[3] Syeda Huma Jabeen, Gaoshou Zhai, Ruixia Zhai, Fault Simulation and Memory Leak Detection over Custom Kernel Module by Using KEDR, 2017 The 7th International Workshop on Computer Science and Engineering (WCSE 2017), Beijing, China, 25-27 June, 2017, pp. 244-248(EI 2017檢索[Accession number: 20173404078439])
[4] Syeda Huma Jabeen, Gaoshou Zhai, A Prototype Design for Medical Diagnosis by An Expert System, 2017 The 7th International Workshop on Computer Science and Engineering (WCSE 2017), Beijing, China, 25-27 June, 2017, pp. 1413-1417(EI 2017檢索[Accession number: 20173404078295])
[9] Gaoshou Zhai,Tao Guo, Jie Huang, SCIATool: A Tool for Analyzing SELinux Policies Based on Access Control Spaces, Information Flows and CPNs, Lecture Notes in Computer Science Vol.9473 (TRUSTED SYSTEMS, INTRUST 2014), 2015, pp.294-309 (ISTP 2016檢索[WOS: 000374047800019] & EI 2016檢索[Accession number: 20160801960347])
[14] Gaoshou Zhai, Tong Wu, Algorithms for Automatic Analysis of SELinux Security Policy, International Journal of Security and Its Applications, Vol.7, No.1, 2013, pp.71-84(EI 2013檢索[Accession number: 20131916322253])
[15] Gaoshou Zhai, Junhong Zhang, Solving Sudoku Puzzles Based on Customized Information Entropy, International Journal of Hybrid Information Technology, Vol.6, No.1, 2013, pp.77-92(EI 2013檢索[Accession number: 20130616005588])
[16] Jing Bai, Gaoshou Zhai, Study On Analysis For SELinux Security Policy, Proceedings of 2012 International Conference on Systems and Informatics (ICSAI 2012), pp.1231-1235(EI 2012檢索[Accession number: 20123115290225])
[17] Gaoshou Zhai, Tong Wu, Automatic Analysis Method for SELinux Security Policy, International Journal of Security and Its Applications, Vol.6, No.2, 2012, pp.229-234(EI 2012檢索[Accession number: 20123215312981])
[18] Gaoshou Zhai, Tong Wu, Study on Analysis Method for SELinux Security Policy, Proceedings of International Conference on Information Security and Assurance (ISA 2012), pp.98-100
[19] Gaoshou Zhai, Junhong Zhang, Solving Sudoku Puzzles Based on Customized Information Entropy, Proceedings of International Conference on Computer and Applications (CCA 2012), pp.23
[20] Yang Siqi, Gaoshou Zhai, A New Realization of Shared Resource Matrix Transitive Closure Computation Algorithm, Proceedings of 2010 International Conference on Information Security and Artificial Intelligence(ISAI 2010):pp.V2-238—V2-241
[21] Gaoshou Zhai, Junhong Zhang, Jianzhong Cha, Study on Simulation Platform of Urban Traffic Signal Control System, Proceedings of 2010 3rd International Conference on Computer and Electrical Engineering(ICCEE 2010), IEEE & IACSIT:pp.V3-16—V3-21
[23] Gaoshou Zhai, Hanhui Niu, Na Yang, Minli Tian, Chengyu Liu, and Hengsheng Yang, Security Testing for Operating System and Its System Calls, D. Slezak et al. (Eds.): SecTech 2009, CCIS (Communications in Computer and Information Science) Volume 58, pp. 116-123, 2009. Springer-Verlag Berlin Heidelberg 2009(ISTP 2010檢索[UT ISI:000273735800015] & EI 2010檢索[Accession number: 20104513364445])
[24] Gaoshou Zhai, Yufeng Zhang, Chengyu Liu, Na Yang, MinLi Tian, Hengsheng Yang, Automatic Identification of Covert Channels inside Linux Kernel Based on Source Codes, ICIS 2009, November 24-26, 2009 Seoul, Korea, pp. 440–445, ACM(EI 2010檢索[Accession number: 20100412670995])
[25] Gaoshou Zhai, Wenlin Ma, Minli Tian, Na Yang, Chengyu Liu, Hengsheng Yang, Design and Implementation of a Tool for Analyzing SELinux Secure Policy, ICIS 2009, November 24-26, 2009 Seoul, Korea, pp. 446–451, ACM(EI 2010檢索[Accession number: 20100412670996])
[26] Gaoshou Zhai, Yaodong Li, Study and Implementation of SELinux-like Access Control Mechanism Based on Linux. T.-k. Kim, T.-h. Kim, and A. Kiumi (Eds.): SecTech 2008, CCIS(Communications in Computer and Information Science) Volume 29, pp. 50-66, 2009. Springer-Verlag Berlin Heidelberg 2009(ISTP 2010檢索[UT ISI:000280079200005] & EI 2010檢索[Accession number: 20104513364280])
