发表论文
[1] 王雨晴, 范伟, 彭诚, 张顺亮, 朱大立. 移动边缘计算下基于贝叶斯博弈的入侵响应决策模型. 信息安全学报[J]. 2024, 第 5 作者[2] Li, Ting, Sun, Jiyan, Liu, Yinlong, Zhang, Xu, Zhu, Dali, Guo, Zhaorui, Geng, Liru. ESMO: Joint Frame Scheduling and Model Caching for Edge Video Analytics. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS[J]. 2023, 第 5 作者34(8): 2295-2310, http://dx.doi.org/10.1109/TPDS.2023.3281598.[3] 张珠君, 朱大立, 范伟, 彭诚. 涉密载体销毁精细化、智能化管理问题研究. 保密科学技术. 2023, 第 2 作者25-30, http://lib.cqvip.com/Qikan/Article/Detail?id=7110618184.[4] 张珠君, 朱大立, 范伟, 弥宝鑫, 彭诚. 基于区块链的群智感知众包机制. 信息安全学报[J]. 2023, 第 2 作者[5] 刘继国, 刘超, 李楠, 高世浩, 刘明奇, 朱大立. LADA-Trans-NER: Adaptive Efficient Transformer for Chinese Named Entity Recognition using Lexicon-Attention and Data-Augmentation. AAAI. 2023, 第 6 作者[6] Hao, Xueying, Zhu, Dali, Wang, Xianlan, Yang, Long, Zeng, Hualin. A Speech Enhancement Algorithm for Speech Reconstruction Based on Laser Speckle Images. SENSORS[J]. 2023, 第 2 作者23(1): [7] 谢冰鸿, 徐国凯, 肖绍球, 喻忠军, 朱大立. 非线性磁电换能器模型的谐振磁电效应分析及其输出功率优化. 物理学报[J]. 2023, 第 5 作者72(11): 1-11, https://wulixb.iphy.ac.cn/cn/article/doi/10.7498/aps.72.20222277.[8] 彭诚, 范伟, 朱大立, 杨芬. 基于加权贝叶斯分类器的LTE接入网中间人攻击检测研究. 信息网络安全[J]. 2023, 第 3 作者1-10, http://lib.cqvip.com/Qikan/Article/Detail?id=7108995385.[9] 崔华俊, 孟国柱, 李玥琦, 张棪, 代玥玥, 杨慧然, 朱大立, 王伟平. 基于联邦学习的第三方库流量识别. 信息安全学报[J]. 2023, 第 7 作者8(3): 128-145, http://lib.cqvip.com/Qikan/Article/Detail?id=7109988690.[10] 范伟, 彭诚, 朱大立, 王雨晴. 移动边缘计算网络下基于静态贝叶斯博弈的入侵响应策略研究. 通信学报[J]. 2023, 第 3 作者44(2): 70-81, http://sciencechina.cn/gw.jsp?action=detail.jsp&internal_id=7447801&detailType=1.[11] 朱大立, 刘海涛, 李婷, 孙继燕, 梁杰, 张杭生, 耿立茹, 刘银龙. Deep Reinforcement Learning-based Task Offlfloading in Satellite-Terrestrial Edge Computing Networks. WCNC 2021. 2021, 第 1 作者[12] 朱大立, 李婷, 田宏峰, 杨勇, 刘银龙, 刘海涛, 耿立茹, 孙继燕. Speed-Aware and Customized Task Offlfloading and Resource Allocation in Mobile Edge Computing. IEEE COMMUNICATIONS LETTERS[J]. 2021, 第 1 作者[13] 马璐萍, 朱大立. 一种UAF漏洞利用判断机制研究. 网络安全技术与应用[J]. 2021, 第 2 作者25-26, http://lib.cqvip.com/Qikan/Article/Detail?id=7105199067.[14] Zhu, Dali, Li, Ting, Tian, Hongfeng, Yang, Yong, Liu, Yinlong, Liu, Haitao, Geng, Liru, Sun, Jiyan. Speed-Aware and Customized Task Offloading and Resource Allocation in Mobile Edge Computing. IEEE COMMUNICATIONS LETTERS[J]. 2021, 第 1 作者25(8): 2683-2687, http://dx.doi.org/10.1109/LCOMM.2021.3075690.[15] 朱大立. 基于触屏行为的隐式持续用户身份认证. 信息安全学报. 2021, 第 1 作者[16] 朱大立. 基于区块链的智能家居动态可信轻量级认证机制研究. 