Search the dblp DataBase
XiaoFeng Wang :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Michael K. Reiter , XiaoFeng Wang , Matthew Wright Building Reliable Mix Networks with Fair Exchange. [Citation Graph (0, 0)][DBLP ] ACNS, 2005, pp:378-392 [Conf ] XiaoFeng Wang , Michael K. Reiter Mitigating bandwidth-exhaustion attacks using congestion puzzles. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2004, pp:257-267 [Conf ] Michael K. Reiter , XiaoFeng Wang Fragile mixing. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2004, pp:227-235 [Conf ] XiaoFeng Wang , Zhuowei Li , Jun Xu , Michael K. Reiter , Chongkyung Kil , Jong Youl Choi Packet vaccine: black-box exploit detection and signature generation. [Citation Graph (0, 0)][DBLP ] ACM Conference on Computer and Communications Security, 2006, pp:37-46 [Conf ] Xiao Gu , Ji-Xiang Du , XiaoFeng Wang Leaf Recognition Based on the Combination of Wavelet Transform and Gaussian Interpolation. [Citation Graph (0, 0)][DBLP ] ICIC (1), 2005, pp:253-262 [Conf ] Ji-Xiang Du , XiaoFeng Wang , Xiao Gu Shape Matching and Recognition Base on Genetic Algorithm and Application to Plant Species Identification. [Citation Graph (0, 0)][DBLP ] ICIC (1), 2005, pp:282-290 [Conf ] XiaoFeng Wang , Ji-Xiang Du , Guo-Jun Zhang Recognition of Leaf Images Based on Shape Features Using a Hypersphere Classifier. [Citation Graph (0, 0)][DBLP ] ICIC (1), 2005, pp:87-96 [Conf ] XiaoFeng Wang , Han Kiliççöte , Pradeep K. Khosla , Chengqi Zhang Agent-Based Risk Learning for Computing Systems. [Citation Graph (0, 0)][DBLP ] ICMAS, 2000, pp:459-460 [Conf ] Danyan Chen , Ahmed K. Elhakeem , XiaoFeng Wang Performance Analysis of Multi-pattern Frequency Hopping Wireless LANs. [Citation Graph (0, 0)][DBLP ] ICT, 2004, pp:1282-1288 [Conf ] Salim Alkhawaldeh , XiaoFeng Wang , Yousef Shayan Phase-Shift-Based Layered Linear Space-Time Codes. [Citation Graph (0, 0)][DBLP ] ISCC, 2005, pp:281-286 [Conf ] Jixiang Du , Deshuang Huang , XiaoFeng Wang , Xiao Gu Shape Recognition Based on Radial Basis Probabilistic Neural Network and Application to Plant Species Identification. [Citation Graph (0, 0)][DBLP ] ISNN (2), 2005, pp:281-285 [Conf ] Yansheng Yang , Tieshan Li , XiaoFeng Wang Robust Adaptive Neural Network Control for Strict-Feedback Nonlinear Systems Via Small-Gain Approaches. [Citation Graph (0, 0)][DBLP ] ISNN (2), 2006, pp:888-897 [Conf ] Jingli Zhou , Hongtao Xia , Jifeng Yu , XiaoFeng Wang Asymmetrical SSL Tunnel Based VPN. [Citation Graph (0, 0)][DBLP ] ISPA, 2006, pp:113-124 [Conf ] XiaoFeng Wang , Tuomas Sandholm Reinforcement Learning to Play an Optimal Nash Equilibrium in Team Markov Games. [Citation Graph (0, 0)][DBLP ] NIPS, 2002, pp:1571-1578 [Conf ] XiaoFeng Wang , Binxing Fang , Hongli Zhang , Weizhe Zhang A Model for Estimating the Performance of Synchronous Parallel Network Simulation. [Citation Graph (0, 0)][DBLP ] IASTED PDCS, 2005, pp:548-553 [Conf ] Danyan Chen , XiaoFeng Wang , Ahmed K. Elhakeem Performance Analysis of UMTS Handover with the Help of WLAN. [Citation Graph (0, 0)][DBLP ] QSHINE, 2005, pp:13- [Conf ] Philippe Golle , XiaoFeng Wang , Markus Jakobsson , Alex Tsow Deterring Voluntary Trace Disclosure in Re-encryption Mix Networks. [Citation Graph (0, 0)][DBLP ] S&P, 2006, pp:121-131 [Conf ] XiaoFeng Wang , Michael K. Reiter Defending Against Denial-of-Service Attacks