[27] Gaoshou Zhai, Yaodong Li, Analysis and Study of Security Mechanisms inside Linux Kernel, SECTECH2008, Sanya, Hainan, China, December 12 - 15, 2008(EI 2009檢索[Accession number: 20090911922242] & ISTP 2009檢索[UT ISI:000264430700012])
[28] Gaoshou Zhai, Jie Zeng, Miaoxia Ma, Liang Zhang, Implementation and Automatic Testing for Security Enhancement of Linux Based on Least Privilege,International Journal of Security and Its Applications, Vol.2, No.3, 2008, pp.93-100(EI 2012檢索[Accession number: 20121214872264])
[29] Gaoshou Zhai, Jie Zeng, Miaoxia Ma, Liang Zhang, Implementation and Automatic Testing for Security Enhancement of Linux Based on Least Privilege,in IEEE CS Proceedings of The 2nd International Conference on Information Security and Assurance (ISA 2008), Busan, Korea, April 24 - 26, 2008(EI 2008檢索[Accession number: 20083811547688] & ISTP 2008檢索[UT ISI:000256051100036])
[30] Gaoshou Zhai, Junhong Zhang, Ruichang Wang, Bingsong Wang, Ningli Wang,Method for Measuring Anterior Chamber Volume by Image Analysis,in MIPPR 2007: Medical Imaging, Parallel Processing of Images of Images, and Optimization Techniques, Proceedings of SPIE Vol.6789 (SPIE, Bellingham, WA, 2007) Article 67891J, SPIE Fifth International Symposium on Multispectral Image Processing and Pattern Recognition,Wuhan,China,15-17 November 2007(EI 2008檢索[Accession number: 20081811236303] & ISTP 2008檢索[UT ISI:000253371500053])
[35] Zhai Gaoshou, Cha Jianzhong, Verification and Prototype Implementation of Fuzzy Self-Organization Decision Algorithm for UTCS, The 4th International Conference on Fuzzy Systems and Knowledge Discovery(FSKD2007) Proceedings Vol. II, IEEE Computer Society,Haikou, China, 24-27 August 2007, pp296-301 (EI 2008檢索[Accession number: 20082211281818]& ISTP 2008檢索[UT ISI:000252460300058])
[36] Wang Ningli, Wang Bingsong, Zhai Gaoshou, Lei Kun, Wang Lan, Congdon Nathan, A method of measuring anterior chamber volume using the anterior segment optical coherence tomographer and specialized software, American Journal of Ophthalmology, Vol.143, No.5, MAY 2007, pp. 879-881(SCI 2007檢索[UT ISI:000246288800028])
[37] Zhai Gaoshou, Cha Jianzhong, Study on Dynamic Self-Organization Decision of Urban Traffic Control System, The 10th World Multi-Conference on Systemics, Cybernetics and Informatics (WMSCI 2006) Proceedings Volume III, 2006, pp359-364 (ISTP 2008檢索[UT ISI:000251937300079] & EI 2012檢索[Accession number: 20124215565977])
[48] Zhai Gaoshou, Cha Jianzhong, A Prototype of Knowledge Based System for Traffic Congestion Management, 2002 IEEE 10 Conference On Computers, Communications, Control And Power Engineering Proceedings, IEEE Press & Posts and Telecom Press, 2002, pp.1753-1756(EI 2003檢索[Accession number: 2003307565168]& ISTP 2003檢索[UT ISI:000181201500425])
[49] Zhai Gaoshou, Zhang Yongkui, Yang Erhong, Construction of Semantic Classification Hierarchy of Chinese Nouns, 2002 IEEE 10 Conference On Computers, Communications, Control And Power Engineering Proceedings, IEEE Press & Posts and Telecom Press, 2002, pp.427-430(EI 2003檢索[Accession number: 2003307564977]& ISTP 2003檢索[UT ISI:000181201500105])
[54] Zhai Gaoshou, Cha Jianzhong, E Mingcheng, Towards Architecture of Integrated Intelligent Urban Traffic Control System, The 15th Triennial Conference of The International Federation of Operational Research Societies, Beijing, China, August 16-20, 1999(ISTP 2000檢索)
[56] Zhai Gaoshou, Zhang Yongkui, Yang Erhong, Cha Jianzhong, Derivation of MCNMRD from Modern Chinese Machine Dictionary, Proc. Of 1997 IEEE International Conference on Intelligent Processing Systems, 萬國學術(shù)出版社, 1997, pp.1809-1813(EI 1998檢索[Accession number: 1998274194731]& ISTP 1998檢索)
[63] Gaoshou Zhai, Junhong Zhang, Research and Practice of Classification Teaching about Operating Systems Course for Computer and Other Engineering Specialties, Proceedings of Teaching Seminars on Higher Education Science and Engineering Courses (ISBN 978-957-43-0862-0), Harbin, China, December 28-29, 2013