头像
论文论著

通讯地址:

个人邮箱:

邮政编码:

办公地点:

传真:

  • 个人简介

  • 研究方向

  • 科研团队

  • 科研项目

  • 获奖动态

  • 教学随笔

  • 教育经历

  • 课程教学

  • 论文著作

  • 科研论文

  • 科研横向项目

  • 科研纵向项目

  • 科研专利

  • 科研动物专利

  • 20162008年以第一作者和通信作者发表主要论文论著:

    1)李永忠,陈兴亮.基于改进DS证据融合与ELM的入侵检测算法.计算机应用研究,2015.11

    2)陈兴亮,李永忠.基于IPMeans-KELM的入侵检测算法研究.计算机工程与应用2016.08

    3)李永忠,张 杰,一种基于云模型和半监督聚类的入侵检测算法,电子测量与仪器学报,201412

    4)李永忠,张 杰,基于云模型和半监督聚类的入侵检测算法,计算机科学,20152

    5)李永忠,王如山,主动学习半监督聚类入侵检测算法,微电子与计算机,2011.10

    6)李永忠,藏文印刷体字符识别技术研究,南京大学学报,2012,1

    7Yongzhong Li, Tao Ji, Jing Xu. Immune Mobile Agent and Its Application in IDS. Lecture Notes in Electrical EngineeringLNEE 254),Springer20138

    8Yanyan QianYongzhong  Li An Intrusion Detection Algorithm Based on Multi-label Learning,国际会议IWECA201420145

    9Yongzhong Li , Zhengjie Li, Rushang Wang. Intrusion Detection Algorithm Based On semi-supervised Learning,   2011 International Conference of Information TechnologyComputer Engineering and Management Science(ICM2011)20119

    10) Yongzhong LiGuang He, Research on Printed Tibetan Character Recognition Technology Based on Fractal Moments ,国际会议IEEE ICCSIT 2010Chengdu, 20107),EIISTP

    (11) Yongzhong LiChunwei Jing Rushan Wang, Immune Mobile Agent and Its Application in Intrusion Detection System ,国际会议IEEE CCCM 2010Yangzhou , 20108EIISTP

    (12) Yongzhong LiChunwei Jing Jing Xu, A New Distributed Intrusion Detection Model Based on Immune Mobile Agent,国际会议LSMS-ICSEE 2010Wuxi, 20109EIISTP

    (13) 李永忠,王汝山, 基于半监督聚类的入侵检测技术,江苏科技大学学报(自然科学版), 20104

    (14) 李永忠,胡翰, 基于主动学习的半监督聚类入侵检测算法技术,江苏科技大学学报(自然科学版), 20102

    (14) 胡翰,李永忠,一种改进的半监督聚类入侵检测算法, 计算机仿真,20103

    (15) Yongzhong LiRushan Wang Jing Xu Distributed Intrusion Detection Model Based on Immune Mobile Agent ,国际会议IEEE WISA 2009,Nanchang, 20095EIISTP

    (16) Yongzhong LiRushan Wang Ge Yang Intrusion Detection Method Based on Fuzzy Hidden Markov Model ,国际会议IEEE FSKD2009 Tianjin, 20098,EIISTP

    (17)Yongzhong LiYan SongGe Yang Anomaly Intrusion Detection Method Based on Rough Set Theory, 国际会议IEEE WAPR2008, Hongkong 20089,EIISTP

    (18) 李永忠,徐静,孙彦, 基于免疫Agent的网络入侵检测系统,计算机科学, 20091

    (19) 李永忠,徐静,胡翰, 基于粒子群优化的聚类入侵检测算法,江苏科技大学学报(自然科学版), 20091

    (20) 李永忠,杨鸽,徐静,胡翰, 基于模糊隐马尔科夫模型的入侵检测方法,6th Internet Conference on Fuzzy System and Knowlogy Discovery, 国际会议论文集,20098

    21)李永忠,王汝山,杨鸽, 模糊支持向量机入侵检测算法研究 ,江苏省第二届信息安全各层论坛, 国内会议论文集,2009(11)

    22)李永忠,王汝山,徐静,一种新的基于免疫移动Agent的分布式入侵检测模型,第二届网络信息系统与应用国际会议, 国际会议论文集, 20095

    23Yongzhong Li Ge YangJing Xu A New Intrusion Detection Method Based on Fuzzy HMM 20086) 国际会议IEEE  ICIEA2008Singapore EIISTP

    24Yongzhong Li Hua ZhuYulei Wang An Adaptive Blind Watermarking Algorithm Based on DCT and  Modified Watsons Visual Model 20088) 国际会议IEEE ISECS2008,Guangzho EIISTP

    25Yongzhong Li Jing Xu Ge Yang A new Mobile Agent Architecture for Wireless Sensor Networks 20086) 国际会议IEEE  ICIEA2008Singapore EIISTP

