发表论文
[1] 张逸飞, 高能, 马存庆. Learning to Select Prototypical Parts for Interpretable Sequential Data Modeling. AAAI 2023null. 2023, [2] 寇英帅, 高能, 张逸飞, 屠晨阳, 马存庆. BiGNN: A Bilateral-Branch Graph Neural Network to Solve Popularity Bias in Recommendation. ICTAI 2022null. 2022, [3] 牛艺诺, 张逸飞, 高能, 马存庆. 融合时序和逻辑关系的日志异常检测系统设计. 信息网络安全[J]. 2022, 1-6, http://lib.cqvip.com/Qikan/Article/Detail?id=7108380960.[4] 韩守康, 高能, 郭晓博, 单亦伟. Incorporating Common Knowledge and Specific Entity Linking Knowledge for Machine Reading Comprehension. The 14th International Conference on Knowledge Science, Engineering and Management (KSEM 2021)null. 2021, [5] 曾泽华, 屠晨阳, 高能, 薛聪, 马存庆, 单亦伟. CMVCG: Non-autoregressive Conditional Masked Live Video Comments Generation Model. The annual International Joint Conference on Neural Networksnull. 2021, [6] 王传银, 马存庆, 李敏, 高能, 张逸飞, 申卓祥. Protecting Data Privacy in Federated Learning Combining Differential Privacy and Weak Encryption. International Conference on Science of Cyber Securitynull. 2021, [7] Zeng, Zehua, Gao, Neng, Xue, Cong, He, Yuanye, Guo, Xiaobo. Learning from Audience Interaction: Multi-Instance Multi-Label Topic Model for Video Shots Annotating. PROCEEDINGS OF THE 2021 IEEE 24TH INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN (CSCWD)null. 2021, 1075-1080, [8] Zeng, Zehua, Gao, Neng, Xue, Cong, Tu, Chenyang. PLVCG: A Pretraining Based Model for Live Video Comment Generation. ADVANCES IN KNOWLEDGE DISCOVERY AND DATA MINING, PAKDD 2021, PT IInull. 2021, 12713: 690-702, [9] Li, Mingyang, Gao, Neng, Tu, Chenyang, Peng, Jia, Li, Min. Incorporating Attributes Semantics into Knowledge Graph Embeddings. PROCEEDINGS OF THE 2021 IEEE 24TH INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN (CSCWD)null. 2021, 620-625, [10] 陈钧莎, 高能, 张逸飞, 屠晨阳. Image-Enhanced Multi-Modal Representation for Local Topic Detection from Social Media. 26th International Conference on Database Systems for Advanced Applicationsnull. 2021, [11] Zhang, Yifei, Wang, Jiong, Chen, Junsha, Gao, Neng, Li, Min, Bai, Jiameng. TEA-RNN: Topic-Enhanced Attentive RNN for Attribute Inference Attacks via User Behaviors. PROCEEDINGS OF THE 2021 IEEE 24TH INTERNATIONAL CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK IN DESIGN (CSCWD)null. 2021, 174-179, [12] 张逸飞, 高能, 陈钧莎, 屠晨阳, 王炯. PrivRec: User-centric Differentially Private Collaborative Filtering using LSH and KD. The 27th International Conference on Neural Information Processingnull. 2020, [13] 彭佳, 高能, 李敏, 袁珺. Knowledge Graph Embedding Based on Relevance and Inner Sequence of Relations. The 27th International Conference on Neural Information Processingnull. 2020, [14] Su, Yijun, Li, Xiang, Liu, Baoping, Zha, Daren, Xiang, Ji, Tang, Wei, Gao, Neng, IEEE. FGCRec: Fine-Grained Geographical Characteristics Modeling for Point-of-Interest Recommendation. ICC 2020 - 2020 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC)null. 2020, [15] Jiang, Yiwen, Tang, Wei, Gao, Neng, Tu, Chenyang, Peng, Jia, Li, Min. SECL: Separated Embedding and Correlation Learning for Demographic Prediction in Ubiquitous Sensor Scenario. 