Xinran Wang
Cited by
Cited by
An OWL-based context model in intelligent environments
T Gu, XH Wang, HK Pung, DQ Zhang
Communication Networks and Distributed Systems Modeling and Simulation …, 2004
SDAP: A secure hop-by-hop data aggregation protocol for sensor networks
Y Yang, X Wang, S Zhu, G Cao
ACM Transactions on Information and System Security (TISSEC) 11 (4), 18, 2008
Amino acid availability regulates p70 S6 kinase and multiple translation factors
X Wang, LE Campbell, CM Miller, CG Proud
Biochemical Journal 335 (3), 711-711, 1998
The Bikou basalts in the northwestern Yangtze block
XC Wang, XH Li, XW Li, ZX Li, Y Liu, YH Yang, XR Liang, XL Tu
South China: Remnants of, 820-810, 2008
Sigfree: A signature-free buffer overflow attack blocker
X Wang, CC Pan, P Liu, S Zhu
Dependable and Secure Computing, IEEE Transactions on 7 (1), 65-79, 2010
Distributed software-based attestation for node compromise detection in sensor networks
Y Yang, X Wang, S Zhu, G Cao
Reliable Distributed Systems, 2007. SRDS 2007. 26th IEEE International …, 2007
MKLu, YX Yan, FQ Meng, SY Guo, GH Zhang, MH Jiang
XQ Wang, D Xu, DR Yuan, YP Tian, WT Yu, SY Sun, ZH Yang, Q Fang
Mater. Res. Bull 34, 2003, 1999
540 V. Nair. 2009. A functional MicroRNA-155 ortholog encoded by the oncogenic 541 Marek's disease virus
Y Zhao, Y Yao, H Xu, L Lambeth, LP Smith, L Kgosana, X Wang
J Virol 83, 489-92, 0
Heuristic botnet detection
X Wang, H Xie
US Patent 8,555,388, 2013
Behavior based software theft detection
X Wang, YC Jhi, S Zhu, P Liu
Proceedings of the 16th ACM conference on Computer and communications …, 2009
Detecting software theft via system call based birthmarks
X Wang, YC Jhi, S Zhu, P Liu
Computer Security Applications Conference, 2009. ACSAC'09. Annual, 149-158, 2009
Perfluorinated and polyfluorinated compounds in lake food webs from the Canadian high arctic
GL Lescord, KA Kidd, AO De Silva, M Williamson, C Spencer, X Wang, ...
Environmental science & technology 49 (5), 2694-2702, 2015
Value-based program characterization and its application to software plagiarism detection
YC Jhi, X Wang, X Jia, S Zhu, P Liu, D Wu
Proceedings of the 33rd International Conference on Software Engineering …, 2011
Still: Exploit code detection via static taint and initialization analyses
X Wang, YC Jhi, S Zhu, P Liu
Computer Security Applications Conference, 2008. ACSAC 2008. Annual, 289-298, 2008
Down-regulation of Par-3 expression and disruption of Par complex integrity by TGF-β during the process of epithelial to mesenchymal transition in rat proximal epithelial cells
X Yu, X Wang, J Nie, Q Zhou, W Liu, F Zhu, W Chen, H Mao, N Luo, ...
Elsevier, 2008
Studies on the electrochemical properties of MlNi sub 4. 3-x Co sub x Al sub 0. 7 hydride alloy electrodes
H Pan, J Ma, C Wang, S Chen, X Wang, C Chen, Q Wang
Journal of Alloys and Compounds(Switzerland) 293, 648-652, 1998
Method and apparatus for performing a search
X Wang, B Acton, V Panchapakesan
US Patent 9,201,963, 2015
Malware family identification using profile signatures
K Sanders, X Wang
US Patent 9,165,142, 2015
Effect of Traditional Chinese Exercise on Gait and Balance for Stroke: A Systematic Review and Meta-Analysis
BL Chen, JB Guo, MS Liu, X Li, J Zou, X Chen, LL Zhang, YS Yue, ...
PloS one 10 (8), e0135932, 2015
Fast depth map generation for 2D to 3D conversion
J Wei, X Tu, X Wang, A Berestov
US Patent 8,472,746, 2013
The system can't perform the operation now. Try again later.
Articles 1–20