<?xml version="1.0"?>
<dblpperson name="Cai Fu" pid="74/6830" n="83">
<person key="homepages/74/6830" mdate="2009-06-10">
<author pid="74/6830">Cai Fu</author>
</person>
<r><article publtype="informal" key="journals/corr/abs-2602-01129" mdate="2026-03-12">
<author pid="73/7287">Xinyi Hou</author>
<author pid="360/7470">Shenao Wang 0001</author>
<author pid="57/4707">Yifan Zhang</author>
<author pid="426/4041">Ziluo Xue</author>
<author pid="40/622-1">Yanjie Zhao 0001</author>
<author pid="74/6830">Cai Fu</author>
<author pid="50/8499-1">Haoyu Wang 0001</author>
<title>SMCP: Secure Model Context Protocol.</title>
<year>2026</year>
<month>February</month>
<volume>abs/2602.01129</volume>
<journal>CoRR</journal>
<ee type="oa">https://doi.org/10.48550/arXiv.2602.01129</ee>
<url>db/journals/corr/corr2602.html#abs-2602-01129</url>
<stream>streams/journals/corr</stream>
</article>
</r>
<r><article key="journals/compsec/LiuLHSF25" mdate="2025-08-05">
<author pid="330/2514">Hongle Liu</author>
<author pid="20/2039">Ming Liu</author>
<author pid="36/4213">Lansheng Han</author>
<author orcid="0000-0003-0295-3852" pid="216/1050">Haili Sun</author>
<author pid="74/6830">Cai Fu</author>
<title>Ripple2Detect: A semantic similarity learning based framework for insider threat multi-step evidence detection.</title>
<pages>104387</pages>
<year>2025</year>
<volume>154</volume>
<journal>Comput. Secur.</journal>
<ee>https://doi.org/10.1016/j.cose.2025.104387</ee>
<url>db/journals/compsec/compsec154.html#LiuLHSF25</url>
<stream>streams/journals/compsec</stream>
</article>
</r>
<r><article key="journals/isci/LvFYHJLL25" mdate="2025-09-11">
<author pid="325/8999">Jianqiang Lv</author>
<author orcid="0000-0003-4536-3537" pid="74/6830">Cai Fu</author>
<author orcid="0009-0008-4187-0690" pid="414/3249">Qiwen Yan</author>
<author orcid="0000-0003-3541-4599" pid="87/7883">Shuai He</author>
<author pid="45/5080">Shuai Jiang</author>
<author orcid="0000-0002-8011-8564" pid="42/6759">Xiaofan Liu</author>
<author pid="20/2039">Ming Liu</author>
<title>BinCOP: Automated mining of code reuse paths for binary component oriented programming.</title>
<pages>122563</pages>
<year>2025</year>
<volume>721</volume>
<journal>Inf. Sci.</journal>
<ee>https://doi.org/10.1016/j.ins.2025.122563</ee>
<url>db/journals/isci/isci721.html#LvFYHJLL25</url>
<stream>streams/journals/isci</stream>
</article>
</r>
<r><article key="journals/jss/ZouZZWSF25" mdate="2025-07-06">
<author orcid="0009-0005-5212-7366" pid="267/9437">Yayi Zou</author>
<author orcid="0009-0005-7040-9623" pid="83/9921">Yixiang Zhang</author>
<author orcid="0009-0008-1889-0589" pid="405/8454">Guanghao Zhao</author>
<author pid="77/8060-1">Yueming Wu 0001</author>
<author pid="361/1626">Shuhao Shen</author>
<author orcid="0000-0003-4536-3537" pid="74/6830">Cai Fu</author>
<title>BinCoFer: Three-stage purification for effective C/C++ binary third-party library detection.</title>
<pages>112480</pages>
<year>2025</year>
<volume>229</volume>
<journal>J. Syst. Softw.</journal>
<ee>https://doi.org/10.1016/j.jss.2025.112480</ee>
<url>db/journals/jss/jss229.html#ZouZZWSF25</url>
<stream>streams/journals/jss</stream>
</article>
</r>
<r><article key="journals/scp/LvFCLHJH25" mdate="2025-05-09">
<author pid="325/8999">Jianqiang Lv</author>
<author orcid="0000-0003-4536-3537" pid="74/6830">Cai Fu</author>
<author pid="404/4486">Liangheng Chen</author>
<author pid="20/2039">Ming Liu</author>
<author pid="87/7883">Shuai He</author>
<author pid="45/5080">Shuai Jiang</author>
<author pid="36/4213">Lansheng Han</author>
<title>DopSteg: Program steganography using data-oriented programming.</title>
<pages>103311</pages>
<year>2025</year>
<volume>245</volume>
<journal>Sci. Comput. Program.</journal>
<ee>https://doi.org/10.1016/j.scico.2025.103311</ee>
<url>db/journals/scp/scp245.html#LvFCLHJH25</url>
<stream>streams/journals/scp</stream>
</article>
</r>
<r><inproceedings key="conf/issta/HeYLHGLF25" mdate="2025-07-06">
<author orcid="0000-0003-3541-4599" pid="87/7883">Shuai He</author>
<author orcid="0009-0005-9894-2083" pid="77/6310">Hao Yan</author>
<author orcid="0000-0002-2172-8709" pid="147/0516">Wenke Li</author>
<author orcid="0009-0004-5919-0248" pid="34/10892">Sheng Hong</author>
<author orcid="0000-0001-7239-7471" pid="59/6422">Xiaowei Guo</author>
<author orcid="0000-0002-8011-8564" pid="42/6759">Xiaofan Liu</author>
<author orcid="0000-0003-4536-3537" pid="74/6830">Cai Fu</author>
<title>From Large Language Models to Adversarial Malware: How far are we.</title>
<pages>178-182</pages>
<year>2025</year>
<booktitle>ISSTA Companion</booktitle>
<ee>https://doi.org/10.1145/3713081.3732928</ee>
<crossref>conf/issta/2025c</crossref>
<url>db/conf/issta/issta2025c.html#HeYLHGLF25</url>
</inproceedings>
</r>
<r><inproceedings key="conf/www/WuHHF025" mdate="2025-12-09">
<author orcid="0009-0009-7802-3003" pid="73/6038">Xiao Wu</author>
<author orcid="0009-0000-4088-1592" pid="314/8336">Junzhou He</author>
<author orcid="0009-0003-4929-1478" pid="128/0955">Liyan Huang</author>
<author orcid="0000-0003-4536-3537" pid="74/6830">Cai Fu</author>
<author orcid="0000-0003-1175-4409" pid="57/7210-1">Weihang Wang 0001</author>
<title>WBSan: WebAssembly Bug Detection for Sanitization and Binary-Only Fuzzing.</title>
<pages>3311-3322</pages>
<year>2025</year>
<booktitle>WWW</booktitle>
<ee>https://doi.org/10.1145/3696410.3714622</ee>
<crossref>conf/www/2025</crossref>
<url>db/conf/www/www2025.html#WuHHF025</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/corr/abs-2504-19551" mdate="2025-06-03">
<author pid="267/9437">Yayi Zou</author>
<author pid="83/9921">Yixiang Zhang</author>
<author pid="405/8454">Guanghao Zhao</author>
<author pid="77/8060-1">Yueming Wu 0001</author>
<author pid="361/1626">Shuhao Shen</author>
<author pid="74/6830">Cai Fu</author>
<title>BinCoFer: Three-Stage Purification for Effective C/C++ Binary Third-Party Library Detection.</title>
<year>2025</year>
<month>April</month>
<volume>abs/2504.19551</volume>
<journal>CoRR</journal>
<ee type="oa">https://doi.org/10.48550/arXiv.2504.19551</ee>
<url>db/journals/corr/corr2504.html#abs-2504-19551</url>
<stream>streams/journals/corr</stream>
</article>
</r>
<r><article key="journals/compsec/SunHHFLL24" mdate="2024-05-31">
<author orcid="0000-0003-0295-3852" pid="216/1050">Haili Sun</author>
<author orcid="0000-0002-7925-4841" pid="75/6434-26">Yan Huang 0026</author>
<author pid="36/4213">Lansheng Han</author>
<author orcid="0000-0003-4536-3537" pid="74/6830">Cai Fu</author>
<author pid="330/2514">Hongle Liu</author>
<author pid="64/6328">Xiang Long</author>
<title>MTS-DVGAN: Anomaly detection in cyber-physical systems using a dual variational generative adversarial network.</title>
<pages>103570</pages>
<year>2024</year>
<volume>139</volume>
<journal>Comput. Secur.</journal>
<ee>https://doi.org/10.1016/j.cose.2023.103570</ee>
<url>db/journals/compsec/compsec139.html#SunHHFLL24</url>
</article>
</r>
<r><article key="journals/tse/JiangFHLHH24" mdate="2024-11-11">
<author pid="45/5080">Shuai Jiang</author>
<author pid="74/6830">Cai Fu</author>
<author orcid="0000-0003-3541-4599" pid="87/7883">Shuai He</author>
<author orcid="0000-0001-6931-0179" pid="325/8999">Jianqiang Lv</author>
<author orcid="0000-0001-7529-729X" pid="36/4213">Lansheng Han</author>
<author orcid="0000-0002-6261-3190" pid="70/2543-4">Hong Hu 0004</author>
<title>BinCola: Diversity-Sensitive Contrastive Learning for Binary Code Similarity Detection.</title>
<pages>2485-2497</pages>
<year>2024</year>
<month>October</month>
<volume>50</volume>
<journal>IEEE Trans. Software Eng.</journal>
<number>10</number>
<ee>https://doi.org/10.1109/TSE.2024.3411072</ee>
<url>db/journals/tse/tse50.html#JiangFHLHH24</url>
<stream>streams/journals/tse</stream>
</article>
</r>
<r><inproceedings key="conf/icse/HeF0CLJ24" mdate="2025-01-19">
<author orcid="0000-0003-3541-4599" pid="87/7883">Shuai He</author>
<author orcid="0000-0003-4536-3537" pid="74/6830">Cai Fu</author>
<author orcid="0000-0002-6261-3190" pid="70/2543-4">Hong Hu 0004</author>
<author orcid="0009-0009-0424-6941" pid="263/1421">Jiahe Chen</author>
<author orcid="0000-0001-6931-0179" pid="325/8999">Jianqiang Lv</author>
<author pid="45/5080">Shuai Jiang</author>
<title>MalwareTotal: Multi-Faceted and Sequence-Aware Bypass Tactics against Static Malware Detection.</title>
<pages>172:1-172:12</pages>
<year>2024</year>
<booktitle>ICSE</booktitle>
