发表论文
2023:
(1)Jianguo Sun, Wenshan Wang, Sizhao Li*, Qingan Da, Lei Chen, Scheduling optimization for UAV communication coverage using virtual force-based PSO model, Digital Comnunications and Networks (中科院一区 Top), Online, 2023.
(2)Xinyu Han, Huosheng Xu, Hao Yu, Sizhao Li*, A Reinforcement Learning Intelligent Deductive Model with Pretrained Sequence Information, International Journal of Bio-inspired Computation, Online, 2023.
(3)Qingan Da, Guoyin Zhang, Sizhao Li, Zechao Liu*, Wenshan Wang, Gradient-free adversarial attack algorithm based on differential evolution, International Journal of Bio-inspired Computation, Online, 2023.
(4)Liguo Zhang, Zilin Tian, Yunfei Long, Sizhao Li*, Guisheng Yin, Cross-modal and Cross-medium Adversarial Attack for Audio, ACM MM' 23 (CCF-A).
(5)Zining Yan, Guisheng Yin, Sizhao Li*, Biplab Sikdar, Path Planning for Heterogeneous UAVs with Radar Sensors, IEEE Internet of Things Journal (中科院一区 Top), online.
(6) Yang Yang, Guoyin Zhang, Sizhao Li, Zechao Liu*, Offline/Online Attribute-Based Searchable Encryption Scheme from Ideal Lattices for IoT, Frontiers of Computer Science, accepted (CCF-B), 2023.
(7) 章璐璐,李思照,基于深度学习的智能体轨迹预测文献综述,无线电工程,2023
(8) 杨梓辰,笪清安,李思照,面向深度学习模型的对抗攻击与防御综述,无线电工程,2023
2022:
(1)Wenshan Wang, Jianguo Sun, Sizhao Li*, Junpeng Wu, Qingan Da, Adaptive Weight Adjustment and Searching Perception Strategy for Multivariate Complex Weights, Wireless Communications and Mobile Computing (CCF-C), 2022.
(2) Guoyin Zhang, Qingan Da, Sizhao Li*, Jianguo Sun, Wenshan Wang, Qing Hu and Jiashuai Lu, Adversarial Transform Network with Adaptive Perturbations for Generating Adversarial Examples, International Journal of Bio-inspired Computation, 20(2):94-103, 2022.
(3) Junpeng Wu, Enyuan Zhao, Sizhao Li*, Yanqiang Wang, Intelligent Fitting Global Real-Time Task Scheduling Strategy for High-Performance Mulit-Core Systems, CAAI Transactions on Intelligence Technology (中科院二区), 2022.
(4) Hao Yu, Sizhao Li, A Higher Performance Accelerator for Resource-Limited FPGA to Deploy Deeper Object Detection Networks, 2022 IEEE 16th International Conference on Anti-counterfeiting, Security, and Identification (ASID).
(5) Danni Wang, Sizhao Li, Automated DDoS Attack Mitigation for Software Defined Network, 2022 IEEE 16th International Conference on Anti-counterfeiting, Security, and Identification (ASID).
(6) 李思照,姜宏睿,韩新宇,赵欢,面向可重构片上网络的缓存可靠性分析,空间控制技术与应用,2022
(7) 张贺,王鹏,李思照,基于格的后量子密码系统研究,无线电工程,2022
2021:
(1) Sizhao Li, Xinyu Han, Dapeng Lang and Songsong Dai, On the stability of two functional equations for $(S, N)-implications, AIMS Mathematics, 2021.
(2) Sizhao Li, Xinyu Han, Hongrui Jiang and Songsong Dai, Complex fuzzy aggregation operations with complex weights, Journal of Intelligent & Fuzzy Systems, 2021.
(3) Jianguo Sun, Zining Yan, Sizhao Li*, Multi-Agent Minimum Risk Path Intrusion Strategy with Computational Geometry, Wireless Communications and Mobile Computing (CCF-C), 2021.
