Chenxi Wang

According to our database1, Chenxi Wang authored at least 39 papers between 1996 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Feature selection for multi-label learning with missing labels.
Appl. Intell., 2019

Efficient Ridesharing Order Dispatching with Mean Field Multi-Agent Reinforcement Learning.
Proceedings of the World Wide Web Conference, 2019

Panthera: holistic memory management for big data processing over hybrid memories.
Proceedings of the 40th ACM SIGPLAN Conference on Programming Language Design and Implementation, 2019

2018
NVM Streaker: a fast and reconfigurable performance simulator for non-volatile memory-based memory architecture.
The Journal of Supercomputing, 2018

Online Multi-label Group Feature Selection.
Knowl.-Based Syst., 2018

Attribute reduction for multi-label learning with fuzzy rough set.
Knowl.-Based Syst., 2018

An Attribute Reduction Algorithm Based on the Maximum Dependency and Minimum Redundancy of Attribute.
Proceedings of the 14th International Conference on Natural Computation, 2018

2017
The classification of imbalanced large data sets based on MapReduce and ensemble of ELM classifiers.
Int. J. Machine Learning & Cybernetics, 2017

Influence of linear and nonlinear aerodynamic models on parameter identification for aircraft.
Proceedings of the International Conference on Control, 2017

2016
A Novel Hybrid Error Criterion-Based Active Control Method for on-Line Milling Vibration Suppression with Piezoelectric Actuators and Sensors.
Sensors, 2016

Efficient Management for Hybrid Memory in Managed Language Runtime.
Proceedings of the Network and Parallel Computing, 2016

2015
Cloud Security: The Industry Landscape and the Lure of Zero-Knowledge Protection.
Proceedings of the 2015 ACM Workshop on Cloud Computing Security Workshop, 2015

2013
Automatic Correspondence Finding for Chinese Characters Using Graph Matching.
Proceedings of the Seventh International Conference on Image and Graphics, 2013

2012
Investigation of fluorine containing plasma activation for room-temperature bonding of Si-based materials.
Microelectronics Reliability, 2012

Nanoadhesion layer for enhanced Si-Si and Si-SiN wafer bonding.
Microelectronics Reliability, 2012

A Polyhedral Modeling Based Source-to-Source Code Optimization Framework for GPGPU.
Proceedings of the 26th IEEE International Parallel and Distributed Processing Symposium Workshops & PhD Forum, 2012

2011
Evaluating the potential of graphics processors for high performance embedded computing.
Proceedings of the Design, Automation and Test in Europe, 2011

2008
Epidemic thresholds in real networks.
ACM Trans. Inf. Syst. Secur., 2008

Self-optimizing distributed trees.
Proceedings of the 22nd IEEE International Symposium on Parallel and Distributed Processing, 2008

A Target Recognition Method of Multi-radar.
Proceedings of the Fifth International Conference on Fuzzy Systems and Knowledge Discovery, 2008

2007
SWorD - A Simple Worm Detection Scheme.
Proceedings of the On the Move to Meaningful Internet Systems 2007: CoopIS, 2007

2006
M2: Multicasting Mixes for Efficient and Anonymous Communication.
Proceedings of the 26th IEEE International Conference on Distributed Computing Systems (ICDCS 2006), 2006

Adaptive Detection of Local Scanners.
Proceedings of the Applied Cryptography and Network Security, 4th International Conference, 2006

2005
Undergraduate embedded system education at Carnegie Mellon.
ACM Trans. Embedded Comput. Syst., 2005

Distributed Construction of a Fault-Tolerant Network from a Tree.
Proceedings of the 24th IEEE Symposium on Reliable Distributed Systems (SRDS 2005), 2005

Empirical Analysis of Rate Limiting Mechanisms.
Proceedings of the Recent Advances in Intrusion Detection, 8th International Symposium, 2005

Censorship Resistance Revisited.
Proceedings of the Information Hiding, 7th International Workshop, 2005

2004
A study of mass-mailing worms.
Proceedings of the 2004 ACM Workshop on Rapid Malcode, 2004

Timing Attacks in Low-Latency Mix Systems (Extended Abstract).
Proceedings of the Financial Cryptography, 2004

Dynamic Quarantine of Internet Worms.
Proceedings of the 2004 International Conference on Dependable Systems and Networks (DSN 2004), 28 June, 2004

2003
Modeling the effects of timing parameters on virus propagation.
Proceedings of the 2003 ACM Workshop on Rapid Malcode, 2003

Epidemic Spreading in Real Networks: An Eigenvalue Viewpoint.
Proceedings of the 22nd Symposium on Reliable Distributed Systems (SRDS 2003), 2003

The Design and Implementation of a JCA-Compliant Capture Protection Infrastructure.
Proceedings of the 22nd Symposium on Reliable Distributed Systems (SRDS 2003), 2003

2002
Verifiable Secret Redistribution for Archive System.
Proceedings of the First International IEEE Security in Storage Workshop, 2002

2001
Protection of Software-Based Survivability Mechanisms.
Proceedings of the 2001 International Conference on Dependable Systems and Networks (DSN 2001) (formerly: FTCS), 2001

2000
On Computer Viral Infection and the Effect of Immunization.
Proceedings of the 16th Annual Computer Security Applications Conference (ACSAC 2000), 2000

1999
A new model of security for metasystems.
Future Generation Comp. Syst., 1999

Towards a Scalable PKI for Electronic Commerce Systems.
Proceedings of the First International Workshop on Advance Issues of E-Commerce and Web-Based Information Systems, 1999

1996
A new model of security for distributed systems.
Proceedings of the 1996 Workshop on New Security Paradigms, 1996


  Loading...