<ee>https://doi.org/10.1145/3597503.3639141</ee>
<ee>https://www.wikidata.org/entity/Q131117954</ee>
<crossref>conf/icse/2024</crossref>
<url>db/conf/icse/icse2024.html#HeF0CLJ24</url>
</inproceedings>
</r>
<r><inproceedings key="conf/issta/GuoFCLHL24" mdate="2025-01-19">
<author orcid="0000-0001-7239-7471" pid="59/6422">Xiaowei Guo</author>
<author orcid="0000-0003-4536-3537" pid="74/6830">Cai Fu</author>
<author orcid="0009-0009-2507-6160" pid="54/2717">Juan Chen</author>
<author orcid="0009-0000-8031-4015" pid="330/2514">Hongle Liu</author>
<author orcid="0000-0001-7529-729X" pid="36/4213">Lansheng Han</author>
<author orcid="0009-0005-7721-2700" pid="84/5952">Wenjin Li</author>
<title>Enhancing Robustness of Code Authorship Attribution through Expert Feature Knowledge.</title>
<pages>199-209</pages>
<year>2024</year>
<booktitle>ISSTA</booktitle>
<ee>https://doi.org/10.1145/3650212.3652121</ee>
<ee>https://www.wikidata.org/entity/Q130840638</ee>
<crossref>conf/issta/2024</crossref>
<url>db/conf/issta/issta2024.html#GuoFCLHL24</url>
</inproceedings>
</r>
<r><inproceedings key="conf/kbse/LiuZFXD24" mdate="2025-05-01">
<author orcid="0000-0002-8011-8564" pid="42/6759">Xiaofan Liu</author>
<author pid="358/8889">Xunjin Zheng</author>
<author pid="74/6830">Cai Fu</author>
<author orcid="0009-0006-9700-0542" pid="359/0480">Xiaoheng Xie</author>
<author orcid="0000-0002-5799-5876" pid="00/9301">Peng Di</author>
<title>GrayDuck: The Sword of Damocles for Duck Typing in Dynamic Language Deserialization.</title>
<pages>2458-2459</pages>
<year>2024</year>
<booktitle>ASE</booktitle>
<ee>https://doi.org/10.1145/3691620.3695327</ee>
<ee>https://www.wikidata.org/entity/Q130921860</ee>
<crossref>conf/kbse/2024</crossref>
<url>db/conf/kbse/ase2024.html#LiuZFXD24</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/corr/abs-2403-02616" mdate="2025-07-04">
<author pid="216/1050">Haili Sun</author>
<author orcid="0000-0002-7925-4841" pid="75/6434-26">Yan Huang 0026</author>
<author pid="36/4213">Lansheng Han</author>
<author pid="74/6830">Cai Fu</author>
<author pid="94/340">Chunjie Zhou</author>
<title>Unsupervised Spatio-Temporal State Estimation for Fine-grained Adaptive Anomaly Diagnosis of Industrial Cyber-physical Systems.</title>
<year>2024</year>
<volume>abs/2403.02616</volume>
<journal>CoRR</journal>
<ee type="oa">https://doi.org/10.48550/arXiv.2403.02616</ee>
<url>db/journals/corr/corr2403.html#abs-2403-02616</url>
</article>
</r>
<r><article key="journals/compsec/FanWFHX23" mdate="2023-07-07">
<author pid="349/6928">Yuanhai Fan</author>
<author orcid="0000-0002-5428-290X" pid="09/685">Chuanhao Wan</author>
<author pid="74/6830">Cai Fu</author>
<author pid="36/4213">Lansheng Han</author>
<author pid="43/6008">Hao Xu</author>
<title>VDoTR: Vulnerability detection based on tensor representation of comprehensive code graphs.</title>
<pages>103247</pages>
<year>2023</year>
<volume>130</volume>
<journal>Comput. Secur.</journal>
<ee>https://doi.org/10.1016/j.cose.2023.103247</ee>
<url>db/journals/compsec/compsec130.html#FanWFHX23</url>
</article>
</r>
<r><article key="journals/digearth/ZhangZYXHZF23" mdate="2025-12-09">
<author pid="44/10594">Shengqing Zhang</author>
<author pid="79/392">Xiaoyan Zhai</author>
<author pid="57/5443">Peng Yang</author>
<author orcid="0000-0002-7993-0803" pid="22/3650-1">Jun Xia 0001</author>
<author pid="66/8069">Sheng Hu</author>
<author pid="27/4249">Libo Zhou</author>
<author pid="74/6830">Cai Fu</author>
<title>Ecological health analysis of wetlands in the middle reaches of Yangtze River under changing environment.</title>
<pages>3125-3144</pages>
<year>2023</year>
<month>December</month>
<volume>16</volume>
<journal>Int. J. Digit. Earth</journal>
<number>1</number>
<ee type="oa">https://doi.org/10.1080/17538947.2023.2244471</ee>
<url>db/journals/digearth/digearth16.html#ZhangZYXHZF23</url>
</article>
</r>
<r><article key="journals/npl/HeFFLD23" mdate="2024-02-05">
<author orcid="0000-0003-3541-4599" pid="87/7883">Shuai He</author>
<author pid="74/6830">Cai Fu</author>
<author pid="277/3320">Guanyun Feng</author>
<author pid="325/8999">Jianqiang Lv</author>
<author pid="326/2302">Fengyang Deng</author>
<title>Singular Value Manipulating: An Effective DRL-Based Adversarial Attack on Deep Convolutional Neural Network.</title>
<pages>12459-12480</pages>
<year>2023</year>
<month>December</month>
<volume>55</volume>
<journal>Neural Process. Lett.</journal>
<number>9</number>
<ee>https://doi.org/10.1007/s11063-023-11428-5</ee>
<url>db/journals/npl/npl55.html#HeFFLD23</url>
</article>
</r>
<r><article key="journals/tosem/YangFDWGW23" mdate="2025-01-19">
<author orcid="0000-0003-1469-0789" pid="22/667">Jia Yang</author>
<author orcid="0000-0003-4536-3537" pid="74/6830">Cai Fu</author>
<author orcid="0000-0003-3352-4065" pid="326/2302">Fengyang Deng</author>
<author orcid="0000-0001-5588-9618" pid="99/1109-1">Ming Wen 0001</author>
<author orcid="0000-0001-7239-7471" pid="59/6422">Xiaowei Guo</author>
<author orcid="0000-0002-5428-290X" pid="09/685">Chuanhao Wan</author>
<title>Toward Interpretable Graph Tensor Convolution Neural Network for Code Semantics Embedding.</title>
<pages>115:1-115:40</pages>
<year>2023</year>
<month>September</month>
<volume>32</volume>
<journal>ACM Trans. Softw. Eng. Methodol.</journal>
<number>5</number>
<ee>https://doi.org/10.1145/3582574</ee>
<ee>https://www.wikidata.org/entity/Q130866812</ee>
<url>db/journals/tosem/tosem32.html#YangFDWGW23</url>
</article>
</r>
<r><inproceedings key="conf/issre/LiHFZL23" mdate="2025-02-12">
<author pid="75/6627">Ke Li</author>
<author pid="34/10892">Sheng Hong</author>
<author pid="74/6830">Cai Fu</author>
<author pid="15/5780-2">Yunhe Zhang 0002</author>
<author pid="20/2039">Ming Liu</author>
<title>Discriminating Human-authored from ChatGPT-Generated Code Via Discernable Feature Analysis.</title>
<pages>120-127</pages>
<year>2023</year>
<booktitle>ISSREW</booktitle>
<ee>https://doi.org/10.1109/ISSREW60843.2023.00059</ee>
<crossref>conf/issre/2023w</crossref>
<url>db/conf/issre/issre2023w.html#LiHFZL23</url>
</inproceedings>
</r>
<r><inproceedings key="conf/kbse/LiWFZ23" mdate="2025-01-19">
<author orcid="0000-0002-2172-8709" pid="147/0516">Wenke Li</author>
<author pid="25/3972">Feng Wu</author>
<author orcid="0000-0003-4536-3537" pid="74/6830">Cai Fu</author>
<author pid="63/3122">Fan Zhou</author>
<title>A Large-Scale Empirical Study on Semantic Versioning in Golang Ecosystem.</title>
<pages>1604-1614</pages>
<year>2023</year>
<booktitle>ASE</booktitle>
<ee>https://doi.org/10.1109/ASE56229.2023.00140</ee>
<ee>https://www.wikidata.org/entity/Q131122644</ee>
<crossref>conf/kbse/2023</crossref>
<url>db/conf/kbse/ase2023.html#LiWFZ23</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/corr/abs-2306-14397" mdate="2025-02-12">
<author pid="75/6627">Ke Li</author>
<author pid="34/10892">Sheng Hong</author>
<author pid="74/6830">Cai Fu</author>
<author pid="15/5780-2">Yunhe Zhang 0002</author>
<author pid="20/2039">Ming Liu</author>
<title>Deciphering the Code: Distinguishing ChatGPT-Generated Code from Human-authored Code through Discriminative Feature Analysis and Dataset Optimization.</title>
<year>2023</year>
<volume>abs/2306.14397</volume>
<journal>CoRR</journal>
<ee type="oa">https://doi.org/10.48550/arXiv.2306.14397</ee>
<url>db/journals/corr/corr2306.html#abs-2306-14397</url>
</article>
</r>
<r><article publtype="informal" key="journals/corr/abs-2309-02894" mdate="2023-09-12">
<author pid="147/0516">Wenke Li</author>
<author pid="25/3972">Feng Wu</author>
<author pid="74/6830">Cai Fu</author>
<author pid="63/3122">Fan Zhou</author>
<title>A Large-Scale Empirical Study on Semantic Versioning in Golang Ecosystem.</title>
<year>2023</year>
<volume>abs/2309.02894</volume>
<journal>CoRR</journal>
<ee type="oa">https://doi.org/10.48550/arXiv.2309.02894</ee>
<url>db/journals/corr/corr2309.html#abs-2309-02894</url>
</article>
</r>
<r><article publtype="informal" key="journals/corr/abs-2311-02378" mdate="2024-05-24">
<author pid="216/1050">Haili Sun</author>
<author pid="75/6434-26">Yan Huang 0026</author>
<author pid="36/4213">Lansheng Han</author>
<author pid="74/6830">Cai Fu</author>
<author pid="330/2514">Hongle Liu</author>
<author pid="64/6328">Xiang Long</author>
<title>MTS-DVGAN: Anomaly Detection in Cyber-Physical Systems using a Dual Variational Generative Adversarial Network.</title>
<year>2023</year>
<volume>abs/2311.02378</volume>