(4) 孙建国,贺子天,李思照*,基于异构视觉计算模块的动态可重构系统,无线电工程,2021
(5) 张国印,孟想,李思照*,基于果蝇优化算法的无人机航路规划方法,无线电通信技术,2021
(6) 孙建国,田野,李思照*,高不平衡遥感图像场景分类技术,无线电通信技术,2021
2020:
(1) Shuyong Liu, Hongrui Jiang, Sizhao Li, Yang Yang, Linshan Shen, A Feature Compression Technique for Anomaly Detection Using Convolutional Neural Networks. IEEE 14th International Conference on Anti-counterfeiting, Security, and Identification (ASID), 2020.
(2) Sizhao Li, Xinyu Han, Software-Behavior-Aware Prefetching Method in Embedded RISC Systems. IEEE 14th International Conference on Anti-counterfeiting, Security, and Identification (ASID), 2020.
(3) Haiyan Lan, Xiaodong Zhu, Jianguo Sun, Sizhao Li, Traffic Data Classification to Detect Man-in-the-Middle Attacks in Industrial Control System. 6th International Conference on Dependable Systems and Their Applications (DSA), 2020.
2019:
(1) Lvqing Bi, Songsong Dai, Bo Hu and Sizhao Li, Complex Fuzzy Arithmetic Aggregation Operations, Journal of Intelligent & Fuzzy Systems, 2019.
(2) Duo Liu, Jianguo Sun, Libo Yin, Ge Zhang and Sizhao Li, Internet of Thing Wireless Sensor Entity Authentication Scheme Based on Merkle, 2019 IEEE INFOCOM WKSHPS: MobiSec 2019:Security, Privacy, and Digital Fornsics of Mobile Systems and Networks.
2018:
(1) Sizhao Li, Yuanzhi Zhang, Hongyin Luo, Yan Chen, Chao Lu and Donghui Guo, Race-Condition-Aware and Hardware-Oriented Task Partitioning and Scheduling Using Entropy Maximization, IEEE Transactions on Parallel and Distributed Systems (CCF-A), 29(7), 1589-1604, 2018.
(2) Bo Hu, Lvqing Bi, Songsong Dai and Sizhao Li, Distances of Complex Fuzzy Sets and Continuity of Complex Fuzzy Operations, Journal of Intelligent & Fuzzy Systems, 2018.
(3) Lvqing Bi, Bo Hu, Sizhao Li and Songsong Dai, The Parallelity of Complex Fuzzy Sets and Parallelity Preserving Operatos, Journal of Intelligent & Fuzzy Systems, 2018.
(4) Songsong Dai, Sizhao Li, Yangbing Wu and Donghui Guo, Cryptographic security of individual instances for conference key distribution, WSEAS Transactions on Communications, 17, 111-119, 2018.
2017:
(1) Sizhao Li and Donghui Guo, Cache Coherence Scheme for HCS-Based CMP and Its System Reliability Analysis, IEEE Access, 5, 7205 - 7215, 2017.
(2) Bo Hu, Lvqing Bi, Sizhao Li and Songsong Dai, Asymmetric Equivalences in Fuzzy Logic, Symmetry, 9(10), 224, 2017.
2013-2015:
(1) Sizhao Li, Hongyin Luo, Xiaochao Li, W. Eric Wong and Donghui Guo, Analysis of Software Specifications Based on Statistics of Markov Chain, IEEE International Conference on Anti-Counterfeiting, Security and Identification, pp.1-5, 2013.
(2) Sizhao Li, Shan Lin, Deming Chen, W. Eric Wong and Donghui Guo, Analysis of System Reliability for Cache Coherence Scheme in Multi-Processor, IEEE International Conference on Software Security and Reliability-Companion, 247-251, 2014.
(3) Shan He, Sizhao Li, Yan Chen and Donghui Guo, Uncertainty Analysis of Race Condition in Real-Time Systems, IEEE International Conference on Software Quality, Reliability and Security, 227-232, 2015.