软件学报. 2021, 第 1 作者[17] Liang, Jie, Zhu, Dali, Liu, Haitao, Ping, Heng, Li, Ting, Zhang, Hangsheng, Geng, Liru, Liu, Yinlong. Multi-Head Attention Based Popularity Prediction Caching in Social Content-Centric Networking With Mobile Edge Computing. IEEE COMMUNICATIONS LETTERS[J]. 2021, 第 2 作者25(2): 508-512, http://dx.doi.org/10.1109/LCOMM.2020.3030329.[18] Dali Zhu, Jie Liang, Haitao Liu, Ting Li, Hangsheng Zhang, Liru Geng, Yinlong Liu. A Novel Caching Strategy in Social Content-Centric Networking with Mobile Edge Computing. ISCC. 2020, 第 1 作者[19] Zhang, Shunliang, Zhu, Dali. Towards artificial intelligence enabled 6G: State of the art, challenges, and opportunities. COMPUTER NETWORKS[J]. 2020, 第 2 作者 通讯作者 183: http://dx.doi.org/10.1016/j.comnet.2020.107556.[20] Zhu, Dali, Xi, Tong, Jing, Pengfei, Xia, Qing, Wu, Di, Zhang, Yiming, IEEE. SADroid: A Deep Classification Model for Android Malware Detection Based on Semantic Analysis. 2020 IEEE WIRELESS COMMUNICATIONS AND NETWORKING CONFERENCE (WCNC). 2020, 第 1 作者[21] Zhang, Shunliang, Zhu, Dali, Wang, Yongming. A survey on space-aerial-terrestrial integrated 5G networks. COMPUTER NETWORKS[J]. 2020, 第 2 作者 通讯作者 174: http://dx.doi.org/10.1016/j.comnet.2020.107212.[22] 弥宝鑫, 吴荻, 范伟, 朱大立. Wi-Fi 6技术及防护技术研究. 保密科学技术[J]. 2020, 第 4 作者48-53, http://lib.cqvip.com/Qikan/Article/Detail?id=7102239257.[23] 朱大立, 梁杰, 李婷, 张杭生, 耿立茹, 吴荻, 张天魁, 刘银龙. 内容中心网络安全技术研究综述. 信息安全学报[J]. 2020, 第 1 作者5(5): 121-143, http://jcs.iie.ac.cn/xxaqxb/ch/reader/view_abstract.aspx?file_no=20200509&flag=1.[24] 彭振, 孙旸, 朱大立. 新一代安全协议WPA3技术特性. 保密科学技术[J]. 2020, 第 3 作者34-43, http://lib.cqvip.com/Qikan/Article/Detail?id=7102907941.[25] 朱大立. 武汉战“疫”给信息安全带来的启示. 保密工作[J]. 2020, 第 1 作者17-18, https://kns.cnki.net/KCMS/detail/detail.aspx?dbcode=CJFQ&dbname=CJFDLAST2020&filename=BMGZ202003008&v=MjYzNDZHNEhOSE1ySTlGYklSOGVYMUx1eFlTN0RoMVQzcVRyV00xRnJDVVI3cWVadWR2Rnk3a1VMN0tKeURNZEw=.[26] Cao, Yi, Fan, Dong, Zhu, Dali, Sun, Lijing, Cao, Lei, Tian, Peng, Liu, Zhongmin. The effect of Si environments on NH3 selective catalytic reduction performance and moisture stability of Cu-SAPO-34 catalysts. JOURNAL OF CATALYSIS[J]. 2020, 第 3 作者391: 404-413, http://dx.doi.org/10.1016/j.jcat.2020.09.002.[27] 冯维淼, 荆鹏飞, 朱大立. 移动办公安全关键技术研究. 保密科学技术[J]. 2019, 第 3 作者7-13, http://lib.cqvip.com/Qikan/Article/Detail?id=7002083426.[28] 朱大立. 当保密遇到手机. 保密工作[J]. 2019, 第 1 作者59-60, http://lib.cqvip.com/Qikan/Article/Detail?id=7100272988.