The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

XiaoFeng Wang: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Michael K. Reiter, XiaoFeng Wang, Matthew Wright
    Building Reliable Mix Networks with Fair Exchange. [Citation Graph (0, 0)][DBLP]
    ACNS, 2005, pp:378-392 [Conf]
  2. XiaoFeng Wang, Michael K. Reiter
    Mitigating bandwidth-exhaustion attacks using congestion puzzles. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2004, pp:257-267 [Conf]
  3. Michael K. Reiter, XiaoFeng Wang
    Fragile mixing. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2004, pp:227-235 [Conf]
  4. XiaoFeng Wang, Zhuowei Li, Jun Xu, Michael K. Reiter, Chongkyung Kil, Jong Youl Choi
    Packet vaccine: black-box exploit detection and signature generation. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2006, pp:37-46 [Conf]
  5. Xiao Gu, Ji-Xiang Du, XiaoFeng Wang
    Leaf Recognition Based on the Combination of Wavelet Transform and Gaussian Interpolation. [Citation Graph (0, 0)][DBLP]
    ICIC (1), 2005, pp:253-262 [Conf]
  6. Ji-Xiang Du, XiaoFeng Wang, Xiao Gu
    Shape Matching and Recognition Base on Genetic Algorithm and Application to Plant Species Identification. [Citation Graph (0, 0)][DBLP]
    ICIC (1), 2005, pp:282-290 [Conf]
  7. XiaoFeng Wang, Ji-Xiang Du, Guo-Jun Zhang
    Recognition of Leaf Images Based on Shape Features Using a Hypersphere Classifier. [Citation Graph (0, 0)][DBLP]
    ICIC (1), 2005, pp:87-96 [Conf]
  8. XiaoFeng Wang, Han Kiliççöte, Pradeep K. Khosla, Chengqi Zhang
    Agent-Based Risk Learning for Computing Systems. [Citation Graph (0, 0)][DBLP]
    ICMAS, 2000, pp:459-460 [Conf]
  9. Danyan Chen, Ahmed K. Elhakeem, XiaoFeng Wang
    Performance Analysis of Multi-pattern Frequency Hopping Wireless LANs. [Citation Graph (0, 0)][DBLP]
    ICT, 2004, pp:1282-1288 [Conf]
  10. Salim Alkhawaldeh, XiaoFeng Wang, Yousef Shayan
    Phase-Shift-Based Layered Linear Space-Time Codes. [Citation Graph (0, 0)][DBLP]
    ISCC, 2005, pp:281-286 [Conf]
  11. Jixiang Du, Deshuang Huang, XiaoFeng Wang, Xiao Gu
    Shape Recognition Based on Radial Basis Probabilistic Neural Network and Application to Plant Species Identification. [Citation Graph (0, 0)][DBLP]
    ISNN (2), 2005, pp:281-285 [Conf]
  12. Yansheng Yang, Tieshan Li, XiaoFeng Wang
    Robust Adaptive Neural Network Control for Strict-Feedback Nonlinear Systems Via Small-Gain Approaches. [Citation Graph (0, 0)][DBLP]
    ISNN (2), 2006, pp:888-897 [Conf]
  13. Jingli Zhou, Hongtao Xia, Jifeng Yu, XiaoFeng Wang
    Asymmetrical SSL Tunnel Based VPN. [Citation Graph (0, 0)][DBLP]
    ISPA, 2006, pp:113-124 [Conf]
  14. XiaoFeng Wang, Tuomas Sandholm
    Reinforcement Learning to Play an Optimal Nash Equilibrium in Team Markov Games. [Citation Graph (0, 0)][DBLP]
