An OWL-based context model in intelligent environments T Gu, XH Wang, HK Pung, DQ Zhang Communication Networks and Distributed Systems Modeling and Simulation …, 2004 | 743* | 2004 |
SDAP: A secure hop-by-hop data aggregation protocol for sensor networks Y Yang, X Wang, S Zhu, G Cao ACM Transactions on Information and System Security (TISSEC) 11 (4), 18, 2008 | 590 | 2008 |
Amino acid availability regulates p70 S6 kinase and multiple translation factors X Wang, LE Campbell, CM Miller, CG Proud Biochemical Journal 335 (3), 711-711, 1998 | 371 | 1998 |
Sigfree: A signature-free buffer overflow attack blocker X Wang, CC Pan, P Liu, S Zhu Dependable and Secure Computing, IEEE Transactions on 7 (1), 65-79, 2010 | 190 | 2010 |
The Bikou basalts in the northwestern Yangtze block XC Wang, XH Li, XW Li, ZX Li, Y Liu, YH Yang, XR Liang, XL Tu South China: Remnants of, 820-810, 2008 | 184* | 2008 |
Distributed software-based attestation for node compromise detection in sensor networks Y Yang, X Wang, S Zhu, G Cao Reliable Distributed Systems, 2007. SRDS 2007. 26th IEEE International …, 2007 | 169 | 2007 |
540 V. Nair. 2009. A functional MicroRNA-155 ortholog encoded by the oncogenic 541 Marek's disease virus Y Zhao, Y Yao, H Xu, L Lambeth, LP Smith, L Kgosana, X Wang J Virol 83, 489-92, 0 | 169* | |
MKLu, YX Yan, FQ Meng, SY Guo, GH Zhang, MH Jiang XQ Wang, D Xu, DR Yuan, YP Tian, WT Yu, SY Sun, ZH Yang, Q Fang Mater. Res. Bull 34, 2003, 1999 | 168* | 1999 |
Heuristic botnet detection X Wang, H Xie US Patent 8,555,388, 2013 | 148 | 2013 |
Behavior based software theft detection X Wang, YC Jhi, S Zhu, P Liu Proceedings of the 16th ACM conference on Computer and communications …, 2009 | 127 | 2009 |
Detecting software theft via system call based birthmarks X Wang, YC Jhi, S Zhu, P Liu Computer Security Applications Conference, 2009. ACSAC'09. Annual, 149-158, 2009 | 113 | 2009 |
Value-based program characterization and its application to software plagiarism detection YC Jhi, X Wang, X Jia, S Zhu, P Liu, D Wu Proceedings of the 33rd International Conference on Software Engineering …, 2011 | 94 | 2011 |
Perfluorinated and polyfluorinated compounds in lake food webs from the Canadian high arctic GL Lescord, KA Kidd, AO De Silva, M Williamson, C Spencer, X Wang, ... Environmental science & technology 49 (5), 2694-2702, 2015 | 87 | 2015 |
Still: Exploit code detection via static taint and initialization analyses X Wang, YC Jhi, S Zhu, P Liu Computer Security Applications Conference, 2008. ACSAC 2008. Annual, 289-298, 2008 | 79 | 2008 |
Down-regulation of Par-3 expression and disruption of Par complex integrity by TGF-β during the process of epithelial to mesenchymal transition in rat proximal epithelial cells X Yu, X Wang, J Nie, Q Zhou, W Liu, F Zhu, W Chen, H Mao, N Luo, ... Elsevier, 2008 | 76 | 2008 |
Studies on the electrochemical properties of MlNi sub 4. 3-x Co sub x Al sub 0. 7 hydride alloy electrodes H Pan, J Ma, C Wang, S Chen, X Wang, C Chen, Q Wang Journal of Alloys and Compounds(Switzerland) 293, 648-652, 1998 | 73* | 1998 |
Method and apparatus for performing a search X Wang, B Acton, V Panchapakesan US Patent 9,201,963, 2015 | 63* | 2015 |
Microstructure and solidification behavior of multicomponent CoCrCuxFeMoNi high-entropy alloys PH Wu, N Liu, W Yang, ZX Zhu, YP Lu, XJ Wang Materials Science and Engineering: A 642, 142-149, 2015 | 53 | 2015 |
Malware family identification using profile signatures K Sanders, X Wang US Patent 9,165,142, 2015 | 51 | 2015 |
Fast depth map generation for 2D to 3D conversion J Wei, X Tu, X Wang, A Berestov US Patent 8,472,746, 2013 | 51 | 2013 |