Dongxia Wang

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Known people with the same name:

Bibliography

2025
The Fast Inertial ADMM optimization framework for distributed machine learning.
Future Gener. Comput. Syst., 2025

2024
Agents4PLC: Automating Closed-loop PLC Code Generation and Verification in Industrial Control Systems using LLM-based Agents.
CoRR, 2024

Characterizing and Evaluating the Reliability of LLMs against Jailbreak Attacks.
CoRR, 2024

FAMCF: A few-shot Android malware family classification framework.
Comput. Secur., 2024

2023
A Neural Network-Based Method for Surface Metallization of Polymer Materials.
J. Circuits Syst. Comput., August, 2023

2022
A Method of Whole-Network Adjustment for Clock Offset Based on Satellite-Ground and Inter-Satellite Link Observations.
Remote. Sens., 2022

Preliminary Analysis and Evaluation of BDS-3 RDSS Timing Performance.
Remote. Sens., 2022

Uncertainty Evaluation of Circularity Error Measurement Based on Coordinate Measuring Machine.
Proceedings of the RobCE 2022: 2nd International Conference on Robotics and Control Engineering, Nanjing, China, March 25, 2022

Automatic Grading of Student Code with Similarity Measurement.
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2022

Distributed ADMM Based on Sparse Computation and Allreduce Communication.
Proceedings of the IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2022

2021
A Comparison of Code Embeddings and Beyond.
CoRR, 2021

2016
Improved shifted robust soliton distribution.
IET Commun., 2016

Empirical Study of Phase Transition of Hamiltonian Cycle Problem in Random Graphs with Degrees Greater Than One.
Proceedings of the Frontiers in Algorithmics, 10th International Workshop, 2016

2015
Quantifying and Improving the Robustness of Trust Systems.
Proceedings of the Twenty-Fourth International Joint Conference on Artificial Intelligence, 2015

An Anomaly Detection Model for Network Intrusions Using One-Class SVM and Scaling Strategy.
Proceedings of the Collaborative Computing: Networking, Applications, and Worksharing, 2015

2008
Data-Flow Based Analysis of Java Bytecode Vulnerability.
Proceedings of the Ninth International Conference on Web-Age Information Management, 2008


  Loading...