头像
论文论著

通讯地址:

个人邮箱:

邮政编码:

办公地点:

传真:

  • 个人简介

  • 研究方向

  • 科研团队

  • 科研项目

  • 获奖动态

  • 教学随笔

  • 教育经历

  • 课程教学

  • 论文著作

  • 科研论文

  • 科研横向项目

  • 科研纵向项目

  • 科研专利

  • 科研动物专利


  • 李永忠,陈兴亮.基于改进DS证据融合与ELM的入侵检测算法.计算机应用研究,2015.11

    陈兴亮,李永忠.基于IPMeans-KELM的入侵检测算法研究.计算机工程与应用2016.08;

    李永忠,张 杰,一种基于云模型和半监督聚类的入侵检测算法,电子测量与仪器学报,2014,12

    李永忠,张 杰,基于云模型和半监督聚类的入侵检测算法,计算机科学,2015,2

    李永忠,王如山,主动学习半监督聚类入侵检测算法,微电子与计算机,2011.10

    李永忠,藏文印刷体字符识别技术研究,南京大学学报,2012,1

    Yongzhong Li, Tao Ji, Jing Xu. Immune Mobile Agent and Its Application in IDS. Lecture Notes in Electrical Engineering(LNEE 254),Springer,2013,8

    Yanyan Qian,Yongzhong  Li ,An Intrusion Detection Algorithm Based on Multi-label Learning,国际会议IWECA2014,2014,5

    Yongzhong Li , Zhengjie Li, Rushang Wang. Intrusion Detection Algorithm Based On semi-supervised Learning, 2011 InternationalConfrence of InformationTechnology,Computer Engineering and Management Science(ICM2011) 2011,9

    Yongzhong Li,Guang He, Research on Printed Tibetan Character Recognition Technology Based on Fractal Moments 2010(7)国际会议IEEE ICCSIT 2010,Chengdu,EI和ISTP

    Yongzhong Li,Chunwei Jing Rushan Wang, Immune Mobile Agent and Its Application in Intrusion Detection System 2010(8)国际会议IEEE CCCM 2010,Yangzhou ,EI和ISTP

    Yongzhong Li,Chunwei Jing Jing Xu, A New Distributed Intrusion Detection Model Based on Immune Mobile Agent 2010(9),国际会议LSMS-ICSEE 2010,Wuxi, EI和ISTP

    李永忠,王汝山, 基于半监督聚类的入侵检测技术 2010(4),江苏科技大学学报(自然科学版) 李永忠,胡翰, 基于主动学习的半监督聚类入侵检测算法技术 2010(2)江苏科技大学学报(自然科学版) 

    胡翰,李永忠,一种改进的半监督聚类入侵检测算法2010(3) 计算机仿真

    Yongzhong Li,Rushan Wang, Jing Xu Distributed Intrusion Detection Model Based on Immune Mobile Agent 2009(5) 国际会议IEEE WISA 2009,Nanchang, EI和ISTP

    Yongzhong Li,Rushan Wang, Ge Yang Intrusion Detection Method Based on Fuzzy Hidden Markov Model 2009(8) 国际会议IEEE FSKD2009,Tianjin, EI和ISTP

    Yongzhong Li,Yan Song,Ge Yang Anomaly Intrusion Detection Method Based on Rough Set Theor 2008(9) 国际会议IEEE WAPR2008,Hongkong EI和ISTP

    李永忠,徐静,孙彦, 基于免疫Agent的网络入侵检测系统 2009(1)计算机科学

    李永忠,徐静,胡翰, 基于粒子群优化的聚类入侵检测算法 2009(1)江苏科技大学学报(自然科学版)

    李永忠,杨鸽,徐静,胡翰, 基于模糊隐马尔科夫模型的入侵检测方法,2009(8)Six Internet Conference on Fuzzy System and Knowlogy Discovery, 国际会议论文集

    李永忠,王汝山,杨鸽, 模糊支持向量机入侵检测算法研究 2009(11),江苏省第二届信息安全各层论坛, 国内会议论文集

    李永忠,王汝山,徐静,一种新的基于免疫移动Agent的分布式入侵检测模型, 2009(5) 第二届网络信息系统与应用国际会议, 国际会议论文集

    Yongzhong Li, Ge Yang,Jing Xu A New Intrusion Detection Method Based on Fuzzy HMM 2008(6) 国际会议IEEE  ICIEA2008,Singapore EI和ISTP

    Yongzhong Li, Hua Zhu,Yulei Wang An Adaptive Blind Watermarking Algorithm Based on DCT and  Modified Watson’s Visual Model 2008(8) 国际会议IEEE ISECS2008,Guangzho EI和ISTP

    Yongzhong Li, Jing Xu ,Ge Yang A new Mobile Agent Architecture for Wireless Sensor Networks 2008(6) 国际会议IEEE  ICIEA2008,Singapore EI和ISTP

