![]() |
个人信息Personal Information
教授
博士生导师
硕士生导师
主要任职:Director of Academic Committee at Kaifa District
其他任职:开发区校区学术分委员会主任(Director of Academic Committee at Kaifa Campus)
性别:男
毕业院校:多伦多大学
学位:博士
所在单位:软件学院、国际信息与软件学院
学科:软件工程. 运筹学与控制论
办公地点:开发区(Kaifa District Campus)
联系方式:mingchul@dlut.edu.cn
电子邮箱:mingchul@dlut.edu.cn
扫描关注
- [181]Tian L., Li M., Sun W., Zhao X., Wang B., Ma J..Evolution of cooperation based on reputation on dynamical networks[A],2012,1399-1404
- [182]Wang, Zhi-Hui, Chang, Chin-Chen, Li, Ming-Chu, CC (reprint author), Feng Chia Univ, Dept Informat Engn & Comp Sci, Taichung 401724, Taiwan..Optimizing least-significant-bit substitution using cat swarm optimization strategy[J],INFORMATION SCIENCES,2012,192:98-108
- [183]Wang, Xing-Tian, Chang, Chin-Chen, Lin, Chia-Chun, Li, Ming-Chu, CC (reprint author), Feng Chia Univ, Dept Informat Engn & Comp Sci, Taichung 407, Taiwan..A novel multi-group exploiting modification direction method based on switch map[J],SIGNAL PROCESSING,2012,92(6):1525-1535
- [184]郭成, 张真诚, 秦川, 李明楚, Guo, C.(guo8016@gmail.com).具有加权特性的门限认证加密机制[J],应用科学学报,2012,30(3):251-255
- [185]范鑫鑫, 李明楚, 崔永瑞, 赵辉, 郭振洲.一种考虑节点角色的P2P信任模型[J],小型微型计算机系统,2012,33(5):1000-1005
- [186]Zhao, Laiping, Sakurai, Kouichi, Ren, Yizhi, Li, Mingchu, LP (reprint author), Kyushu Univ, Dept Informat, Fukuoka 812, Japan..Flexible service selection with user-specific QoS support in service-oriented architecture[J],JOURNAL OF NETWORK AND COMPUTER APPLICATIONS,2012,35(3):962-973
- [187]李明楚, 许雷, 孙伟峰, 陆坤, 郭成, Sun, W.-F.(wfsun@dlut.edu.cn).基于非完全信息博弈的网格资源分配模型[J],软件学报,2012,23(2):428-438
- [188]Zhao, Hui, Li, Mingchu, Sakurai, Kouichi, Ren, Yizhi, Sun, Jonathan Z., Wang, Fengying, FY (reprint author), Shandong Univ Technol, Comp Sci & Technol Sch, 12 Zhangzhou Rd, Zibo 255049, Shandong, Peoples R China..A Finite Equivalence of Verifiable Multi-secret Sharing[J],INTERNATIONAL JOURNAL OF COMPUTATIONAL INTELLIGENCE SYSTEMS,2012,5(1):1-12
- [189]Sun M., Sun W., Shu L., Li M., Xue L..FoSSicker: A personalized search engine by location-awareness[A],2012,456-460
- [190]陈博, 席菁, 叶勇, 李明楚.基于信任度与参数化约束的后向凭证链发现算法[J],中国科学院研究生院学报,2012,29(1):109-117
- [191]李明楚.Self-Healing Key-Distribution Scheme with Collusion Attack Resistance Based on One-Way Key Chains...[J],IJDSN,2012,12(12):23-26
- [192]冯斌, 王智慧, 李明楚.A Novel, Reversible, Chinese Text Information Hiding Scheme Based on Lookalike Traditional and Si...[J],KSII Transactions on Internet and Information Systems,2012
- [193]李明楚, 喻言, 欧进萍.Self-healing Key distribution Scheme with Collusion Attack Resistance based on One-way Key Chains...[J],International Journal of Distributed Sensor Networks,2012,10:1-11
- [194]李明楚, 王兴田, Chin-Chen Chang.A novel multi-group exploiting modification direction method based on switch map. 92(6): 1525-15...[J],Signal Processing,2012,92(6):1525-1535
- [195]Su, Zhiyuan, Li, Mingchu, Guo, Cheng, Ma, Jianhua, Park, Jong Hyuk, Jeong, Young-Sik, MC (reprint author), Dalian Univ Technol, Sch Software Technol, Dalian, Peoples R China..Fuzzy Set Theory-Based Trust Models in Multi-Agent Environment[J],JOURNAL OF INTERNET TECHNOLOGY,2012,13(1):159-172
- [196]Sun W., Xia Q., Xu Z., Li M., Qin Z., Qin, Z., School of Software, Dalian University of Technology, Dalian, China, email: qzq@dlut.edu.cn.A game theoretic resource allocation model based on extended second price sealed auction in grid ...[J],Journal of Computers,2012,7(1):65-75
- [197]Chen Y.-F., Li M.-C., Cheng X.-C., Chen, Y.-F., Department of Software, Dalian University of Technology, DaLian 116024, China, email: yuanfang_chen@ieee.org.A localization parameter estimation model for CKN-based wireless sensor networks[J],Journal of Computers,2012,22(4):38-46
- [198]Cui S.-Y., Wang Z.-H., Chang C.-C., Li M.-C., Cui, S.-Y., Department of Software, Dalian University of Technology, DaLian 116024, China, email: cuishiyu0523@gmail.com.A data hiding scheme based on voronoi diagram[J],Journal of Computers,2012,22(4):47-58
- [199]Jiao, Dong, Li, Mingchu, Yu, Yan, Ou, Jinping, Y (reprint author), Dalian Univ Technol, Sch Elect Sci & Technol, Dalian 116024, Peoples R China..Self-Healing Key-Distribution Scheme with Collusion Attack Resistance Based on One-Way Key Chai...[J],INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS,2012
- [200]李明楚, 胡伟通, 郭成.Wei-Tong Hu, MingChu Li, Cheng Guo, Yizhi Ren: Reversible secret image sharing with steganography...[J],Security and Communication Networks,2012,5(11):1267-1276