Dongbin Wang

Orcid: 0009-0009-9495-3374

According to our database1, Dongbin Wang authored at least 36 papers between 2008 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A Smart Contract Vulnerability Detection System Based on BERT Model and Fuzz Testing.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2024

An Efficient Smart Contracts Event Ordering Vulnerability Detection System Based on Symbolic Execution and Fuzz Testing.
Proceedings of the Innovative Mobile and Internet Services in Ubiquitous Computing, 2024

Developing a Multi-phase Stakeholder Game Framework for Recyclable Resource Management System.
Proceedings of the Human-Centric Decision and Negotiation Support for Societal Transitions, 2024

Hash Time Lock with Dynamic Premium Based on Credit in Cross-Chain Transaction.
Proceedings of the IEEE International Conference on Blockchain, 2024

WBRP: Consensus Algorithm Based on Weak Proof of Work.
Proceedings of the IEEE International Conference on Blockchain, 2024

A Dynamic Sharding Scheme For Blockchain Based On Graph Partitioning.
Proceedings of the IEEE International Conference on Blockchain, 2024

2023
Evicting and filling attack for linking multiple network addresses of Bitcoin nodes.
Cybersecur., December, 2023

DoSDefender: A Kernel-Mode TCP DoS Prevention in Software-Defined Networking.
Sensors, 2023

2022
A microservice based generic consensus engine for BaaS.
Proceedings of the IEEE International Conference on Industrial Technology, 2022

Privacy-preserving Trajectory Generation Algorithm Considering Utility based on Semantic Similarity Awareness.
Proceedings of the IEEE International Conference on Communications, 2022

Cross-Security Domain Dynamic Orchestration Algorithm of Network Security Functions.
Proceedings of the 7th IEEE International Conference on Data Science in Cyberspace, 2022

A Hybrid Routing Mutation Mechanism based on Mutation Cost and Resource Trustworthiness in Network Moving Target Defense.
Proceedings of the 7th IEEE International Conference on Data Science in Cyberspace, 2022

2020
A Trusted Resource-Based Routing Algorithm With Entropy Estimation in Integrated Space-Terrestrial Network.
IEEE Access, 2020

2019
A Weighted PageRank-Based Algorithm for Virtual Machine Placement in Cloud Computing.
IEEE Access, 2019

An Effective Load Balance Using Link Bandwidth for SDN-Based Data Centers.
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019

Fast Failover for Link Failures in Software Defined Networks.
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019

A Congestion Control Methodology with Probability Routing Based on MNL for Datacenter Network.
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019

Towards Multi-Controller Placement for SDN Based on Density Peaks Clustering.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

2018
Spatiotemporal Cyberspace Situation Awareness Mechanism for Backbone Networks.
Proceedings of the 4th International Conference on Big Data Computing and Communications, 2018

2017
Implementing an Inference Engine for RDFS/OWL Constructs and User-Defined Rules in HBase.
Proceedings of the 13th International Conference on Semantics, Knowledge and Grids, 2017

A Virtual Machine Migration Algorithm Based on Group Selection in Cloud Data Center.
Proceedings of the Network and Parallel Computing, 2017

An Energy Efficient Virtual Machine Placement Algorithm Based on Graph Partitioning in Cloud Data Center.
Proceedings of the 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), 2017

An SDN controlled self-optimizing approach in circular array equipped small cells.
Proceedings of the 17th International Symposium on Communications and Information Technologies, 2017

Collaborative filtering recommendation algorithm optimization based on latent factor model clustering.
Proceedings of the 13th International Conference on Natural Computation, 2017

Cross-site Scripting Attacks on Android Hybrid Applications.
Proceedings of the 2017 International Conference on Cryptography, Security and Privacy, 2017

A Group-Based Replica Consistency Schema for Cloud Storage.
Proceedings of the Cloud Computing and Security - Third International Conference, 2017

A Credibility Evaluation Method in Opportunistic Networks.
Proceedings of the Cloud Computing and Security - Third International Conference, 2017

Cloud Multimedia Files Assured Deletion Based on Bit Stream Transformation with Chaos Sequence.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2017

UR Rank: Micro-blog User Influence Ranking Algorithm Based on User Relationship.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2017

Ranking the Influence of Micro-blog Users Based on Activation Forwarding Relationship.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2017

2016
An Optimal Controller Design for CPS with Stochastic Time Delay.
Proceedings of the 12th International Conference on Mobile Ad-Hoc and Sensor Networks, 2016

An Effective Buffer Management Policy for Opportunistic Networks.
Proceedings of the Collaborate Computing: Networking, Applications and Worksharing, 2016

A Decision Level Fusion Algorithm for Time Series in Cyber Physical System.
Proceedings of the Big Data Computing and Communications - Second International Conference, 2016

2014
Design and Performance Analysis of Utility Maximization-Based Cooperative MAC in Multi-rate WiFi Networks.
Proceedings of the Trustworthy Computing and Services - International Conference, 2014

2010
Open Source Policy and Promotion of IT Industries in East Asia.
Proceedings of the Open Source Software: New Horizons, 2010

2008
A Survey of Secure Routing in Ad Hoc Networks.
Proceedings of the Ninth International Conference on Web-Age Information Management, 2008


  Loading...