![]() |
| 2007 | ||
|---|---|---|
| 3 | EE | Ji-yao An, Ronghui Wu, Renfa Li, Cheng Xu: An Intrusion Alarm System Based on Fuzzy Reasoning Machine. IITA 2007: 165-168 |
| 2006 | ||
| 2 | EE | Ji-yao An, Guangxue Yue, Fei Yu, Renfa Li: Intrusion Detection Based on Fuzzy Neural Networks. ISNN (2) 2006: 231-239 |
| 1 | EE | Guangxue Yue, Fei Yu, Yi-jun Chen, Ronghui Wu, Ji-yao An, Renfa Li: Access Control Model for P2P File-Sharing Systems Based on Trust and Recommendation. SKG 2006: 74 |
| 1 | Yi-jun Chen | [1] |
| 2 | Renfa Li | [1] [2] [3] |
| 3 | Ronghui Wu | [1] [3] |
| 4 | Cheng Xu | [3] |
| 5 | Fei Yu | [1] [2] |
| 6 | Guangxue Yue | [1] [2] |