| 2009 | 
| 21 | EE | Fei Yu,
Chin-Chen Chang,
Ben M. Chen,
Jian Shu,
Guangxue Yue:
Editorial.
JCP 4(1): 1-2 (2009) | 
| 20 | EE | Xiaojun Jia,
Guangxue Yue,
Fang Mei:
The Mathematical Model and Applications of Coded Structured Light System for Object Detecting.
JCP 4(1): 53-60 (2009) | 
| 19 | EE | Fei Yu,
Chin-Chen Chang,
Ben M. Chen,
Jun Zhang,
Guangxue Yue:
Editorial.
JSW 4(1): 1-2 (2009) | 
| 2008 | 
| 18 | EE | Shigen Shen,
Guangxue Yue:
Unified Certificate Validation System DNS-OCSP.
ISECS 2008: 394-397 | 
| 17 | EE | Wen Chen,
Fei Yu,
Chin-Chen Chang,
Jiexian Zeng,
Guangxue Yue:
Editorial.
JCM 3(7): 1-2 (2008) | 
| 2007 | 
| 16 | EE | Zaimei Zhang,
Renfa Li,
Zhongsheng Li,
Haiyan Zhang,
Guangxue Yue:
An Incomplete Data Analysis Approach Based on the Rough Set Theory and Divide-and-Conquer Idea.
FSKD (3) 2007: 119-123 | 
| 15 | EE | Weifeng Du,
Guangxue Yue,
Cheng Xu:
A Brief Analysis about Boundary Region Partition Reduction Standard.
IITA 2007: 34-37 | 
| 14 |   | Lei Ding,
Fei Yu,
Guangxue Yue,
Cheng Xu:
An Improved Algorithm of Pattern Matching for Information Security Audit System.
IMECS 2007: 459-463 | 
| 13 | EE | Fei Yu,
Yue Shen,
Guangxue Yue,
Ronghui Wu,
Cheng Xu:
Catastrophe Prediction of Cnaphalocrosis Medinalis Based on Fuzzy Reasoning.
International Conference on Computational Science (3) 2007: 109-112 | 
| 12 | EE | Ken Chen,
Guangxue Yue,
Fei Yu,
Yue Shen,
Aiqing Zhu:
Research on Speech Emotion Recognition System in E-Learning.
International Conference on Computational Science (3) 2007: 555-558 | 
| 11 | EE | Ronghui Wu,
Renfa Li,
Fei Yu,
Guangxue Yue,
Cheng Xu:
Research on Advanced Distributed Learning by Using SCORM.
International Conference on Computational Science (3) 2007: 571-574 | 
| 10 | EE | Guangxue Yue,
Fei Yu,
Li-ping Chen,
Yi-jun Chen:
An Access Control Model in Lager-Scale P2P File Sharing Systems.
International Conference on Computational Science (4) 2007: 741-744 | 
| 9 | EE | Renfa Li,
Yunlong Xie,
Jigang Wen,
Guangxue Yue:
EMMP: a highly efficient membership management protocol.
Frontiers of Computer Science in China 1(2): 208-212 (2007) | 
| 2006 | 
| 8 | EE | Guang Lu,
Yu Fei,
Guangxue Yue,
Miaoliang Zhu:
Worm Intrusion Alarm Modeling Based on Network Traffic Character.
IMSCCS (2) 2006: 142-147 | 
| 7 | EE | Bin Jiang,
Da-fung Zhang,
Chao Yang,
Guangxue Yue,
Fei Yu:
A Privacy Policy of P3P Based on Relational Database.
IMSCCS (2) 2006: 510-515 | 
| 6 | EE | Ji-yao An,
Guangxue Yue,
Fei Yu,
Renfa Li:
Intrusion Detection Based on Fuzzy Neural Networks.
ISNN (2) 2006: 231-239 | 
| 5 | EE | Cheng Xu,
Fei Yu,
Zhenghui Dai,
Guangxue Yue,
Renfa Li:
Data Distribution Algorithm of High-Speed Intrusion Detection system Based on Network Processor.
SKG 2006: 27 | 
| 4 | EE | Ronghui Wu,
Renfa Li,
Fei Yu,
Guangxue Yue,
Cheng Xu:
Research on User Authentication for Grid Computing Security.
SKG 2006: 72 | 
| 3 | EE | Guangxue Yue,
Fei Yu,
Yi-jun Chen,
Ronghui Wu,
Ji-yao An,
Renfa Li:
Access Control Model for P2P File-Sharing Systems Based on Trust and Recommendation.
SKG 2006: 74 | 
| 2 | EE | Ronghui Wu,
Renfa Li,
Fei Yu,
Guangxue Yue,
Jigang Wen:
Research on Remote Heterogeneous Disaster Recovery Technology in Grid Computing Security.
SKG 2006: 75 | 
| 2005 | 
| 1 | EE | Guangxue Yue,
Renfa Li,
Zude Zhou,
Ronghui Wu:
An Efficient Cluster-Hierarchy Architecture Model ECHP2P for P2P Networks.
GCC 2005: 776-786 |