·Paper Publications
- [11] Fu Cai,CUI YONG QUAN,李俊,PENG BING,HONG FAN.Fu Cai.一个基于SPKI的Ad Hoc网络匿名可控路由方案.[期刊].计算机科学(CCF T2),3871,(10):182-183
- [12] Cai,Fu,Liang,Hong,Rui-xian,Li.Fan,Hong.Self-organized public-key management for mobile Ad Hoc Networks based on a bidirectional trust model.[期刊].Wuhan University Journal of Natural Sciences,3871,(1):188-192
- [13] Fu Cai,XU LAN FANG,Lansheng Han,PENG BING,洪亮.Fu Cai.移动自组网中非完全信息节点风险评估.[期刊].计算机学报(CCF T1),3990,(4):805—816
- [14] Chen,Jing,Du,Ruiying,Fu,Cai,Lian,Shiguo.Chen,Jing.A hybrid game model based on reputation for spectrum allocation in wireless networks.[期刊].Computer Communications(Q1),4042,(14):1623-1631
- [15] Xu,Peng,Tang,XueMing,Fu,Cai.Cui,GuoHua.A more efficient accountable authority IBE scheme under the DL assumption.[期刊].SCIENCE CHINA Information Sciences(Q1),4023,(3):581-592
- [16] Lei,Feng-Yu,Chen,Jing,Li,Xi.Fu,Cai.Secure data aggregation solution based on dynamic multiple cluster key management model.[期刊].Journal of Internet Technology(Q3),4066,(3):465-476
- [17] Lansheng Han,才,付,Liao,Wenyuan.彭爱华.基于布尔代数的木马行为界定及判别.[期刊].小型微型计算机系统(CCF T2),4188,(9):2068-2072
- [18] Han,Lansheng,Fu,Cai,Sun,Changhua,Jia,Wenjing,Han,Shuxia,Zhou,Man.Han,Lansheng.Targeting Malware Discrimination Based on Reversed Association Task.[期刊].Concurrency and Computation: Practice and Experience(CCF T3),4336,(23):1-11
- [19] Han,Lansheng,Jia,Wenjing,Lee,ChangHoon,Zou,Deqing.Fu,Cai.Task-based behavior detection of illegal codes.[期刊].Mathematical and Computer Modelling,4090,(1):80-86
- [20] Fu,Cai,Jing,Chen,Lansheng,Han,Xiaoyang,Ming,Liu,Xiang,Gao.Fu,Cai.GRAP: Grey risk assessment based on projection in ad hoc networks.[期刊].Journal of Parallel and Distributed Computing(Q2),4078,(9):1249-1260