


Остановите войну!
for scientists:


default search action
Binxing Fang
Bingxing Fang
Person information

Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2023
- [j75]Tiantian Ji, Binxing Fang, Xiang Cui, Zhongru Wang, Peng Liao, Shouyou Song:
Framework for understanding intention-unbreakable malware. Sci. China Inf. Sci. 66(4) (2023) - 2022
- [j74]Zhongda Xia, Yu Zhang
, Binxing Fang:
Exploiting Knowledge for Better Mobility Support in the Future Internet. Mob. Networks Appl. 27(4): 1671-1687 (2022) - [j73]Yali Gao
, Xiaoyong Li
, Hao Peng
, Binxing Fang, Philip S. Yu
:
HinCTI: A Cyber Threat Intelligence Modeling and Identification System Based on Heterogeneous Information Network. IEEE Trans. Knowl. Data Eng. 34(2): 708-722 (2022) - [c184]Donglei Wu, Xiangyu Zou, Shuyu Zhang, Haoyu Jin, Wen Xia, Binxing Fang:
SmartIdx: Reducing Communication Cost in Federated Learning by Exploiting the CNNs Structures. AAAI 2022: 4254-4262 - [c183]Liyan Shen, Ye Dong, Binxing Fang, Jinqiao Shi, Xuebin Wang, Shengli Pan, Ruisheng Shi:
ABNN2: secure two-party arbitrary-bitwidth quantized neural network predictions. DAC 2022: 361-366 - [c182]Zhehui Liu, Zhongru Wang, Yuntao Zhang, Tong Liu, Binxing Fang, Zhengyuan Pang:
Automated Crash Analysis and Exploit Generation with Extendable Exploit Model. DSC 2022: 71-78 - [c181]Wei Liu, Yutao Huang, Yibing Guo, Ye Wang, Binxing Fang, Qing Liao:
Topic Modeling for Short Texts Via Dual View Collaborate optimization. DSC 2022: 160-166 - [c180]Tong Liu, Zhongru Wang, Yuntao Zhang, Zhehui Liu, Binxing Fang, Zhengyuan Pang:
Automated Vulnerability Discovery System Based on Hybrid Execution. DSC 2022: 234-241 - [c179]Heyan Chai, Siyu Tang, Jinhao Cui, Ye Ding, Binxing Fang, Qing Liao:
Improving Multi-task Stance Detection with Multi-task Interaction Network. EMNLP 2022: 2990-3000 - [c178]Siyu Tang, Heyan Chai, Ziyi Yao, Ye Ding, Cuiyun Gao, Binxing Fang, Qing Liao:
Affective Knowledge Enhanced Multiple-Graph Fusion Networks for Aspect-based Sentiment Analysis. EMNLP 2022: 5352-5362 - [c177]Heyan Chai
, Weijun Su, Siyu Tang, Ye Ding, Binxing Fang, Qing Liao:
Improving Anomaly Detection with a Self-Supervised Task Based on Generative Adversarial Network. ICASSP 2022: 3563-3567 - [c176]Chuanwang Ma, Yu Zhang, Binxing Fang, Hongli Zhang:
DWBFT: A Weighted Byzantine Fault Tolerant Protocol with Decentralized Trust. ICC 2022: 5384-5390 - [c175]Baoke Li, Cong Cao, Fangfang Yuan, Yanbing Liu, Baohui Li, Binxing Fang:
EPGraph: An Efficient Graph Computing Model in Persistent Memory System. ISPA/BDCloud/SocialCom/SustainCom 2022: 9-17 - [c174]Yuntao Zhang, Yanhao Wang, Yuwei Liu, Zhengyuan Pang, Binxing Fang:
PDG2Vec: Identify the Binary Function Similarity with Program Dependence Graph. QRS 2022: 537-548 - [c173]Jiawen Diao, Binxing Fang, Xiang Cui, Zhongru Wang, Tian Wang, Shouyou Song:
From Passive to Active: Near-optimal DNS-based Data Exfiltration Defense Method Based on Sticky Mechanism. TrustCom 2022: 159-166 - 2021
- [j72]Mingtao Lei
, Xi Zhang
, Lingyang Chu
, Zhefeng Wang
, Philip S. Yu, Binxing Fang:
Finding Route Hotspots in Large Labeled Networks. IEEE Trans. Knowl. Data Eng. 33(6): 2479-2492 (2021) - [j71]Yu Zhang
, Wenfeng Liu
, Zhongda Xia
, Zhongze Wang
, Lu Liu
, Weizhe Zhang, Hongli Zhang, Binxing Fang:
Blockchain-Based DNS Root Zone Management Decentralization for Internet of Things. Wirel. Commun. Mob. Comput. 2021: 6620236:1-6620236:20 (2021) - [c172]Xuebin Wang, Meiqi Wang, Jinqiao Shi, Zeyu Li, Kexin Zou, Binxing Fang:
