【按时间倒序排列】
[1] 古天龙, 李龙, 常亮, 罗义琴. 公平机器学习:概念、分析与设计[J]. 计算机学报,2022. (录用待刊,EI,一级学报,CCF推荐A类期刊)
[2] 古天龙, 郝峰锐,李龙, 李晶晶, 常亮. 社交网络中负责隐私协商的智能体行为追责研究[J]. 软件学报,2022. (录用待刊,EI,一级学报,CCF推荐A类期刊)
[3] 古天龙, 马露, 李龙, 闫茹. 符合伦理的人工智能应用的价值敏感设计:现状与展望[J]. 智能系统学报,
2022, 17(01): 1-14. (CCF推荐C类期刊)
[4] 古天龙,李龙.伦理智能体及其设计:现状和展望[J].计算机学报,2021,44(03):632-651. (EI,一级学报,CCF推荐A类期刊)
[5] 古天龙,冯旋,李龙,包旭光,李云辉.基于社会新闻数据集的伦理行为判别方法[J].计算机研究与发展,2021,58(02):253-263. (EI,一级学报,CCF推荐A类期刊)
[6] 古天龙,高慧, 李龙,包旭光,李云辉. 基于强化学习的伦理智能体训练方法[J].计算机研究与发展,2021. (网络首发,EI,一级学报,CCF推荐A类期刊)
[7] Xuguang
Bao, Tianlong Gu, Liang Chang, Zhoubo Xu, Long
Li. Knowledge-Based Interactive Postmining of User-Preferred
Co-Location Patterns Using Ontologies[J]. IEEE Transactions on Cybernetics,
2021,3(11):1-14. (SCI,IF= 11.079,CCF推荐B类期刊)
[8] Xinyu
Tang, Cheng Guo, Kim-Kwang Raymond Choo, Yining Liu, Long Li. A Secure and Trustworthy Medical Record Sharing
Scheme based on Searchable Encryption and Blockchain[J]. Computer Networks,
2021, 2021: 1-16. (SCI,IF= 4.474,CCF推荐B类期刊)
[9] Yunhui
Li, Liang Chang, Long Li,
Xuguang Bao, and Tianlong Gu. TASC-MADM: Task Assignment in Spatial
Crowdsourcing Based on Multiattribute Decision-Making[J]. Security and
Communication Networks, 2021, 2021: 1-14. (SCI,IF=
1.791,CCF推荐C类期刊)
[10] Yunhui
Li, Liang Chang, Long Li,
Xuguang Bao, and Tianlong Gu. Key Research Issues and Related Technologies in
Crowdsourcing Data Collection[J]. Wireless Communications and Mobile Computing,
2021, 2021: 1-15. (SCI,IF= 2.336,CCF推荐C类期刊)
[11] Hongtao
Li, Xingsi Xue, Zhiying Li, Long Li,
Jinbo Xiong. Location Privacy Protection Scheme for LBS in IoT[J]. Wireless
Communications and Mobile Computing, 2021, 2021: 1-18. (SCI,IF=
2.336,CCF推荐C类期刊)
[12] Chien-Ming
Chen, Zhen Li , Shehzad Ashraf Chaudhry , Long
Li. Attacks and Solutions for a Two-Factor Authentication Protocol for
Wireless Body Area Networks[J]. Security and Communication Networks, 2021,
2021: 1-12. (SCI,IF= 1.791,CCF推荐C类期刊)
[13] Yike
Li, Yingxiao Xiang, Endong Tong, Wenjia Niu, Bowei Jia, Long Li, Jiqiang Liu, Zhen Han. An Empirical Study on
GAN-based Traffic Congestion Attack Analysis: A Visualized Method[J]. Wireless
Communications and Mobile Computing, 2021, 2021: 1-12. (SCI,IF=
2.336,CCF推荐C类期刊)
[14] Zhang
Naiqian, Liao Qichun, Jin Libiao, Li Long, Xia Zhiping. An Improved Spectrum
Allocation Algorithm based on System Throughput Maximization[J].
