2016~2008年以第一作者和通信作者发表主要论文论著:
(1)李永忠,陈兴亮.基于改进DS证据融合与ELM的入侵检测算法.计算机应用研究,2015.11;
(2)陈兴亮,李永忠.基于IPMeans-KELM的入侵检测算法研究.计算机工程与应用2016.08;
(3)李永忠,张 杰,一种基于云模型和半监督聚类的入侵检测算法,电子测量与仪器学报,2014,12
(4)李永忠,张 杰,基于云模型和半监督聚类的入侵检测算法,计算机科学,2015,2
(5)李永忠,王如山,主动学习半监督聚类入侵检测算法,微电子与计算机,2011.10
(6)李永忠,藏文印刷体字符识别技术研究,南京大学学报,2012,1
(7)Yongzhong Li, Tao Ji, Jing Xu. Immune Mobile Agent and Its Application in IDS. Lecture Notes in Electrical Engineering(LNEE 254),Springer,2013,8
(8)Yanyan Qian,Yongzhong Li,An Intrusion Detection Algorithm Based on Multi-label Learning,国际会议IWECA2014,2014,5
(9)Yongzhong Li , Zhengjie Li, Rushang Wang. Intrusion Detection Algorithm Based On semi-supervised Learning, 2011 International Conference of Information Technology,Computer Engineering and Management Science(ICM2011),2011,9
(10) Yongzhong Li,Guang He, Research on Printed Tibetan Character Recognition Technology Based on Fractal Moments,国际会议IEEE ICCSIT 2010,Chengdu, 2010(7),EI和ISTP
(11) Yongzhong Li,Chunwei Jing Rushan Wang, Immune Mobile Agent and Its Application in Intrusion Detection System,国际会议IEEE CCCM 2010,Yangzhou , 2010(8)EI和ISTP
(12) Yongzhong Li,Chunwei Jing Jing Xu, A New Distributed Intrusion Detection Model Based on Immune Mobile Agent,国际会议LSMS-ICSEE 2010,Wuxi, 2010(9)EI和ISTP
(13)李永忠,王汝山,基于半监督聚类的入侵检测技术,江苏科技大学学报(自然科学版), 2010(4)
(14)李永忠,胡翰,基于主动学习的半监督聚类入侵检测算法技术,江苏科技大学学报(自然科学版), 2010(2)
(14)胡翰,李永忠,一种改进的半监督聚类入侵检测算法,计算机仿真,2010(3)
(15) Yongzhong Li,Rushan Wang,Jing Xu Distributed Intrusion Detection Model Based on Immune Mobile Agent ,国际会议IEEE WISA 2009,,Nanchang, 2009(5)EI和ISTP
(16) Yongzhong Li,Rushan Wang,Ge Yang Intrusion Detection Method Based on Fuzzy Hidden Markov Model ,国际会议IEEE FSKD2009,Tianjin, 2009(8),EI和ISTP
(17)Yongzhong Li,Yan Song,Ge Yang Anomaly Intrusion Detection Method Based on Rough Set Theory,国际会议IEEE WAPR2008, Hongkong,2008(9),EI和ISTP
(18)李永忠,徐静,孙彦,基于免疫Agent的网络入侵检测系统,计算机科学, 2009(1)
(19)李永忠,徐静,胡翰,基于粒子群优化的聚类入侵检测算法,江苏科技大学学报(自然科学版), 2009(1)
(20)李永忠,杨鸽,徐静,胡翰,基于模糊隐马尔科夫模型的入侵检测方法,6th Internet Conference on Fuzzy System and Knowlogy Discovery,国际会议论文集,2009(8)
(21)李永忠,王汝山,杨鸽,模糊支持向量机入侵检测算法研究,江苏省第二届信息安全各层论坛,国内会议论文集,2009(11)
(22)李永忠,王汝山,徐静,一种新的基于免疫移动Agent的分布式入侵检测模型,第二届网络信息系统与应用国际会议,国际会议论文集,2009(5)
(23)Yongzhong Li,Ge Yang,Jing Xu A New Intrusion Detection Method Based on Fuzzy HMM 2008(6) 国际会议IEEE ICIEA2008,Singapore EI和ISTP
(24)Yongzhong Li,Hua Zhu,Yulei Wang An Adaptive Blind Watermarking Algorithm Based on DCT and Modified Watson’s Visual Model 2008(8) 国际会议IEEE ISECS2008,Guangzho EI和ISTP
(25)Yongzhong Li,Jing Xu,Ge Yang A new Mobile Agent Architecture for Wireless Sensor Networks 2008(6) 国际会议IEEE ICIEA2008,Singapore EI和ISTP
(26)李永忠,徐静,基于免疫Agent的网络入侵检测系统, ,计算机科学,2008(12)
(27)李永忠,沈晔华,刘真真, INTENET上藏文信息交换平台的研究与设计,信息科学与工程国际学术会议论文集(国际),2008年12月
论著:
主编专著1部:李永忠编著,《计算机网络理论与应用》国防工业出版社,2011年3月。
主编教材:
1.李永忠编著,《物联网信息安全》,西安电子科技大学出版社,2016年5月;
2.李永忠主编,《现代微机原理与接口技术》,西安电子科技大学出版社,2013年10月;
3.李永忠主编,《微机原理与接口技术》,电子工业出版社,2012年2月;
4.李永忠主编,《计算机网络测试与维护》主编,西安电子科技大学出版社,2011年9月;
5.李永忠主编,《现代通信原理、技术与仿真》,西安电子科技大学出版社,2010年9月。
