Dongxia Wang

According to our database1, Dongxia Wang authored at least 31 papers between 2005 and 2017.

Collaborative distances :
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2017
Multi-source trust revision.
Proceedings of the 20th International Conference on Information Fusion, 2017

Multi-source fusion in subjective logic.
Proceedings of the 20th International Conference on Information Fusion, 2017

2016
Improved shifted robust soliton distribution.
IET Communications, 2016

Elasticity Evaluation of IaaS Cloud Based on Mixed Workloads.
Proceedings of the 15th International Symposium on Parallel and Distributed Computing, 2016

How to Use Information Theory to Mitigate Unfair Rating Attacks.
Proceedings of the Trust Management X - 10th IFIP WG 11.11 International Conference, 2016

Empirical Study of Phase Transition of Hamiltonian Cycle Problem in Random Graphs with Degrees Greater Than One.
Proceedings of the Frontiers in Algorithmics, 10th International Workshop, 2016

PANP-GM: A Periodic Adaptive Neighbor Workload Prediction Model Based on Grey Forecasting for Cloud Resource Provisioning.
Proceedings of the Collaborate Computing: Networking, Applications and Worksharing, 2016

Is It Harmful When Advisors Only Pretend to Be Honest?
Proceedings of the Thirtieth AAAI Conference on Artificial Intelligence, 2016

2015
A Novel Method for Survivability Test Based on End Nodes in Large Scale Network.
TIIS, 2015

DAC-Hmm: detecting anomaly in cloud systems with hidden Markov models.
Concurrency and Computation: Practice and Experience, 2015

Information Theory for Subjective Logic.
Proceedings of the Modeling Decisions for Artificial Intelligence, 2015

Quantifying Robustness of Trust Systems against Collusive Unfair Rating Attacks Using Information Theory.
Proceedings of the Twenty-Fourth International Joint Conference on Artificial Intelligence, 2015

Quantifying and Improving the Robustness of Trust Systems.
Proceedings of the Twenty-Fourth International Joint Conference on Artificial Intelligence, 2015

An Anomaly Detection Model for Network Intrusions Using One-Class SVM and Scaling Strategy.
Proceedings of the Collaborative Computing: Networking, Applications, and Worksharing, 2015

Using Information Theory to Improve the Robustness of Trust Systems.
Proceedings of the 2015 International Conference on Autonomous Agents and Multiagent Systems, 2015

Quantifying and Improving Robustness of Trust Systems.
Proceedings of the 2015 International Conference on Autonomous Agents and Multiagent Systems, 2015

2014
Towards Robust and Effective Trust Management for Security: A Survey.
Proceedings of the 13th IEEE International Conference on Trust, 2014

An Approach of Discovering Causal Knowledge for Alert Correlating Based on Data Mining.
Proceedings of the IEEE 12th International Conference on Dependable, 2014

Implemention of Cyber Security Situation Awareness Based on Knowledge Discovery with Trusted Computer.
Proceedings of the Web Technologies and Applications, 2014

2013
Towards tags ranking for social images.
Neurocomputing, 2013

SA4WSs: A Security Architecture for Web Services.
Proceedings of the Information and Communicatiaon Technology - International Conference, 2013

2012
Optimizing social image search with multiple criteria: Relevance, diversity, and typicality.
Neurocomputing, 2012

A Survey of Virtualization Technologies Focusing on Untrusted Code Execution.
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012

Network Survivability Evaluation Model Based on Immune Evolution and Multiple Criteria Decision Making.
Proceedings of the 2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2012

2011
A General Framework for Network Survivability Testing and Evaluation.
JNW, 2011

Research on survivability metrics based on survivable process of network system.
Proceedings of the 4th International Conference on Security of Information and Networks, 2011

A Network Security Evaluation Method Framework Based on Multiple Criteria Decision Making Theory.
Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011

A Framework of Network Security Situation Analysis Based on the Technologies of Event Correlation and Situation Assessment.
Proceedings of the Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2011

2010
Analyzing and Correlating Security Events Using State Machine.
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010

2008
Data-Flow Based Analysis of Java Bytecode Vulnerability.
Proceedings of the Ninth International Conference on Web-Age Information Management, 2008

2005
A Subband Adaptive Learning Algorithm for Microphone Array Based Speech Enhancement.
Proceedings of the Advances in Neural Networks - ISNN 2005, Second International Symposium on Neural Networks, Chongqing, China, May 30, 2005


  Loading...