欢迎访问
程杰仁 的个人主页
  • 程杰仁
  1. 学  院:计算机科学与技术学院
  2. 学历职称:博士/教授
  3. 导师类型:博/硕士生导师
  4. 联系方式:992730@hainanu.edu.cn
科研项目 发表论文 获奖情况 专利情况

1.Cheng Jieren, Liu Jingxin,Xu Xinbin,Xia Dongwan,Liu Le, Sheng Victor S. A review of Chinese named entity recognition,2021,Ksii Transactions On Internet And Information Systems,vol:15 ,no :6 ,pp :2012-2030(IF:0.858; 4)

2.Khaled Riad, Jieren Cheng. Adaptive XACML Access Policies for Heterogeneous Distributed Iot Environments,2021,Information Sciences,vol: 548,pp: 135-152.(IF:6.795; 1)

3.Lei Feifei, Cheng Jieren*, Yang Yue, Tang Xiangyan,Sheng Victor S, Huang Chunzao. Improving Heterogeneous Network Knowledge Transfer Based on the Principle of Generative Adversarial.2021,Electronics,vol:10 , no :13(IF:2.412; 3)

4.Jieren Cheng, Jiachen Zheng, Xiaomei Yu. An Ensemble Framework for Interpretable Malicious Code Detection,International Journal Of Intelligent Systems,2020,DOI:10.1002/int.22310.(IF:10.312; 1)

5.Jieren Cheng, Junqi Li, Xiangyan Tang. A Novel DDoS Attack Detection Method Using Optimized Generalized Multiple Kernel Learning. Computers, Materials and Continua, 2020, vol. 62, no. 3, pp. 1423-1443.(IF:4.89; 1)

6.Jieren Cheng, Yue Yang, Xiangyan Tang, Naixue Xiong, Yuan Zhang, Feifei Lei. Generative Adversarial Networks: A Literature Review,KSII Transactionaaas On Internet And Information Systems,2020,vol: 14 no: 12 pp: 4625-4647.(IF:0.858; 4)

7.Jieren Cheng, Luyi Xie, Xiangyan, Naixue Xiong, Boyi Liu. A Survey of Security Threats and Defense on Blockchain,Multimedia Tools And Applications,2020,DOI: 10.1007/s11042-020-09368-6.(IF:2.757; 2)

8.Jieren Cheng, Jun Li, Naixue Xiong, Meizhu Chen, Hao Guo,Xinzhi Yao. Lightweight Mobile Clients Privacy Protection Using Trusted Execution Environments for Blockchain,2020,CMC-Computers Materials & Continua,vol: 65 ,no: 3 ,pp: 2247-2262.(IF:4.89; 1)

9.Jun Li, Jieren Cheng*, Naixue Xiong, Lougao Zhan, Yuan Zhang. A Distributed Privacy Preservation Approach for Big Data in Public Health Emergencies Using Smart Contract and SGX,2020,CMC-Computers Materials & Continua,vol: 65 ,no: 1, pp: 723-741.(IF:4.89; 1)

10.Jieren Cheng, Yifu Liu, Xiangyan Tang,Sheng, Victor, Mengyang Li, junqi Li. DDoS Attack Detection via Multi-scale Convolutional Neural Network.2020,Computers, Materials and Continua,vol: 62 no: 3 pp: 1317-1333.(IF:4.89; 1)

11.Jieren Cheng, Canting Cai, Xiangyan Tang. A DDoS Attack Information Fusion Method based on CNN for Multi-element Data. Computers, Materials and Continua, 2020, vol. 63, no. 1, pp. 131-150.(IF:4.89; 1)

12.Ruomeng Xu, Jieren Cheng*, Fengkai Wang, Xiangyan Tang, Jinying Xu. A DRDoS Detection and Defense Method Based on Deep Forest in the Big Data Environment,Symmetry-Basel,2019,vol: 11 no: 1,(IF:2.713; 2)

13.Chen Zhang, Jieren Cheng*, Xiangyan Tang. Novel DDoS Feature Representation Model Combining Deep Belief Network and Canonical Correlation Analysis. Computers, Materials and Continua,2019, vol. 61, no. 2, pp. 657-675.(IF:4.89; 1)