    NIPS, 2002, pp:1571-1578 [Conf]
  15. XiaoFeng Wang, Binxing Fang, Hongli Zhang, Weizhe Zhang
    A Model for Estimating the Performance of Synchronous Parallel Network Simulation. [Citation Graph (0, 0)][DBLP]
    IASTED PDCS, 2005, pp:548-553 [Conf]
  16. Danyan Chen, XiaoFeng Wang, Ahmed K. Elhakeem
    Performance Analysis of UMTS Handover with the Help of WLAN. [Citation Graph (0, 0)][DBLP]
    QSHINE, 2005, pp:13- [Conf]
  17. Philippe Golle, XiaoFeng Wang, Markus Jakobsson, Alex Tsow
    Deterring Voluntary Trace Disclosure in Re-encryption Mix Networks. [Citation Graph (0, 0)][DBLP]
    S&P, 2006, pp:121-131 [Conf]
  18. XiaoFeng Wang, Michael K. Reiter
    Defending Against Denial-of-Service Attacks with Puzzle Auction. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2003, pp:78-92 [Conf]
  19. XiaoFeng Wang, Michael K. Reiter
    WRAPS: Denial-of-Service Defense through Web Referrals. [Citation Graph (0, 0)][DBLP]
    SRDS, 2006, pp:51-60 [Conf]
  20. Danyan Chen, Ahmed K. Elhakeem, XiaoFeng Wang
    A Novel Call Admission Control in Multi-Service Wireless LANs. [Citation Graph (0, 0)][DBLP]
    WiOpt, 2005, pp:119-128 [Conf]
  21. XiaoFeng Wang, Jianbo Ou, Xiaofeng Meng, Yan Chen
    Abox Inference for Large Scale OWL-Lite Data. [Citation Graph (0, 0)][DBLP]
    SKG, 2006, pp:30- [Conf]
  22. Markus Jakobsson, XiaoFeng Wang, Susanne Wetzel
    Stealth attacks in vehicular technologies. [Citation Graph (0, 0)][DBLP]
    VTC Fall (2), 2004, pp:1218-1222 [Conf]
  23. Ji-Xiang Du, De-Shuang Huang, XiaoFeng Wang, Xiao Gu
    Shape recognition based on neural networks trained by differential evolution algorithm. [Citation Graph (0, 0)][DBLP]
    Neurocomputing, 2007, v:70, n:4-6, pp:896-903 [Journal]
  24. Kotaro Hirasawa, XiaoFeng Wang, Junichi Murata, Jinglu Hu, Chunzhi Jin
    Universal learning network and its application to chaos control. [Citation Graph (0, 0)][DBLP]
    Neural Networks, 2000, v:13, n:2, pp:239-253 [Journal]
  25. Ji-Xiang Du, XiaoFeng Wang, Guo-Jun Zhang
    Leaf shape based plant species recognition. [Citation Graph (0, 0)][DBLP]
    Applied Mathematics and Computation, 2007, v:185, n:2, pp:883-893 [Journal]
  26. Shawn X. K. Hu, XiaoFeng Wang, Dan Martin
    Context Modeling to Enforce Interoperability in Web Service Definition. [Citation Graph (0, 0)][DBLP]
    IEEE SCC, 2007, pp:674-675 [Conf]
  27. Zhuowei Li, XiaoFeng Wang, Jong Youl Choi
    SpyShield: Preserving Privacy from Spy Add-Ons. [Citation Graph (0, 0)][DBLP]
    RAID, 2007, pp:296-316 [Conf]
  28. Dherar Rezk, Xiao Feng Wang
    Improved Layered Space Time Architecture Through Unequal Power Allocation and Multistage Decoding. [Citation Graph (0, 0)][DBLP]
    CCECE, 2006, pp:932-935 [Conf]