<journal>CoRR</journal>
<ee type="oa">https://doi.org/10.48550/arXiv.2311.02378</ee>
<url>db/journals/corr/corr2311.html#abs-2311-02378</url>
</article>
</r>
<r><article key="journals/compsec/JiangFQHLH22" mdate="2024-10-06">
<author pid="45/5080">Shuai Jiang</author>
<author pid="74/6830">Cai Fu</author>
<author pid="232/4390">Yekui Qian</author>
<author pid="87/7883">Shuai He</author>
<author orcid="0000-0001-6931-0179" pid="325/8999">Jianqiang Lv</author>
<author pid="36/4213">Lansheng Han</author>
<title>IFAttn: Binary code similarity analysis based on interpretable features with attention.</title>
<pages>102804</pages>
<year>2022</year>
<volume>120</volume>
<journal>Comput. Secur.</journal>
<ee>https://doi.org/10.1016/j.cose.2022.102804</ee>
<ee>https://www.wikidata.org/entity/Q115045994</ee>
<url>db/journals/compsec/compsec120.html#JiangFQHLH22</url>
</article>
</r>
<r><article key="journals/iotj/YangFLW22" mdate="2023-08-28">
<author orcid="0000-0003-1469-0789" pid="22/667">Jia Yang</author>
<author pid="74/6830">Cai Fu</author>
<author orcid="0000-0002-9532-1709" pid="125/9849">Xiao-Yang Liu</author>
<author orcid="0000-0003-1992-6068" pid="75/6446">Anwar Walid</author>
<title>Recommendations in Smart Devices Using Federated Tensor Learning.</title>
<pages>8425-8437</pages>
<year>2022</year>
<volume>9</volume>
<journal>IEEE Internet Things J.</journal>
<number>11</number>
<ee>https://doi.org/10.1109/JIOT.2021.3116505</ee>
<ee>https://www.wikidata.org/entity/Q114086154</ee>
<url>db/journals/iotj/iotj9.html#YangFLW22</url>
</article>
</r>
<r><article key="journals/spe/DengFQYHX22" mdate="2022-08-25">
<author orcid="0000-0003-3352-4065" pid="326/2302">Fengyang Deng</author>
<author pid="74/6830">Cai Fu</author>
<author pid="232/4390">Yekui Qian</author>
<author pid="22/667">Jia Yang</author>
<author pid="87/7883">Shuai He</author>
<author pid="43/6008">Hao Xu</author>
<title>Federated learning based multi-task feature fusion framework for code expressive semantic extraction.</title>
<pages>1849-1866</pages>
<year>2022</year>
<volume>52</volume>
<journal>Softw. Pract. Exp.</journal>
<number>8</number>
<ee>https://doi.org/10.1002/spe.3094</ee>
<url>db/journals/spe/spe52.html#DengFQYHX22</url>
</article>
</r>
<r><article key="journals/tse/YangFLYZ22" mdate="2024-10-06">
<author orcid="0000-0003-1469-0789" pid="22/667">Jia Yang</author>
<author orcid="0000-0003-4536-3537" pid="74/6830">Cai Fu</author>
<author orcid="0000-0002-9532-1709" pid="125/9849">Xiao-Yang Liu</author>
<author orcid="0000-0002-8942-7742" pid="77/6178-1">Heng Yin 0001</author>
<author orcid="0000-0002-8629-4622" pid="84/6614-1">Pan Zhou 0001</author>
<title>Codee: A Tensor Embedding Scheme for Binary Code Search.</title>
<pages>2224-2244</pages>
<year>2022</year>
<volume>48</volume>
<journal>IEEE Trans. Software Eng.</journal>
<number>7</number>
<ee>https://doi.org/10.1109/TSE.2021.3056139</ee>
<ee>https://www.wikidata.org/entity/Q114083688</ee>
<url>db/journals/tse/tse48.html#YangFLYZ22</url>
</article>
</r>
<r><article key="journals/vcomm/ZhouHLFQ22" mdate="2025-11-15">
<author orcid="0000-0002-3867-3513" pid="165/8236-1">Man Zhou 0001</author>
<author pid="36/4213">Lansheng Han</author>
<author pid="94/7642">Hongwei Lu</author>
<author pid="74/6830">Cai Fu</author>
<author pid="232/4390">Yekui Qian</author>
<title>Attack detection based on invariant state set for SDN-enabled vehicle platoon control system.</title>
<pages>100417</pages>
<year>2022</year>
<volume>34</volume>
<journal>Veh. Commun.</journal>
<ee>https://doi.org/10.1016/j.vehcom.2021.100417</ee>
<url>db/journals/vcomm/vcomm34.html#ZhouHLFQ22</url>
</article>
</r>
<r><article key="journals/isci/YangFL21" mdate="2021-05-17">
<author pid="22/667">Jia Yang</author>
<author pid="74/6830">Cai Fu</author>
<author pid="94/7642">Hongwei Lu</author>
<title>Optimized and federated soft-impute for privacy-preserving tensor completion in cyber-physical-social systems.</title>
<pages>103-123</pages>
<year>2021</year>
<volume>564</volume>
<journal>Inf. Sci.</journal>
<ee>https://doi.org/10.1016/j.ins.2021.02.028</ee>
<url>db/journals/isci/isci564.html#YangFL21</url>
</article>
</r>
<r><article key="journals/istr/JiangYFQH21" mdate="2025-03-03">
<author orcid="0000-0001-7219-5597" pid="45/5080">Shuai Jiang</author>
<author pid="98/914">Hong Yao</author>
<author pid="74/6830">Cai Fu</author>
<author pid="232/4390">Yekui Qian</author>
<author pid="36/4213">Lansheng Han</author>
<title>Function-level obfuscation detection method based on Graph Convolutional Networks.</title>
<pages>102953</pages>
<year>2021</year>
<volume>61</volume>
<journal>J. Inf. Secur. Appl.</journal>
<ee>https://doi.org/10.1016/j.jisa.2021.102953</ee>
<url>db/journals/istr/istr61.html#JiangYFQH21</url>
</article>
</r>
<r><article key="journals/jcsc/FuKZCCY21" mdate="2025-02-12">
<author pid="74/6830">Cai Fu</author>
<author pid="248/4607">Zhaokang Ke</author>
<author orcid="0000-0002-7866-0100" pid="15/5780-2">Yunhe Zhang 0002</author>
<author pid="248/5141">Xiwu Chen</author>
<author pid="248/4930">Liqing Cao</author>
<author pid="248/4507">Mingjun Yin</author>
<title>The Impact of Search Engines on Virus Propagation.</title>
<pages>2150230:1-2150230:18</pages>
<year>2021</year>
<volume>30</volume>
<journal>J. Circuits Syst. Comput.</journal>
<number>13</number>
<ee>https://doi.org/10.1142/S0218126621502303</ee>
<url>db/journals/jcsc/jcsc30.html#FuKZCCY21</url>
</article>
</r>
<r><article key="journals/monet/ZhouHLF21" mdate="2025-01-19">
<author pid="165/8236">Man Zhou</author>
<author orcid="0000-0001-7529-729X" pid="36/4213">Lansheng Han</author>
<author pid="94/7642">Hongwei Lu</author>
<author pid="74/6830">Cai Fu</author>
<title>Intrusion Detection System for IoT Heterogeneous Perceptual Network.</title>
<pages>1461-1474</pages>
<year>2021</year>
<volume>26</volume>
<journal>Mob. Networks Appl.</journal>
<number>4</number>
<ee>https://doi.org/10.1007/s11036-019-01483-5</ee>
<ee>https://www.wikidata.org/entity/Q126345567</ee>
<url>db/journals/monet/monet26.html#ZhouHLF21</url>
</article>
</r>
<r><article key="journals/tnse/WuWCYZWF21" mdate="2025-11-14">
<author orcid="0000-0002-6955-2087" pid="88/3604-16">Jing Wu 0016</author>
<author orcid="0000-0002-1637-5443" pid="230/6692">Juzhen Wang</author>
<author orcid="0000-0003-2497-8911" pid="63/5974">Qimei Chen</author>
<author pid="197/5699">Zenghui Yuan</author>
<author orcid="0000-0002-8629-4622" pid="84/6614-1">Pan Zhou 0001</author>
<author orcid="0000-0002-3772-290X" pid="15/7829-5">Xiumin Wang 0005</author>
<author pid="74/6830">Cai Fu</author>
<title>Resource Allocation for Delay-Sensitive Vehicle-to-Multi-Edges (V2Es) Communications in Vehicular Networks: A Multi-Agent Deep Reinforcement Learning Approach.</title>
<pages>1873-1886</pages>
<year>2021</year>
<volume>8</volume>
<journal>IEEE Trans. Netw. Sci. Eng.</journal>
<number>2</number>
<ee>https://doi.org/10.1109/TNSE.2021.3075530</ee>
<url>db/journals/tnse/tnse8.html#WuWCYZWF21</url>
</article>
</r>
<r><inproceedings key="conf/hpcc/FanWZLXFLC21" mdate="2024-06-20">
<author pid="274/0938">Houxiang Fan</author>
<author pid="123/7149">Binghui Wang</author>
<author pid="84/6614-1">Pan Zhou 0001</author>
<author pid="33/2805-5">Ang Li 0005</author>
<author pid="05/8410">Zichuan Xu</author>
<author pid="74/6830">Cai Fu</author>
<author pid="30/5330-1">Hai Li 0001</author>
<author pid="80/1641">Yiran Chen 0001</author>
<title>Reinforcement Learning-based Black-Box Evasion Attacks to Link Prediction in Dynamic Graphs.</title>
<pages>933-940</pages>
<year>2021</year>
<booktitle>HPCC/DSS/SmartCity/DependSys</booktitle>
<ee>https://doi.org/10.1109/HPCC-DSS-SmartCity-DependSys53884.2021.00149</ee>
<crossref>conf/hpcc/2021</crossref>
<url>db/conf/hpcc/hpcc2021.html#FanWZLXFLC21</url>
</inproceedings>
</r>
<r><article key="journals/cn/ZhouHLF20" mdate="2020-04-28">
<author pid="165/8236">Man Zhou</author>
<author pid="36/4213">Lansheng Han</author>
<author pid="94/7642">Hongwei Lu</author>
<author pid="74/6830">Cai Fu</author>
<title>Distributed collaborative intrusion detection system for vehicular Ad Hoc networks based on invariant.</title>
<pages>107174</pages>
<year>2020</year>
<volume>172</volume>
<journal>Comput. Networks</journal>
<ee>https://doi.org/10.1016/j.comnet.2020.107174</ee>
<url>db/journals/cn/cn172.html#ZhouHLF20</url>
</article>
</r>
<r><article key="journals/compsec/ZhouHLFA20" mdate="2025-11-15">
