学术论文

SCI期刊

[1] Khelifi, Hakima; Luo, Senlin;Nour, Boubakr et al. Named Data Networking in Vehicular Ad hoc Networks:State-of-the-Art and Challenges. IEEE COMMUNICATIONS SURVEYS AND TUTORIALS. (SCI1区,IF: 20.13)

[2] Han,Longfei; Luo,Senlin;Yu,Jianmin et al. Rule Extraction From Support Vector Machines Using EnsembleLearning Approach: An Application for Diagnosis of Diabetes[J]. IEEE JOURNAL OFBIOMEDICAL AND HEALTH INFORMATICS. (SCI 1区, 2F: 3.84)

[3] Wei, Chao; Luo, Senlin; Pan,Limin et al. Locally weighted embedding topic modeling by markov random walkstructure approximation and sparse regularization. (SCI 1区,IF: 3.82)

[4] Liu, Xiaoshuang; Luo, Senlin;Pan, Limin. Robust boosting via self-sampling. KNOWLEDGE-BASED SYSTEMS. (SCI 2区,IF: 4.68)

[5] Wei, Chao; Luo, Senlin; Guo,Jia et al. Discriminative locally document embedding: Learning a smooth affinemap by approximation of the probabilistic generative structure of subspace.KNOWLEDGE-BASED SYSTEMS. (SCI 2区, IF: 4.68)

[6] Han, Longfei; Luo, Senlin;Wang, Huaiqing et al. An Intelligible Risk Stratification Model Based onPairwise and Size Constrained Kmeans. IEEE JOURNAL OF BIOMEDICAL AND HEALTHINFORMATICS. (SCI 2区, IF: 3.84)

[7] Zhang, Hanqing; Luo, Senlin;Zhang, Yifei et al. An Efficient Android Malware Detection System Based onMethod-Level Behavioral Semantic Analysis , IEEE ACCESS. (SCI 2区,IF: 3.63)

[8] Wei, Yuan; Luo, Senlin; Zhuge,Jianwei et al. ARG: Automatic ROP Chains Generation. IEEE ACCESS. (SCI 2区,IF: 3.63)

[9] Bai, Chongyou; Pan, Limin; Luo,Senlin et al. Joint Extraction of Entities and Relations by a Novel End-to-EndModel with a Double-Pointer Module. NEUROCOMPUTING. (SCI 2区,IF: 3.54)

[10] Safi, Qamas Gul Khan; Luo,Senlin; Pan, Limin et al. SVPS: Cloud-based smart vehicle parking system overubiquitous VANETs. COMPUTER NETWORKS. (SCI 2区,IF: 2.99)

[11] Liu, Wangtong; Luo, Senlin;Liu, Yu et al. A Kernel Stack Protection Model against Attacks from KernelExecution Units. COMPUTERS & SECURITY. (SCI 3区,IF: 2.85)

[12] Hu, Yaxian; Luo, Senlin; Han,Longfei et al. Deep Supervised Learning with Mixture of Neural Networks.Artificial Intelligence in Medicine. (SCI 3区,IF: 2.82)

[13] Wei, Chao; Luo, Senlin; Ma,Xincheng et al. Locally Embedding Autoencoders: A Semi-Supervised ManifoldLearning Approach of Document Representation. PLOS ONE. (SCI 3区, IF: 2.78)

[14] Luo,Senlin; Han,Longfei;Zeng,Ping et al. A Risk Assessment Model for Type 2 Diabetes in Chinese[J].PLOS ONE. (SCI 3区, IF: 2.78)

[15] Khelifi, Hakima; Luo, Senlin;Nour, Boubakr et al. Bringing Deep Learning at the Edge of Information-CentricInternet of Things. IEEE COMMUNICATIONS LETTERS. (SCI 3区,IF: 2.72)

[16] Safi, Qamas Gul Khan; Luo,Senlin; Pan, Limin et al. Secure authentication framework for cloud-based tollpayment message dissemination over ubiquitous VANETs. PERVASIVE AND MOBILECOMPUTING. (SCI 3区, IF: 2.70)

[17] Safi, Qamas Gul Khan; Luo,Senlin; Wei, Chao et al. PIaaS: Cloud-oriented secure and privacy-consciousparking information as a service using VANETs. COMPUTER NETWORKS. (SCI 3区, IF: 2.69)

[18] Song, Tianbin; Nie, Binbin;Ensen Ma et al. Functional magnetic resonance imaging reveals abnormal brainconnectivity in EGR3 gene transfected rat model of schizophrenia. BIOCHEMICALAND BIOPHYSICAL RESEARCH COMMUNICATIONS. (SCI 3区, IF: 2.58)

