2007 | ||
---|---|---|
3 | EE | Ji-yao An, Ronghui Wu, Renfa Li, Cheng Xu: An Intrusion Alarm System Based on Fuzzy Reasoning Machine. IITA 2007: 165-168 |
2006 | ||
2 | EE | Ji-yao An, Guangxue Yue, Fei Yu, Renfa Li: Intrusion Detection Based on Fuzzy Neural Networks. ISNN (2) 2006: 231-239 |
1 | EE | Guangxue Yue, Fei Yu, Yi-jun Chen, Ronghui Wu, Ji-yao An, Renfa Li: Access Control Model for P2P File-Sharing Systems Based on Trust and Recommendation. SKG 2006: 74 |
1 | Yi-jun Chen | [1] |
2 | Renfa Li | [1] [2] [3] |
3 | Ronghui Wu | [1] [3] |
4 | Cheng Xu | [3] |
5 | Fei Yu | [1] [2] |
6 | Guangxue Yue | [1] [2] |