with Puzzle Auction. [Citation Graph (0, 0)][DBLP ] IEEE Symposium on Security and Privacy, 2003, pp:78-92 [Conf ] XiaoFeng Wang , Michael K. Reiter WRAPS: Denial-of-Service Defense through Web Referrals. [Citation Graph (0, 0)][DBLP ] SRDS, 2006, pp:51-60 [Conf ] Danyan Chen , Ahmed K. Elhakeem , XiaoFeng Wang A Novel Call Admission Control in Multi-Service Wireless LANs. [Citation Graph (0, 0)][DBLP ] WiOpt, 2005, pp:119-128 [Conf ] XiaoFeng Wang , Jianbo Ou , Xiaofeng Meng , Yan Chen Abox Inference for Large Scale OWL-Lite Data. [Citation Graph (0, 0)][DBLP ] SKG, 2006, pp:30- [Conf ] Markus Jakobsson , XiaoFeng Wang , Susanne Wetzel Stealth attacks in vehicular technologies. [Citation Graph (0, 0)][DBLP ] VTC Fall (2), 2004, pp:1218-1222 [Conf ] Ji-Xiang Du , De-Shuang Huang , XiaoFeng Wang , Xiao Gu Shape recognition based on neural networks trained by differential evolution algorithm. [Citation Graph (0, 0)][DBLP ] Neurocomputing, 2007, v:70, n:4-6, pp:896-903 [Journal ] Kotaro Hirasawa , XiaoFeng Wang , Junichi Murata , Jinglu Hu , Chunzhi Jin Universal learning network and its application to chaos control. [Citation Graph (0, 0)][DBLP ] Neural Networks, 2000, v:13, n:2, pp:239-253 [Journal ] Ji-Xiang Du , XiaoFeng Wang , Guo-Jun Zhang Leaf shape based plant species recognition. [Citation Graph (0, 0)][DBLP ] Applied Mathematics and Computation, 2007, v:185, n:2, pp:883-893 [Journal ] Shawn X. K. Hu , XiaoFeng Wang , Dan Martin Context Modeling to Enforce Interoperability in Web Service Definition. [Citation Graph (0, 0)][DBLP ] IEEE SCC, 2007, pp:674-675 [Conf ] Zhuowei Li , XiaoFeng Wang , Jong Youl Choi SpyShield: Preserving Privacy from Spy Add-Ons. [Citation Graph (0, 0)][DBLP ] RAID, 2007, pp:296-316 [Conf ] Dherar Rezk , Xiao Feng Wang Improved Layered Space Time Architecture Through Unequal Power Allocation and Multistage Decoding. [Citation Graph (0, 0)][DBLP ] CCECE, 2006, pp:932-935 [Conf ] Automatically Organize Web Text Resources with Frequent Term Tree. [Citation Graph (, )][DBLP ] Reliability-Driven Reputation Based Scheduling for Public-Resource Computing Using GA. [Citation Graph (, )][DBLP ] Reliability-Oriented Genetic Algorithm for Workflow Applications Using Max-Min Strategy. [Citation Graph (, )][DBLP ] Towards automatic reverse engineering of software security configurations. [Citation Graph (, )][DBLP ] Privacy-preserving genomic computation through program specialization. [Citation Graph (, )][DBLP ] Learning your identity and disease from research papers: information leaks in genome wide association study. [Citation Graph (, )][DBLP ] A Hase-based SAKA Protocol Algorithm. [Citation Graph (, )][DBLP ] A new room decoration assistance system based on 3D reconstruction and integrated service. [Citation Graph (, )][DBLP ] AGIS: Towards automatic generation of infection signatures. [Citation Graph (, )][DBLP ] Period and Deadline Selection for Schedulability in Real-Time Systems. [Citation Graph (, )][DBLP ] Mitigating Inadvertent Insider Threats with Incentives. [Citation Graph (, )][DBLP ] A Granular Ranking Algorithm for Mining Market Values. [Citation Graph (, )][DBLP ] A Novel Data Purification Algorithm Based on Outlier Mining. [Citation Graph (, )][DBLP ] Decentralized Event-Triggered Broadcasts over Networked Control Systems. [Citation Graph (, )][DBLP ] Event-Triggering in Distributed