论文
当前位置: 首页 > 科研成果 > 论文
实验室发表论文
浏览次数: | 评论次数: | 发布人:管理员 | 发布时间:2020/12/18 22:40:18

英文论文:

[1]. Shan Tian, Songsong Mo, Liwei Wang, Zhiyong Peng. Deep reinforcement learning-based approach to tackle topic-aware influence maximization[J]. Data Science and Engineering, 2020, 5(1): 1-11.


[2]. Songyong Mo, Zhifeng Bao, Baihua Zheng, Zhiyong Peng. FASTS: A satisfaction-boosting bus scheduling assistant[J]. Proceedings of the VLDB Endowment 2020, 13(12): 2873-2876


[3]. Ping Zhang, Zhifeng Bao, Yuchen Li, Guoliang Li, Yipeng Zhang, Zhiyong Peng Towards an Optimal Outdoor Advertising Placement: When a Budget Constraint Meets Moving Trajectories[J]. ACM Transactions on Knowledge Discovery from Data (TKDD), 2020, 14(5): 1-32.


[4]. Juntao Zhang, Biao Li, Wei Song, Nanzhou Lin, Xiandi Yang, Zhiyong Peng. Learning Ability Community for Personalized Knowledge Tracing[C]//Asia-Pacific Web (APWeb) and Web-Age Information Management (WAIM) Joint International Conference on Web and Big Data. Springer, Cham, 2020: 176-192.


[5]. Songsong Mo, Zhifeng Bao, Baihua Zheng, Zhiyong Peng. Bus Frequency Optimization: When Waiting Time Matters in User Satisfaction[J]. International Conference on Database Systems for Advanced Applications (DASFAA), 2020: 192-208


[6]. Fan Wu, Juntao Zhang, Yuling Shi, Xiandi Yang, Wei Song, Zhiyong Peng. Predicting MOOCs Dropout with a Deep Model[C]//International Conference on Web Information Systems Engineering(WISE). Springer, Cham, 2020: 488-502.


[7]. Yicheng Ding, Wei Song, Yuan Shen, Yan Sun, Enabling Efficient Multi-Keyword Search over Fine-grained Authorized Healthcare Blockchain System[C]//Asia-Pacific Web (APWeb) and Web-Age Information Management (WAIM) Joint International Conference on Web and Big Data. Springer, Cham, 2020:27-41


[8]. Qianwen Luo, Chen Chen, Song Wang, Rongrong Li, Yuwei Peng, Tool Data Modeling Method Based on an Object Deputy Model[C]//Asia-Pacific Web (APWeb) and Web-Age Information Management (WAIM) Joint International Conference on Web and Big Data. Springer, Cham, 2020: 491-499.


[9]. Hai Lan, Zhifeng Bao, Yuwei Peng, An Index Advisor Using Deep Reinforcement Learning[C]//Conference on Information and Knowledge Management, 2020:2105-2108.


[10]. Fei Wang, Tieyun Qian, Bin Liu, Zhiyong Peng. Patent expanded retrieval via word embedding under composite-domain perspectives[J]. Frontiers of Computer Science, 2019, 13(5): 1048-1061.


[11]. Ping Zhang, Zhifeng Bao, Yudong Niu, Yipeng Zhang, Songsong Mo, Fei Geng, Zhiyong Peng, Proactive rumor control in online networks[J]. World Wide Web-Internet and Web Information Systems, 2019, 22(4):1799-1818.


[12]. Wei Song, Chengliang Shi, Yuan Shen, Zhiyong Peng. Select the Best for Me: Privacy-Preserving Polynomial Evaluation Algorithm over Road Network[M]// Complexity in Polish Phonotactics. 2019:281-297.


[13]. Shan Tian, Ping Zhang, Songsong Mo, Liwei Wang, Zhiyong Peng. A Learning Approach for Topic-Aware Influence Maximization[C]//Asia-Pacific Web (APWeb) and Web-Age Information Management (WAIM) Joint International Conference on Web and Big Data. Springer, Cham, 2019: 125-140.


[14]. Songsong Mo, Shan Tian, Liwei Wang, Zhiyong Peng. Minimizing the spread of rumor within budget constraint in online network[C]//National Conference of Theoretical Computer Science. Springer, Singapore, 2019: 131-149.