<author orcid="0000-0002-3867-3513" pid="165/8236-1">Man Zhou 0001</author>
<author orcid="0000-0001-7529-729X" pid="36/4213">Lansheng Han</author>
<author pid="94/7642">Hongwei Lu</author>
<author pid="74/6830">Cai Fu</author>
<author pid="263/9325">Dezhi An</author>
<title>Cooperative malicious network behavior recognition algorithm in E-commerce.</title>
<pages>101868</pages>
<year>2020</year>
<volume>95</volume>
<journal>Comput. Secur.</journal>
<ee>https://doi.org/10.1016/j.cose.2020.101868</ee>
<ee>https://www.wikidata.org/entity/Q115054125</ee>
<url>db/journals/compsec/compsec95.html#ZhouHLFA20</url>
</article>
</r>
<r><article key="journals/tcss/FuYLYWY20" mdate="2025-12-07">
<author orcid="0000-0003-4536-3537" pid="74/6830">Cai Fu</author>
<author orcid="0009-0000-5169-3669" pid="21/2326">Zhao Yang</author>
<author orcid="0000-0002-9532-1709" pid="125/9849">Xiao-Yang Liu</author>
<author orcid="0000-0003-1469-0789" pid="22/667">Jia Yang</author>
<author orcid="0000-0003-1992-6068" pid="75/6446">Anwar Walid</author>
<author orcid="0000-0002-7986-4244" pid="y/LaurenceTianruoYang">Laurence T. Yang</author>
<title>Secure Tensor Decomposition for Heterogeneous Multimedia Data in Cloud Computing.</title>
<pages>247-260</pages>
<year>2020</year>
<volume>7</volume>
<journal>IEEE Trans. Comput. Soc. Syst.</journal>
<number>1</number>
<ee>https://doi.org/10.1109/TCSS.2019.2959948</ee>
<url>db/journals/tcss/tcss7.html#FuYLYWY20</url>
</article>
</r>
<r><inproceedings key="conf/spde/YangFQYFH20" mdate="2020-10-29">
<author pid="219/9343">Chenglong Yang</author>
<author pid="74/6830">Cai Fu</author>
<author pid="232/4390">Yekui Qian</author>
<author pid="98/914">Hong Yao</author>
<author pid="277/3320">Guanyun Feng</author>
<author pid="36/4213">Lansheng Han</author>
<title>Deep Learning-Based Reverse Method of Binary Protocol.</title>
<pages>606-624</pages>
<year>2020</year>
<booktitle>SPDE</booktitle>
<ee>https://doi.org/10.1007/978-981-15-9129-7_42</ee>
<crossref>conf/spde/2020</crossref>
<url>db/conf/spde/spde2020.html#YangFQYFH20</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/corr/abs-2009-00163" mdate="2024-06-20">
<author pid="274/0938">Houxiang Fan</author>
<author pid="123/7149">Binghui Wang</author>
<author pid="84/6614-1">Pan Zhou 0001</author>
<author pid="33/2805-5">Ang Li 0005</author>
<author pid="172/9447">Meng Pang</author>
<author pid="05/8410">Zichuan Xu</author>
<author pid="74/6830">Cai Fu</author>
<author pid="30/5330-1">Hai Li 0001</author>
<author pid="80/1641">Yiran Chen 0001</author>
<title>Reinforcement Learning-based Black-Box Evasion Attacks to Link Prediction in Dynamic Graphs.</title>
<year>2020</year>
<volume>abs/2009.00163</volume>
<journal>CoRR</journal>
<ee type="oa">https://arxiv.org/abs/2009.00163</ee>
<url>db/journals/corr/corr2009.html#abs-2009-00163</url>
</article>
</r>
<r><article publtype="informal" key="journals/corr/abs-2009-00203" mdate="2024-06-20">
<author pid="123/7149">Binghui Wang</author>
<author pid="09/1447">Tianxiang Zhou</author>
<author pid="274/1711">Minhua Lin</author>
<author pid="84/6614-1">Pan Zhou 0001</author>
<author pid="33/2805-5">Ang Li 0005</author>
<author pid="172/9447">Meng Pang</author>
<author pid="74/6830">Cai Fu</author>
<author pid="30/5330-1">Hai Li 0001</author>
<author pid="80/1641">Yiran Chen 0001</author>
<title>Evasion Attacks to Graph Neural Networks via Influence Function.</title>
<year>2020</year>
<volume>abs/2009.00203</volume>
<journal>CoRR</journal>
<ee type="oa">https://arxiv.org/abs/2009.00203</ee>
<url>db/journals/corr/corr2009.html#abs-2009-00203</url>
</article>
</r>
<r><article key="journals/access/HanZQFZ19" mdate="2025-11-15">
<author orcid="0000-0001-7529-729X" pid="36/4213">Lansheng Han</author>
<author orcid="0000-0002-3867-3513" pid="165/8236-1">Man Zhou 0001</author>
<author pid="232/4390">Yekui Qian</author>
<author pid="74/6830">Cai Fu</author>
<author orcid="0000-0001-8534-5048" pid="z/DeqingZou">Deqing Zou</author>
<title>An Optimized Static Propositional Function Model to Detect Software Vulnerability.</title>
<pages>143499-143510</pages>
<year>2019</year>
<volume>7</volume>
<journal>IEEE Access</journal>
<ee type="oa">https://doi.org/10.1109/ACCESS.2019.2943896</ee>
<ee>https://www.wikidata.org/entity/Q121816467</ee>
<url>db/journals/access/access7.html#HanZQFZ19</url>
</article>
</r>
<r><article key="journals/concurrency/HanZHJSF19" mdate="2025-01-19">
<author orcid="0000-0001-7529-729X" pid="36/4213">Lansheng Han</author>
<author pid="165/8236">Man Zhou</author>
<author pid="98/4874">Shuxia Han</author>
<author orcid="0000-0002-0940-3338" pid="24/669">Wenjing Jia</author>
<author pid="00/6602">Changhua Sun</author>
<author pid="74/6830">Cai Fu</author>
<title>Targeting malware discrimination based on reversed association task.</title>
<year>2019</year>
<volume>31</volume>
<journal>Concurr. Comput. Pract. Exp.</journal>
<number>23</number>
<ee>https://doi.org/10.1002/cpe.4922</ee>
<ee>https://www.wikidata.org/entity/Q129216960</ee>
<url>db/journals/concurrency/concurrency31.html#HanZHJSF19</url>
</article>
</r>
<r><article key="journals/fgcs/FuPLYYH19" mdate="2020-02-19">
<author pid="74/6830">Cai Fu</author>
<author pid="198/1044">Chenchen Peng</author>
<author pid="125/9849">Xiao-Yang Liu</author>
<author pid="y/LaurenceTianruoYang">Laurence T. Yang</author>
<author pid="22/667">Jia Yang</author>
<author pid="36/4213">Lansheng Han</author>
<title>Search engine: The social relationship driving power of Internet of Things.</title>
<pages>972-986</pages>
<year>2019</year>
<volume>92</volume>
<journal>Future Gener. Comput. Syst.</journal>
<ee>https://doi.org/10.1016/j.future.2018.01.037</ee>
<url>db/journals/fgcs/fgcs92.html#FuPLYYH19</url>
</article>
</r>
<r><article key="journals/tdsc/FuLYYYZ19" mdate="2024-10-06">
<author orcid="0000-0003-4536-3537" pid="74/6830">Cai Fu</author>
<author orcid="0000-0002-9532-1709" pid="125/9849">Xiao-Yang Liu</author>
<author pid="22/667">Jia Yang</author>
<author orcid="0000-0002-7986-4244" pid="y/LaurenceTianruoYang">Laurence T. Yang</author>
<author orcid="0000-0003-4485-6743" pid="90/3575-1">Shui Yu 0001</author>
<author orcid="0000-0003-3411-7947" pid="19/8310">Tianqing Zhu</author>
<title>Wormhole: The Hidden Virus Propagation Power of the Search Engine in Social Networks.</title>
<pages>693-710</pages>
<year>2019</year>
<volume>16</volume>
<journal>IEEE Trans. Dependable Secur. Comput.</journal>
<number>4</number>
<ee>https://doi.org/10.1109/TDSC.2017.2703887</ee>
<ee>https://www.wikidata.org/entity/Q57920646</ee>
<url>db/journals/tdsc/tdsc16.html#FuLYYYZ19</url>
</article>
</r>
<r><inproceedings key="conf/dependsys/DengFL19" mdate="2020-01-30">
<author pid="257/2720">Youqiang Deng</author>
<author pid="74/6830">Cai Fu</author>
<author pid="37/4190">Yang Li</author>
<title>CodeeGAN: Code Generation via Adversarial Training.</title>
<pages>18-30</pages>
<year>2019</year>
<booktitle>DependSys</booktitle>
<ee>https://doi.org/10.1007/978-981-15-1304-6_2</ee>
<crossref>conf/dependsys/2019</crossref>
<url>db/conf/dependsys/dependsys2019.html#DengFL19</url>
</inproceedings>
</r>
<r><inproceedings key="conf/hp3c/XuCFLLHK19" mdate="2026-02-25">
<author pid="137/6459">Deliang Xu</author>
<author pid="360/9172">Zewei Cen</author>
<author pid="74/6830">Cai Fu</author>
<author orcid="0009-0009-7392-9260" pid="43/656">Tao Liu</author>
<author pid="05/10612">Guohui Li</author>
<author pid="36/4213">Lansheng Han</author>
<author pid="248/4607">Zhaokang Ke</author>
<title>A live migration strategy for virtual encryption card equipment.</title>
<pages>106-112</pages>
<year>2019</year>
<booktitle>HP3C</booktitle>
<ee>https://doi.org/10.1145/3318265.3318275</ee>
<ee>https://www.wikidata.org/entity/Q130832699</ee>
<crossref>conf/hp3c/2019</crossref>
<url>db/conf/hp3c/hp3c2019.html#XuCFLLHK19</url>
</inproceedings>
</r>
<r><inproceedings key="conf/iccse2/HuangHF19" mdate="2019-09-30">
<author pid="17/2416">Qingfeng Huang</author>
<author pid="24/6089">Xiaotao Huang</author>
<author pid="74/6830">Cai Fu</author>
<title>The Application Of Critical Thinking In C Programming Language Course.</title>
<pages>420-422</pages>
<year>2019</year>
<booktitle>ICCSE</booktitle>
<ee>https://doi.org/10.1109/ICCSE.2019.8845327</ee>
<crossref>conf/iccse2/2019</crossref>
<url>db/conf/iccse2/iccse2019.html#HuangHF19</url>
</inproceedings>
</r>
<r><inproceedings key="conf/isi/KeFCYCL19" mdate="2019-09-09">
