研究成果

近五年学术著作、专利、发表论文。

著作

序号 名称 出版社 出版时间 著作人及排序
1 通信安全保密 金城出版社 2016年 周安民
2 应用密码学(规划教材第2版) 清华大学出版社 2014年 刘嘉勇,任德斌,胡勇,方勇
3 信息系统安全风险估计与控制理论 科学出版社 2011年 王祯学,周安民,方勇

专利

序号 专利名称 第一发明人 专利号 授权日期
1 一种基于频谱分析的复合文档恶意代码检测方法与系统 方勇 2013102245691 2015-12-02
2 一种基于虚拟化主机的广告展示方法与系统 方勇 2013100324491 2016-01-20

论文(SCI/EI检索)

[1] Huang C, Liu J Y, Fang Y, et al. A study on Web security incidents in China by analyzing vulnerability disclosure platforms[J]. Computers& Security, 2015, 58:47-62.

[2] Zhang Q, Qin R, Huang X, et al. Classification of Ultra-High Resolution Orthophotos Combined with DSM Using a Dual Morphological Top Hat Profile[J]. Remote Sensing, 2015, 7(12):16422-16440.

[3] Xue Zhou, Yong Hu, Yue Wu, et al. Influence analysis of information erupted on social networks based on SIR model[J]. International Journal of Modern Physics C, 2015, 26(2).

[4] Yue Wu, Yong Hu, Xiaohai He, et al. Impact of user influence on information multi-step communication in a micro-blog[J]. Chinese Physics B, 2014, 23(6):5-12.

[5] YUE WU, YONG HU, XIAOHAI HE. PUBLIC OPINION FORMATION MODEL BASED ON OPINION ENTROPY[J]. International Journal of Modern Physics C, 2013, 24(11):263-300.

[6] Yue W U, Yong H U. Online Forum Post Opinion Classification Based on Tree Conditional Random Fields Model[J]. Wireless Communication Over Zigbee for Automotive Inclination Measurement China Communications, 2013, 10(8):125-136.

[7] Tang J, Fang Y, Tang J G. The Lattice-Valued Turing Machines and the Lattice-Valued Type 0 Grammars[J]. Mathematical Problems in Engineering, 2014, 2014(2):281-297.

[8] CHAOLANG HU, RONGJUN WU, JIAYONG LIU. STUDY ON THE MODEL OF CONSENSUS FORMATION IN INTERNET BASED ON THE DIRECTED GRAPH[J]. International Journal of Modern Physics C, 2012, 23(6):58-68.

[9] 吴少华, 崔鑫, 胡勇. 基于SNA的网络舆情演变分析方法[J]. 四川大学学报:工程科学版, 2015, 47(1):138-142.

[10] 刘亮, 彭帝, 杨延峰,等. 二进制代码中整数型漏洞挖掘和利用技术[J]. 四川大学学报:工程科学版, 2012, 44(1):123-126.

[11] Li L, Zhou A M, Fang Y, et al. An Improved VIPS-Based Algorithm of Extracting Web Content[J]. Applied Mechanics & Materials, 2014, 651-653:1806-1810.

[12] Cheng H, Yong F, Liang L, et al. A static detection model of malicious PDF documents based on naive Bayesian classifier technology[C]// Wavelet Active Media Technology and Information Processing (ICWAMTIP), 2012 International Conference on. 2012:29-32.

[13] Jia P, He X, Liu L, et al. A framework for privacy information protection on Android[C]// International Conference on Computing, NETWORKING and Communications. IEEE, 2015:1127 - 1131.

[14] Zuo Z, Fang Y, Liu L, et al. Research on information security cost based on game-theory[C]// Industrial Electronics and Applications. 2013:1435-1436.

[15] He L, Fang Y, Liu L. Website Regional Rapid Security Detection Method[C]// Fifth International Conference on Computational Intelligence, Communication Systems and Networks. 2013:185-190.

[16] Wang J, Fang Y, Liu L. Research on Trojan communication model based on IRC and webmail system[C]// Industrial Electronics and Applications. 2012:682-685.

[17] Gong Y, Fang Y, Liu L, et al. Multi-agent Intrusion Detection System Using Feature Selection Approach[C]// Tenth International Conference on Intelligent Information Hiding and Multimedia Signal Processing. IEEE, 2014:544-552.