6.李永忠主编,《现代通信原理与技术》,国防工业出版社,2010年6月;
国际会议论文
1Intrusion Detection Algorithm Based On Semi-supervised Learning2011年9月,南京(EI,ISTP)2011 International Conference of Information Technology, Computer Engineering and Management Sciences (ICM 2011)Yongzhong Li, Zhengjie Li, Rushang Wang
2Anomaly Intrusion Detection Method Based on K-means Clustering Algorithm with Particle Swarm Optimization2011年9月,南京,(EI,ISTP)Conference of Information Technology, Computer Engineering and Management Sciences (ICM 2011)Zhengjie Li, Yongzhong Li, Lei Xu
3Research on Printed Tibetan Character Recognition Technology Based on Fractal Moments2010年7月,成都(EI,ISTP)The 3rd IEEE International Conference on Computer Science and Information Technology (IEEE ICCSIT 2010)Yongzhong LI,Guang He, Yulei ang, Zhenzhnen Liu
4Immune Mobile Agent and Its Application in Intrusion Detection System2010年8月,扬州2010 International Colloquium on Computing, Communication, Control, and Management
( IEEE CCCM 2010)Yongzhong Li , Chunwei Jing, Jing Xu
5A New Distributed Intrusion Detection Model Based on Immune Mobile Agent2010年9月,无锡(EI,ISTP)LSMS-ICSEE 2010 (2010 International Conference on Life System Modeling and Simulation and 2010 International Conference on Intelligent Computing for Sustainable Energy and EnvironmentYongzhong LI, Chunwei Jing, Jing Xu
6.Distributed Intrusion Detection Model Based on Immune Mobile Agent2009年5月,南昌2009'International Symposium on Web Information Systems and Applications(WISA2009)Yongzhong Li, Rushan Wang, Jing Xu
7Intrusion Detection Method Based on Fuzzy Hidden Markov Model2009年8月,天津(EI,ISTP)The 5th International Conference on Natural Computation-The 6th International Conference on Fuzzy Systems and Knowledge Discovery (ICNC09-FSKD'09)Yongzhong Li, Rushan Wang, Jing Xu, Ge Yang,Bo Zhao
8A New Intrusion Detection Method Based on Fuzzy HMM2008年6月,新加坡(EI,ISTP)3rd IEEE Conference on Industrial Electronics and Applications (ICIEA 2008)Yongzhong Li, Yang Ge, Xu Jing, Zhao Bo
9A new Mobile Agent Architecture for Wireless Sensor Networks2008年6月,新加坡(EI,ISTP)3rd IEEE Conference on Industrial Electronics and Applications (ICIEA 2008)Yongzhong Li , Jing Xu , Bo Zhao, Ge Yang
10Anomaly Intrusion Detection Method Based on Rough Set Theory2008年8月,香港(EI,ISTP)International Conference on Wavelet Analysis and Pattern Recognition 2008
(ICWAPR2008)Yong-zhong Li, bo ZHAO, jing xu, Ge yang
11An Adaptive Blind Watermarking Algorithm Based on DCT and Modified Watson’s Visual Model2008年8月,广州(EI,ISTP)2008 International Symposium on Electronic Commerce and Security (ISECS 2008)Yongzhong Li, Hua Zhu, Ruiqing Yu, Yang Ge, Xu Jing
12Study and Implementation of Tibetan Information Exchange Platform On Internet2008年12月,上海(EI,ISTP)2008 International Symposium on Computer Science and Computioanl Technology(ISCSCT2008)Li Yongzhong, Shen Yehua
13Research and Implementation of Tibetan Information exchange platform On Internet2007年9月,宁波(ISTP)ISCS2007 IEEE国际学术会议论文集Yongzhong Li , Yehua Shen