Efficient Classification of Darknet Access Activity with Partial Traffic. CNCERT 2021: 113-128 - [c171]Baoke Li, Cong Cao, Yuhai Lu, Yanbing Liu, Baohui Li, Binxing Fang, Jianhui Fu:
D2Graph: An Efficient and Unified Out-of-Core Graph Computing Model. ISPA/BDCloud/SocialCom/SustainCom 2021: 193-201 - [c170]Zhongda Xia, Yu Zhang, Teng Liang, Xinggong Zhang, Binxing Fang:
Adapting Named Data Networking (NDN) for Better Consumer Mobility Support in LEO Satellite Networks. MSWiM 2021: 207-216 - [c169]Yuntao Zhang, Zhongru Wang, Weiqiang Yu, Binxing Fang:
Multi-level Directed Fuzzing for Detecting Use-after-Free Vulnerabilities. TrustCom 2021: 569-576 - [c168]Jiating Wu, Yujia Zhu, Baiyang Li, Qingyun Liu, Binxing Fang:
Peek Inside the Encrypted World: Autoencoder-Based Detection of DoH Resolvers. TrustCom 2021: 783-790 - 2020
- [j70]Peiyi Han
, Chuanyi Liu, Jiahao Cao, Shaoming Duan, Hezhong Pan
, Zekun Cao, Binxing Fang:
CloudDLP: Transparent and Scalable Data Sanitization for Browser-Based Cloud Storage. IEEE Access 8: 68449-68459 (2020) - [j69]Xiaomeng Wang, Binxing Fang, Hongli Zhang, Xing Wang:
Predicting the security threats on the spreading of rumor, false information of Facebook content based on the principle of sociology. Comput. Commun. 150: 455-462 (2020) - [j68]Lihua Yin, Binxing Fang, Yunchuan Guo, Zhe Sun
, Zhihong Tian
:
Hierarchically defining Internet of Things security: From CIA to CACA. Int. J. Distributed Sens. Networks 16(1) (2020) - [j67]Jing Qiu
, Zhihong Tian
, Chunlai Du, Qi Zuo, Shen Su
, Binxing Fang:
A Survey on Access Control in the Age of Internet of Things. IEEE Internet Things J. 7(6): 4682-4696 (2020) - [j66]Tiantian Ji
, Zhongru Wang, Zhihong Tian, Binxing Fang, Qiang Ruan, Haichen Wang, Wei Shi:
AFLPro: Direction sensitive fuzzing. J. Inf. Secur. Appl. 54: 102497 (2020) - [j65]Mingtao Lei, Lingyang Chu, Zhefeng Wang, Jian Pei
, Caifeng He, Xi Zhang, Binxing Fang:
Mining top-k sequential patterns in transaction database graphs. World Wide Web 23(1): 103-130 (2020) - [j64]Hezhong Pan, Chuanyi Liu, Shaoming Duan, Peiyi Han, Binxing Fang:
Scene text reading based cloud compliance access. World Wide Web 23(4): 2633-2647 (2020) - [c167]Tian Tian, Yudong Liu, Xiaoyu Yang, Yuefei Lyu, Xi Zhang, Binxing Fang:
QSAN: A Quantum-probability based Signed Attention Network for Explainable False Information Detection. CIKM 2020: 1445-1454 - [c166]Liyan Shen, Xiaojun Chen, Jinqiao Shi, Ye Dong
, Binxing Fang:
An Efficient 3-Party Framework for Privacy-Preserving Neural Network Inference. ESORICS (1) 2020: 419-439 - [c165]Caiyun Huang, Yujia Zhu, Yong Sun, Qingyun Liu, Binxing Fang:
How Many Users Behind A Local Recursive DNS Server? Estimated by Delta-Time Cluster Model. HPCC/DSS/SmartCity 2020: 465-474 - [c164]Wenfeng Liu, Yu Zhang, Lu Liu, Shuyan Liu, Hongli Zhang, Binxing Fang:
A secure domain name resolution and management architecture based on blockchain. ISCC 2020: 1-7 - [c163]Muqian Chen, Xuebin Wang, Jinqiao Shi, Can Zhao, Meiqi Wang, Binxing Fang:
Napping Guard: Deanonymizing Tor Hidden Service in a Stealthy Way. TrustCom 2020: 699-706 - [i12]Tiantian Ji, Binxing Fang, Xiang Cui, Zhongru Wang, Jiawen Diao, Tian Wang, Weiqiang Yu:
First Step Towards Modeling Unbreakable Malware. CoRR abs/2008.06163 (2020) - [i11]Tian Tian, Yudong Liu, Xiaoyu Yang, Yuefei Lyu, Xi Zhang, Binxing Fang:
QSAN: A Quantum-probability based Signed Attention Network for Explainable False Information Detection. CoRR abs/2009.03823 (2020)
2010 – 2019
- 2019
- [j63]Mingtao Lei
, Xi Zhang
