
鲁剑锋

-
教授
- 性别 : 男
- 毕业院校 : 华中科技大学
- 学历 : 博士研究生毕业
- 学位 : 博士学位
- 在职信息 : 在岗
- 所在单位 : 数学与计算机科学学院
- 入职时间 : 2010-08-24
- 学科 : 计算机科学与技术
- 办公地点 : 数计学院21-317
- Email : 0a3339aefc509cc0ae3874987bcafad71b0d151bfb1349c041ec366d0c77e2e987b9fb713aed9d1fa64bb2aae0568159fb1488bde27b68a6255a0807f2fadf28506b29befeadcc39cdde3b4817412ea2617c249e842274d268a83a9989f05947bcab29d6592807bbba6d5a476eff3354261958dc006cce99f7a6e31d05afa1f3
访问量 :
-
[21] Jianfeng Lu.On the complexity of role updating feasibility problem in RBAC.Information Processing Letters.2014,Vol.114 (No.11):597-602
-
[22] Hao Peng.An anonymity mechanism with reduced server-side cost in peer-to-peer networks.International Journal of High Performance Computing and Networking.2016,Vol.9 (No.5-6):409-416
-
[23] Hao Peng.Invulnerability of grown Peer-to-Peer networks under progressive targeted attacks.Physica A: Statistical Mechanics and its Applications.2015,Vol.428 :60-67
-
[24] 鲁剑锋.一种优化的策略不一致性冲突消解方法.华中科技大学学报(自然科学版).2014 (第11期):106-111
-
[25] 郭会.实现轨迹k<sup>m</sup>-匿名的最小变形度算法.计算机工程.2015 (第11期):180-185,201
-
[26] 郑路倩.抵制时空位置点链接攻击的(k,δ,l)-匿名模型<sup>*</sup>.计算机科学与探索.2015,第9卷 (第9期):1108-1121
-
[27] 王丽侠.基于多中介器协作的信息集成框架.浙江师范大学学报(自然科学版).2014,第37卷 (第4期):446-452
-
[28] Hao Peng.An improved label propagation algorithm using average node energy in complex networks.Physica A: Statistical Mechanics and its Applications.2016,Vol.460 :98-104
-
[29] 彭浩.P2P系统中一种基于TMR优化的信誉评估算法.山东大学学报(理学版).2014 (第9期):97-102,108
-
[30] Hao Peng.Reliability analysis in interdependent smart grid systems.Physica A: Statistical Mechanics and its Applications.2018,Vol.500 :50-59
-
[31] Jianfeng Lu.Designing Socially-Optimal Rating Protocols for Crowdsourcing Contest Dilemma.IEEE Transactions on Information Forensics and Security.2017,Vol.12 (No.6):1330-1344
-
[32] Hu, Zhao-Long.Localization of diffusion sources in complex networks with sparse observations..Phys. Lett. A.2018,Vol.382 (No.14):931-937
-
[33] Jianfeng LU.Towards an Efficient Approximate Solution for the Weighted User Authorization Query Problem.IEICE TRANSACTIONS on Information and Systems.2017 (E100-DNo.8):1762-1769
-
[34] Jianmin Han.MAGE: A semantics retaining K-anonymization method for mixed data.Knowledge-Based Systems.2014,Vol.55 :75-86
-
[35] Jian-feng Lu.Safety and Availability Checking for User Authorization Queries in RBAC.International Journal of Computational Intelligence Systems.2012,Vol.5 (No.5):860-867
-
[36] Dewu Xu.Study on Anti-worm Diffusion Strategies Based on B+ Address Tree.Journal of Computers.2012,Vol.7 (No.9)
-
[37] 鲁剑锋.访问控制策略的分类方法研究.武汉理工大学学报(信息与管理工程版).2011 (第6期):878-882
-
[38] Jianfeng Lu.Supporting user authorization queries in RBAC systems by role–permission reassignment.Future Generation Computer Systems.2018,Vol.88 :707-717
-
[39] Jianfeng Lu.Game-Theoretic Design of Optimal Two-Sided Rating Protocols for Service Exchange Dilemma in Crowdsourcing.IEEE Transactions on Information Forensics and Security.2018,Vol.13 (No.11):2801-2815
-
[40] Jianfeng Lu.Inconsistency Resolving of Safety and Utility in Access Control.EURASIP Journal on Wireless Communications and Networking.2011,2011:101 :1-12