[15]. Yu Wu, Nanzhou Lin, Wei Song, Shen Yuan, Xiandi Yang, Juntao Zhang, Yan Sun. Adaptive Authorization Access Method for Medical Cloud Data Based on Attribute Encryption[C]//International Conference on Web Information Systems and Applications. Springer, Cham, 2019: 361-367.


[16]. Chaoqun Yang, Yuanyuan Zhu, Ming Zhong, Rongrong Li. Semantic Similarity Computation in Knowledge Graphs: Comparisons and Improvements[C]//International Conference on Data Engineering Workshops (ICDEW), 2019: 249-252.


[17]. Ping Zhang, Zhifeng Bao, Yuchen Li, Guoliang Li, Yipeng Zhang, Zhiyong Peng. Trajectory-driven Influential Billboard Placement[C]// International Conference on Knowledge Discovery & Data Mining(ACM SIGKDD), 2018:2748-2757.


[18]. Yuwei Peng, Hai Lan, Mingliang Yue, Yu Xue. Multipurpose watermarking for vector map protection and authentication[J]. Multimedia Tools and Applications, 2018,77:7239–7259.


[19]. Yuling Shi, Zhiyong Peng, Liang Hong, Qian Yu. SoC-constrained Team Formation with Self-Organizing mechanism in Social Networks[J]. Knowledge-Based Systems, 2017, 138:1-14


[20]. Yuling Shi, Zhiyong Peng, Hongning Wang. Modeling Student Learning Styles in MOOCs[C]//ACM on Conference on Information and Knowledge Management, 2017:979-988.


[21]. Liang Wang, Liwei Wang, Zhiyong Peng. Probabilistic object deputy model for uncertain data and lineage management[J]. Data & Knowledge Engineering, 2017,109:70-84.


[22]. Wei Song, Bing Wang, Qian Wang, Zhiyong Peng, Wenjing Lou. Tell me the truth: Practically public authentication for outsourced databases with multi-user modification[J]. Information Sciences, 2017,387:221-237.


[23]. Wei Song, Bing Wang, Qian Wang, Zhiyong Peng, Wenjing Lou, Yihui Cui. A privacy-preserved full-text retrieval algorithm over encrypted data for cloud storage applications[J]. Journal of Parallel and Distributed Computing, 2017, 99:14-27.


[24]. Wei Song, Bing Wang, Qian Wang, Chengliang Shi, Wenjing Lou, Zhiyong Peng. Publicly Verifiable Computation of Polynomials over Outsourced Data with Multiple Sources[J]. IEEE Transactions on Information Forensics & Security, 2017,12(10):2334-2347.


[25]. Bing Wang , Wei Song, Wenjing Lou , Y. Thomas Hou. Privacy-preserving pattern matching over encrypted genetic data in cloud computing[C]// IEEE Conference on Computer Communications(IEEE INFOCOM), 2017:1-9.


[26]. Hai Lan, Yuwei Peng. Reversible fragile watermarking for fine-grained tamper localization in spatial data[C]//Australasian Database Conference. Springer, Cham, 2017: 233-247.


[27]. Tieyun Qian, Bin Liu, Chen Li, Zhiyong Peng. Tri-Training for authorship attribution with limited training data: a comprehensive study[J]. Neurocomputing, 2016, 171: 798-806.


[28]. Song Wang, Hao Huang , Yunjun Gao, Tieyun Qian, Liang Hong, Zhiyong Peng. Fast rare category detection using nearest centroid neighborhood[C]//Asia-Pacific Web Conference. Springer, Cham, 2016: 383-394


[29]. Xiaoying Wu , Theodoratos D, Zhiyong Peng . Efficiently mining homomorphic patterns from large data trees[C]//International Conference on Database Systems for Advanced Applications. Springer, Cham, 2016: 180-196.


[30]. Wei Song, Zou Hua, Haowen Liu, Chen Jun. A practical group key management algorithm for cloud data sharing with dynamic group[J]. China Communications, 2016, 13(6):205-216.


[31]. Liang Wang , Liwei Wang, Zhiyong Peng. Probabilistic object deputy model for uncertain data and lineage management[J]. Data & Knowledge Engineering, 2017, 109: 70-84.


[32]. Liang Wang, Liwei Wang, Zhiyong Peng. A Working Model for Uncertain Data with Lineage[C]//International Conference on Conceptual Modeling. Springer, Cham, 2015: 369-383.


