BibTeX records: Maochao Xu

download as .bib file

@article{DBLP:journals/eor/ZhangXSZ23,
  author       = {Xiaoyu Zhang and
                  Maochao Xu and
                  Jianxi Su and
                  Peng Zhao},
  title        = {Structural models for fog computing based internet of things architectures
                  with insurance and risk management applications},
  journal      = {Eur. J. Oper. Res.},
  volume       = {305},
  number       = {3},
  pages        = {1273--1291},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.ejor.2022.07.033},
  doi          = {10.1016/J.EJOR.2022.07.033},
  timestamp    = {Sun, 15 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/eor/ZhangXSZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/scisec/SunXSBKX23,
  author       = {Zheyuan Sun and
                  Maochao Xu and
                  Kristin M. Schweitzer and
                  Raymond M. Bateman and
                  Alexander Kott and
                  Shouhuai Xu},
  editor       = {Moti Yung and
                  Chao Chen and
                  Weizhi Meng},
  title        = {Cyber Attacks Against Enterprise Networks: Characterization, Modeling
                  and Forecasting},
  booktitle    = {Science of Cyber Security - 5th International Conference, SciSec 2023,
                  Melbourne, VIC, Australia, July 11-14, 2023, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {14299},
  pages        = {60--81},
  publisher    = {Springer},
  year         = {2023},
  url          = {https://doi.org/10.1007/978-3-031-45933-7\_4},
  doi          = {10.1007/978-3-031-45933-7\_4},
  timestamp    = {Wed, 06 Dec 2023 13:43:04 +0100},
  biburl       = {https://dblp.org/rec/conf/scisec/SunXSBKX23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/FangXZ22,
  author       = {Rui Fang and
                  Maochao Xu and
                  Peng Zhao},
  title        = {Determination of ransomware payment based on Bayesian game models},
  journal      = {Comput. Secur.},
  volume       = {116},
  pages        = {102685},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cose.2022.102685},
  doi          = {10.1016/J.COSE.2022.102685},
  timestamp    = {Mon, 26 Aug 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/FangXZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2209-07306,
  author       = {Maochao Xu and
                  Quynh Nhu Nguyen},
  title        = {Statistical Modeling of Data Breach Risks: Time to Identification
                  and Notification},
  journal      = {CoRR},
  volume       = {abs/2209.07306},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2209.07306},
  doi          = {10.48550/ARXIV.2209.07306},
  eprinttype    = {arXiv},
  eprint       = {2209.07306},
  timestamp    = {Wed, 05 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2209-07306.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ress/DingXHZS21,
  author       = {Weiyong Ding and
                  Maochao Xu and
                  Yu Huang and
                  Peng Zhao and
                  Fengyi Song},
  title        = {Cyber attacks on {PMU} placement in a smart grid: Characterization
                  and optimization},
  journal      = {Reliab. Eng. Syst. Saf.},
  volume       = {212},
  pages        = {107586},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.ress.2021.107586},
  doi          = {10.1016/J.RESS.2021.107586},
  timestamp    = {Thu, 27 May 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ress/DingXHZS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ress/ZhangXDZ21,
  author       = {Xiaoyu Zhang and
                  Maochao Xu and
                  Gaofeng Da and
                  Peng Zhao},
  title        = {Ensuring confidentiality and availability of sensitive data over a
                  network system under cyber threats},
  journal      = {Reliab. Eng. Syst. Saf.},
  volume       = {214},
  pages        = {107697},
  year         = {2021},
  url          = {https://doi.org/10.1016/j.ress.2021.107697},
  doi          = {10.1016/J.RESS.2021.107697},
  timestamp    = {Wed, 16 Mar 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ress/ZhangXDZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/FangXXH21,
  author       = {Zijian Fang and
                  Maochao Xu and
                  Shouhuai Xu and
                  Taizhong Hu},
  title        = {A Framework for Predicting Data Breach Risk: Leveraging Dependence
                  to Cope With Sparsity},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {16},
  pages        = {2186--2201},
  year         = {2021},
  url          = {https://doi.org/10.1109/TIFS.2021.3051804},
  doi          = {10.1109/TIFS.2021.3051804},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/FangXXH21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ress/DingXHZ20,
  author       = {Weiyong Ding and
                  Maochao Xu and
                  Yu Huang and
                  Peng Zhao},
  title        = {Cyber risks of {PMU} networks with observation errors: Assessment
                  and mitigation},
  journal      = {Reliab. Eng. Syst. Saf.},
  volume       = {198},
  pages        = {106873},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.ress.2020.106873},
  doi          = {10.1016/J.RESS.2020.106873},
  timestamp    = {Tue, 21 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ress/DingXHZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sesa/Trieu-DoGXXF20,