    26)李永忠,徐静,基于免疫Agent的网络入侵检测系统, ,计算机科学,200812

    27)李永忠,沈晔华,刘真真, INTENET上藏文信息交换平台的研究与设计,  信息科学与工程国际学术会议论文集(国际)200812

    论著:

    主编专著1部:李永忠编著,《计算机网络理论与应用》国防工业出版社,20113月。

    主编教材:

    1.李永忠编著,《物联网信息安全》,西安电子科技大学出版社,20165月;

    2.李永忠主编,《现代微机原理与接口技术》,西安电子科技大学出版社,201310月;

    3.李永忠主编,《微机原理与接口技术》,电子工业出版社,20122月;

      

    4.李永忠主编,《计算机网络测试与维护》主编,西安电子科技大学出版社,20119月;

      

    5.李永忠主编,《现代通信原理、技术与仿真》,西安电子科技大学出版社,20109月。

    6.李永忠主编,《现代通信原理与技术》,国防工业出版社,20106月;

    国际会议论文

    1

    Intrusion Detection Algorithm Based On     Semi-supervised Learning

    20119月,南京(EIISTP

    2011 International Conference   of Information Technology, Computer   Engineering and Management   Sciences (ICM 2011)

    Yongzhong   Li, Zhengjie Li, Rushang   Wang

    2

    Anomaly Intrusion Detection Method Based on    K-means Clustering Algorithm with Particle   Swarm Optimization

    20119月,南京,(EIISTP

    Conference of Information   Technology, Computer Engineering and Management   Sciences (ICM   2011)

    Zhengjie   Li, Yongzhong Li, Lei Xu

    3

    Research on Printed Tibetan Character Recognition   Technology   Based on Fractal Moments

    20107月,成都(EIISTP

    The 3rd IEEE International     Conference on Computer Science and Information Technology (IEEE   ICCSIT 2010)

    Yongzhong     LIGuang   He, Yulei ang, Zhenzhnen Liu

    4

    Immune Mobile Agent   and Its   Application in Intrusion Detection System

    20108月,扬州

    2010 International Colloquium   on   Computing, Communication, Control, and Management

    ( IEEE CCCM 2010)

    Yongzhong   Li , Chunwei Jing,   Jing Xu

    5

    A New Distributed Intrusion Detection Model Based on     Immune Mobile Agent

    20109月,无锡(EIISTP

    LSMS-ICSEE 2010 (2010     International Conference on Life System Modeling and Simulation   and  2010 International Conference on Intelligent   Computing   for Sustainable Energy and Environment

    Yongzhong   LI,  Chunwei Jing, Jing Xu

    6

    .Distributed Intrusion Detection Model Based on Immune     Mobile Agent

    20095月,南昌

    2009'International Symposium on     Web Information Systems and Applications(WISA2009)

    Yongzhong Li, Rushan Wang, Jing   Xu

    7

    Intrusion Detection Method Based on Fuzzy Hidden Markov     Model

    20098月,天津(EIISTP

    The 5th International   Conference on Natural   Computation-The 6th International   Conference on Fuzzy Systems   and                       Knowledge Discovery (ICNC09-FSKD'09)

    Yongzhong   Li,   Rushan  Wang, Jing  Xu, Ge      Yang,Bo Zhao

    8

    A New Intrusion Detection Method Based on Fuzzy HMM

    20086月,新加坡(EIISTP

    3rd IEEE Conference on   Industrial Electronics and   Applications (ICIEA 2008)

    Yongzhong   Li, Yang Ge, Xu Jing, Zhao Bo

    9

    A new Mobile Agent Architecture for Wireless Sensor     Networks

    20086月,新加坡(EIISTP

    3rd IEEE Conference on   Industrial Electronics and   Applications (ICIEA 2008)

    Yongzhong     Li , Jing Xu , Bo Zhao, Ge Yang

    10

    Anomaly Intrusion Detection Method Based on Rough Set     Theory

    20088月,香港(EIISTP

    International Conference on   Wavelet Analysis and   Pattern Recognition 2008

    (ICWAPR2008)

    Yong-zhong     Li, bo ZHAO, jing xu, Ge yang

    11

    An Adaptive Blind Watermarking Algorithm Based on DCT     and  Modified Watson’s Visual Model

    20088月,广州(EIISTP

    2008 International Symposium on   Electronic Commerce   and Security (ISECS 2008)

    Yongzhong     Li, Hua Zhu, Ruiqing Yu, Yang Ge, Xu Jing

    12

    Study and Implementation of Tibetan Information     Exchange Platform On Internet

    200812月,上海(EIISTP

    2008 International Symposium on   Computer Science and   Computioanl Technology(ISCSCT2008)

    Li   Yongzhong, Shen Yehua

    13

    Research and Implementation of Tibetan Information     exchange platform On Internet

    20079月,宁波(ISTP

    ISCS2007 IEEE国际学术会议论文集

    Yongzhong   Li , Yehua Shen