2020 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN)null. 2020, [16] 高能. TransMVG: Knowledge Graph Embedding based on Multiple-Valued Gates. 21st International Conference on Web Information Systems Engineering (WISE 2020). 2020, [17] 王炯, 寇英帅, 张逸飞, 高能, 屠晨阳. Leveraging Knowledge Context Information to Enhance Personalized Recommendation. The 27th International Conference on Neural Information Processingnull. 2020, [18] 高能. A Practical Defense against Attribute Inference Attacks in Session-based Recommendations. 2020 IEEE International Conference on Web Services. 2020, [19] Xia, Hangyu, Gao, Neng, Peng, Jia, Mo, Jingjie, Wang, Jiong, IEEE. Binarized Attributed Network Embedding via Neural Networks. 2020 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN)null. 2020, [20] Tu, Chenyang, Liu, Zeyi, Gao, Neng, Ma, Cunqing, Ge, Jingquan, Zhang, Lingchen. MACM: How to Reduce the Multi-Round SCA to the Single-Round Attack on the Feistel-SP Networks. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY[J]. 2020, 15: 3079-3092, http://dx.doi.org/10.1109/TIFS.2019.2959910.[21] 何敏, 马存庆, 葛景全, 高能, 屠晨阳. Flush-Detector: More Secure API Resistant to Flush-Based Spectre Attacks on ARM Cortex-A9. ISCCnull. 2020, [22] 高能. Multiple Demographic Attribute Prediction in Mobile and Sensor devices. Pacific-Asia Conference on Knowledge Discovery and Data Mining. 2020, [23] Luo, Lannan, Zeng, Qiang, Cao, Chen, Chen, Kai, Liu, Jian, Liu, Limin, Gao, Neng, Yang, Min, Xing, Xinyu, Liu, Peng. Tainting-Assisted and Context-Migrated Symbolic Execution of Android Framework for Vulnerability Discovery and Exploit Generation. IEEE TRANSACTIONS ON MOBILE COMPUTING[J]. 2020, 19(12): 2946-2964, http://dx.doi.org/10.1109/TMC.2019.2936561.[24] 高能. TransBidiFilter: Knowledge Embedding Based On A Bidirectional Filter. The 9th CCF International Conference on Natural Language Processing and Chinese Computing(NLPCC 2020). 2020, [25] Su, Yijun, Zhang, JiaDong, Li, Xiang, Zha, Daren, Xiang, Ji, Tang, Wei, Gao, Neng, IEEE. FGRec: A Fine-Grained Point-of-Interest Recommendation Framework by Capturing Intrinsic Influences. 2020 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN)null. 2020, [26] 彭萍, 马存庆, 葛景全, 高能, 屠晨阳. A Hardware/Software Collaborative SM4 Implementation Resistant to Side-channel Attacks on ARM-FPGA Embedded SoC. ISCCnull. 2020, [27] Li, Xiang, Su, Yijun, Gao, Neng, Xiang, Ji, Wang, Yuewu, IEEE. User Alignment with Jumping Seed Alignment Information Propagation. 2020 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN)[J]. 2020, [28] 王炯, 寇英帅, 高能, 屠晨阳. User Preference Excitation Network for Sequential Recommendation. 18th IEEE International Symposium on Parallel and Distributed Processing with Applicationsnull. 