[33]. Xia Wu, Yuanyuan Zhu, Shengchao Xiong, Yuwei Peng, Zhiyong Peng. A new similarity measure between semantic trajectories based on road networks[C]//Asia-Pacific Web Conference. Springer, Cham, 2015: 522-535.


[34]. Yuwei Peng, Mingliang Yue. A Zero-Watermarking Scheme for Vector Map Based on Feature Vertex Distance Ratio[J]. Journal of Electrical & Computer Engineering, 2015, 2015:35.


[35]. Zhiyong Peng, Mingliang Yue, Xia Wu, Yuwei Peng. Blind watermarking scheme for polylines in vector geo-spatial data[J]. Multimedia Tools and Applications, 2015,74(24):11721-11739.


[36]. Wei Song , Zhiyong Peng , Qian Wang, Fanquan Cheng. Efficient privacy‐preserved data query over ciphertext in cloud computing[J]. Security & Communication Networks, 2014, 7(6):1049-1065.


[37]. Tieyun Qian , Qing Li, Jaideep Srivastava, Zhiyong Peng, Yang Yang , Shuo Wang. Exploiting small world property for network clustering[J]. World Wide Web-internet & Web Information Systems, 2014, 17(3):405-425.


[38]. Yihui Cui , Zhiyong Peng , Wei Song , Xiaojuan Li, Fangquan Cheng, LuXiao Ding. A Time-Based Group Key Management Algorithm Based on Proxy Re-encryption for Cloud Storage[C]//Asia-Pacific Web Conference. Springer, Cham, 2014: 117-128.


[39]. Dacheng Liu, Zhiyong Peng, Bin Liu, Xu Chen, Yuqi Guo. A Time-Based Group Key Management Algorithm Based on Proxy Re-encryption for Cloud Storage[C]//Asia-Pacific Web Conference. Springer, Cham, 2014: 117-128.


[40]. Junyan Jiang, Zhiyong Peng, Xiaoying Wu, Nan Liang. Sharing-Aware Scheduling of Web Services[C]//Asia-Pacific Web Conference. Springer, Cham, 2014: 153-164.


[41]. Ge Xie , Zhiyong Peng , Wei Song . Query Authentication over Cloud Data from Multiple Contributors[C]//Asia-Pacific Web Conference. Springer, Cham, 2014: 469-477.


[42]. Qian Yu, Zhiyong Peng, Liang Hong, Bin Liu, Haiping Peng. Novel community recommendation based on a user-community total relation[C]//International Conference on Database Systems for Advanced Applications. Springer, Cham, 2014: 281-295.


[43]. Mingliang Yue, Zhiyong Peng, Kai Zheng, Yuwei Peng. Rights protection for trajectory streams[C]//International Conference on Database Systems for Advanced Applications. Springer, Cham, 2014: 407-421.


[44]. Ling Feng, Zhiyong Peng, Bin Liu, Dunren Che. Finding Novel Patents Based on Patent Association[C]//International Conference on Web-Age Information Management. Springer, Cham, 2014: 5-17.


[45]. Fangquan Cheng, Qian Wang, Qianwen Zhang, Zhiyong Peng. Highly efficient indexing for privacy-preserving multi-keyword query over encrypted cloud data[C]//International Conference on Web-Age Information Management. Springer, Cham, 2014: 348-359.


[46]. Qian Wang, Meiqi He, Wei Song, Yun Rui. Energy efficient opportunistic cooperative transmission with different ratio combinings: from a new perspective[J]. Science China Information Sciences, 2014, 57(4): 1-14.


[47]. Wenfeng Li, Liwei Wang, Zhiyong Peng, Deyi Li. A Sampling Method of Finding Top-k Frequent Items on Timestamp-Based Stream[C]//2014 11th Web Information System and Application Conference. IEEE, 2014: 221-226.


[48]. Jia Zhu, Yi Yang, Qing Xie, Liwei Wang. Saeed-Ul Hassan. Robust hybrid name disambiguation framework for large databases[J]. Scientometrics, 2014, 98(3): 2255-2274.


[49]. Mingliang Yue, Zhiyong Peng, Yuwei Peng. A fragile watermarking scheme for modification type characterization in 2d vector maps[C]//Asia-Pacific Web Conference. Springer, Cham, 2014: 129-140.