[19] Yun Qian, Yudi Lin, TiemeiZhang et al. The characteristics of impaired fasting glucose associated withobesity and dyslipidaemia in a Chinese population[J]. BMC PUBLIC HEALTH. (SCI 3区, IF: 2.42)

[20] Luo Senlin, Chen Songjing, PanLimin et al. Exploring the effects of intervention for those at high risk ofdeveloping type 2 diabetes using a computer simulation. Computers in Biologyand Medicine. (SCI 3区 IF:2.08)

[21] Luo, Senlin; Chen, Songjing;Pan, Limin et al. Exploring the effects of intervention for those at high riskof developing type 2 diabetes using a computer simulation. COMPUTERS IN BIOLOGYAND MEDICINE. (SCI 3区, IF: 2.079)

[22] Safi, Qamas Gul Khan; Luo,Senlin; Wei, Chao et al. Cloud-based security and privacy-aware informationdissemination over ubiquitous VANETs. COMPUTER STANDARDS & INTERFACES. (SCI3区, IF: 1.85)

[23] Zhang, Tiemei;Zhu, Ling;Luo, Senlin et al. Analysis onhealth information extracted from an urban professional population inBeijing[J]. Chinese Medical Journal. (SCI 3区, IF: 1.405)

[24] Chen Min, Zhang Tiemei, LuoSenlin et al. Functional magnetic resonance imaging and immunohistochemicalstudy of hypothalamic function following oral glucose ingestion in rats.Chinese Medical Journal (English). (SCI 3区,IF:1.405)

[25] Wang, Ruiyi; Luo, Senlin; Pan,Limin et al. Microblog Summarization using Paragraph Vector and SemanticStructure. COMPUTER SPEECH AND LANGUAGE. (SCI 4区,IF: 1.84)

[26] Ma, Jun; Luo, Senlin; Yao,Jianguo et al. Efficient Opinion Summarization on Comments with Online-LDA.INTERNATIONAL JOURNAL OF COMPUTERS COMMUNICATIONS & CONTROL. (SCI 4区, IF: 1.42)

[27] Khelifi, Hakima; Luo, Senlin;Nour, Boubakr et al. Security and Privacy Issues in Vehicular Named DataNetworks: An Overview. MOBILE INFORMATION SYSTEMS. (SCI 4区, IF: 1.15)

[28] Yan, Guanglu; Luo, Senlin;Feng, Fan et al. MOSKG: Countering Kernel Rootkits with a Secure PagingMechanism. SECURITY AND COMMUNICATION NETWORKS. (SCI 4区, IF: 1.12)

[29] Chen, Songjing; Luo, Senlin;Pan, Limin et al. Quantitative influence of risk factors on blood glucoselevel[J]. BIO-MEDICAL MATERIALS AND ENGINEERING. (SCI 4区, IF: 0.855)

[30] Feng Yang, Luo Senlin, PanLimin. An Extensive Method to detect the Image Digital Watermarking Based onKnown Template. Lecture Notes in Computer Science. (SCI 4区,IF:0.402)

[31] Boubekeur, Mohamed Bachir;Luo, SenLin; Labidi, Hocine. A Background Subtraction Algorithm for IndoorMonitoring Surveillance Systems , IEEE International Conference onComputational Intelligence and Virtual Environments for Measurement Systems andApplications. (SCI)

[32] Bachir, Boubekeur Mohamed;SenLin, Luo; Hocine, Labidi et al. Video Object Segmentation via AdaptiveThreshold based on Background Model Diversity, Proceedings of SPIE. (SCI)

[33] Labidi, Hocine; Luo, Senlin;Boubekeur, Mohamed Bachir et al. Multi-patch matching for PersonRe-identification, Proceedings of SPIE. (SCI)

CCF会议

[1]Han, Longfei; Zhang, Dingwen; Huang, Dong et al. self-paced mixture ofregressions [C]. In Proceedings of Internatinal Joint Conference on ArtificialIntelligence (IJCAI), Melbourne, Austrilia. (CCF, A 类)

[2] Huang, Dong; Han, Longfei; Fernando de laTorre. Soft-margin mixture of regressions [C]. In Proceedings of the IEEEconference on computer vision and pattern recognition (CVPR), Hawaii, USA.(CCF, A 类)

[3] Zhou, Xiaorui; Luo, Senlin; Wu, Yunfang.Co-Attention Hierarchical Network: Generating Coherent Long Distractors forReading Comprehension. In Proceedings of the Association for the Advance ofArtificial Intelligence . (CCF, A 类)

