首页»
研究方向»
学术论文»
2015年
2015年
- 1. Sen Ma,Mingyang Jiao,Shikun Zhang,Wen Zhao,Dong Wei Wang. Practical null pointer dereference detection via value-dependence analysis,International Symposium on Software Reliability Engineering,Nov. 2015
- 2. Yunni Xia,MengChu Zhou,Xin Luo,Qingsheng Zhu,Jia Li,and Yu Huang. stochastic Modeling and Quality Evaluation of Infrastructure-as-a-Service Clouds. IEEE TRANSACTIONS ON AUTOMATION SCIENCE AND ENGINEERING,VOL. 12,NO. 1,JANUARY 2. 2015.
- 3. Qiuxiang Dong,Zhi Guan,Kunlun Gao,Zhong Chen:SCRHM: A Secure Continuous Remote Health Monitoring System. IJDSN 2015: 392439:1-392439:12 (2015) (SCI)
- 4. Zhao Wen,Ma Sen,Yuan Chongyi. Towards Verified Software: Mirror Theory of Programming. CHINESE JOURNAL OF ELECTRONICS. (SCI收录)
- 5. 马森,赵文,习翔宇,王栋伟. 基于值依赖分析的空指针解引用检测. 电子学报. 2015 Vol. 43 (4): 647-651. (EI收录)
- 6. Ma Sen,Zhao Wen,Zhang Shikun. Dereference detection via graph reachability. 6th IEEE International Workshop on Program Debugging(IWPD 2015)(EI收录)。
- 7. Luo Ruici,Ye Wei,Zhang Shikun. Toward a Deployment System for Cloud Applications. The 27th International Conference on Software Engineering and Knowledge Engineering (SEKE),2015
- 8.Yu Huang,etc.. A simulation modeling method based on Petri net. IEEE CSCloud 2015.
- 9.Proceedings of the 2015 IEEE International Conference on Internet of Things,Dec,2015,Sydney(EI检索)
- 10.Proceedings of the 2015 IEEE International Performance Computing and Communications Conference,Dec,2015,Nanjing(EI检索,CCF C类)
- 11.Proceedings of the 20th European Symposium on Research in Computer Security (ESORICS 2015).Springer-Verlag,LNCS(EI检索,CCF B类,学院B类)。
- 12.IEEE Internet of Things Journal,vol.2,Aug,2015(期刊)。
- 13.Proceedings of 2015 IEEE International Conference on Ubiquitous Intelligence and Computing(EI检索,CCF C类)。
- 14.Proceedings of 2015 IEEE International Conference on Big Data and Cloud Computing(EI检索)
- 15.Proceedings of 2015 International Conference on Web-Age Information Management,June,2015(EI检索,CCF C类,学院B类)
- 16.International Journal of Web Services Research (IJWSR),April-June 2015,Vol.12,No.2(SCI/EI检索)
- 17.Information Sciences,Vol.321,2015(SCI/EI检索,CCF B类,学院A类)
- 18.IEEE Transactions on Dependable and Secure Computing,Vol. 12 No.4(SCI检索,CCF A类)