Guowei Dong

According to our database1, Guowei Dong authored at least 18 papers between 2005 and 2019.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Adaptive fuzzy control for pure-feedback systems with full state constraints and unknown nonlinear dead zone.
Applied Mathematics and Computation, 2019

2018
Fault detection and fuzzy tolerant control for complex stochastic multivariable nonlinear systems.
Neurocomputing, 2018

2017
Adaptive NNs Fault-Tolerant Control for Nonstrict-Feedback Nonlinear Systems.
Proceedings of the Advances in Neural Networks - ISNN 2017 - 14th International Symposium, 2017

2016
Design and implementation of software consistency detection system based on Netty framework.
Proceedings of the Advances on Broad-Band Wireless Computing, 2016

A program behavior recognition algorithm based on assembly instruction sequence similarity.
Proceedings of the Advances on Broad-Band Wireless Computing, 2016

2015
A practical off-line taint analysis framework and its application in reverse engineering of file format.
Computers & Security, 2015

2014
Modelling Analysis and Auto-detection of Cryptographic Misuse in Android Applications.
Proceedings of the IEEE 12th International Conference on Dependable, 2014

SymWalker: Symbolic Execution in Routines of Binary Code.
Proceedings of the Tenth International Conference on Computational Intelligence and Security, 2014

TWalker: An efficient taint analysis tool.
Proceedings of the 10th International Conference on Information Assurance and Security, 2014

Analysis on Password Protection in Android Applications.
Proceedings of the 2014 Ninth International Conference on P2P, 2014

2013
Taxonomy of Source Code Security Defects Based on Three-Dimension-Tree.
Proceedings of the Computer and Computing Technologies in Agriculture VII, 2013

Improved Plagiarism Detection Algorithm Based on Abstract Syntax Tree.
Proceedings of the 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies, 2013

FlowWalker: A Fast and Precise Off-Line Taint Analysis Framework.
Proceedings of the 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies, 2013

UBKM: A Usage-Based Key Management Protocol for Distributed Sensor Networks.
Proceedings of the 2013 Fourth International Conference on Emerging Intelligent Data and Web Technologies, 2013

2011
Ontology Model-Based Static Analysis of Security Vulnerabilities.
Proceedings of the Information and Communications Security - 13th International Conference, 2011

2010
Security Assurance with Metamorphic Testing and Genetic Algorithm.
Proceedings of the 2010 IEEE/WIC/ACM International Conference on Web Intelligence and International Conference on Intelligent Agent Technology - Workshops, Toronto, Canada, August 31, 2010

2007
An Effective Iterative Metamorphic Testing Algorithm Based on Program Path Analysis.
Proceedings of the Seventh International Conference on Quality Software (QSIC 2007), 2007

2005
Automatic Test Generation for N-Way Combinatorial Testing.
Proceedings of the Quality of Software Architectures and Software Quality, 2005


  Loading...