[29] Zhao, Bobai, Zhu, Dali, Xi, Tong, Wang, Siye, Wu, Di, ACM. Indoor localization based on subcarrier parameter estimation of LoS with Wi-Fi. PROCEEDINGS OF THE 16TH EAI INTERNATIONAL CONFERENCE ON MOBILE AND UBIQUITOUS SYSTEMS: COMPUTING, NETWORKING AND SERVICES (MOBIQUITOUS'19). 2019, 第 2 作者80-89, http://dx.doi.org/10.1145/3360774.3360785.[30] Zhu, Dali, Xi, Tong, Jing, Pengfei, Wu, Di, Xia, Qing, Zhang, Yiming, Assoc Comp Machinery. A Transparent and Multimodal Malware Detection Method for Android Apps. MSWIM'19: PROCEEDINGS OF THE 22ND INTERNATIONAL ACM CONFERENCE ON MODELING, ANALYSIS AND SIMULATION OF WIRELESS AND MOBILE SYSTEMS. 2019, 第 1 作者 通讯作者 51-60, http://dx.doi.org/10.1145/3345768.3355915.[31] 张珠君, 朱大立. 年度信息安全事件盘点. 保密工作[J]. 2019, 第 2 作者17-18, http://lib.cqvip.com/Qikan/Article/Detail?id=7100746079.[32] Zhu, Dali, Ma, Yuchen, Xi, Tong, Zhang, Yiming, IEEE. FSNet: Android Malware Detection with Only One Feature. 2019 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC). 2019, 第 1 作者 通讯作者 940-945, [33] 朱大立, 金昊, 吴荻, 荆鹏飞, 杨莹. 基于数据流深度学习算法的Android恶意应用检测方法. 信息安全学报[J]. 2019, 第 1 作者4(2): 53-68, http://jcs.iie.ac.cn/xxaqxb/ch/reader/view_abstract.aspx?file_no=20190206&flag=1.[34] Zhao, Bobai, Zhu, Dali, Xi, Tong, Jia, Chenggang, Jiang, Shang, Wang, Siye. Convolutional neural network and dual-factor enhanced variational Bayes adaptive Kalman filter based indoor localization with Wi-Fi. COMPUTER NETWORKS[J]. 2019, 第 2 作者 通讯作者 162: http://dx.doi.org/10.1016/j.comnet.2019.106864.[35] Zhu Dali, Rong Wenjing, Wu Di, Pang Na, Qing S, Mitchell C, Chen L, Liu D. Multi-attribute Counterfeiting Tag Identification Protocol in Large-Scale RFID System. INFORMATION AND COMMUNICATIONS SECURITY, ICICS 2017. 2018, 第 1 作者10631: 352-362, [36] 朱大立. 移动安全专题评述. 信息安全研究[J]. 2018, 第 1 作者4(8): 687-688, http://lib.cqvip.com/Qikan/Article/Detail?id=675767977.[37] 张珠君, 朱大立. 区块链技术保障无线终端安全问题探究. 保密科学技术[J]. 2018, 第 2 作者14-19, http://lib.cqvip.com/Qikan/Article/Detail?id=676053008.[38] Zhu, Dali, Zhao, Bobai, Wang, Siye. Mobile target indoor tracking based on Multi-Direction Weight Position Kalman Filter. COMPUTER NETWORKS[J]. 2018, 第 1 作者141: 115-127, http://dx.doi.org/10.1016/j.comnet.2018.05.021.[39] Wu, Di, Zhu, Dali, Liu, Yinlong, Zhao, Dongmei. Location Verification Assisted by a Moving Obstacle for Wireless Sensor Networks. IEEE INTERNET OF THINGS JOURNAL[J]. 2018, 第 2 作者5(1): 322-335, https://www.webofscience.com/wos/woscc/full-record/WOS:000425170000025.[40] 吴荻, 张玉, 刘银龙, 马伟, 朱大立, 孙鑫. 面向基于位置服务的一种改进型隐私感知虚假位置选择机制. 信息安全学报[J]. 