14.Cheng Jieren, Li Mengyang, Tang Xiangyan, Sheng Victor S., Liu Yifu, Guo Wei. Flow Correlation Degree Optimization Driven Random Forest for Detecting DDoS Attacks in Cloud Computing,2019,Security and Communication Networks,DOI: 10.1155/2019/6809054.(IF:1.791; 4)

15.Liu, Yifu, Cheng Jieren*, Tang Xiangyan, Li Mengyang, Xie Luyi. Multi-view DDoS Network Flow Feature Extraction Method via Convolutional Neural Network,2019,Cyberspace Safety and Security, Pt II,vol: 11983,pp: 30-41.(SCI)

16.Zhang Ruizhi, Cheng Jieren, Tang Xiangyan, Liu Qiang, He Xiangfeng. DDoS Attack Security Situation Assessment Model Using Fusion Feature Based on Fuzzy C-Means Clustering Algorithm,2018,Cloud Computing and Security, Pt II,vol: 11064,pp: 654-669.(SCI)

17.Cheng Jieren, Zhou Jinghe, Liu Qiang, Tang Xiangyan, Guo Yanxiang. A DDoS Detection Method for Socially Aware Networking Based on Forecasting Fusion Feature Sequence,2018,Computer Journal,vol: 61 ,no: 7 pp: 959-970.(IF:1.494; 3)

18.Cheng Jieren, Xu Ruomeng, Tang Xiangyan, Sheng Victor S, Cai Canting. An Abnormal Network Flow Feature Sequence Prediction Approach for DDoS Attacks Detection in Big Data Environment,2018,cmc-Computers Materials & Continua,vol: 55 ,no: 1 ,pp: 95-119.(IF:4.89; 1; ESI高被引论文,1%)

19.Cheng Jieren, Li Mengyang, Tang Xiangyan, Sheng Victor S., Liu Yifu, Guo Wei. Flow Correlation Degree Optimization Driven Random Forest for Detecting DDoS Attacks in Cloud Computing,2018,Security And Communication Networks,DOI: 10.1155/2018/6459326.(IF:1.791; 4)

20.Cheng Jieren, Liu Boyi, Cai Kuanqi, Tang Xiangyan, Zhang Boyun. ETC Intelligent Navigation Path Planning Method,2018,Journal Of Internet Technology,vol:19,no: 2 ,pp: 619-631.(IF:1.93; 4)

21.Cheng Jieren, Zhang Chen, Tang Xiangyan, Sheng Victor , Dong Zhe, Li Junqi. Adaptive DDoS Attack Detection Method Based on Multiple-Kernel Learning,2018,Security And Communication Networks,DOI: 10.1155/2018/5198685.(IF:1.791; 4)

22.Cheng Jieren, Cai Kuanqi, Liu Boyi, Tang Xiangyan. Design and Test of the Intelligent Rubber Tapping Technology Evaluation Equipment Based on Cloud Model,2017,Cloud Computing And Security, Pt I,vol: 10602 子辑: I.(SCI)

23.Liu Boyi, Cheng Jieren*, Cai Kuanqi,Shi Pengchao, Tang Xiangyan. Singular Point Probability Improve LSTM Network Performance for Long-term Traffic Flow Prediction,2017,Theoretical Computer Science, Nctcs 2017,vol: 768,pp: 328-340.(IF:0.827; 4)

24.Chen Xuegang, Cheng Jieren*, Yin Jianping, Tang Xiangyan, Zhang Jialu. Characterization of Bipolar Information Aggregation and Decomposition,2016,Natural Computation, Fuzzy Systems and Knowledge Discovery, pp: 305-310.(SCI)

25.Cheng Jieren, Liu Boyi, Tang Xiangyan. A Traffic-Congestion Detection Method for Bad Weather Based on Traffic Video,2016,Intelligence Computation and Applications,vol: 575, pp: 506-518.(SCI)


海南大学计算机科学与技术学院
  • 地址:海南省海口市人民大道58号
  • 电话:0898-66278203 66278201 邮箱:cs@hainanu.edu.cn
  • 院长信箱:zhangqingchen@hainanu.edu.cn 书记信箱:990920@hainanu.edu.cn
  • 美工支持/中旗网络
  • 海大公众号 学院公众号