[4] Khelifi, Hakima; Luo, Senlin; Nour,Boubakr. A Name-to-Hash Encoding Scheme for Vehicular Named Data Networks[C].In Proceedings of the International Wireless Communications and MobileComputing Conference. (CCF, B类)

[5] Khelifi, Hakima; Luo, Senlin; Nour, Boubakret al. A QoS-Aware Cache Replacement Policy for Vehicular Named Data Networks.In Proceedings of the Global Communications Conference. (CCF, C类)

[6] Nour, Boubakr; Li, Fan; Khelifi , Hakimaet al. Coexistence of ICN and IP Networks: An NFV as a Service Approach[C]. InProceedings of the Global Communications Conference. (CCF, C类)

[7] Khelifi, Hakima; Luo, Senlin; Nour, Boubakret al. LQCC: A Link Quality-based Congestion Control Scheme in Named DataNetworkss[C]. In Proceedings of the IEEE Wireless Communications &Networking Conference. (CCF, C类)

[8] Khelifi, Hakima; Luo, Senlin; Nour, Boubakret al. An Optimized Proactive Caching Scheme Based on Mobility Prediction forVehicular Networks[C]. In Proceedings of the Global Communications Conference. (CCF,C类)

[9] Khelifi, Hakima; Luo, Senlin; Nour, Boubakr et al. Reputation-Based Blockchain for Secure NDN Caching in Vehicular Networks. [C]. In Proceedings of the IEEE Conference on Standards for Communications and Networking (CSCN).

[10] Nour, Boubakr; Sharif, Kashif; Li, Fan et al. NNCP: A Named Data Network Control Protocol for IoT Applications[C]. In Proceedings of the IEEE Conference on Standards for Communications and Networking (CSCN). 

其他期刊

[1] 罗森林,孙志鹏, 潘丽敏. 软聚类节点分裂层次模型. 北京理工大学学报.

[2] Khelifi, Hakima; Luo, Senlin; Nour,Boubakr et al. LQCC: A Link Quality-based Congestion Control Scheme in NamedData Networks. IEEE Wireless Communications and Networking Conference (WCNC).

[3]宋言言, 罗森林, 尚海等. 函数Native化的Android APP加固方法,浙江大学学报 (工学版).

[4]刘宇, 罗森林, 曲乐炜等. 全特征信息均衡建模的内部威胁人物检测,浙江大学学报(工学版).

[5] 焦龙龙,罗森林, 曹伟等. 变异策略动态构建的模糊测试数据生成方法, 北京理工大学学报 (自然科学版).

[6]柯懂湘,潘丽敏,罗森林等. 基于随机森林算法的Android恶意行为识别与分类方法. 浙江大学学报 (工学版).

[7]Khelifi, Hakima; Luo, Senlin; Nour, Boubakr et al. An Optimized ProactiveCaching Scheme based on Mobility Prediction for Vehicular Networks. IEEE GlobalCommunications Conference.

[8]闫广禄, 罗森林, 刘望桐等. 高可靠In-VM隐藏进程对抗检测方法. 北京理工大学学报.

[9]Khelifi, Hakima; Luo, Senlin; Nour, Boubakr et al. Reputation-Based Blockchainfor Secure NDN Caching in Vehicular Networks. IEEE Conference on Standards forCommunications and Networking (CSCN).

[10]罗森林, 毛焱颖, 潘丽敏等. 扩展语义相似情感词的文本情感分类方法. 北京理工大学学报.

[11]Han, Longfei; Zhang, Dingwen; Huang, Dong et al. Self-paced Mixture ofRegressions. Proceedings of the Twenty-Sixth International Joint Conference onArtificial Intelligence.

[12]Luo, Senlin; Chen, Qianrou; Guo, Jia et al. Microblog summarization viaenriching contextual features based on sentence-level semantic analysis.Journal of Beijing Institute of Technology.

[13]王睿怡, 罗森林, 吴舟婷等. 深度学习在汉语语义分析的应用与发展趋势. 计算机技术与发展.

[14]侯留洋, 罗森林, 焦龙龙等. 一种结合混淆思想的代码虚拟化保护方法. 科学技术与工程.

[15]Yu, Lu; Luo, Senlin; Pan, Limin. Detecting SQL Injection Attacks based on TextAnalysis.

Proceedingsof the 3rd International Conference on Computer Engineering, InformationScience & Application Technology (ICCIA 2019)

[16]刘望桐, 罗森林, 闫广禄等. 虚拟化平台构建操作系统函数调用关系方法. 吉林大学学报(信息科学版).