  29. Automatically Organize Web Text Resources with Frequent Term Tree. [Citation Graph (, )][DBLP]


  30. Reliability-Driven Reputation Based Scheduling for Public-Resource Computing Using GA. [Citation Graph (, )][DBLP]


  31. Reliability-Oriented Genetic Algorithm for Workflow Applications Using Max-Min Strategy. [Citation Graph (, )][DBLP]


  32. Towards automatic reverse engineering of software security configurations. [Citation Graph (, )][DBLP]


  33. Privacy-preserving genomic computation through program specialization. [Citation Graph (, )][DBLP]


  34. Learning your identity and disease from research papers: information leaks in genome wide association study. [Citation Graph (, )][DBLP]


  35. A Hase-based SAKA Protocol Algorithm. [Citation Graph (, )][DBLP]


  36. A new room decoration assistance system based on 3D reconstruction and integrated service. [Citation Graph (, )][DBLP]


  37. AGIS: Towards automatic generation of infection signatures. [Citation Graph (, )][DBLP]


  38. Period and Deadline Selection for Schedulability in Real-Time Systems. [Citation Graph (, )][DBLP]


  39. Mitigating Inadvertent Insider Threats with Incentives. [Citation Graph (, )][DBLP]


  40. A Granular Ranking Algorithm for Mining Market Values. [Citation Graph (, )][DBLP]


  41. A Novel Data Purification Algorithm Based on Outlier Mining. [Citation Graph (, )][DBLP]


  42. Decentralized Event-Triggered Broadcasts over Networked Control Systems. [Citation Graph (, )][DBLP]


  43. Event-Triggering in Distributed Networked Systems with Data Dropouts and Delays. [Citation Graph (, )][DBLP]


  44. Multiple Classification of Plant Leaves Based on Gabor Transform and LBP Operator. [Citation Graph (, )][DBLP]


  45. Recognition of Plant Leaves Using Support Vector Machine. [Citation Graph (, )][DBLP]


  46. Automated Segmentation Using a Fast Implementation of the Chan-Vese Models. [Citation Graph (, )][DBLP]


  47. Minimum Distortion Look-Up Table Based Data Hiding. [Citation Graph (, )][DBLP]


  48. A new localized superpixel Markov random field for image segmentation. [Citation Graph (, )][DBLP]


  49. Automatically face detection based on BP neural network and Bayesian decision. [Citation Graph (, )][DBLP]


  50. PRECIP: Towards Practical and Retrofittable Confidential Information Protection. [Citation Graph (, )][DBLP]


  51. An Improved ID-based Restrictive Partially Blind Signature Scheme. [Citation Graph (, )][DBLP]


  52. Side-Channel Leaks in Web Applications: A Reality Today, a Challenge Tomorrow. [Citation Graph (, )][DBLP]


  53. Panalyst: Privacy-Aware Remote Error Analysis on Commodity Software . [Citation Graph (, )][DBLP]


  54. Making CAPTCHAs clickable. [Citation Graph (, )][DBLP]


  55. Where Agile Research Meets Industry Needs: Starting from a 10-Year Retrospective. [Citation Graph (, )][DBLP]


  56. So You Think You're Agile? [Citation Graph (, )][DBLP]


  57. Research on the Video Segmentation Method with Integrated Multi-features Based on GMM. [Citation Graph (, )][DBLP]


  58. Maritime information engine. [Citation Graph (, )][DBLP]


  59. Pattern Recognition Method based on the Attribute Computing Network. [Citation Graph (, )][DBLP]


  60. Granular Computing-based Qualitative Criterion Cluster and the License Plate Characters' Recognition. [Citation Graph (, )][DBLP]


  61. Context-Based Semantic Approach to Ontology Creation of Maritime Information in Chinese. [Citation Graph (, )][DBLP]


  62. Improved layered space time architecture over quasi-static fading channels with unequal power allocation and multistage decoding. [Citation Graph (, )][DBLP]


  63. QAM-MIMO Signal Detection Using Semidefinite Programming Relaxation. [Citation Graph (, )][DBLP]


  64. Error Performance of Linear Dispersion Codes. [Citation Graph (, )][DBLP]


  65. Message Substitute Attack on Concurrent Signatures Protocol and its Improvement. [Citation Graph (, )][DBLP]


  66. A New Certificateless Electronic Cash Scheme with Multiple Banks Based on Group Signatures. [Citation Graph (, )][DBLP]


  67. Granular Ranking Algorithm Based on Rough Sets. [Citation Graph (, )][DBLP]


  68. ID-Based Authenticated Multi-party Key Agreement Protocol to Multimedia Applications Systems. [Citation Graph (, )][DBLP]


  69. ID-Based Convertible Limited (Multi-)Verifier Signature Scheme. [Citation Graph (, )][DBLP]


  70. Event design in event-triggered feedback control systems. [Citation Graph (, )][DBLP]


  71. A new implementation of trellis coded quantization based data hiding. [Citation Graph (, )][DBLP]


  72. A Security Architecture for Grid-Based Distributed Simulation Platform. [Citation Graph (, )][DBLP]


  73. Exploratory analysis of protein translation regulatory networks using hierarchical random graphs. [Citation Graph (, )][DBLP]


  74. Modeling language and tools for the semantic link network. [Citation Graph (, )][DBLP]


  75. Nowhere-zero 4-flow in almost Petersen-minor free graphs. [Citation Graph (, )][DBLP]


  76. A note on Berge-Fulkerson coloring. [Citation Graph (, )][DBLP]


Search in 0.003secs, Finished in 0.452secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002