Dongxia Wang

Affiliations:
  • National Key Laboratory of Science and Technology on Information System Security, Beijing, China


According to our database1, Dongxia Wang authored at least 25 papers between 2010 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Adversarial Example Detection for Deep Neural Networks: A Review.
Proceedings of the 8th International Conference on Data Science in Cyberspace, 2023

A Study on Vulnerability Code Labeling Method in Open-Source C Programs.
Proceedings of the Database and Expert Systems Applications, 2023

2022
AAT: An Efficient Adaptive Adversarial Training Algorithm.
Proceedings of the IPMV 2022: 4th International Conference on Image Processing and Machine Vision, Hong Kong, SAR, China, March 25, 2022

2021
The Side-Channel Vulnerability in Network Protocol.
Proceedings of the ICCNS 2021: The 11th International Conference on Communication and Network Security, Weihai, China, December 3, 2021

The Overview of SPIN in Software Model Checking.
Proceedings of the Sixth IEEE International Conference on Data Science in Cyberspace, 2021

2020
Enhancing Randomization Entropy of x86-64 Code while Preserving Semantic Consistency.
Proceedings of the 19th IEEE International Conference on Trust, 2020

2019
A heuristic fuzz test generator for Java native interface.
Proceedings of the 2nd ACM SIGSOFT International Workshop on Software Qualities and Their Dependencies, 2019

An Approach of Code Pointer Hiding Based on a Resilient Area.
Proceedings of the Seventh International Conference on Advanced Cloud and Big Data, 2019

2018
A Comparison of Moving Target Defense Strategies.
Proceedings of the 15th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2018

Web Service Applying Moving Target Defense.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018

2017
云计算弹性测试研究 (Study on Testing Cloud Computing Elasticity).
计算机科学, 2017

2016
Elasticity Evaluation of IaaS Cloud Based on Mixed Workloads.
Proceedings of the 15th International Symposium on Parallel and Distributed Computing, 2016

PANP-GM: A Periodic Adaptive Neighbor Workload Prediction Model Based on Grey Forecasting for Cloud Resource Provisioning.
Proceedings of the Collaborate Computing: Networking, Applications and Worksharing, 2016

2015
A Novel Method for Survivability Test Based on End Nodes in Large Scale Network.
KSII Trans. Internet Inf. Syst., 2015

DAC-Hmm: detecting anomaly in cloud systems with hidden Markov models.
Concurr. Comput. Pract. Exp., 2015

2014
An Approach of Discovering Causal Knowledge for Alert Correlating Based on Data Mining.
Proceedings of the IEEE 12th International Conference on Dependable, 2014

Implemention of Cyber Security Situation Awareness Based on Knowledge Discovery with Trusted Computer.
Proceedings of the Web Technologies and Applications, 2014

2013
SA4WSs: A Security Architecture for Web Services.
Proceedings of the Information and Communicatiaon Technology - International Conference, 2013

2012
A Survey of Virtualization Technologies Focusing on Untrusted Code Execution.
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012

Network Survivability Evaluation Model Based on Immune Evolution and Multiple Criteria Decision Making.
Proceedings of the 2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2012

2011
A General Framework for Network Survivability Testing and Evaluation.
J. Networks, 2011

Research on survivability metrics based on survivable process of network system.
Proceedings of the 4th International Conference on Security of Information and Networks, 2011

A Network Security Evaluation Method Framework Based on Multiple Criteria Decision Making Theory.
Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011

A Framework of Network Security Situation Analysis Based on the Technologies of Event Correlation and Situation Assessment.
Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011

2010
Analyzing and Correlating Security Events Using State Machine.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010


  Loading...