[50]. Bin Fu , Wenfeng Li , Zhiyong Peng . Sublinear Time Approximate Sum via Uniform Random Sampling[C]//International Computing and Combinatorics Conference. Springer, Berlin, Heidelberg, 2013: 713-720.


[51]. Chuanjian Wang, Zhiyong Peng, Yuwei Peng, Liang Yu, Junzhou Wang, Qingzhan Zhao. Watermarking geographical data on spatial topological relations[J]. Multimedia Tools & Applications, 2012, 57(1):67-89.


[52]. Xu Chen , Zhiyong Peng , Cheng Zeng . A co-training based method for Chinese patent semantic annotation[C]//Proceedings of the 21st ACM international conference on Information and knowledge management. 2012: 2379-2382.


[53]. Dawen Jia, Cheng Zeng, Wenhui Nie, Zhihao Li, Zhiyong Peng. A new approach for date sharing and recommendation in social web[C]//International Conference on Database and Expert Systems Applications. Springer, Berlin, Heidelberg, 2012: 314-328.


[54]. Liwei Wang, Koehler H, Ke Deng, Xiaofang Zhou. Flexible Provenance Tracing[J]. International Journal of Systems & Service Oriented Engineering, 2011, 2(2):1-20.


[55]. Zhixu Li, Sitbon L, Liwei Wang, Xiaofang Zhou. Aml: Efficient approximate membership localization within a web-based join framework[J]. IEEE Transactions on Knowledge and Data Engineering, 2011, 25(2): 298-310.


[56]. Liang Wang, Liwei Wang, Zufa Fu, Zeqian Huang, Zhiyong Peng. Sorting of Search Results Based on Data Quality[C]//Web Information Systems and Applications Conference. 2011: 119-124.


[57]. Jia Zhu , Gabriel Fung , Liwei Wang. Efficient name disambiguation in digital libraries[C]//International Conference on Web-Age Information Management. Springer, Berlin, Heidelberg, 2011: 430-441.


[58]. Yuwei Peng, Hefei Ge, Mao Ding, Zeqian Huang, Chuanjian Wang. Index structure for cross-class query in object deputy database[C]//International Conference on Web-Age Information Management. Springer, Berlin, Heidelberg, 2011: 493-504.


[59]. Rongrong Li, Weixiang Zhai, Zhiyong Peng. Supporting query over dynamic combination of data sources for social media[C]//International Conference on Web-Age Information Management. Springer, Berlin, Heidelberg, 2011: 185-196.


[60]. Zhiyong Peng , Hui Wang , Yuwei Peng , Bo Xu. A three layer system architecture for web-based unstructured data management[C]//International Asia-Pacific Web Conference, IEEE, 2010: 447-450.


[61]. Xiaozhu Liu , Zhiyong Peng . An efficient random access inverted index for information retrieval[C]//International conference on World wide web. 2010: 1153-1154.


[62]. Liwei Wang, Köehler H, Ke Deng, Xiaofang Zhou. Providing flexible tradeoff for provenance tracking[C]//International Conference on Web Information Systems Engineering. Springer, Berlin, Heidelberg, 2010: 226-240.


[63]. Ke Deng, Liwei Wang, Xiaofang Zhou, Shazia Sadiq. Active duplicate detection[C]//International Conference on Database Systems for Advanced Applications. Springer, Berlin, Heidelberg, 2010: 565-579.


[64]. Zhixu Li, Laurianne Sitbon, Liwei Wang, Xiaofang Zhou , Xiaoyong Du. Approximate membership localization (AML) for web-based join[C]//ACM international conference on Information and knowledge management. 2010: 1321-1324.


[65]. Tieyun Qian, Jaideep Srivastava, Zhiyong Peng, Phillip C. Y. Sheu. Simultaneously Finding Fundamental Articles and New Topics Using a Community Tracking Method //Pacific-Asia Conference on Knowledge Discovery and Data Mining. Springer, Berlin, Heidelberg, 2009: 796-803.


[66]. Liwei Wang, Zeqian Huang, Ming Luo. Supporting Dynamic Workflow Adaptation in a Dataflow-Constrained Workflow Net[C]//International Conference on New Trends in Information and Service Science. IEEE, 2009: 1000-1005.