  author       = {Van Trieu{-}Do and
                  Richard Garcia{-}Lebron and
                  Maochao Xu and
                  Shouhuai Xu and
                  Yusheng Feng},
  title        = {Characterizing and Leveraging Granger Causality in Cybersecurity:
                  Framework and Case Study},
  journal      = {{EAI} Endorsed Trans. Security Safety},
  volume       = {7},
  number       = {25},
  pages        = {e4},
  year         = {2020},
  url          = {https://doi.org/10.4108/eai.11-5-2021.169912},
  doi          = {10.4108/EAI.11-5-2021.169912},
  timestamp    = {Wed, 16 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sesa/Trieu-DoGXXF20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2006-16092,
  author       = {Gaofeng Da and
                  Maochao Xu and
                  Jingshi Zhang and
                  Peng Zhao},
  title        = {Joint Cyber Risk Assessment of Network Systems with Heterogeneous
                  Components},
  journal      = {CoRR},
  volume       = {abs/2006.16092},
  year         = {2020},
  url          = {https://arxiv.org/abs/2006.16092},
  eprinttype    = {arXiv},
  eprint       = {2006.16092},
  timestamp    = {Wed, 01 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2006-16092.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2007-00454,
  author       = {Lei Hua and
                  Maochao Xu},
  title        = {Pricing cyber insurance for a large-scale network},
  journal      = {CoRR},
  volume       = {abs/2007.00454},
  year         = {2020},
  url          = {https://arxiv.org/abs/2007.00454},
  eprinttype    = {arXiv},
  eprint       = {2007.00454},
  timestamp    = {Mon, 06 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2007-00454.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ejisec/FangXXZ19,
  author       = {Xing Fang and
                  Maochao Xu and
                  Shouhuai Xu and
                  Peng Zhao},
  title        = {A deep learning framework for predicting cyber attacks rates},
  journal      = {{EURASIP} J. Inf. Secur.},
  volume       = {2019},
  pages        = {5},
  year         = {2019},
  url          = {https://doi.org/10.1186/s13635-019-0090-6},
  doi          = {10.1186/S13635-019-0090-6},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ejisec/FangXXZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tr/DaXZ19,
  author       = {Gaofeng Da and
                  Maochao Xu and
                  Peng Zhao},
  title        = {Modeling Network Systems Under Simultaneous Cyber-Attacks},
  journal      = {{IEEE} Trans. Reliab.},
  volume       = {68},
  number       = {3},
  pages        = {971--984},
  year         = {2019},
  url          = {https://doi.org/10.1109/TR.2019.2911106},
  doi          = {10.1109/TR.2019.2911106},
  timestamp    = {Thu, 09 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tr/DaXZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/eor/DaCX18,
  author       = {Gaofeng Da and
                  Ping Shing Chan and
                  Maochao Xu},
  title        = {On the signature of complex system: {A} decomposed approach},
  journal      = {Eur. J. Oper. Res.},
  volume       = {265},
  number       = {3},
  pages        = {1115--1123},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.ejor.2017.08.052},
  doi          = {10.1016/J.EJOR.2017.08.052},
  timestamp    = {Fri, 21 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/eor/DaCX18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ress/ChenXS18,
  author       = {Die Chen and
                  Maochao Xu and
                  Weidong Shi},
  title        = {Defending a cyber system with early warning mechanism},
  journal      = {Reliab. Eng. Syst. Saf.},
  volume       = {169},
  pages        = {224--234},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.ress.2017.08.021},
  doi          = {10.1016/J.RESS.2017.08.021},
  timestamp    = {Tue, 25 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ress/ChenXS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/XuSBX18,
  author       = {Maochao Xu and
                  Kristin M. Schweitzer and
                  Raymond M. Bateman and
                  Shouhuai Xu},
  title        = {Modeling and Predicting Cyber Hacking Breaches},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {13},
  number       = {11},
  pages        = {2856--2871},
  year         = {2018},
  url          = {https://doi.org/10.1109/TIFS.2018.2834227},
  doi          = {10.1109/TIFS.2018.2834227},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/XuSBX18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ress/HuXXZ17,
  author       = {Xiaoxiao Hu and
                  Maochao Xu and
                  Shouhuai Xu and
                  Peng Zhao},
  title        = {Multiple cyber attacks against a target with observation errors and
                  dependent outcomes: Characterization and optimization},
  journal      = {Reliab. Eng. Syst. Saf.},
  volume       = {159},
  pages        = {119--133},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.ress.2016.10.025},
  doi          = {10.1016/J.RESS.2016.10.025},
  timestamp    = {Tue, 25 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ress/HuXXZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/technometrics/XuHX17,