    李永忠,徐静,基于免疫Agent的网络入侵检测系统, 2008(12),计算机科学

    李永忠,沈晔华,刘真真, INTENET上藏文信息交换平台的研究与设计, 2008年12月 信息科学与工程国际学术会议论文集(国际)

    论著:

      主编专著1部:李永忠编著,《计算机网络理论与应用》国防工业出版社,2011年3月。

    主编教材:

    1.李永忠编著,《物联网信息安全》,西安电子科技大学出版社,2016年5月;

    2.李永忠主编,《现代微机原理与接口技术》,西安电子科技大学出版社,2013年10月;

    3.李永忠主编, 《微机原理与接口技术》,电子工业出版社,2012年2月;


    4.李永忠主编,《计算机网络测试与维护》主编,西安电子科技大学出版社,2011年9月;


    5.李永忠主编,《现代通信原理、技术与仿真》,西安电子科技大学出版社,2010年9月。

    6.李永忠主编, 《现代通信原理与技术》,国防工业出版社,2010年6月;

    国际会议论文

    1

    Intrusion Detection Algorithm Based On   Semi-supervised Learning

    20119

    南京

    EIISTP

    2011 International Conference of Information Technology, Computer   Engineering and Management Sciences (ICM 2011)

    Yongzhong Li, Zhengjie Li, Rushang   Wang

    2

    Anomaly Intrusion Detection Method Based on  K-means Clustering Algorithm with Particle   Swarm Optimization

    20119

    南京

    EIISTP

    Conference of Information Technology, Computer Engineering and Management   Sciences (ICM 2011)

    Zhengjie   Li, Yongzhong Li, Lei Xu

    3

    Research on Printed Tibetan Character Recognition Technology   Based on Fractal Moments

    20107

    成都

    EIISTP

    The 3rd IEEE International   Conference on Computer Science and Information Technology (IEEE ICCSIT 2010)

    Yongzhong   LIGuang   He, Yulei ang, Zhenzhnen Liu

    4

    Immune Mobile Agent   and Its Application in Intrusion Detection System

    20108

    扬州

    2010 International Colloquium on   Computing, Communication, Control, and Management

    ( IEEE CCCM 2010)

    Yongzhong Li , Chunwei Jing,   Jing Xu

    5

    A New Distributed Intrusion Detection Model Based on   Immune Mobile Agent

    20109

    无锡

    EIISTP

    LSMS-ICSEE 2010 (2010   International Conference on Life System Modeling and Simulation and  2010 International Conference on Intelligent   Computing for Sustainable Energy and Environment

    Yongzhong LI,  Chunwei Jing, Jing Xu

    6

    .Distributed Intrusion Detection Model Based on Immune   Mobile Agent

    20095

    南昌

    2009'International Symposium on   Web Information Systems and Applications(WISA2009)

    Yongzhong Li, Rushan Wang, Jing   Xu

    7

    Intrusion Detection Method Based on Fuzzy Hidden Markov   Model

    20098

    天津

    EIISTP

    The 5th International Conference on Natural   Computation-The 6th International Conference on Fuzzy Systems and                     Knowledge Discovery (ICNC09-FSKD'09)

    Yongzhong Li,   Rushan  Wang, Jing  Xu, Ge    Yang,Bo Zhao

    8

    A New Intrusion Detection Method Based on Fuzzy HMM

    20086

    新加坡

    EIISTP

    3rd IEEE Conference on Industrial Electronics and   Applications (ICIEA 2008)

    Yongzhong   Li, Yang Ge, Xu Jing, Zhao Bo

    9

    A new Mobile Agent Architecture for Wireless Sensor   Networks

    20086

    新加坡

    EIISTP

    3rd IEEE Conference on Industrial Electronics and   Applications (ICIEA 2008)

    Yongzhong   Li , Jing Xu , Bo Zhao, Ge Yang

    10

    Anomaly Intrusion Detection Method Based on Rough Set   Theory

    20088

    香港

    EIISTP

    International Conference on Wavelet Analysis and   Pattern Recognition 2008

    (ICWAPR2008)

    Yong-zhong   Li, bo ZHAO, jing xu, Ge yang

    11

    An Adaptive Blind Watermarking Algorithm Based on DCT   and  Modified Watson’s Visual Model

    20088

    广州

    EIISTP

    2008 International Symposium on Electronic Commerce   and Security (ISECS 2008)

    Yongzhong   Li, Hua Zhu, Ruiqing Yu, Yang Ge, Xu Jing

    12

    Study and Implementation of Tibetan Information   Exchange Platform On Internet

    200812

    上海

    EIISTP

    2008 International Symposium on Computer Science and   Computioanl Technology(ISCSCT2008)

    Li   Yongzhong, Shen Yehua

    13

    Research and Implementation of Tibetan Information   exchange platform On Internet

    20079

    宁波

    ISTP

    ISCS2007 IEEE国际学术会议论文集

    Yongzhong   Li , Yehua Shen