default search action
Dongxia Wang 0001
Person information
- affiliation: National Key Laboratory of Science and Technology on Information System Security, Beijing, China
Other persons with the same name
- Dongxia Wang — disambiguation page
- Dongxia Wang 0002 — Zhejiang University, China (and 2 more)
- Dongxia Wang 0003 — Shanghai University, Shanghai, China
- Dongxia Wang 0004 — Anhui Normal University, Wuhu, China
- Dongxia Wang 0005 — Liaoning University of Technology, School of Electronic and Information Engineering, Jinzhou, China (and 1 more)
- Dongxia Wang 0006 — Tianjin University of Technology and Education, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c21]Yaning Zheng, Dongxia Wang, Huayang Cao, Cheng Qian, Xiaohui Kuang, Honglin Zhuang:
A Study on Vulnerability Code Labeling Method in Open-Source C Programs. DEXA (1) 2023: 52-67 - [c20]Chongyang Zhao, Hu Li, Dongxia Wang, Ruiqi Liu:
Adversarial Example Detection for Deep Neural Networks: A Review. DSC 2023: 468-475 - 2022
- [c19]Menghua Cao, Dongxia Wang, Yulong Wang:
AAT: An Efficient Adaptive Adversarial Training Algorithm. IPMV 2022: 110-114 - 2021
- [c18]Yaning Zheng, Kaiqi Ru, Xuewei Feng, Dongxia Wang:
The Overview of SPIN in Software Model Checking. DSC 2021: 654-661 - [c17]Kaiqi Ru, Yaning Zheng, Xuewei Feng, Dongxia Wang:
The Side-Channel Vulnerability in Network Protocol. ICCNS 2021: 1-8 - 2020
- [c16]Xuewei Feng, Dongxia Wang, Zhechao Lin, Xiaohui Kuang, Gang Zhao:
Enhancing Randomization Entropy of x86-64 Code while Preserving Semantic Consistency. TrustCom 2020: 1-12
2010 – 2019
- 2019
- [c15]Xuewei Feng, Dongxia Wang, Zhechao Lin:
An Approach of Code Pointer Hiding Based on a Resilient Area. CBD 2019: 204-209 - [c14]Jinjing Zhao, Yan Wen, Xiang Li, Ling Pang, Xiaohui Kuang, Dongxia Wang:
A heuristic fuzz test generator for Java native interface. SQUADE@ESEC/SIGSOFT FSE 2019: 1-7 - 2018
- [c13]Jingzhe Zhang, Xuewei Feng, Dongxia Wang, Liang Ming:
Web Service Applying Moving Target Defense. DSC 2018: 640-645 - [c12]Jingzhe Zhang, Dongxia Wang, Xuewei Feng:
A Comparison of Moving Target Defense Strategies. MASS 2018: 543-547 - 2017
- [j4]Yazhou Hu, Bo Deng, Wangqun Lin, Fuyang Peng, Dongxia Wang:
云计算弹性测试研究 (Study on Testing Cloud Computing Elasticity). 计算机科学 44(7): 8-15 (2017) - 2016
- [c11]Yazhou Hu, Bo Deng, Fuyang Peng, Dongxia Wang, Yu Yang:
PANP-GM: A Periodic Adaptive Neighbor Workload Prediction Model Based on Grey Forecasting for Cloud Resource Provisioning. CollaborateCom 2016: 273-285 - [c10]Yazhou Hu, Bo Deng, Yu Yang, Dongxia Wang:
Elasticity Evaluation of IaaS Cloud Based on Mixed Workloads. ISPDC 2016: 157-164 - 2015
- [j3]Bin Hong, Fuyang Peng, Bo Deng, Yazhou Hu, Dongxia Wang:
DAC-Hmm: detecting anomaly in cloud systems with hidden Markov models. Concurr. Comput. Pract. Exp. 27(18): 5749-5764 (2015) - [j2]Liang Ming, Gang Zhao, Dongxia Wang, Minhuan Huang, Xiang Li, Qing Miao, Fei Xu:
A Novel Method for Survivability Test Based on End Nodes in Large Scale Network. KSII Trans. Internet Inf. Syst. 9(2): 620-636 (2015) - 2014
- [c9]Jiemei Zeng, Xuewei Feng, Dongxia Wang, Lan Fang:
Implemention of Cyber Security Situation Awareness Based on Knowledge Discovery with Trusted Computer. APWeb Workshophs 2014: 225-234 - [c8]Xuewei Feng, Dongxia Wang, Minhuan Huang, Xiao Xia Sun:
An Approach of Discovering Causal Knowledge for Alert Correlating Based on Data Mining. DASC 2014: 57-62 - 2013
- [c7]Lingxia Liu, Dongxia Wang, Jinjing Zhao, Minhuan Huang:
SA4WSs: A Security Architecture for Web Services. ICT-EurAsia 2013: 306-311 - 2012
- [c6]Chunlei Wang, Lan Fang, Yiqi Dai, Liang Ming, Qing Miao, Dongxia Wang:
Network Survivability Evaluation Model Based on Immune Evolution and Multiple Criteria Decision Making. CyberC 2012: 178-184 - [c5]Yan Wen, Jinjing Zhao, Gang Zhao, Hua Chen, Dongxia Wang:
A Survey of Virtualization Technologies Focusing on Untrusted Code Execution. IMIS 2012: 378-383 - 2011
- [j1]Chunlei Wang, Liang Ming, Jinjing Zhao, Dongxia Wang:
A General Framework for Network Survivability Testing and Evaluation. J. Networks 6(6): 831-841 (2011) - [c4]Jinjing Zhao, Yan Wen, Dongxia Wang:
A Network Security Evaluation Method Framework Based on Multiple Criteria Decision Making Theory. IMIS 2011: 371-375 - [c3]Xuewei Feng, Dongxia Wang, Shanwen Ke, Guoqing Ma, Jin Li:
A Framework of Network Security Situation Analysis Based on the Technologies of Event Correlation and Situation Assessment. IMIS 2011: 376-380 - [c2]Liang Ming, Minhuan Huang, Dongxia Wang, Xiaohui Kuang, Chunlei Wang, Xuewei Feng:
Research on survivability metrics based on survivable process of network system. SIN 2011: 247-250 - 2010
- [c1]Xuewei Feng, Dongxia Wang, Jiemei Zeng, Guoqing Ma, Jin Li:
Analyzing and Correlating Security Events Using State Machine. CIT 2010: 2849-2854
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-10 20:46 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint