![]() |
个人信息Personal Information
教授
博士生导师
硕士生导师
主要任职:Director of Academic Committee at Kaifa District
其他任职:开发区校区学术分委员会主任(Director of Academic Committee at Kaifa Campus)
性别:男
毕业院校:多伦多大学
学位:博士
所在单位:软件学院、国际信息与软件学院
学科:软件工程. 运筹学与控制论
办公地点:开发区(Kaifa District Campus)
联系方式:mingchul@dlut.edu.cn
电子邮箱:mingchul@dlut.edu.cn
扫描关注
- [121]李明楚, 郭成.A reversible steganography scheme of secret image sharing based on cellular automata and least si...[J],Mathematical Problems in Engineering,2015,15(849768)
- [122]喻言, 赵雪峰, 李明楚, 欧进萍.Design and Initial Validation of Mobile-Structural Health Monitoring System Using Smart Phones[J],International Journal of Distributed Sensor Networks,2015,3:1-14
- [123]Hu, Wei-Tong, Li, Ming-Chu, Guo, Cheng, Yuan, Li-Feng, C (reprint author), Dalian Univ Technol, Sch Software, 8 Rd, Dalian 116620, Peoples R China..A Reversible Steganography Scheme of Secret Image Sharing Based on Cellular Automata and Least ...[J],MATHEMATICAL PROBLEMS IN ENGINEERING,2015
- [124]Liao, Wei, Li, Mingchu, W (reprint author), Dalian Univ Technol, Sch Software Technol, Dalian 116620, Peoples R China..[r, s, t]-colorings of fans[J],ARS COMBINATORIA,2015,119:263-273
- [125]Yuan, Lifeng, Li, Mingchu, Guo, Cheng, Hu, Weitong, Tan, Xing.A Verifiable E-voting Scheme with Secret Sharing[A],2015,304-308
- [126]Feng B., Guo C., Li M., Wang Z., Wang, Z., School of Software Technology, Dalian University of Technology, No.8 Road, China.A novel proactive multi-secret sharing scheme[J],International Journal of Network Security,2015,17(2):123-128
- [127]Zhao X., Yu Y., Li M., Ou J..Research on Cloud-SHM and its applications[A],2015
- [128]侯刚, 周宽久, 王洁, 常军旺, 李明楚.基于时延STM的软件形化建模与验证方法[A],2014,156-165
- [129]Hou G., Zhou K.-J., Wang J., Chang J.-W., Li M.-C., Wang, J., School of Software Technology, Dalian University of TechnologyChina.Modeling and analysis for interrupt behaviors of embedded systems based on EDSPN[J],Dongbei Daxue Xuebao/Journal of Northeastern University,2014,35:201-206
- [130]Li, Mingchu, Qi, Zhe, Lu, Kun, Guo, Cheng.A Textual Polarity Analysis Based on Reviewer Identity Disclosure and Product Sales[A],2014,303-308
- [131]Cui, Guang-Hai, Li, Ming-Chu, Fan, Xin-Xin, Deonauth, Nakema, Wang, Zhen, Z (reprint author), Dalian Univ Technol, Sch Software, Dalian 116621, Peoples R China..Optimism when winning and cautiousness when losing promote cooperation in the spatial prisoner'...[J],PHYSICA A-STATISTICAL MECHANICS AND ITS APPLICATIONS,2014,408:181-189
- [132]石慧, 李明楚, Shi, Hui.安全的变容量恢复水印方案[J],计算机研究与发展,2014,51(8):1715-1726
- [133]苏志远, 李明楚, 范鑫鑫, 崔永瑞, 郭成.LT_Trust:一种混合策略下的信任管理模型[J],小型微型计算机系统,2014,35(7):1464-1469
- [134]Cui, Yongrui, Zhao, Hang, Wu, Jun, Su, Zhiyuan, Li, Mingchu.A Sensitive and Robust Grid Reputation System Based on Rating of Recommenders[A],2014,23-28
- [135]Hou G., Chang J., Zhou K., Li M., Zhou, K., School of Software Technology, Dalian University of Technology, Dalian 116024, China, email: zhoukj@dlut.edu.cn.Embedded system modeling and verification based on deterministic and stochastic Petri net[J],Journal of Computational Information Systems,2014,10(12):5051-5058
- [136]Lu, Kun, Wu, Bin, Li, Ming-chu, Wang, Zhen, Z (reprint author), Dalian Univ Technol, Sch Software, Dalian 116621, Peoples R China..Other-regarding preference causing ping-pong effect in self-questioning game[J],CHAOS SOLITONS & FRACTALS,2014,59:51-58
- [137]Feng, Bin, Wang, Zhi-Hui, Duo, Chang, Ching-Yun, Li, Ming-Chu, ZH (reprint author), Dalian Univ Technol, Sch Software, Dalian 116620, Peoples R China..A novel, reversible, Chinese text information hiding scheme based on lookalike traditional and ...[J],KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS,2014,8(1):269-281
- [138]李明楚, 郭成.Accurate location in batch dynamic provable data possession[A],2014,519:9-12
- [139]李明楚, 郭成.Encrypted Searching with Adaptive Symmetric Searchable Encryption Security in Cloud Storage[A],2014
- [140]李明楚, 郭成.Mignotte sequence-based weighted threshold secret image sharing[A],2014,543:2395-2399