  author       = {Maochao Xu and
                  Lei Hua and
                  Shouhuai Xu},
  title        = {A Vine Copula Model for Predicting the Effectiveness of Cyber Defense
                  Early-Warning},
  journal      = {Technometrics},
  volume       = {59},
  number       = {4},
  pages        = {508--520},
  year         = {2017},
  url          = {https://doi.org/10.1080/00401706.2016.1256841},
  doi          = {10.1080/00401706.2016.1256841},
  timestamp    = {Thu, 28 Dec 2017 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/technometrics/XuHX17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/ZhanXX16,
  author       = {Zhenxin Zhan and
                  Maochao Xu and
                  Shouhuai Xu},
  title        = {Predicting Cyber Attack Rates with Extreme Values},
  journal      = {CoRR},
  volume       = {abs/1603.07432},
  year         = {2016},
  url          = {http://arxiv.org/abs/1603.07432},
  eprinttype    = {arXiv},
  eprint       = {1603.07432},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/ZhanXX16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/ZhanXX16a,
  author       = {Zhenxin Zhan and
                  Maochao Xu and
                  Shouhuai Xu},
  title        = {Characterizing Honeypot-Captured Cyber Attacks: Statistical Framework
                  and Case Study},
  journal      = {CoRR},
  volume       = {abs/1603.07433},
  year         = {2016},
  url          = {http://arxiv.org/abs/1603.07433},
  eprinttype    = {arXiv},
  eprint       = {1603.07433},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/ZhanXX16a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/ZhanXX16b,
  author       = {Zhenxin Zhan and
                  Maochao Xu and
                  Shouhuai Xu},
  title        = {A Characterization of Cybersecurity Posture from Network Telescope
                  Data},
  journal      = {CoRR},
  volume       = {abs/1603.07438},
  year         = {2016},
  url          = {http://arxiv.org/abs/1603.07438},
  eprinttype    = {arXiv},
  eprint       = {1603.07438},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/ZhanXX16b.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/XuX16,
  author       = {Maochao Xu and
                  Shouhuai Xu},
  title        = {An Extended Stochastic Model for Quantitative Security Analysis of
                  Networked Systems},
  journal      = {CoRR},
  volume       = {abs/1603.08304},
  year         = {2016},
  url          = {http://arxiv.org/abs/1603.08304},
  eprinttype    = {arXiv},
  eprint       = {1603.08304},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/XuX16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/DaXX16,
  author       = {Gaofeng Da and
                  Maochao Xu and
                  Shouhuai Xu},
  title        = {A New Approach to Modeling and Analyzing Security of Networked Systems},
  journal      = {CoRR},
  volume       = {abs/1603.08305},
  year         = {2016},
  url          = {http://arxiv.org/abs/1603.08305},
  eprinttype    = {arXiv},
  eprint       = {1603.08305},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/DaXX16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/XuDX16,
  author       = {Maochao Xu and
                  Gaofeng Da and
                  Shouhuai Xu},
  title        = {Cyber Epidemic Models with Dependences},
  journal      = {CoRR},
  volume       = {abs/1603.08307},
  year         = {2016},
  url          = {http://arxiv.org/abs/1603.08307},
  eprinttype    = {arXiv},
  eprint       = {1603.08307},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/XuDX16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/im/XuDX15,
  author       = {Maochao Xu and
                  Gaofeng Da and
                  Shouhuai Xu},
  title        = {Cyber Epidemic Models with Dependences},
  journal      = {Internet Math.},
  volume       = {11},
  number       = {1},
  pages        = {62--92},
  year         = {2015},
  url          = {https://doi.org/10.1080/15427951.2014.902407},
  doi          = {10.1080/15427951.2014.902407},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/im/XuDX15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhanXX15,
  author       = {Zhenxin Zhan and
                  Maochao Xu and
                  Shouhuai Xu},
  title        = {Predicting Cyber Attack Rates With Extreme Values},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {8},
  pages        = {1666--1677},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2015.2422261},
  doi          = {10.1109/TIFS.2015.2422261},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhanXX15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/anor/KocharX14,
  author       = {Subhash C. Kochar and
                  Maochao Xu},
  title        = {On the skewness of order statistics with applications},
  journal      = {Ann. Oper. Res.},
  volume       = {212},
  number       = {1},
  pages        = {127--138},
  year         = {2014},
  url          = {https://doi.org/10.1007/s10479-012-1212-4},
  doi          = {10.1007/S10479-012-1212-4},
  timestamp    = {Thu, 13 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/anor/KocharX14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ma/DaXB14,
  author       = {Gaofeng Da and
                  Maochao Xu and
                  N. Balakrishnan},
  title        = {On the Lorenz ordering of order statistics from exponential populations
                  and some applications},
  journal      = {J. Multivar. Anal.},
  volume       = {127},
  pages        = {88--97},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.jmva.2014.02.005},
  doi          = {10.1016/J.JMVA.2014.02.005},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ma/DaXB14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hotsos/DaXX14,
  author       = {Gaofeng Da and
                  Maochao Xu and
                  Shouhuai Xu},
  editor       = {Laurie A. Williams and
                  David M. Nicol and
                  Munindar P. Singh},
  title        = {A new approach to modeling and analyzing security of networked systems},
  booktitle    = {Proceedings of the 2014 Symposium and Bootcamp on the Science of Security,
                  HotSoS 2014, Raleigh, NC, USA, April 08 - 09, 2014},
  pages        = {6},
  publisher    = {{ACM}},
  year         = {2014},
  url          = {https://doi.org/10.1145/2600176.2600184},
  doi          = {10.1145/2600176.2600184},
  timestamp    = {Tue, 06 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hotsos/DaXX14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/intrust/ZhanXX14,
  author       = {Zhenxin Zhan and
                  Maochao Xu and
                  Shouhuai Xu},
  editor       = {Moti Yung and
                  Liehuang Zhu and
                  Yanjiang Yang},
  title        = {A Characterization of Cybersecurity Posture from Network Telescope
                  Data},
  booktitle    = {Trusted Systems - 6th International Conference, {INTRUST} 2014, Beijing,
                  China, December 16-17, 2014, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9473},
  pages        = {105--126},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-27998-5\_7},
  doi          = {10.1007/978-3-319-27998-5\_7},
  timestamp    = {Tue, 14 May 2019 10:00:52 +0200},
  biburl       = {https://dblp.org/rec/conf/intrust/ZhanXX14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/ZhanXX13,
  author       = {Zhenxin Zhan and
                  Maochao Xu and
                  Shouhuai Xu},
  title        = {Characterizing Honeypot-Captured Cyber Attacks: Statistical Framework
                  and Case Study},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {8},
  number       = {11},
  pages        = {1775--1789},
  year         = {2013},
  url          = {https://doi.org/10.1109/TIFS.2013.2279800},
  doi          = {10.1109/TIFS.2013.2279800},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/ZhanXX13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/im/XuX12,
  author       = {Maochao Xu and
                  Shouhuai Xu},
  title        = {An Extended Stochastic Model for Quantitative Security Analysis of
                  Networked Systems},
  journal      = {Internet Math.},
  volume       = {8},
  number       = {3},
  pages        = {288--320},
  year         = {2012},
  url          = {https://doi.org/10.1080/15427951.2012.654480},
  doi          = {10.1080/15427951.2012.654480},
  timestamp    = {Sun, 17 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/im/XuX12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jossac/WangXM12,
  author       = {Xuanhe Wang and
                  Maochao Xu and
                  Shengwang Meng},
  title        = {Dependence analysis of regression models in time series},
  journal      = {J. Syst. Sci. Complex.},
  volume       = {25},
  number       = {6},
  pages        = {1136--1142},
  year         = {2012},
  url          = {https://doi.org/10.1007/s11424-012-1091-4},
  doi          = {10.1007/S11424-012-1091-4},
  timestamp    = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jossac/WangXM12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ma/XuB12,
  author       = {Maochao Xu and
                  N. Balakrishnan},
  title        = {On the sample ranges from heterogeneous exponential variables},
  journal      = {J. Multivar. Anal.},
  volume       = {109},
  pages        = {1--9},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.jmva.2012.02.009},
  doi          = {10.1016/J.JMVA.2012.02.009},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ma/XuB12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ma/KocharX10,
  author       = {Subhash C. Kochar and
                  Maochao Xu},
  title        = {On the right spread order of convolutions of heterogeneous exponential
                  random variables},
  journal      = {J. Multivar. Anal.},
  volume       = {101},
  number       = {1},
  pages        = {165--176},
  year         = {2010},
  url          = {https://doi.org/10.1016/j.jmva.2009.07.001},
  doi          = {10.1016/J.JMVA.2009.07.001},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ma/KocharX10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ma/GenestKX09,
  author       = {Christian Genest and
                  Subhash C. Kochar and
                  Maochao Xu},
  title        = {On the range of heterogeneous samples},
  journal      = {J. Multivar. Anal.},
  volume       = {100},
  number       = {8},
  pages        = {1587--1592},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.jmva.2009.01.001},
  doi          = {10.1016/J.JMVA.2009.01.001},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ma/GenestKX09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}