Networked Systems with Data Dropouts and Delays. [Citation Graph (, )][DBLP ] Multiple Classification of Plant Leaves Based on Gabor Transform and LBP Operator. [Citation Graph (, )][DBLP ] Recognition of Plant Leaves Using Support Vector Machine. [Citation Graph (, )][DBLP ] Automated Segmentation Using a Fast Implementation of the Chan-Vese Models. [Citation Graph (, )][DBLP ] Minimum Distortion Look-Up Table Based Data Hiding. [Citation Graph (, )][DBLP ] A new localized superpixel Markov random field for image segmentation. [Citation Graph (, )][DBLP ] Automatically face detection based on BP neural network and Bayesian decision. [Citation Graph (, )][DBLP ] PRECIP: Towards Practical and Retrofittable Confidential Information Protection. [Citation Graph (, )][DBLP ] An Improved ID-based Restrictive Partially Blind Signature Scheme. [Citation Graph (, )][DBLP ] Side-Channel Leaks in Web Applications: A Reality Today, a Challenge Tomorrow. [Citation Graph (, )][DBLP ] Panalyst: Privacy-Aware Remote Error Analysis on Commodity Software . [Citation Graph (, )][DBLP ] Making CAPTCHAs clickable. [Citation Graph (, )][DBLP ] Where Agile Research Meets Industry Needs: Starting from a 10-Year Retrospective. [Citation Graph (, )][DBLP ] So You Think You're Agile? [Citation Graph (, )][DBLP ] Research on the Video Segmentation Method with Integrated Multi-features Based on GMM. [Citation Graph (, )][DBLP ] Maritime information engine. [Citation Graph (, )][DBLP ] Pattern Recognition Method based on the Attribute Computing Network. [Citation Graph (, )][DBLP ] Granular Computing-based Qualitative Criterion Cluster and the License Plate Characters' Recognition. [Citation Graph (, )][DBLP ] Context-Based Semantic Approach to Ontology Creation of Maritime Information in Chinese. [Citation Graph (, )][DBLP ] Improved layered space time architecture over quasi-static fading channels with unequal power allocation and multistage decoding. [Citation Graph (, )][DBLP ] QAM-MIMO Signal Detection Using Semidefinite Programming Relaxation. [Citation Graph (, )][DBLP ] Error Performance of Linear Dispersion Codes. [Citation Graph (, )][DBLP ] Message Substitute Attack on Concurrent Signatures Protocol and its Improvement. [Citation Graph (, )][DBLP ] A New Certificateless Electronic Cash Scheme with Multiple Banks Based on Group Signatures. [Citation Graph (, )][DBLP ] Granular Ranking Algorithm Based on Rough Sets. [Citation Graph (, )][DBLP ] ID-Based Authenticated Multi-party Key Agreement Protocol to Multimedia Applications Systems. [Citation Graph (, )][DBLP ] ID-Based Convertible Limited (Multi-)Verifier Signature Scheme. [Citation Graph (, )][DBLP ] Event design in event-triggered feedback control systems. [Citation Graph (, )][DBLP ] A new implementation of trellis coded quantization based data hiding. [Citation Graph (, )][DBLP ] A Security Architecture for Grid-Based Distributed Simulation Platform. [Citation Graph (, )][DBLP ] Exploratory analysis of protein translation regulatory networks using hierarchical random graphs. [Citation Graph (, )][DBLP ] Modeling language and tools for the semantic link network. [Citation Graph (, )][DBLP ] Nowhere-zero 4-flow in almost Petersen-minor free graphs. [Citation Graph (, )][DBLP ] A note on Berge-Fulkerson coloring. [Citation Graph (, )][DBLP ] Search in 0.003secs, Finished in 0.452secs