2020, [29] Su, Yijun, Li, Xiang, Tang, Wei, Zha, Daren, Xiang, Ji, Gao, Neng, IEEE. Personalized Point-of-Interest Recommendation on Ranking with Poisson Factorization. 2019 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN)null. 2019, [30] 薛聪, 高能, 查达仁, 王雷, 尹芷仪, 曾泽华. 事件库构建技术综述. 信息安全学报[J]. 2019, 83-106, http://lib.cqvip.com/Qikan/Article/Detail?id=88658866504849574850484856.[31] Yuan Jun, Gao Neng, Xiang Ji, AAAI. TransGate: Knowledge Graph Embedding with Shared Gate Structure. THIRTY-THIRD AAAI CONFERENCE ON ARTIFICIAL INTELLIGENCE / THIRTY-FIRST INNOVATIVE APPLICATIONS OF ARTIFICIAL INTELLIGENCE CONFERENCE / NINTH AAAI SYMPOSIUM ON EDUCATIONAL ADVANCES IN ARTIFICIAL INTELLIGENCEnull. 2019, 3100-3107, http://apps.webofknowledge.com/CitedFullRecord.do?product=UA&colName=WOS&SID=5CCFccWmJJRAuMzNPjj&search_mode=CitedFullRecord&isickref=WOS:000485292603015.[32] Su, Yijun, Li, Xiang, Zha, Daren, Tang, Wei, Jiang, Yiwen, Xiang, Ji, Gao, Neng, Gedeon, T, Wong, KW, Lee, M. HRec: Heterogeneous Graph Embedding-Based Personalized Point-of-Interest Recommendation. NEURAL INFORMATION PROCESSING (ICONIP 2019), PT IIInull. 2019, 11955: 37-49, [33] Wang, Zihan, Gao, Neng, Wang, Xin, Xiang, Ji, Zha, Daren, Li, Linghui. HidingGAN: High Capacity Information Hiding with Generative Adversarial Network. COMPUTER GRAPHICS FORUM[J]. 2019, 38(7): 393-401, https://www.doi.org/10.1111/cgf.13846.[34] 高能. Your Pedometer tells you: Attribute Inference via Daily Walking Step Count. The 16th IEEE International Conference on Ubiquitous Intelligence and Computing (UIC 2019). 2019, [35] Chen, Junsha, Gao, Neng, Xue, Cong, Zhang, Yifei, Tu, Chenyang, Li, Min. The Application of Network based Embedding in Local Topic Detection from Social Media. 2019 IEEE 31ST INTERNATIONAL CONFERENCE ON TOOLS WITH ARTIFICIAL INTELLIGENCE (ICTAI 2019)null. 2019, 1311-1319, [36] 高能. Node-Edge Bilateral Attributed Network Embedding. the 26th International Conference on Neural Information Processing. 2019, [37] Zhou, Yujing, Pei, Yang, He, Yuanye, Mo, Jingjie, Wang, Jiong, Gao, Neng, IEEE. Dynamic Graph Link Prediction by Semantic Evolution. ICC 2019 - 2019 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC)null. 2019, [38] Wang, Zihan, Gao, Neng, Wang, Xin, Xiang, Ji, Liu, Guanqun, Gedeon, T, Wong, KW, Lee, M. STNet: A Style Transformation Network for Deep Image Steganography. NEURAL INFORMATION PROCESSING (ICONIP 2019), PT IInull. 2019, 11954: 3-14, [39] 刘泽艺, 王彤彤, 尹芷仪, 高能, 查达仁, 屠晨阳. 针对增强型旋转S盒掩码方案的侧信道安全漏洞系统研究. 信息安全学报[J]. 2019, 4(4): 33-58, http://lib.cqvip.com/Qikan/Article/Detail?id=7002765089.[40] 高能. Demographic Prediction from Purchase Data based on Knowledge-Aware Embedding. the 26th International Conference on Neural Information Processing. 2019, [41] Yuan, Jun, Gao, Neng, Xiang, Ji, Tu, Chenyang, Ge, Jingquan. Knowledge Graph Embedding with Order Information of Triplets. ADVANCES IN KNOWLEDGE DISCOVERY AND DATA MINING, PAKDD 2019, PT IIInull. 