[67]. Xiandi Yang, Zhiyong Peng, Yuwei Peng. Personalized Information Integration by Object Deputy Model[C]//International Conference on Computer and Information Technology. IEEE, 2009, 1: 324-329.


[68]. Zukai Tang, Zhiyong Peng, Yi Ren: Using Object Deputy Model for Aspect Oriented Programming[C]//International Conference on Creating, Connecting and Collaborating through Computing (C5'07). IEEE, 2007: 170-177.


[69]. Min Huang, Xiang Zhou, Jiaheng Cao, Zhiyong Peng. Geo-WDBMS: An Improved DBMS with the Function of Watermarking Geographical Data[C]// International Conference on Database Systems for Advanced Applications. Springer, Berlin, Heidelberg, 2007: 1098-1109.


[70]. Zhiyong Peng, Yuwei Peng, Boxuan Zhai. Using object deputy database to realize multi-representation geographic information system[C]//Annual ACM international symposium on Advances in geographic information systems. 2007: 1-4.


[71]. Xiang Zhou, Min Huang, Zhiyong Peng. An additive-attack-proof watermarking mechanism for databases' copyrights protection using image[C]//ACM symposium on Applied computing. 2007: 254-258.


[72]. Xiandi Yang, Ning He, Libing Wu, Junqiang Liu. Ontology based approach of semantic information integration[J]. Journal of Southeast University (English Edition), 2007, 23(3): 338-342.


[73]. Junqiang Liu, Xiandi Yang. Deputy Mechanism for OLAP over Imprecise Data and Composite Measure[C]//International Conference on Computer and Information Technology (CIT 2007). IEEE, 2007: 65-70.


[74]. Zhiyong Peng , Yuan Shi , Boxuan Zhai . Realization of Biological Data Management by Object Deputy Database System[M]//Transactions on Computational Systems Biology. Springer, Berlin, Heidelberg, 2006: 49-67.


[75]. Zhe Shan, Yu Yang, Qing Li, Yi Luo, Zhiyong Peng. A light-weighted approach to workflow view implementation[C]//Asia-Pacific Web Conference. Springer, Berlin, Heidelberg, 2006: 1059-1070.


[76]. Boxuan Zhai, Yuan Shi, Zhiyong Peng. Object Deputy Database Language [C]// International Conference on Creating, Connecting and Collaborating through Computing (C5'06). IEEE, 2006: 88-95.


[77]. Yuan Shi , Boxuan Zhai , Xiang Zhou , Zhiyong Peng. Object Identifier Reuse Mechanism for TOTEM[C]//International Conference on Data Engineering Workshops (ICDEW'06). IEEE, 2006: 127-127.


[78]. Liwei Wang, Zhiyong Peng, Min Luo, Wenhao Ji, Zeqian Huang. A Scientific Workflow Framework Integrated with Object Deputy Model for Data Provenance[C]// International Conference on Web-Age Information Management. Springer, Berlin, Heidelberg, 2006: 569-580.


[79]. Bin Liu, Baohua Cao, Bing Li, Deyi Li. Mining representative nodes in scale-free networks[J]. Dynamics of Continuous, Discrete and Impulsive Systems Series B: Applications and Algorithms, 2006, 13(3): 395.


[80]. Xuhui Li , Zhiyong Peng , Jiaheng Cao. A practical approach to specifying and verifying mobile agent algorithms[J]. International Journal of Pervasive Computing and Communications, 2005, 1(2):115-122.


[81]. Zhiyong Peng, Qing Li, Ling Feng, Xuhui Li, Junqang Liu. Using object deputy model to prepare data for data warehousing[J]. IEEE Transactions on Knowledge and Data Engineering, 2005, 17(9):1274-1288.


[82]. Zhiyong Peng, Kai Huang, Shijun Li, Yi Luo. Integration of multiple heterogeneous databases in Smalltalk[C]//International Conference on Creating, Connecting and Collaborating through Computing (C5'05). IEEE, 2005: 108-115.


[83]. Zhe Shan, Qing Li, Yi Luo, Zhiyong Peng. Deputy mechanism for workflow views[C]//International Conference on Database Systems for Advanced Applications. Springer, Berlin, Heidelberg, 2005: 816-827.


[84]. Yuwei Peng, Weiping Xie, Boxuan Zhai. A Personalized Electronic Map System Based on Object Deputy Model[C]//International Conference on Data Engineering Workshops (ICDEW'05). IEEE, 2005: 1252-1252.


