Xinran Wang
Citeras av
Citeras av
An OWL-based context model in intelligent environments
T Gu, XH Wang, HK Pung, DQ Zhang
Communication Networks and Distributed Systems Modeling and Simulation …, 2004
SDAP: A secure hop-by-hop data aggregation protocol for sensor networks
Y Yang, X Wang, S Zhu, G Cao
ACM Transactions on Information and System Security (TISSEC) 11 (4), 18, 2008
Amino acid availability regulates p70 S6 kinase and multiple translation factors
X Wang, LE Campbell, CM Miller, CG Proud
Biochemical Journal 335 (3), 711-711, 1998
Sigfree: A signature-free buffer overflow attack blocker
X Wang, CC Pan, P Liu, S Zhu
Dependable and Secure Computing, IEEE Transactions on 7 (1), 65-79, 2010
The Bikou basalts in the northwestern Yangtze block
XC Wang, XH Li, XW Li, ZX Li, Y Liu, YH Yang, XR Liang, XL Tu
South China: Remnants of, 820-810, 2008
Distributed software-based attestation for node compromise detection in sensor networks
Y Yang, X Wang, S Zhu, G Cao
Reliable Distributed Systems, 2007. SRDS 2007. 26th IEEE International …, 2007
540 V. Nair. 2009. A functional MicroRNA-155 ortholog encoded by the oncogenic 541 Marek's disease virus
Y Zhao, Y Yao, H Xu, L Lambeth, LP Smith, L Kgosana, X Wang
J Virol 83, 489-92, 0
MKLu, YX Yan, FQ Meng, SY Guo, GH Zhang, MH Jiang
XQ Wang, D Xu, DR Yuan, YP Tian, WT Yu, SY Sun, ZH Yang, Q Fang
Mater. Res. Bull 34, 2003, 1999
Heuristic botnet detection
X Wang, H Xie
US Patent 8,555,388, 2013
Behavior based software theft detection
X Wang, YC Jhi, S Zhu, P Liu
Proceedings of the 16th ACM conference on Computer and communications …, 2009
Detecting software theft via system call based birthmarks
X Wang, YC Jhi, S Zhu, P Liu
Computer Security Applications Conference, 2009. ACSAC'09. Annual, 149-158, 2009
Value-based program characterization and its application to software plagiarism detection
YC Jhi, X Wang, X Jia, S Zhu, P Liu, D Wu
Proceedings of the 33rd International Conference on Software Engineering …, 2011
Perfluorinated and polyfluorinated compounds in lake food webs from the Canadian high arctic
GL Lescord, KA Kidd, AO De Silva, M Williamson, C Spencer, X Wang, ...
Environmental science & technology 49 (5), 2694-2702, 2015
Still: Exploit code detection via static taint and initialization analyses
X Wang, YC Jhi, S Zhu, P Liu
Computer Security Applications Conference, 2008. ACSAC 2008. Annual, 289-298, 2008
Down-regulation of Par-3 expression and disruption of Par complex integrity by TGF-β during the process of epithelial to mesenchymal transition in rat proximal epithelial cells
X Yu, X Wang, J Nie, Q Zhou, W Liu, F Zhu, W Chen, H Mao, N Luo, ...
Elsevier, 2008
Studies on the electrochemical properties of MlNi sub 4. 3-x Co sub x Al sub 0. 7 hydride alloy electrodes
H Pan, J Ma, C Wang, S Chen, X Wang, C Chen, Q Wang
Journal of Alloys and Compounds(Switzerland) 293, 648-652, 1998
Method and apparatus for performing a search
X Wang, B Acton, V Panchapakesan
US Patent 9,201,963, 2015
Microstructure and solidification behavior of multicomponent CoCrCuxFeMoNi high-entropy alloys
PH Wu, N Liu, W Yang, ZX Zhu, YP Lu, XJ Wang
Materials Science and Engineering: A 642, 142-149, 2015
Malware family identification using profile signatures
K Sanders, X Wang
US Patent 9,165,142, 2015
Fast depth map generation for 2D to 3D conversion
J Wei, X Tu, X Wang, A Berestov
US Patent 8,472,746, 2013
Systemet kan inte utföra åtgärden just nu. Försök igen senare.
Artiklar 1–20