Electrotehnica, Electronica, Automatica, 2021, 69(3): 91-99. (EI,CCF推荐A类期刊,CACR推荐C类期刊)
[15] Tianlong
Gu, Bin Yuan, Yining Liu, Peng Wang, Long
Li, Liang Chang. An improved EAAP scheme for vehicular ad hoc
networks[J]. International Journal of Communication Systems, 2020, e4283. (SCI,IF=2.047,CCF推荐B类期刊)
[16] Yiqin
Luo, Yanpeng Sun, Liang Chang, Tianlong Gu, Chenzhong Bin, Long Li. Considering Fine-Grained and Coarse-Grained
Information for Context-Aware Recommendations[J]. Computer Journal, 2020,
bxaa095. (SCI,IF=1.494,CCF推荐B类期刊)
[17] Yike
Li, Yingxiao Xiang, Endong Tong, Wenjia Niu, Bowei Jia, Long Li, Jiqiang Liu, and Zhen Han. An Empirical Study on
GAN-Based Traffic Congestion Attack Analysis: A Visualized Method[J]. Wireless
Communications and Mobile Computing, 2020, 2020. (SCI,IF=
2.336,CCF推荐C类期刊)
[18] Yubin
Qu, Xiang Chen, Fang Li, Fan Yang, Junxia Ji, Long Li. Empirical Evaluation on the Impact of Class Overlap
for EEG-Based Early Epileptic Seizure Detection[J]. IEEE Access, 2020, 8:
180328-180340. (SCI,IF= 3.367)
[19] Jiang
Wu; Jianjun Xu; Xiankai Meng; Haoyu Zhang; Zhuo Zhang; Long Li. Compilation Optimization Pass Selection Using Gate
Graph Attention Neural Network for Reliability Improvement[J]. IEEE Access,
2020, 8: 150422-150434. (SCI,IF= 3.367)
[20] Fang
Li, Yubin Qu, Junxia Ji, Dejun Zhang, Long
Li. Active Learning Empirical Research on Cross-Version Software Defect
Prediction Datasets [J]. International Journal of Performability Engineering,
2020, 16(4): 609-617. (EI)
[21] Tianlong
Gu, Hanyi Chen, Liang Chang, Long Li.
Intrusion detection system based on improved abc algorithm with tabu search[J].
IEEJ Transactions on Electrical and Electronic Engineering, 2019, 14(11):
1652-1660. (SCI,IF= 0.686)
[22] Yiqin
Luo, Liang Chang, Long Li,
Wei Chen, Tianlong Gu. Knowledge Representation Learning with Dynamic Path[J].
Journal of Computers, 2019, 30(6): 207-215. (EI)
[23] 李龙,古天龙,常亮,李晶晶,钱俊彦.云制造中策略可更新的去中心化访问控制机制[J].计算机集成制造系统,2019,25(09):2280-2290. (EI,CCF推荐C类期刊)
[24] Long Li, Tianlong Gu, Liang
Chang, Jingjing Li, Junyan Qian. CP-ABE based Access Control with Policy
Updating and Fast Decryption for Intelligent Manufacturing[J]. Journal of
Internet Technology, 2018, 19(3), 825–836. (SCI,IF=
1.392)
[25] Long Li, Tianlong Gu, Liang
Chang, Zhoubo Xu, Yining Liu. A Ciphertext-Policy Attribute-Based Encryption
Based on an Ordered Binary Decision Diagram [J]. IEEE Access, 2017,
5(99):1137-1145. (SCI,IF= 3.367)
[26] 李龙, 古天龙, 常亮, 徐周波, 钱俊彦. 快速解密且私钥定长的密文策略属性基加密方案[J]. 电子与信息学报,
2018, 40(7): 1661-1668. (EI,CCF推荐C类期刊)
[27] Long Li, Shaowei Zhang,
Yongchao Zhang, Liang Chang, Tianlong Gu. The Intrusion Detection Model based
on Parallel Multi-Artificial Bee Colony and Support Vector Machine[C]//2019
Eleventh International Conference on Advanced Computational Intelligence
(ICACI). IEEE, 2019: 308-313. (EI)
[28] Long Li, Tianlong Gu, Liang
Chang, Jingjing Li. Efficient Computation Method of Participants’ Weights in
Shamir’s Secret Sharing[C]//International Conference on Security with
Intelligent Computing and Big-data Services. Springer, Cham, 2018: 598-605. (EI)
[29] Shaowei
Zhang, Long Li, Liang Chang,
Tianlong Gu, Huadong Liu. A Ciphertext-Policy Attribute-Based Encryption Based
on Multi-valued Decision Diagram [C]//International Conference on Intelligent
Information Processing. Springer, Cham, 2018: 303-310. (EI)
[30] Yunhao
Yang, Long Li, Liang Chang,
Tianlong Gu. A Poisoning Attack Against the Recognition Model Trained by the
Data Augmentation Method[C]//International Conference on Machine Learning for
Cyber Security. Springer, Cham, 2020: 550-561. (EI)
[31] Huang
Jianbo, Chang Liang, Li Long, Bao Xuguang An Adaptive Dummy-based Mechanism to
Protect Location Privacy in Smart Health Care System[C]//2020 International
Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery
(CyberC). IEEE, 2020: 92-97. (EI)
[32] Ying
Fang, Tianlong Gu, Liang Chang, Long
Li. Algebraic Decision Diagram-Based CP-ABE with Constant Secret and
Fast Decryption[C]//2020 International Conference on Cyber-Enabled Distributed
Computing and Knowledge Discovery (CyberC). IEEE, 2020: 98-106. (EI)
[33] Miao
Li, Xuguang Bao, Liang Chang, Zhoubo Xu, Long
Li. A Survey of Researches on Personalized Bundle Recommendation
Techniques[C]//International Conference on Machine Learning for Cyber Security.
Springer, Cham, 2020: 290-304. (EI)
[34] Wenkai
Wang, Liang Chang, Chenzhong Bin, Wen Xuan, Wei Chen, Long Li. ESN-NER: entity storage network using attention
mechanism for chinese NER[C]//Proceedings of the International Conference on
Artificial Intelligence, Information Processing and Cloud Computing. 2019: 1-8. (EI)
[35] 李建铎,刘建明,李龙,林丹.基于节点关键度的DTN路由算法[J].计算机仿真,2018,35(04):126-130. (中文核心,CCF推荐C类期刊)
[36] 刘建明,唐霞,李龙.基于机器学习的VoIP流量在线识别系统[J].电子技术应用,2016,42(08):133-137. (中文核心)
[37] 李龙,刘建明,古天龙.UWSNs中基于位置及能量信息的垂直分簇路由[J].控制与决策,2015,30(07):1284-1290. (EI)
[38] 李龙,刘建明,李宏周,彭智勇.基于位置和能量的水下无线传感网路由协议[J].计算机应用研究,2014,31(11):3429-3433. (中文核心,CCF推荐C类期刊)
[39] 李龙,刘建明,李宏周,彭智勇.基于节点剩余能量分布的簇头选择算法[J].计算机工程与设计,2014,35(04):1136-1141. (中文核心,CCF推荐C类期刊)
[40] 谢维佳,刘建明,何烨,李龙.水下传感网基于深度信息的定向路由协议[J].微电子学与计算机,2015,32(11):40-45. (中文核心)
[41] 何烨,刘建明,李龙,谢维佳.权重选择下的低延迟飞艇自适应部署[J].计算机工程与设计,2015,36(10):2657-2661. (中文核心,CCF推荐C类期刊)