<author pid="248/4607">Zhaokang Ke</author>
<author pid="74/6830">Cai Fu</author>
<author pid="248/4930">Liqing Cao</author>
<author pid="248/4507">Mingjun Yin</author>
<author pid="248/5141">Xiwu Chen</author>
<author pid="37/4190">Yang Li</author>
<title>Community Partition immunization strategy based on Search Engine.</title>
<pages>223</pages>
<year>2019</year>
<booktitle>ISI</booktitle>
<ee>https://doi.org/10.1109/ISI.2019.8823495</ee>
<crossref>conf/isi/2019</crossref>
<url>db/conf/isi/isi2019.html#KeFCYCL19</url>
</inproceedings>
</r>
<r><inproceedings key="conf/trustcom/ZhouLFSC18" mdate="2023-03-24">
<author pid="67/180">Haotian Zhou</author>
<author pid="125/9849">Xiao-Yang Liu</author>
<author pid="74/6830">Cai Fu</author>
<author pid="88/1901">Chen Shang</author>
<author pid="226/0964">Xinyi Chang</author>
<title>Differentially Private Matrix Completion via Distributed Matrix Factorization.</title>
<pages>1628-1631</pages>
<year>2018</year>
<booktitle>TrustCom/BigDataSE</booktitle>
<ee>https://doi.org/10.1109/TrustCom/BigDataSE.2018.00239</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/TrustCom/BigDataSE.2018.00239</ee>
<crossref>conf/trustcom/2018</crossref>
<url>db/conf/trustcom/trustcom2018.html#ZhouLFSC18</url>
</inproceedings>
</r>
<r><article key="journals/access/XuFLZZL17" mdate="2024-07-26">
<author pid="137/6459">Deliang Xu</author>
<author orcid="0000-0003-4536-3537" pid="74/6830">Cai Fu</author>
<author pid="05/10612-1">Guohui Li 0001</author>
<author pid="z/DeqingZou">Deqing Zou</author>
<author pid="95/7634">Honghao Zhang</author>
<author pid="125/9849">Xiao-Yang Liu</author>
<title>Virtualization of the Encryption Card for Trust Access in Cloud Computing.</title>
<pages>20652-20667</pages>
<year>2017</year>
<volume>5</volume>
<journal>IEEE Access</journal>
<ee type="oa">https://doi.org/10.1109/ACCESS.2017.2754515</ee>
<ee>https://www.wikidata.org/entity/Q122740995</ee>
<url>db/journals/access/access5.html#XuFLZZL17</url>
</article>
</r>
<r><article key="journals/access/KongFYXH17" mdate="2018-07-04">
<author pid="210/0343">Dezhang Kong</author>
<author orcid="0000-0003-4536-3537" pid="74/6830">Cai Fu</author>
<author pid="22/667">Jia Yang</author>
<author pid="137/6459">Deliang Xu</author>
<author pid="36/4213">Lansheng Han</author>
<title>The Impact of the Collective Influence of Search Engines on Social Networks.</title>
<pages>24920-24930</pages>
<year>2017</year>
<volume>5</volume>
<journal>IEEE Access</journal>
<ee type="oa">https://doi.org/10.1109/ACCESS.2017.2767075</ee>
<url>db/journals/access/access5.html#KongFYXH17</url>
</article>
</r>
<r><article key="journals/fgcs/LiFLYZH17" mdate="2020-02-19">
<author pid="82/0">Min Li</author>
<author orcid="0000-0002-7706-6898" pid="74/6830">Cai Fu</author>
<author pid="125/9849">Xiao-Yang Liu</author>
<author pid="22/667">Jia Yang</author>
<author pid="19/8310">Tianqing Zhu</author>
<author pid="36/4213">Lansheng Han</author>
<title>Evolutionary virus immune strategy for temporal networks based on community vitality.</title>
<pages>276-290</pages>
<year>2017</year>
<volume>74</volume>
<journal>Future Gener. Comput. Syst.</journal>
<ee>https://doi.org/10.1016/j.future.2016.05.015</ee>
<url>db/journals/fgcs/fgcs74.html#LiFLYZH17</url>
</article>
</r>
<r><article key="journals/jsjkx/XiongHXFL17" mdate="2020-03-24">
<author pid="220/9548">Zili Xiong</author>
<author pid="36/4213">Lansheng Han</author>
<author pid="54/8940">Xingbo Xu</author>
<author pid="74/6830">Cai Fu</author>
<author pid="147/2755">Buyu Liu</author>
<title>&#22522;&#20110;&#21338;&#24328;&#30340;&#26080;&#32447;&#20256;&#24863;&#22120;&#32593;&#32476;&#20837;&#20405;&#26816;&#27979;&#27169;&#22411; (Research on Intrusion Detection of Wireless Sensor Networks Based on Game Theory).</title>
<pages>326-332</pages>
<year>2017</year>
<volume>44</volume>
<journal>&#35745;&#31639;&#26426;&#31185;&#23398;</journal>
<number>Z6</number>
<ee type="oa">https://doi.org/10.11896/j.issn.1002-137X.2017.6A.075</ee>
<ee type="oa">http://www.jsjkx.com/EN/10.11896/j.issn.1002-137X.2017.6A.075</ee>
<url>db/journals/jsjkx/jsjkx44.html#XiongHXFL17</url>
</article>
</r>
<r><inproceedings key="conf/acm/FuPL17" mdate="2025-01-19">
<author pid="74/6830">Cai Fu</author>
<author pid="198/1044">Chenchen Peng</author>
<author pid="125/9849">Xiao-Yang Liu</author>
<title>Search engine drives the evolution of social networks.</title>
<pages>49:1-49:5</pages>
<year>2017</year>
<booktitle>ACM TUR-C</booktitle>
<ee>https://doi.org/10.1145/3063955.3064807</ee>
<ee>https://www.wikidata.org/entity/Q130991271</ee>
<crossref>conf/acm/2017turc</crossref>
<url>db/conf/acm/tur-c2017.html#FuPL17</url>
</inproceedings>
</r>
<r><inproceedings key="conf/trustcom/HanHJSF17" mdate="2025-09-06">
<author pid="36/4213">Lansheng Han</author>
<author pid="98/4874">Shuxia Han</author>
<author orcid="0000-0002-0940-3338" pid="24/669">Wenjing Jia</author>
<author pid="00/6602">Changhua Sun</author>
<author pid="74/6830">Cai Fu</author>
<title>Malware Discrimination Based on Reversed Association Task.</title>
<pages>120-127</pages>
<year>2017</year>
<booktitle>TrustCom/BigDataSE/ICESS</booktitle>
<ee>https://doi.org/10.1109/Trustcom/BigDataSE/ICESS.2017.228</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/Trustcom/BigDataSE/ICESS.2017.228</ee>
<crossref>conf/trustcom/2017</crossref>
<url>db/conf/trustcom/trustcom2017.html#HanHJSF17</url>
</inproceedings>
</r>
<r><article publtype="informal" key="journals/corr/FuPL17" mdate="2018-08-13">
<author pid="74/6830">Cai Fu</author>
<author pid="198/1044">Chenchen Peng</author>
<author pid="125/9849">Xiao-Yang Liu</author>
<title>Search Engine Drives the Evolution of Social Networks.</title>
<year>2017</year>
<volume>abs/1703.05922</volume>
<journal>CoRR</journal>
<ee type="oa">http://arxiv.org/abs/1703.05922</ee>
<url>db/journals/corr/corr1703.html#FuPL17</url>
</article>
</r>
<r><article key="journals/ijcomsys/ChenHDYYWF16" mdate="2023-12-15">
<author pid="27/4364-3">Jing Chen 0003</author>
<author pid="59/1028-8">Kun He 0008</author>
<author pid="37/7220">Ruiying Du</author>
<author pid="06/3662">Fajiang Yu</author>
<author pid="29/5782-3">Quan Yuan 0003</author>
<author pid="01/1318-1">Lina Wang 0001</author>
<author pid="74/6830">Cai Fu</author>
<title>A multi-objective optimization model based on immune algorithm in wireless mesh networks.</title>
<pages>155-169</pages>
<year>2016</year>
<volume>29</volume>
<journal>Int. J. Commun. Syst.</journal>
<number>1</number>
<ee>https://doi.org/10.1002/dac.2808</ee>
<url>db/journals/ijcomsys/ijcomsys29.html#ChenHDYYWF16</url>
</article>
</r>
<r><article key="journals/jsjkx/WangHFZL16" mdate="2020-03-27">
<author pid="12/5838">Tao Wang</author>
<author pid="36/4213">Lansheng Han</author>
<author pid="74/6830">Cai Fu</author>
<author pid="z/DeqingZou">Deqing Zou</author>
<author pid="20/2039">Ming Liu</author>
<title>&#36719;&#20214;&#28431;&#27934;&#38745;&#24577;&#26816;&#27979;&#27169;&#22411;&#21450;&#26816;&#27979;&#26694;&#26550; (Static Detection Model and Framework for Software Vulnerability).</title>
<pages>80-86</pages>
<year>2016</year>
<volume>43</volume>
<journal>&#35745;&#31639;&#26426;&#31185;&#23398;</journal>
<number>5</number>
<ee type="oa">https://doi.org/10.11896/j.issn.1002-137X.2016.05.015</ee>
<ee type="oa">http://www.jsjkx.com/EN/10.11896/j.issn.1002-137X.2016.05.015</ee>
<url>db/journals/jsjkx/jsjkx43.html#WangHFZL16</url>
</article>
</r>
<r><inproceedings key="conf/dasc/YaoFHFZH16" mdate="2023-03-23">
<author pid="98/914">Hong Yao</author>
<author pid="74/6830">Cai Fu</author>
<author pid="17/2416">Qingfeng Huang</author>
<author pid="137/6585">Zhicun Fang</author>
<author pid="187/6215">JieHua Zeng</author>
<author pid="36/4213">Lansheng Han</author>
<title>Communities Evolution Analysis Based on Events in Dynamic Complex Network.</title>
<pages>497-503</pages>
<year>2016</year>
<booktitle>DASC/PiCom/DataCom/CyberSciTech</booktitle>
<ee>https://doi.org/10.1109/DASC-PICom-DataCom-CyberSciTec.2016.97</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/DASC-PICom-DataCom-CyberSciTec.2016.97</ee>
<crossref>conf/dasc/2016</crossref>
<url>db/conf/dasc/dasc2016.html#YaoFHFZH16</url>
</inproceedings>
</r>
<r><article key="journals/jsjkx/DuHFZL15" mdate="2020-04-27">
<author pid="86/4539">Nan Du</author>
<author pid="36/4213">Lansheng Han</author>
<author pid="74/6830">Cai Fu</author>
<author pid="72/8380">Zhongke Zhang</author>