2018, 第 5 作者3(2): 62-75, http://jcs.iie.ac.cn/xxaqxb/ch/reader/view_abstract.aspx?file_no=20180205&flag=1.[41] Zhu Dali, Zhao Bobai, Wang Siye, Wu Di, Assoc Comp Machinery. Direct-path based fingerprint extraction algorithm for indoor localization. PROCEEDINGS OF THE 15TH EAI INTERNATIONAL CONFERENCE ON MOBILE AND UBIQUITOUS SYSTEMS: COMPUTING, NETWORKING AND SERVICES (MOBIQUITOUS 2018). 2018, 第 1 作者 通讯作者 11-18, http://dx.doi.org/10.1145/3286978.3286993.[42] 杨莹, 夏剑锋, 朱大立. 基于Web操作系统的移动瘦终端多安全策略模型. 计算机科学[J]. 2018, 第 3 作者45(11): 108-114, http://lib.cqvip.com/Qikan/Article/Detail?id=7000912166.[43] Pang Na, Zhu Dali, Xue Kaiwen, Rong Wenjing, Liu Yinlong, Ou Changhai, Li G, Ge Y, Zhang Z, Jin Z, Blumenstein M. Analyzing Customer's Product Preference Using Wireless Signals. KNOWLEDGE SCIENCE, ENGINEERING AND MANAGEMENT (KSEM 2017). 2017, 第 2 作者10412: 139-148, [44] Zhu, Dali, Jin, Hao, Yang, Ying, Wu, Di, Chen, Weiyi, IEEE. DeepFlow: Deep Learning-Based Malware Detection by Mining Android Application for Abnormal Usage of Sensitive Data. 2017 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC). 2017, 第 1 作者 通讯作者 438-443, [45] Zhu Dali, Pang Na, Feng Weimiao, AlKhizaay Muhmmad, Ma Yuchen, Li G, Ge Y, Zhang Z, Jin Z, Blumenstein M. Device-Free Intruder Sensing Leveraging Fine-Grained Physical Layer Signatures. KNOWLEDGE SCIENCE, ENGINEERING AND MANAGEMENT (KSEM 2017). 2017, 第 1 作者10412: 183-194, [46] Zhu Dali, Rong Wenjing, Wu Di, Pang Na, IEEE. Lightweight anonymous RFID group ownership transfer protocol in multi-owner environment. 2017 19TH IEEE INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS (HPCC) / 2017 15TH IEEE INTERNATIONAL CONFERENCE ON SMART CITY (SMARTCITY) / 2017 3RD IEEE INTERNATIONAL CONFERENCE ON DATA SCIENCE AND SYSTEMS (DSS). 2017, 第 1 作者 通讯作者 404-411, http://dx.doi.org/10.1109/HPCC-SmartCity-DSS.2017.53.[47] Zhu, Dali, Zhang, Renjun, Jia, Dingding, Okamoto, T, Yu, Y, Au, MH, Li, Y. Public-Key Encryption with Simulation-Based Sender Selective-Opening Security. PROVABLE SECURITY, PROVSEC 2017. 2017, 第 1 作者10592: 361-380, [48] 朱大立, 杨莹, 金昊, 邵京, 冯维淼. 面向移动Web操作系统的BLP改进模型及应用. 信息安全学报[J]. 2017, 第 1 作者2(4): 13-26, http://jcs.iie.ac.cn/xxaqxb/ch/reader/view_abstract.aspx?file_no=20170402&flag=1.[49] Zhu Dali, Pang Na, Li Gang, Liu Shaowu, Chen J, Yang LT. WiseFi: Activity Localization and Recognition on Commodity Off-the-shelf WiFi Devices. PROCEEDINGS OF 2016 IEEE 18TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS; IEEE 14TH INTERNATIONAL CONFERENCE ON SMART CITY; IEEE 2ND INTERNATIONAL CONFERENCE ON DATA SCIENCE AND SYSTEMS (HPCC/SMARTCITY/DSS). 