2019, 11441: 476-488, [42] 郭晓博, 高能, 王雷, 王鑫. TransI: Translating Infinite Dimensional Embeddings based on Trend Smooth Distance.. The 12th International Conference on Knowledge Science, Engineering and Management, KSEM2019null. 2019, [43] 陈钧莎, 高能, 张逸飞, 屠晨阳. Local Topic Detection Using Word Embedding from Spatio-Temporal Social Media. the 26th International Conference on Neural Information Processingnull. 2019, [44] Li, Xiang, Su, Yijun, Gao, Neng, Tang, Wei, Xiang, Ji, Wang, Yuewu, Gedeon, T, Wong, KW, Lee, M. Aligning Users Across Social Networks by Joint User and Label Consistence Representation. NEURAL INFORMATION PROCESSING (ICONIP 2019), PT II[J]. 2019, 11954: 656-668, [45] Chen Junsha, Gao Neng, Xue Cong, Tu Chenyang, Zha Daren. Perceiving Topic Bubbles: Local Topic Detection in Spatio-Temporal Tweet Stream. DATABASE SYSTEMS FOR ADVANCED APPLICATIONS (DASFAA 2019), PT IInull. 2019, 11447: 730-747, [46] 高能. MultNet: An Efficient Network Representation Learning for Large-scale Social Relation Extraction. In 25th International Conference on Neural Information Processing(ICONIP). 2018, [47] 薛聪, 曾泽华, 何原野, 王雷, 高能. A MIML-LSTM Neural Network for Integrated Fine-Grained Event Forecasting. In 2018 International Conferenceon Big Data Technologies ICBDT 2018null. 2018, [48] Tang, Wei, Su, Yijun, Li, Xiang, Zha, Daren, Jiang, Weiyu, Gao, Neng, Xiang, Ji, Cheng, L, Leung, ACS, Ozawa, S. CNN-Based Chinese Character Recognition with Skeleton Feature. NEURAL INFORMATION PROCESSING (ICONIP 2018), PT Vnull. 2018, 11305: 461-472, [49] Wang, Zihan, Gao, Neng, Wang, Xin, Qu, Xuexin, Li, Linghui, Cheng, L, Leung, ACS, Ozawa, S. SSteGAN: Self-learning Steganography Based on Generative Adversarial Networks. NEURAL INFORMATION PROCESSING (ICONIP 2018), PT IInull. 2018, 11302: 253-264, [50] 葛景全, 高能, 屠晨阳, 向继, 刘泽艺, 袁珺. Combination of Hardware and Software: An Efficient AES Implementation Resistant to Side-channel Attacks on All Programmable SoC. In 23rd European Symposium on Research in Computer Security (ESORICS 2018)null. 2018, [51] Mo, Jingjie, Gao, Neng, Zhou, Yujing, Pei, Yang, Wang, Jiong, Hacid, H, Cellary, W, Wang, H, Paik, HY, Zhou, R. NANE: Attributed Network Embedding with Local and Global Information. WEB INFORMATION SYSTEMS ENGINEERING, WISE 2018, PT Inull. 2018, 11233: 247-261, [52] 高能. Learning from Audience Intelligence: Dynamic Labeled LDA Model for Time-Sync Commented Video Tagging. In 25th International Conference on Neural Information Processing(ICONIP). 2018, [53] Mo Jingjie, Gao Neng, Zhou Yujing, Pei Yang, Wang Jiong, IEEE. Translation-Based Attributed Network Embedding. 2018 IEEE 30TH INTERNATIONAL CONFERENCE ON TOOLS WITH ARTIFICIAL INTELLIGENCE (ICTAI)null. 2018, 892-899, [54] 高能. 网络基因图谱—网络安全新领域. 信息安全研究期刊. 2017, [55] 屠晨阳, 张令臣, 刘泽艺, 高能, 马原. A Practical Chosen Message Power Analysis Approach Against Ciphers with the Key Whitening Layers. 