<author pid="20/2039">Ming Liu</author>
<title>&#22522;&#20110;&#30456;&#35782;&#24230;&#30340;&#24694;&#24847;&#20195;&#30721;&#26816;&#27979; (Detection of Malware Code Based on Acquaintance Degree).</title>
<pages>187-192</pages>
<year>2015</year>
<volume>42</volume>
<journal>&#35745;&#31639;&#26426;&#31185;&#23398;</journal>
<number>1</number>
<ee type="oa">https://doi.org/10.11896/j.issn.1002-137X.2015.01.042</ee>
<ee type="oa">http://www.jsjkx.com/EN/10.11896/j.issn.1002-137X.2015.01.042</ee>
<url>db/journals/jsjkx/jsjkx42.html#DuHFZL15</url>
</article>
</r>
<r><inproceedings key="conf/IEEEcit/FuMYXLH15" mdate="2017-05-26">
<author pid="74/6830">Cai Fu</author>
<author pid="76/3049">Li Min</author>
<author pid="22/667">Jia Yang</author>
<author pid="137/6459">Deliang Xu</author>
<author pid="98/3794">Xiaoyang Liu</author>
<author pid="36/4213">Lansheng Han</author>
<title>Evolutionary Virus Immune Strategy Based on Community Vitality.</title>
<pages>1725-1732</pages>
<year>2015</year>
<booktitle>CIT/IUCC/DASC/PICom</booktitle>
<ee>https://doi.org/10.1109/CIT/IUCC/DASC/PICOM.2015.260</ee>
<crossref>conf/IEEEcit/2015</crossref>
<url>db/conf/IEEEcit/cit-iucc-dasc-picom2015.html#FuMYXLH15</url>
</inproceedings>
</r>
<r><inproceedings key="conf/cscloud/YangFXHL15" mdate="2023-03-24">
<author pid="22/667">Jia Yang</author>
<author pid="74/6830">Cai Fu</author>
<author pid="137/6459">Deliang Xu</author>
<author pid="36/4213">Lansheng Han</author>
<author pid="125/9849">Xiao-Yang Liu</author>
<title>Search Engine: A Hidden Power for Virus Propagation in Community Networks.</title>
<pages>87-92</pages>
<year>2015</year>
<booktitle>CSCloud</booktitle>
<ee>https://doi.org/10.1109/CSCloud.2015.83</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/CSCloud.2015.83</ee>
<crossref>conf/cscloud/2015</crossref>
<url>db/conf/cscloud/cscloud2015.html#YangFXHL15</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ica3pp/LiuFXSH15" mdate="2017-05-26">
<author pid="24/8176">Changming Liu</author>
<author pid="74/6830">Cai Fu</author>
<author pid="137/6459">Deliang Xu</author>
<author pid="95/6619">Lin Sun</author>
<author pid="36/4213">Lansheng Han</author>
<title>An Energy-Balanced WSN Algorithm Based on Active Hibernation and Data Recovery.</title>
<pages>730-743</pages>
<year>2015</year>
<booktitle>ICA3PP (1)</booktitle>
<ee>https://doi.org/10.1007/978-3-319-27119-4_51</ee>
<crossref>conf/ica3pp/2015-1</crossref>
<url>db/conf/ica3pp/ica3pp2015-1.html#LiuFXSH15</url>
</inproceedings>
</r>
<r><inproceedings key="conf/skg/YeFHX15" mdate="2023-03-23">
<author pid="177/5191">Rui Ye</author>
<author pid="74/6830">Cai Fu</author>
<author pid="36/4213">Lansheng Han</author>
<author pid="137/6459">Deliang Xu</author>
<title>Multidimensional Trust Evaluation Model Based on Redemption and Data Aggregation.</title>
<pages>212-216</pages>
<year>2015</year>
<booktitle>SKG</booktitle>
<ee>https://doi.org/10.1109/SKG.2015.34</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/SKG.2015.34</ee>
<crossref>conf/skg/2015</crossref>
<url>db/conf/skg/skg2015.html#YeFHX15</url>
</inproceedings>
</r>
<r><inproceedings key="conf/cits/FuZFHC14" mdate="2017-11-03">
<author pid="74/6830">Cai Fu</author>
<author pid="29/177">Kang Zhang</author>
<author pid="137/6585">Zhicun Fang</author>
<author pid="36/4213">Lansheng Han</author>
<author pid="27/4364">Jing Chen</author>
<title>K-clique community detection based on union-find.</title>
<pages>1-5</pages>
<year>2014</year>
<booktitle>CITS</booktitle>
<ee>https://doi.org/10.1109/CITS.2014.6878972</ee>
<crossref>conf/cits/2014</crossref>
<url>db/conf/cits/cits2014.html#FuZFHC14</url>
</inproceedings>
</r>
<r><article key="journals/ejwcn/FuHHSL13" mdate="2020-08-27">
<author pid="74/6830">Cai Fu</author>
<author pid="17/2416">Qingfeng Huang</author>
<author pid="36/4213">Lansheng Han</author>
<author pid="91/3680">Li Shen</author>
<author pid="98/3794">Xiaoyang Liu</author>
<title>Virus propagation power of the dynamic network.</title>
<pages>210</pages>
<year>2013</year>
<volume>2013</volume>
<journal>EURASIP J. Wirel. Commun. Netw.</journal>
<ee type="oa">https://doi.org/10.1186/1687-1499-2013-210</ee>
<ee>https://www.wikidata.org/entity/Q59301027</ee>
<url>db/journals/ejwcn/ejwcn2013.html#FuHHSL13</url>
</article>
</r>
<r><article key="journals/ijdsn/FuLZQHP13" mdate="2020-06-21">
<author pid="74/6830">Cai Fu</author>
<author pid="82/0">Min Li</author>
<author pid="z/DeqingZou">Deqing Zou</author>
<author pid="46/1505">Shuyan Qu</author>
<author pid="36/4213">Lansheng Han</author>
<author pid="142/7129">James Hyuk Park</author>
<title>Community Vitality in Dynamic Temporal Networks.</title>
<year>2013</year>
<volume>9</volume>
<journal>Int. J. Distributed Sens. Networks</journal>
<ee type="oa">https://doi.org/10.1155/2013/281565</ee>
<url>db/journals/ijdsn/ijdsn9.html#FuLZQHP13</url>
</article>
</r>
<r><inproceedings key="conf/css/FuXHXF13" mdate="2017-05-26">
<author pid="74/6830">Cai Fu</author>
<author pid="137/6459">Deliang Xu</author>
<author pid="36/4213">Lansheng Han</author>
<author pid="95/8">Jingfang Xu</author>
<author pid="137/6585">Zhicun Fang</author>
<title>Restraining and Characterization of Virus Propagation in Large-Scale Wireless LAN.</title>
<pages>429-440</pages>
<year>2013</year>
<booktitle>CSS</booktitle>
<ee>https://doi.org/10.1007/978-3-319-03584-0_32</ee>
<crossref>conf/css/2013</crossref>
<url>db/conf/css/css2013.html#FuXHXF13</url>
</inproceedings>
</r>
<r><inproceedings key="conf/hpcc/FuCHF13" mdate="2017-05-23">
<author pid="74/6830">Cai Fu</author>
<author pid="31/3581">Yongquan Cui</author>
<author pid="36/4213">Lansheng Han</author>
<author pid="137/6585">Zhicun Fang</author>
<title>Projection Pursuit Based Wormhole Detection in Ad Hoc Network.</title>
<pages>1315-1322</pages>
<year>2013</year>
<booktitle>HPCC/EUC</booktitle>
<ee>https://doi.org/10.1109/HPCC.and.EUC.2013.187</ee>
<crossref>conf/hpcc/2013</crossref>
<url>db/conf/hpcc/hpcc2013.html#FuCHF13</url>
</inproceedings>
</r>
<r><inproceedings key="conf/trustcom/RuanFZHL13" mdate="2023-03-24">
<author pid="35/10551">Ou Ruan</author>
<author pid="74/6830">Cai Fu</author>
<author pid="01/2356">Jing Zhou</author>
<author pid="36/4213">Lansheng Han</author>
<author pid="98/3794">Xiaoyang Liu</author>
<title>Efficient Fair UC-Secure Two-Party Computation on Committed Inputs.</title>
<pages>544-551</pages>
<year>2013</year>
<booktitle>TrustCom/ISPA/IUCC</booktitle>
<ee>https://doi.org/10.1109/TrustCom.2013.7</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/TrustCom.2013.7</ee>
<crossref>conf/trustcom/2013</crossref>
<url>db/conf/trustcom/trustcom2013.html#RuanFZHL13</url>
</inproceedings>
</r>
<r><article key="journals/mcm/HanFZLJ12" mdate="2021-02-17">
<author pid="36/4213">Lansheng Han</author>
<author pid="74/6830">Cai Fu</author>
<author pid="z/DeqingZou">Deqing Zou</author>
<author orcid="0000-0003-4292-5792" pid="93/3417">Changhoon Lee</author>
<author orcid="0000-0002-0940-3338" pid="24/669">Wenjing Jia</author>
<title>Task-based behavior detection of illegal codes.</title>
<pages>80-86</pages>
<year>2012</year>
<volume>55</volume>
<journal>Math. Comput. Model.</journal>
<number>1-2</number>
<ee type="oa">https://doi.org/10.1016/j.mcm.2011.01.052</ee>
<url>db/journals/mcm/mcm55.html#HanFZLJ12</url>
</article>
</r>
<r><article key="journals/ijcisys/CaiMJLL11" mdate="2018-04-20">
<author pid="74/6830">Cai Fu</author>
<author pid="19/2037">Liu Ming</author>
<author pid="83/1396">Chen Jing</author>
<author pid="67/4817">Zhang Li</author>
<author pid="125/9849">Xiao-Yang Liu</author>
<title>A Projection Pursuit Based Risk Assessment Method in Mobile Ad hoc Networks.</title>
<pages>749-758</pages>
<year>2011</year>
<volume>4</volume>
<journal>Int. J. Comput. Intell. Syst.</journal>
<number>5</number>
<ee>https://doi.org/10.1080/18756891.2011.9727826</ee>
<url>db/journals/ijcisys/ijcisys4.html#CaiMJLL11</url>
</article>
</r>
<r><article key="journals/jpdc/FuGLLHC11" mdate="2020-02-22">
<author pid="74/6830">Cai Fu</author>
<author pid="14/3881">Xiang Gao</author>
<author pid="20/2039">Ming Liu</author>
<author pid="98/3794">Xiaoyang Liu</author>
<author pid="36/4213">Lansheng Han</author>
<author pid="27/4364">Jing Chen</author>
<title>GRAP: Grey risk assessment based on projection in ad hoc networks.</title>
<pages>1249-1260</pages>
<year>2011</year>
<volume>71</volume>
<journal>J. Parallel Distributed Comput.</journal>