[85]. Cheng Zeng, Jiaheng Cao, Zhiyong Peng. A novel 3D video trajectory tracking method[C]// International Conference on Computer and Information Technology. IEEE, 2004: 221-226.


[86]. Shijun Li , Zhiyong Peng , Mengchi Liu. Extraction and integration information in HTML tables[C]// International Conference on Computer and Information Technology. IEEE, 2004: 315-320.


[87]. Min Huang, Jiaheng Cao, Zhiyong Peng. A new watermark mechanism for relational data[C]// International Conference on Computer and Information Technology. IEEE, 2004:  946-950.


[88]. Liwei Wang , Zhiyong Peng. Extension of multi-version concurrency control mechanisms for long-duration transaction based on nested transaction model[C]// International Conference on Computer and Information Technology. IEEE, 2004:963-968.


[89]. Shijun Li, Mengchi Liu, Guoren Wang, Zhiyong Peng. Capturing Semantic Hierarchies to Perform Meaningful Integration in HTML Tables[C]//Asia-Pacific Web Conference. Springer, Berlin, Heidelberg, 2004: 899-902.


[90]. Juan Ye, Zhiyong Peng. A Squeak-based educational software-Happy Learning[C]// International Conference on Creating, Connecting and Collaborating through Computing. IEEE, 2004: 138-145.


[91]. Zhe Shan, Zhiyi Long, Yi Luo, Zhiyong Peng. Object-Oriented Realization of Workflow Views for Web Services–An Object Deputy Model Based Approach[C]//International Conference on Web-Age Information Management. Springer, Berlin, Heidelberg, 2004: 468-477.


[92]. Shijun Li , Mengchi Liu , Ling T W , Zhiyong Peng. Automatic HTML to XML conversion[C]//International Conference on Web-Age Information Management. Springer, Berlin, Heidelberg, 2004: 714-719.


[93]. Shijun Li, Mengchi Liu , Zhiyong Peng . Wrapping HTML tables into XML[C]//International Conference on Web Information Systems Engineering. Springer, Berlin, Heidelberg, 2004: 147-152.


[94]. Yi Luo, Zhiyong Peng, Zhe Shan, Qing Li. Semantics based conformance assessment of ebXML business processes[C]//International Conference on Web Information Systems Engineering. Springer, Berlin, Heidelberg, 2004: 590-595.


[95]. Zhiyong Peng, Kai Huang, Juan Ye. Development of smalltalk in China[C]//Conference on Creating, Connecting and Collaborating Through Computing, IEEE, 2003: 52-59.


[96]. Jihong Guan, Shuigeng Zhou, Junpeng Chen, Zhiyong Peng. MAG2DL: A framework for information retrieval and integration of distributed Geographic Digital Libraries[C]//International Conference on Asian Digital Libraries. Springer, Berlin, Heidelberg, 2003: 351-364.


[97]. Zhiyong Peng, Yahiko Kambaya, Resolving conflicts and handling replication during integration of multiple databases by object deputy model[C]//International Conference on Conceptual Modeling. Springer, Berlin, Heidelberg, 2001: 285-298.


中文论文:

[1]. 王淞,彭煜玮,兰海,罗倩雯,彭智勇.数据集成方法发展与展望[J]. 软件学报, 2020, 000(003):893-908.


[2]. 胡聪睿,刘斌,冯岭,王飞,彭智勇. 对象代理数据库的双向指针存储优化方法[J]. 计算机学报, 2018, 41(8): 1752-1765.


[3]. 吴瑕,唐祖锴,祝园园,彭煜玮,彭智勇. 近似到达时间约束下的语义轨迹频繁模式挖掘[J]. 软件学报. 2018, 29(10): 3184-3204


[4]. 张平,王黎维,彭智勇,岳昆,黄浩. 一种面向团体的影响最大化方法[J]. 软件学报, 2017, 28(8):2161-2174


[5]. 崔一辉,宋伟,王占兵,史成良,程芳权. 一种基于格的隐私保护聚类数据挖掘方法[J]. 软件学报, 2017, 28(9):2293-2308


[6]. 江俊彦, 彭智勇, 吴小莹,彭承晨,王敏. 基于分层抽样的重叠深网数据源选择[J]. 软件学报, 2017, 28(5):1271-1295


[7]. 崔一辉, 宋伟, 王占兵, 史成良,程芳权. 一种基于格的隐私保护聚类数据挖掘方法[J]. 软件学报, 2017, 28(009):2293-2308.