15th International Conference on Applied Cryptography and Network Security (ACNS2017)null. 2017, [56] Luo, Lannan, Zeng, Qiang, Cao, Chen, Chen, Kai, Liu, Jian, Liu, Limin, Gao, Neng, Yang, Min, Xing, Xinyu, Liu, Peng, Assoc Comp Machinery. System Service Call-oriented Symbolic Execution of Android Framework with Applications to Vulnerability Discovery and Exploit Generation. MOBISYS'17: PROCEEDINGS OF THE 15TH ANNUAL INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS, APPLICATIONS, AND SERVICESnull. 2017, 225-238, http://dx.doi.org/10.1145/3081333.3081361.[57] 董新民, 尹芷仪, 郭晓博, 高能. 网络基因图谱研究. 信息安全研究[J]. 2016, 2(9): 844-849, http://lib.cqvip.com/Qikan/Article/Detail?id=670052711.[58] 王鑫, 高能, 张令臣, 刘宗斌, 王雷. Novel MITM Attacks on Security Protocols in SDN: A Feasibility Study. 18th International Conference on Information and Communication Securitynull. 2016, [59] 刘泽艺, 高能, 屠晨阳, 马原, 刘宗斌. Detecting Side Channel Vulnerabilities in Improved Rotating S-box Masking Scheme: Presenting Four Non-profiled Attacks. SAC 2016null. 2016, [60] Liu Zeyi, Gao Neng, Tu Chenyang, Zhou Jian, Ma Yuan, Zhao Yuan. Leakage Fingerprints - A Non-negligible Vulnerability in Side-Channel Analysis. ASIA CCS'16: PROCEEDINGS OF THE 11TH ACM ASIA CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITYnull. 2016, 807-818, http://dx.doi.org/10.1145/2897845.2897868.[61] 秦文仙, 王琼霄, 高能, 周健. 基于RFID智能卡的Android移动终端数据保护方案. 计算机工程与应用[J]. 2016, 52(2): 112-116,126, http://lib.cqvip.com/Qikan/Article/Detail?id=667676081.[62] 曹琛, 高能, 向继, 刘鹏. 安卓系统服务中输入验证型漏洞的初步分析. 信息安全学报[J]. 2016, 1-11, http://lib.cqvip.com/Qikan/Article/Detail?id=88658866504849544849484851.[63] 李成吉, 雷灵光, 林璟锵, 高能. 安全的Android移动终端内容保护方案. 计算机工程与设计[J]. 2016, 37(3): 591-596, http://lib.cqvip.com/Qikan/Article/Detail?id=668196815.[64] 田伟, 高能, 王平建, 张令臣. Android数据安全存储平台的设计与实现. 信息网络安全[J]. 2015, 113-118, http://lib.cqvip.com/Qikan/Article/Detail?id=666205625.[65] 姜国锋, 高能, 江伟玉. 基于Shadow DOM和改进PBE的安全口令管理器. 信息网络安全[J]. 2015, 270-273, http://lib.cqvip.com/Qikan/Article/Detail?id=666205658.[66] 高能. Towards Analyzing the Input Validation Vulnerabilities associated with Android System Services. ACSAC. 2015, [67] 屠晨阳, 周健, 高能, 刘泽艺, 马原, 刘宗斌. QRL: A High Performance Quadruple-Rail Logic for Resisting DPA on FPGA Implementations. Information and Communications Security. ICICS 2015null. 2015, [68] 高能. Input Validation Vulnerabilities in Android System Services: A First Analysis. Annual Computer Security Applications Conference 2015. 2015, [69] 于航, 刘丽敏, 高能, 李红达. 基于模拟器的沙箱系统研究. 信息网络安全[J]. 2015, 139-143, http://lib.cqvip.com/Qikan/Article/Detail?id=666205630.[70] Lin, Jingqiang, Zhu, WenTao, Wang, Qiongxiao, Zhang, Nan, Jing, Jiwu, Gao, Neng. RIKE plus : using revocable identities to support key escrow in public key infrastructures with flexibility. IET INFORMATION SECURITY[J]. 2015, 9(2): 136-147, https://www.webofscience.com/wos/woscc/full-record/WOS:000350214400006.[71] 王鑫, 高能, 马存庆, 薛聪. 分布式SDN控制器的规则冲突解决方案. 信息网络安全[J]. 2014, 6-11, http://lib.cqvip.com/Qikan/Article/Detail?id=662254608.