<number>9</number>
<ee>https://doi.org/10.1016/j.jpdc.2010.11.012</ee>
<url>db/journals/jpdc/jpdc71.html#FuGLLHC11</url>
</article>
</r>
<r><article publtype="informal" key="journals/iacr/RuanFC11" mdate="2020-05-11">
<author pid="35/10551">Ou Ruan</author>
<author pid="74/6830">Cai Fu</author>
<author pid="13/4750">Guohua Cui</author>
<title>An Efficient Protocol for the Commit-Prove-Fair-Open functionality.</title>
<pages>577</pages>
<year>2011</year>
<volume>2011</volume>
<journal>IACR Cryptol. ePrint Arch.</journal>
<ee type="oa">http://eprint.iacr.org/2011/577</ee>
<url>db/journals/iacr/iacr2011.html#RuanFC11</url>
</article>
</r>
<r><article key="journals/chinaf/XuCFT10" mdate="2024-03-08">
<author orcid="0000-0003-4268-4976" pid="84/586-3">Peng Xu 0003</author>
<author pid="13/4750">Guohua Cui</author>
<author pid="74/6830">Cai Fu</author>
<author pid="85/8147">Xueming Tang</author>
<title>A more efficient accountable authority IBE scheme under the DL assumption.</title>
<pages>581-592</pages>
<year>2010</year>
<volume>53</volume>
<journal>Sci. China Inf. Sci.</journal>
<number>3</number>
<ee>https://doi.org/10.1007/s11432-010-0051-7</ee>
<url>db/journals/chinaf/chinaf53.html#XuCFT10</url>
</article>
</r>
<r><article key="journals/comcom/ChenLFD10" mdate="2020-02-20">
<author pid="27/4364-3">Jing Chen 0003</author>
<author pid="23/53">Shiguo Lian</author>
<author pid="74/6830">Cai Fu</author>
<author pid="37/7220">Ruiying Du</author>
<title>A hybrid game model based on reputation for spectrum allocation in wireless networks.</title>
<pages>1623-1631</pages>
<year>2010</year>
<volume>33</volume>
<journal>Comput. Commun.</journal>
<number>14</number>
<ee>https://doi.org/10.1016/j.comcom.2010.02.024</ee>
<url>db/journals/comcom/comcom33.html#ChenLFD10</url>
</article>
</r>
<r><article key="journals/jnw/LeiCFXC10" mdate="2020-09-15">
<author pid="05/8511">Feng-Yu Lei</author>
<author pid="13/4750">Guohua Cui</author>
<author pid="74/6830">Cai Fu</author>
<author pid="84/586">Peng Xu</author>
<author pid="27/4364">Jing Chen</author>
<title>Secure Authentication Scheme based on IBE.</title>
<pages>1106-1113</pages>
<year>2010</year>
<volume>5</volume>
<journal>J. Networks</journal>
<number>9</number>
<ee type="archive">https://doi.org/10.4304/jnw.5.9.1106-1113</ee>
<url>db/journals/jnw/jnw5.html#LeiCFXC10</url>
</article>
</r>
<r><inproceedings key="conf/euc/YeLF10" mdate="2023-03-24">
<author pid="85/9341">Jihang Ye</author>
<author pid="50/9649">Mengyao Liu</author>
<author pid="74/6830">Cai Fu</author>
<title>Trusted Risk Evaluation and Attribute Analysis in Ad-Hoc Networks Security Mechanism based on Projection Pursuit Principal Component Analysis.</title>
<pages>492-497</pages>
<year>2010</year>
<booktitle>EUC</booktitle>
<ee>https://doi.org/10.1109/EUC.2010.81</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/EUC.2010.81</ee>
<crossref>conf/euc/2010</crossref>
<url>db/conf/euc/euc2010.html#YeLF10</url>
</inproceedings>
</r>
<r><inproceedings key="conf/uic/FuYZZH10" mdate="2023-03-23">
<author pid="74/6830">Cai Fu</author>
<author pid="85/9341">Jihang Ye</author>
<author pid="89/5992">Li Zhang</author>
<author pid="15/5780">Yunhe Zhang</author>
<author pid="36/4213">Lansheng Han</author>
<title>A Dynamic Risk Assessment Framework Using Principle Component Analysis with Projection Pursuit in Ad Hoc Networks.</title>
<pages>154-159</pages>
<year>2010</year>
<booktitle>UIC/ATC Workshops</booktitle>
<ee>https://doi.org/10.1109/UIC-ATC.2010.42</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/UIC-ATC.2010.42</ee>
<crossref>conf/uic/2010w</crossref>
<url>db/conf/uic/uic2010w.html#FuYZZH10</url>
</inproceedings>
</r>
<r><inproceedings key="conf/fcst/LiuFYH09" mdate="2023-03-24">
<author pid="98/3794">Xiaoyang Liu</author>
<author pid="74/6830">Cai Fu</author>
<author pid="92/403">Jiandong Yang</author>
<author pid="36/4213">Lansheng Han</author>
<title>Grey Model-Enhanced Risk Assessment and Prediction for P2P Nodes.</title>
<pages>681-685</pages>
<year>2009</year>
<booktitle>FCST</booktitle>
<ee>https://doi.org/10.1109/FCST.2009.84</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/FCST.2009.84</ee>
<crossref>conf/fcst/2009</crossref>
<url>db/conf/fcst/fcst2009.html#LiuFYH09</url>
</inproceedings>
</r>
<r><inproceedings key="conf/ispa/FuTCLP09" mdate="2023-03-23">
<author pid="74/6830">Cai Fu</author>
<author pid="62/10075">Fugui Tang</author>
<author pid="31/3581">Yongquan Cui</author>
<author pid="20/2039">Ming Liu</author>
<author pid="39/1294">Bing Peng</author>
<title>Grey Theory Based Nodes Risk Assessment in P2P Networks.</title>
<pages>479-483</pages>
<year>2009</year>
<booktitle>ISPA</booktitle>
<ee>https://doi.org/10.1109/ISPA.2009.45</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/ISPA.2009.45</ee>
<crossref>conf/ispa/2009</crossref>
<url>db/conf/ispa/ispa2009.html#FuTCLP09</url>
</inproceedings>
</r>
<r><inproceedings key="conf/mue/ZhangLMF09" mdate="2023-03-24">
<author pid="15/5780">Yunhe Zhang</author>
<author pid="45/591">Zhitang Li</author>
<author pid="93/3618">Song Mei</author>
<author pid="74/6830">Cai Fu</author>
<title>Session-Based Tunnel Scheduling Model in Multi-link Aggregate IPSec VPN.</title>
<pages>505-510</pages>
<year>2009</year>
<booktitle>MUE</booktitle>
<ee>https://doi.org/10.1109/MUE.2009.89</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/MUE.2009.89</ee>
<crossref>conf/mue/2009</crossref>
<url>db/conf/mue/mue2009.html#ZhangLMF09</url>
</inproceedings>
</r>
<r><inproceedings key="conf/aina/HongHF05" mdate="2023-03-24">
<author pid="41/3957">Fan Hong</author>
<author pid="92/399">Liang Hong</author>
<author pid="74/6830">Cai Fu</author>
<title>Secure OLSR.</title>
<pages>713-718</pages>
<year>2005</year>
<crossref>conf/aina/2005</crossref>
<booktitle>AINA</booktitle>
<ee>https://doi.org/10.1109/AINA.2005.305</ee>
<ee>https://doi.ieeecomputersociety.org/10.1109/AINA.2005.305</ee>
<url>db/conf/aina/aina2005.html#HongHF05</url>
</inproceedings>
</r>
<coauthors n="159" nc="1">
<co c="0"><na f="a/An:Dezhi" pid="263/9325">Dezhi An</na></co>
<co c="0"><na f="c/Cao:Liqing" pid="248/4930">Liqing Cao</na></co>
<co c="0"><na f="c/Cen:Zewei" pid="360/9172">Zewei Cen</na></co>
<co c="0"><na f="c/Chang:Xinyi" pid="226/0964">Xinyi Chang</na></co>
<co c="0"><na f="c/Chen:Jiahe" pid="263/1421">Jiahe Chen</na></co>
<co c="0"><na f="c/Chen:Jing" pid="27/4364">Jing Chen</na></co>
<co c="0"><na f="c/Chen_0003:Jing" pid="27/4364-3">Jing Chen 0003</na></co>
<co c="0"><na f="c/Chen:Juan" pid="54/2717">Juan Chen</na></co>
<co c="0"><na f="c/Chen:Liangheng" pid="404/4486">Liangheng Chen</na></co>
<co c="0"><na f="c/Chen:Qimei" pid="63/5974">Qimei Chen</na></co>
<co c="0"><na f="c/Chen:Xiwu" pid="248/5141">Xiwu Chen</na></co>
<co c="0"><na f="c/Chen_0001:Yiran" pid="80/1641">Yiran Chen 0001</na></co>
<co c="0"><na f="c/Cui:Guohua" pid="13/4750">Guohua Cui</na></co>
<co c="0"><na f="c/Cui:Yongquan" pid="31/3581">Yongquan Cui</na></co>
<co c="0"><na f="d/Deng:Fengyang" pid="326/2302">Fengyang Deng</na></co>
<co c="0"><na f="d/Deng:Youqiang" pid="257/2720">Youqiang Deng</na></co>
<co c="0"><na f="d/Di:Peng" pid="00/9301">Peng Di</na></co>
<co c="0"><na f="d/Du:Nan" pid="86/4539">Nan Du</na></co>
<co c="0"><na f="d/Du:Ruiying" pid="37/7220">Ruiying Du</na></co>
<co c="0" n="2"><na f="e/Elwalid:Anwar" pid="75/6446">Anwar Elwalid</na><na>Anwar Walid</na></co>
<co c="0"><na f="f/Fan:Houxiang" pid="274/0938">Houxiang Fan</na></co>
<co c="0"><na f="f/Fan:Yuanhai" pid="349/6928">Yuanhai Fan</na></co>
<co c="0"><na f="f/Fang:Zhicun" pid="137/6585">Zhicun Fang</na></co>
<co c="0"><na f="f/Feng:Guanyun" pid="277/3320">Guanyun Feng</na></co>
<co c="0"><na f="g/Gao:Xiang" pid="14/3881">Xiang Gao</na></co>
<co c="0"><na f="g/Guo:Xiaowei" pid="59/6422">Xiaowei Guo</na></co>
<co c="0"><na f="h/Han:Lansheng" pid="36/4213">Lansheng Han</na></co>
<co c="0"><na f="h/Han:Shuxia" pid="98/4874">Shuxia Han</na></co>
<co c="0"><na f="h/He:Junzhou" pid="314/8336">Junzhou He</na></co>
<co c="0"><na f="h/He_0008:Kun" pid="59/1028-8">Kun He 0008</na></co>
<co c="0"><na f="h/He:Shuai" pid="87/7883">Shuai He</na></co>
<co c="0"><na f="h/Hong:Fan" pid="41/3957">Fan Hong</na></co>
<co c="0"><na f="h/Hong:Liang" pid="92/399">Liang Hong</na></co>
<co c="0"><na f="h/Hong:Sheng" pid="34/10892">Sheng Hong</na></co>
<co c="0"><na f="h/Hou:Xinyi" pid="73/7287">Xinyi Hou</na></co>