[8]. 刘斌, 冯岭, 王飞, 彭智勇. 支持技术创新的专利检索与分析[J]. 通信学报, 2016, 37(3): 79-89. 


[9]. 余骞, 彭智勇, 洪亮, 万言历. 基于用户邻域和主题的新颖性Web社区推荐方法[J]. 软件学报, 2016(5):1266-1284.


[10]. 王淞,黄浩,余果,梁楠,王黎维,孙月明. 一种基于 k 近邻图的稀有类检测算法[J]. 软件学报, 2016 (9): 2320-2331.


[11]. 冯岭,彭智勇,刘斌,车敦仁. 一种基于潜在引用网络的专利价值评估方法[J]. 计算机研究与发展, 2015, 52(3): 649.


[12]. 宋伟、彭智勇、王骞、李瑞轩、程芳权、崔一辉.Mimir:一种基于密文的全文检索服务系统[J],计算机学报,2014,37(5):1170-1183.


[13]. 王梁,周光焱,王黎维,彭智勇. 不确定关系数据属性级溯源表示与概率计算[J]. 软件学报, 2014, 4: 863-879.


[14]. 程芳权,彭智勇,宋伟,王书林,崔一辉.可信云存储环境下支持访问控制的密钥管理[J],计算机研究与发展,2013, 50(8):1613-1627.


[15]. 王黎维,付祖发,刘东明,王梁,李佳瑾,彭智勇. 生物实验信息管理系统[J]. 计算机研究与发展, 2013 (S1): 410-415.


[16]. 李文凤, 彭智勇, 李德毅. 不确定性Top-K查询处理[J]. 软件学报, 2012, 23(006):1542-1560.


[17]. 贾大文,曾承, 彭智勇,成鹏,阳志敏, 卢舟. 一种基于用户偏好自动分类的社会媒体共享和推荐方法[J].计算机学报,2012.11:2381—2391.


[18]. 程芳权,彭智勇,宋伟,王书林,崔一辉.云环境下一种隐私保护的高效密文排序查询方法[J].计算机学报, 2012,35(11):2215-2227


[19]. 汪传建,葛贺飞,丁卯,彭智勇,彭煜玮,宋伟,王俊舟. 一种基于可变步长量化调制的地理数据库水印方法[J]. 计算机研究与发展. 2011, 48(10): 1960-1971.


[20]. 程芳权,宋伟,任毅,江小华,黄小婷,陈立,彭智勇. 可信Web电子邮件服务系统[J]. 计算机研究与发展, 2011, 048(0z2):792-798.


[21]. 宋伟,彭智勇,程芳权,李文海,胡文斌,任毅. 可信数据库环境下面向服务的自适应密文数据查询方法[J]. 计算机学报, 2010, 33(8): 1324-1338.


[22]. 黄泽谦,彭智勇,李越,彭煜玮. 一种支持对象代理数据库高效查询处理的索引结构[J]. 计算机学报. 2010, 33(8): 1446-1459.


[23]. 陈旭,黄泽谦,彭煜玮,曾承,彭智勇.网上专利个性化管理与服务系统[J]. 计算机研究与发展. 2010, 47(z1): 489-493.


[24]. 刘小珠, 彭智勇. 全文索引技术时空效率分析[J]. 软件学报, 2009, 20(007):1768-1784.


[25]. 王黎维, 黄泽谦, 罗敏, 彭智勇. 集成对象代理数据库的科学工作流服务框架中的数据跟踪[J]. 计算机学报, 2008, 31(5): 721-732.


[26]. 宋伟,李瑞轩,卢正鼎,於光灿. 一种支持多维资源描述的高效 P2P 路由算法[J]. 软件学报, 2007, 18(11): 2851-2862.


[27]. 黄敏,韩南,周祥,彭煜玮,曹加恒,彭智勇. 2006. 一种带有纠错机制的数据库水印技术[J]. 计算机研究与发展. 2006, 43(z3): 276-283


[28]. 彭智勇,罗义,单喆,李青. 基于对象代理模型的工作流视图实现[J]. 计算机学报, 2005(04):222-231.