[72] Chenyang Tu, Wei He, Neng Gao, Eduardo de la Torre, Zeyi Liu, Limin Liu. A Progressive Dual-Rail Routing Repair Approach for FPGA Implementation of Crypto Algorithm. Information security practice and experience :null. 2014, 217-231, [73] 王琼霄, 王琼宵, 高能, 王跃武. 对SIP认证协议的安全性分析与改进. 信息网络安全[J]. 2013, 5-7, http://lib.cqvip.com/Qikan/Article/Detail?id=47650519.[74] 郑强, 高能, 张令臣. 基于SM3算法的动态口令卡的设计与实现. 计算机应用与软件[J]. 2013, 30(2): 14-17, http://lib.cqvip.com/Qikan/Article/Detail?id=44821661.[75] Li Miao, He Liangsheng, Yang Tongjie, Gao Neng, Liu Zongbin, Zhang Qinglong, Zia, T, Zomaya, A, Varadharajan, V, Mao, M. An Efficient Reconfigurable II-ONB Modular Multiplier. SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2013null. 2013, 127: 169-+, [76] 朱荣华, 高能, 向继. 云计算中的认证机制研究. 信息网络安全[J]. 2013, 54-56, http://lib.cqvip.com/Qikan/Article/Detail?id=47650534.[77] Jing Jiwu. RIKE: Using Revocable Identities to Support Key Escrow in PKIs. 10th International Conference on Applied Cryptography and Network Security (ACNS). 2012, [78] 江伟玉, 高能, 刘泽艺, 林雪燕. 一种云计算中的多重身份认证与授权方案. 信息网络安全[J]. 2012, 7-10, http://lib.cqvip.com/Qikan/Article/Detail?id=42995329.[79] 高能. Towards attack resilient social network based threshold signing. Information Security and Cryptology. Springer Berlin Heidelberg, 2012. 2012, [80] 余幸杰, 高能, 江伟玉. 云计算中的身份认证技术研究. 信息网络安全[J]. 2012, 71-74, http://lib.cqvip.com/Qikan/Article/Detail?id=42995348.[81] 王雷, 向继, 荆继武, 高能, 张令臣. 基于NFS协议的存储加密代理设计与实现. 信息网络安全[J]. 2011, 194-196, http://lib.cqvip.com/Qikan/Article/Detail?id=39271380.[82] 顾青, 高能, 包珍珍, 向继. 基于GPGPU和CUDA的高速AES算法的实现和优化. 中国科学院研究生院学报[J]. 2011, 28(6): 776-785, http://lib.cqvip.com/Qikan/Article/Detail?id=39873728.[83] 高能. 基于Parameter-free 聚类新闻Web网页中的话题发现. ICEBI 2010. 2010, [84] 高能, 夏鲁宁, 荆继武, 文晓阳. 高效的验证码识别技术与验证码分类思想. 计算机工程[J]. 2009, 35(8): 186-188,191, http://lib.cqvip.com/Qikan/Article/Detail?id=30109062.[85] 向继, 高能, 荆继武. 一种基于门限签名的可靠蠕虫特征产生系统. 计算机学报[J]. 2009, 930-939, http://lib.cqvip.com/Qikan/Article/Detail?id=30348247.[86] 黄敏, 荆继武, 高能. 面向电子文档的协作式访问控制模型. 计算机工程与设计[J]. 2008, 29(1): 12-15, http://lib.cqvip.com/Qikan/Article/Detail?id=26442807.[87] 李安怀, 高能, 林憬锵, 荆继武. 基于RFC2025的PKI内部通信安全实现. 计算机工程[J]. 2007, 33(9): 174-176, http://lib.cqvip.com/Qikan/Article/Detail?id=25190832.[88] 高能, 冯登国, 向继. 一种基于数据挖掘的拒绝服务攻击检测技术. 计算机学报[J]. 2006, 29(6): 944-951, http://lib.cqvip.com/Qikan/Article/Detail?id=22019853.[89] 王琼霄, 荆继武, 高能. OCTAVE风险评估方法在电子政务中的应用. 信息网络安全[J]. 2006, 39-42, http://lib.cqvip.com/Qikan/Article/Detail?id=22733483.[90] 郑晓林, 高能, 荆继武. 美国信息安全发展策略导向评述. 计算机应用研究[J]. 2006, 23(9): 107-110, http://lib.cqvip.com/Qikan/Article/Detail?id=22636300.[91] 向继, 高能, 荆继武. 网站欺骗攻击技术及其防范. 信息网络安全[J]. 2005, 70-72, http://lib.cqvip.com/Qikan/Article/Detail?id=20377831.[92] 高能, 向继, 冯登国. 一种基于数字证书的网络设备身份认证机制. 计算机工程[J]. 2004, 30(12): 96-98, http://lib.cqvip.com/Qikan/Article/Detail?id=10337971.[93] 向继, 高能, 荆继武. 聚类算法在网络入侵检测中的应用. 计算机工程[J]. 2003, 29(16): 48-49,85, http://lib.cqvip.com/Qikan/Article/Detail?id=8322108.