<co c="0"><na f="h/Hu_0004:Hong" pid="70/2543-4">Hong Hu 0004</na></co>
<co c="0"><na f="h/Hu:Sheng" pid="66/8069">Sheng Hu</na></co>
<co c="0"><na f="h/Huang:Liyan" pid="128/0955">Liyan Huang</na></co>
<co c="0"><na f="h/Huang:Qingfeng" pid="17/2416">Qingfeng Huang</na></co>
<co c="0"><na f="h/Huang:Xiaotao" pid="24/6089">Xiaotao Huang</na></co>
<co c="0"><na f="h/Huang_0026:Yan" pid="75/6434-26">Yan Huang 0026</na></co>
<co c="0"><na f="j/Jia:Wenjing" pid="24/669">Wenjing Jia</na></co>
<co c="0"><na f="j/Jiang:Shuai" pid="45/5080">Shuai Jiang</na></co>
<co c="0"><na f="j/Jing:Chen" pid="83/1396">Chen Jing</na></co>
<co c="0"><na f="k/Ke:Zhaokang" pid="248/4607">Zhaokang Ke</na></co>
<co c="0"><na f="k/Kong:Dezhang" pid="210/0343">Dezhang Kong</na></co>
<co c="0"><na f="l/Lee:Changhoon" pid="93/3417">Changhoon Lee</na></co>
<co c="0"><na f="l/Lei:Feng=Yu" pid="05/8511">Feng-Yu Lei</na></co>
<co c="0"><na f="l/Li_0005:Ang" pid="33/2805-5">Ang Li 0005</na></co>
<co c="0" n="2"><na f="l/Li:GuoHui" pid="05/10612">GuoHui Li</na><na>Guohui Li</na></co>
<co c="0"><na f="l/Li_0001:Guohui" pid="05/10612-1">Guohui Li 0001</na></co>
<co c="0"><na f="l/Li_0001:Hai" pid="30/5330-1">Hai Li 0001</na></co>
<co c="0"><na f="l/Li:Ke" pid="75/6627">Ke Li</na></co>
<co c="0"><na f="l/Li:Min" pid="82/0">Min Li</na></co>
<co c="0"><na f="l/Li:Wenjin" pid="84/5952">Wenjin Li</na></co>
<co c="0"><na f="l/Li:Wenke" pid="147/0516">Wenke Li</na></co>
<co c="0"><na f="l/Li:Yang" pid="37/4190">Yang Li</na></co>
<co c="0"><na f="l/Li:Zhang" pid="67/4817">Zhang Li</na></co>
<co c="0"><na f="l/Li:Zhitang" pid="45/591">Zhitang Li</na></co>
<co c="0"><na f="l/Lian:Shiguo" pid="23/53">Shiguo Lian</na></co>
<co c="0"><na f="l/Lin:Minhua" pid="274/1711">Minhua Lin</na></co>
<co c="0"><na f="l/Liu:Buyu" pid="147/2755">Buyu Liu</na></co>
<co c="0"><na f="l/Liu:Changming" pid="24/8176">Changming Liu</na></co>
<co c="0"><na f="l/Liu:Hongle" pid="330/2514">Hongle Liu</na></co>
<co c="0"><na f="l/Liu:Mengyao" pid="50/9649">Mengyao Liu</na></co>
<co c="0"><na f="l/Liu:Ming" pid="20/2039">Ming Liu</na></co>
<co c="0"><na f="l/Liu:Tao" pid="43/656">Tao Liu</na></co>
<co c="0"><na f="l/Liu:Xiao=Yang" pid="125/9849">Xiao-Yang Liu</na></co>
<co c="0"><na f="l/Liu:Xiaofan" pid="42/6759">Xiaofan Liu</na></co>
<co c="0"><na f="l/Liu:Xiaoyang" pid="98/3794">Xiaoyang Liu</na></co>
<co c="0"><na f="l/Long:Xiang" pid="64/6328">Xiang Long</na></co>
<co c="0"><na f="l/Lu:Hongwei" pid="94/7642">Hongwei Lu</na></co>
<co c="0"><na f="l/Lv:Jianqiang" pid="325/8999">Jianqiang Lv</na></co>
<co c="0"><na f="m/Mei:Song" pid="93/3618">Song Mei</na></co>
<co c="0"><na f="m/Min:Li" pid="76/3049">Li Min</na></co>
<co c="0"><na f="m/Ming:Liu" pid="19/2037">Liu Ming</na></co>
<co c="0"><na f="p/Pang:Meng" pid="172/9447">Meng Pang</na></co>
<co c="0"><na f="p/Park:James_Hyuk" pid="142/7129">James Hyuk Park</na></co>
<co c="0"><na f="p/Peng:Bing" pid="39/1294">Bing Peng</na></co>
<co c="0"><na f="p/Peng:Chenchen" pid="198/1044">Chenchen Peng</na></co>
<co c="0"><na f="q/Qian:Yekui" pid="232/4390">Yekui Qian</na></co>
<co c="0"><na f="q/Qu:Shuyan" pid="46/1505">Shuyan Qu</na></co>
<co c="0"><na f="r/Ruan:Ou" pid="35/10551">Ou Ruan</na></co>
<co c="0"><na f="s/Shang:Chen" pid="88/1901">Chen Shang</na></co>
<co c="0"><na f="s/Shen:Li" pid="91/3680">Li Shen</na></co>
<co c="0"><na f="s/Shen:Shuhao" pid="361/1626">Shuhao Shen</na></co>
<co c="0"><na f="s/Sun:Changhua" pid="00/6602">Changhua Sun</na></co>
<co c="0"><na f="s/Sun:Haili" pid="216/1050">Haili Sun</na></co>
<co c="0"><na f="s/Sun:Lin" pid="95/6619">Lin Sun</na></co>
<co c="0"><na f="t/Tang:Fugui" pid="62/10075">Fugui Tang</na></co>
<co c="0"><na f="t/Tang:Xueming" pid="85/8147">Xueming Tang</na></co>
<co c="0"><na f="w/Wan:Chuanhao" pid="09/685">Chuanhao Wan</na></co>
<co c="0"><na f="w/Wang:Binghui" pid="123/7149">Binghui Wang</na></co>
<co c="0"><na f="w/Wang_0001:Haoyu" pid="50/8499-1">Haoyu Wang 0001</na></co>
<co c="0"><na f="w/Wang:Juzhen" pid="230/6692">Juzhen Wang</na></co>
<co c="0"><na f="w/Wang_0001:Lina" pid="01/1318-1">Lina Wang 0001</na></co>
<co c="0"><na f="w/Wang_0001:Shenao" pid="360/7470">Shenao Wang 0001</na></co>
<co c="0"><na f="w/Wang:Tao" pid="12/5838">Tao Wang</na></co>
<co c="0"><na f="w/Wang_0001:Weihang" pid="57/7210-1">Weihang Wang 0001</na></co>
<co c="0"><na f="w/Wang_0005:Xiumin" pid="15/7829-5">Xiumin Wang 0005</na></co>
<co c="0"><na f="w/Wen_0001:Ming" pid="99/1109-1">Ming Wen 0001</na></co>
<co c="0"><na f="w/Wu:Feng" pid="25/3972">Feng Wu</na></co>
<co c="0"><na f="w/Wu_0016:Jing" pid="88/3604-16">Jing Wu 0016</na></co>
<co c="0"><na f="w/Wu:Xiao" pid="73/6038">Xiao Wu</na></co>
<co c="0"><na f="w/Wu_0001:Yueming" pid="77/8060-1">Yueming Wu 0001</na></co>
<co c="0"><na f="x/Xia_0001:Jun" pid="22/3650-1">Jun Xia 0001</na></co>
<co c="0"><na f="x/Xie:Xiaoheng" pid="359/0480">Xiaoheng Xie</na></co>
<co c="0"><na f="x/Xiong:Zili" pid="220/9548">Zili Xiong</na></co>
<co c="0"><na f="x/Xu:Deliang" pid="137/6459">Deliang Xu</na></co>
<co c="0"><na f="x/Xu:Hao" pid="43/6008">Hao Xu</na></co>
<co c="0"><na f="x/Xu:Jingfang" pid="95/8">Jingfang Xu</na></co>
<co c="0"><na f="x/Xu:Peng" pid="84/586">Peng Xu</na></co>
<co c="0"><na f="x/Xu_0003:Peng" pid="84/586-3">Peng Xu 0003</na></co>
<co c="0"><na f="x/Xu:Xingbo" pid="54/8940">Xingbo Xu</na></co>
<co c="0"><na f="x/Xu:Zichuan" pid="05/8410">Zichuan Xu</na></co>
<co c="0"><na f="x/Xue:Ziluo" pid="426/4041">Ziluo Xue</na></co>
<co c="0"><na f="y/Yan:Hao" pid="77/6310">Hao Yan</na></co>
<co c="0"><na f="y/Yan:Qiwen" pid="414/3249">Qiwen Yan</na></co>
<co c="0"><na f="y/Yang:Chenglong" pid="219/9343">Chenglong Yang</na></co>
<co c="0"><na f="y/Yang:Jia" pid="22/667">Jia Yang</na></co>
<co c="0"><na f="y/Yang:Jiandong" pid="92/403">Jiandong Yang</na></co>
<co c="0"><na f="y/Yang:Laurence_T=" pid="y/LaurenceTianruoYang">Laurence T. Yang</na></co>
<co c="0"><na f="y/Yang:Peng" pid="57/5443">Peng Yang</na></co>
<co c="0"><na f="y/Yang:Zhao" pid="21/2326">Zhao Yang</na></co>
<co c="0"><na f="y/Yao:Hong" pid="98/914">Hong Yao</na></co>
<co c="0"><na f="y/Ye:Jihang" pid="85/9341">Jihang Ye</na></co>
<co c="0"><na f="y/Ye:Rui" pid="177/5191">Rui Ye</na></co>
<co c="0"><na f="y/Yin_0001:Heng" pid="77/6178-1">Heng Yin 0001</na></co>
<co c="0"><na f="y/Yin:Mingjun" pid="248/4507">Mingjun Yin</na></co>
<co c="0"><na f="y/Yu:Fajiang" pid="06/3662">Fajiang Yu</na></co>
<co c="0"><na f="y/Yu_0001:Shui" pid="90/3575-1">Shui Yu 0001</na></co>
<co c="0"><na f="y/Yuan_0003:Quan" pid="29/5782-3">Quan Yuan 0003</na></co>
<co c="0"><na f="y/Yuan:Zenghui" pid="197/5699">Zenghui Yuan</na></co>
<co c="0"><na f="z/Zeng:JieHua" pid="187/6215">JieHua Zeng</na></co>
<co c="0"><na f="z/Zhai:Xiaoyan" pid="79/392">Xiaoyan Zhai</na></co>
<co c="0"><na f="z/Zhang:Honghao" pid="95/7634">Honghao Zhang</na></co>
<co c="0"><na f="z/Zhang:Kang" pid="29/177">Kang Zhang</na></co>
<co c="0"><na f="z/Zhang:Li" pid="89/5992">Li Zhang</na></co>
<co c="0"><na f="z/Zhang:Shengqing" pid="44/10594">Shengqing Zhang</na></co>
<co c="0"><na f="z/Zhang:Yifan" pid="57/4707">Yifan Zhang</na></co>
<co c="0"><na f="z/Zhang:Yixiang" pid="83/9921">Yixiang Zhang</na></co>
<co c="0"><na f="z/Zhang:Yunhe" pid="15/5780">Yunhe Zhang</na></co>
<co c="0"><na f="z/Zhang_0002:Yunhe" pid="15/5780-2">Yunhe Zhang 0002</na></co>
<co c="0"><na f="z/Zhang:Zhongke" pid="72/8380">Zhongke Zhang</na></co>
<co c="0"><na f="z/Zhao:Guanghao" pid="405/8454">Guanghao Zhao</na></co>
<co c="0"><na f="z/Zhao_0001:Yanjie" pid="40/622-1">Yanjie Zhao 0001</na></co>
<co c="0"><na f="z/Zheng:Xunjin" pid="358/8889">Xunjin Zheng</na></co>
<co c="0"><na f="z/Zhou:Chunjie" pid="94/340">Chunjie Zhou</na></co>
<co c="0"><na f="z/Zhou:Fan" pid="63/3122">Fan Zhou</na></co>
<co c="0"><na f="z/Zhou:Haotian" pid="67/180">Haotian Zhou</na></co>
<co c="0"><na f="z/Zhou:Jing" pid="01/2356">Jing Zhou</na></co>
<co c="0"><na f="z/Zhou:Libo" pid="27/4249">Libo Zhou</na></co>
<co c="0"><na f="z/Zhou:Man" pid="165/8236">Man Zhou</na></co>
<co c="0"><na f="z/Zhou_0001:Man" pid="165/8236-1">Man Zhou 0001</na></co>
<co c="0"><na f="z/Zhou_0001:Pan" pid="84/6614-1">Pan Zhou 0001</na></co>
<co c="0"><na f="z/Zhou:Tianxiang" pid="09/1447">Tianxiang Zhou</na></co>
<co c="0"><na f="z/Zhu:Tianqing" pid="19/8310">Tianqing Zhu</na></co>
<co c="0"><na f="z/Zou:Deqing" pid="z/DeqingZou">Deqing Zou</na></co>
<co c="0"><na f="z/Zou:Yayi" pid="267/9437">Yayi Zou</na></co>
</coauthors>
</dblpperson>