[17]潘丽敏, 罗森林. 网络空间安全高质量研究型专业教材体系研究. 高等理科教育.

[18]Khelifi, Hakima; Luo, Senlin; Nour, Boubakr et al. A Name-to-Hash EncodingScheme for Vehicular Named Data Networks. 15th International WirelessCommunications & Mobile Computing Conference.

[19]Yu, Lu; Luo, Senlin; Pan, Limin. Detecting SQL Injection Attacks based on TextAnalysis. Proceedings of the 3rd International Conference on ComputerEngineering, Information Science & Application Technology .

[20]潘丽敏, 罗森林, 张笈等. 网络空间安全学科专业研究型教学框架及基础认知.信息安全研究.

[21]胡雅娴, 罗森林, 庞婧等. 国内7省市老年人抑郁症的检出率及影响因素分析. 现代生物医学进展.

[22]焦龙龙, 罗森林, 刘望桐等. 基于遗传算法的二进制程序模糊测试方法. 浙江大学学报 (工学版).

[23]谢尔曼, 罗森林, 潘丽敏. 2D-Haar声学特征超向量快速生成方法. 北京理工大学学报.

[24]罗森林, 白建敏, 潘丽敏等. 融合句义特征的多文档自动摘要算法研究. 北京理工大学学报.

[25]罗森林, 程慧, 刘旭东等. 多粒度的老年人体能分级方法. 北京理工大学学报.

[26]HOCINE, Labidi; Cao, Wei; Ding, Yong et al. Adaptive learning rate GMM formoving object detection in outdoor surveillance for sudden illuminationchanges. Journal of Beijing Institute of Technology.

[27]郭亮, 罗森林, 潘丽敏. 基于相似度匹配的网络协议语法分析方法. 北京理工大学学报.

[28]喻露, 罗森林. RBAC模式下数据库内部入侵检测方法研究. 信息网络安全.

[29]侯留洋, 罗森林, 潘丽敏等. 融合多特征的Android恶意软件检测方法. 信息网络安全.

[30]陈骋, 罗森林, 吴倩等. 基于 HTTP 协议组合的隐蔽信道构建. 信息网络安全.

[31]潘丽敏, 罗森林, 王越. 网络空间安全创新实践教育教学方法研究. 信息安全研究.

[32]王文浩, 王大光, 罗森林等. 城市人群血清营养水平指标与膳食习惯关系的分析.现代生物医学进展.

[33]郭佳, 罗森林, 陈倩柔. 基于Paragraph Vector模型的科研热点发现方法. 电子设计工程.

[34]高君丰, 张岳峰, 罗森林等. 网络编码协议污点回溯逆向分析方法研究. 信息网络安全.

[35]任浩, 罗森林, 潘丽敏等. 基于图结构的文本表示方法研究. 信息网络安全.

[36]朱帅, 罗森林, 柯懂湘. Windows Shellcode自动构建方法研究. 信息网络安全.

[37]闫玺玺, 叶青, 刘宇. 云环境下支持隐私保护和用户撤销的属性基加密方案.信息网络安全.

[38]Gul Khan Safi Qamas, 尹继泽, 潘丽敏等. 基于深度神经网络的命名实体识别方法研究. 信息网络安全.

[39]毛焱颖, 罗森林. 融合多种技术的堆喷射方法研究. 信息网络安全.

[40]Yan, Guanglu; Luo, Senlin; Wei, Wei et al. Multiple Attacks onVirtualization-Based Security Monitoring. Journal of Beijing Institute ofTechnology.

[41]郭亮, 罗森林, 潘丽敏. 编码函数交叉定位网络协议测试数据生成方法研究.信息网络安全.

[42]丁庸, 曹伟, 罗森林. 基于LKM系统调用劫持的恶意软件行为监控技术研究. 信息网络安全.

[43]徐楠, 刘克军, 罗森林等. 糖尿病高危人群强化干预管理成本分析. 卫生经济研究.

[44]尚海, 罗森林, 韩磊等. 基于句义成分的短文本表示方法研究. 信息网络安全.

[45]杨静雅, 罗森林, 朱帅等.  基于多层次交叉视图分析的Android系统恶意行为监控方法研究. 信息网络安全.

[46]罗森林, 朱帅, 王春晓. 网络空间安全对抗演练模型研究. 信息网络安全.

[47]曲乐炜, 罗森林, 孙志鹏, 朱帅. Android系统数据完整性检测方法研究. 信息网络安全.

[48]GUL Khan Safi Qamas, 王鹏, 罗森林, 潘丽敏. 一种高并发网络Web应用技术研究. 信息网络安全.