Xiao Wang

Affiliations:
  • Chinese Academy of Sciences, Institute of Information Engineering, Beijing, China
  • Chinese Academy of Sciences, Institute of Computing Technology, Beijing, China
  • National Engineering Laboratory for Information Security Technologies, China


According to our database1, Xiao Wang authored at least 13 papers between 2011 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Multi-Blockchain Based Data Trading Markets With Novel Pricing Mechanisms.
IEEE CAA J. Autom. Sinica, December, 2023

2017
Parallel intermodal road-rail transportation system based on acp approach.
Proceedings of the 2017 IEEE International Conference on Systems, Man, and Cybernetics, 2017

2016
A Fast Algorithm for Competitive Recommendation Marketing Strategy.
Proceedings of the IEEE First International Conference on Data Science in Cyberspace, 2016

2015
A Fast Climbing Approach for Diffusion Source Inference in Large Social Networks.
Proceedings of the Data Science - Second International Conference, 2015

2014
Towards Improving Service Accessibility by Adaptive Resource Distribution Strategy.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

Topic Block: Mining User Inner Interests for Text and Link Analysis in Social Networks.
Proceedings of the 15th International Conference on Parallel and Distributed Computing, 2014

A Moving Target Framework to Improve Network Service Accessibility.
Proceedings of the 9th IEEE International Conference on Networking, 2014

2013
IX-Level Adversaries on Entry- and Exit-Transmission Paths in Tor Network.
Proceedings of the IEEE Eighth International Conference on Networking, 2013

Detecting Sybil Nodes in Anonymous Communication Systems.
Proceedings of the First International Conference on Information Technology and Quantitative Management, 2013

Towards Analyzing and Improving Service Accessibility under Resource Enumeration Attack.
Proceedings of the First International Conference on Information Technology and Quantitative Management, 2013

An empirical analysis of family in the Tor network.
Proceedings of IEEE International Conference on Communications, 2013

2012
Towards Analyzing Traceability of Data Leakage by Malicious Insiders.
Proceedings of the Trustworthy Computing and Services - International Conference, ISCTCS 2012, Beijing, China, May 28, 2012

2011
A Covert Communication Method Based on User-Generated Content Sites.
Proceedings of the IEEE 23rd International Conference on Tools with Artificial Intelligence, 2011


  Loading...