2016, 第 1 作者 通讯作者 562-569, http://dx.doi.org/10.1109/HPCC-SmartCity-DSS.2016.222.[50] Zhu, Dali, Chen, Junhuang, Zhang, Yanfang, Wang, Siye, Kong, Huafeng, IEEE. An Efficient Approach of Integrating RFID and Vision Techniques in Object Surveillance System. 2016 IEEE TRUSTCOM/BIGDATASE/ISPA. 2016, 第 1 作者1023-1029, [51] Zhu Dali, Pang Na, Li Gang, Rong Wenjing, Fan Zheming, IEEE. WiN: Non-Invasive Abnormal Activity Detection Leveraging Fine-grained WiFi Signals. 2016 IEEE TRUSTCOM/BIGDATASE/ISPA. 2016, 第 1 作者 通讯作者 744-751, [52] Zhu, Dali, Yang, Ying, Jin, Hao, Shao, Jing, Feng, WeiMiao, IEEE. Application of Modified BLP model on Mobile Web Operating System. 2016 IEEE TRUSTCOM/BIGDATASE/ISPA. 2016, 第 1 作者 通讯作者 1818-1824, [53] Zhu Dali, Pang Na, Li Gang, Rong Wenjing, Liao X, Lovas R, Shen X, Zheng R. Opportunistic Probe: An Efficient Adaptive Detection Model for Collaborative Intrusion Detection. 2016 IEEE 22ND INTERNATIONAL CONFERENCE ON PARALLEL AND DISTRIBUTED SYSTEMS (ICPADS). 2016, 第 1 作者 通讯作者 430-437, [54] Zhu Dali, Fan Zheming, Pang Na, IEEE. A Dynamic Credible Factory Reset Mechanism of Personal Data in Android Device. 2015 IEEE TRUSTCOM/BIGDATASE/ISPA, VOL 1. 2015, 第 1 作者 通讯作者 990-998, http://dx.doi.org/10.1109/Trustcom.2015.474.[55] 朱大立, 荣文晶, 王思叶, 庞娜. 基于树形模型的轻量级RFID组证明协议. TONGXIN XUEBAO[J]. 2015, 第 1 作者36(11): 15-24, https://doaj.org/article/53d5a918ed7b43329cf98d8167e01aa0.[56] Zhu Da Li, Pang Na, Fan Zhe Ming, Sung WP, Kao JCM, Li J. A Novel Protection Mechanism for Auto-organized Wireless Network Based on Rogue Access Point. FRONTIERS OF MANUFACTURING SCIENCE AND MEASURING TECHNOLOGY V. 2015, 第 1 作者 通讯作者 846-852, http://apps.webofknowledge.com/CitedFullRecord.do?product=UA&colName=WOS&SID=5CCFccWmJJRAuMzNPjj&search_mode=CitedFullRecord&isickref=WOS:000377602400141.[57] Zhu Dali, Fan Zheming, Pang Na, Batten L, Li G, Niu W, Warren M. System-Level Permission Management Mechanism of Android Device. APPLICATIONS AND TECHNIQUES IN INFORMATION SECURITY, ATIS 2014. 2014, 第 1 作者 通讯作者 490: 1-12, [58] Zhu Dali, Zhang Huihui, Feng Weimiao, Li, JB. Research on the Construction of Radio-map Based on Support Vector Regression. 2014 FOURTH INTERNATIONAL CONFERENCE ON INSTRUMENTATION AND MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC). 2014, 第 1 作者 通讯作者 77-80,