, Jincui Yang, Binxing Fang:
Efficiently Approximating Top- $k$ Sequential Patterns in Transactional Graphs. IEEE Access 7: 62817-62832 (2019) - [j62]Shang Li
, Hongli Zhang, Lin Ye
, Xiaoding Guo, Binxing Fang:
MANN: A Multichannel Attentive Neural Network for Legal Judgment Prediction. IEEE Access 7: 151144-151155 (2019) - [j61]Xiaomeng Wang, Binxing Fang, Hongli Zhang, Yuhang Wang:
A competitive model of popularity prediction using correlation matrix. Clust. Comput. 22(Supplement): 2747-2759 (2019) - [j60]Dongyang Zhan
, Lin Ye
, Binxing Fang, Hongli Zhang:
SAVM: A practical secure external approach for automated in-VM management. Concurr. Comput. Pract. Exp. 31(23) (2019) - [j59]Jinlin Wang
, Haining Yu, Xing Wang, Hongli Zhang, Binxing Fang, Yuchen Yang, Xiaozhou Zhu:
DRAV: Detection and repair of data availability violations in Internet of Things. Int. J. Distributed Sens. Networks 15(11) (2019) - [j58]Qingfeng Tan
, Yue Gao
, Jinqiao Shi, Xuebin Wang
, Binxing Fang, Zhihong Tian
:
Toward a Comprehensive Insight Into the Eclipse Attacks of Tor Hidden Services. IEEE Internet Things J. 6(2): 1584-1593 (2019) - [j57]Jirui Li
, Xiaoyong Li
, Jie Yuan
, Rui Zhang, Binxing Fang:
Fog Computing-Assisted Trustworthy Forwarding Scheme in Mobile Internet of Things. IEEE Internet Things J. 6(2): 2778-2796 (2019) - [j56]Xi Zhang
, Yixuan Li, Senzhang Wang, Binxing Fang, Philip S. Yu:
Enhancing stock market prediction with extended coupled hidden Markov model over multi-sourced data. Knowl. Inf. Syst. 61(2): 1071-1090 (2019) - [j55]Zhongru Wang, Yuntao Zhang, Zhihong Tian
, Qiang Ruan, Tong Liu, Haichen Wang, Zhehui Liu, Jiayi Lin, Binxing Fang, Wei Shi
:
Automated Vulnerability Discovery and Exploitation in the Internet of Things. Sensors 19(15): 3362 (2019) - [j54]Zhongru Wang, Binxing Fang:
Correction to: Application of combined kernel function artificial intelligence algorithm in mobile communication network security authentication mechanism. J. Supercomput. 75(9): 5965 (2019) - [j53]Xi Zhang
, Yuan Su, Siyu Qu, Sihong Xie, Binxing Fang, Philip S. Yu:
IAD: Interaction-Aware Diffusion Framework in Social Networks. IEEE Trans. Knowl. Data Eng. 31(7): 1341-1354 (2019) - [c162]Yue Wu, Zhongru Wang, Qiang Ruan, Jinyu Shi, Binxing Fang:
Node Scheduling: A Blockchain-Based Node Selection Approach on Sapiens Chain. BigComp 2019: 1-7 - [c161]Jieyun Huang, Xi Zhang, Binxing Fang:
CoStock: A DeepFM Model for Stock Market Prediction with Attentional Embeddings. IEEE BigData 2019: 5522-5531 - [c160]Peiyi Han, Chuanyi Liu, Yingfei Dong, Hezhong Pan, QiYang Song, Binxing Fang:
FileCrypt: Transparent and Scalable Protection of Sensitive Data in Browser-based Cloud Storage. CNS 2019: 46-54 - [c159]Mingtao Lei, Xi Zhang, Jincui Yang, Binxing Fang:
PSMSP: A Parallelized Sampling-Based Approach for Mining Top-k Sequential Patterns in Database Graphs. DASFAA (3) 2019: 254-258 - [c158]Yuan Su, Xi Zhang, Senzhang Wang, Binxing Fang, Tianle Zhang, Philip S. Yu:
Understanding Information Diffusion via Heterogeneous Information Network Embeddings. DASFAA (1) 2019: 501-516 - [c157]Yuntao Zhang, Tong Liu, Zhongru Wang, Qiang Ruan, Binxing Fang:
AutoDE: Automated Vulnerability Discovery and Exploitation. DSC 2019: 46-53 - [c156]Xiayu Xiang, Zhongru Wang, Yan Jia, Binxing Fang:
Knowledge Graph-Based Clinical Decision Support System Reasoning: A Survey. DSC 2019: 373-380 - [c155]Jie Lin, Chuanyi Liu, Xinyi Zhang
, Rongfei Zhuang, Binxing Fang:
VMRe: A Reverse Framework of Virtual Machine Protection Packed Binaries. DSC 2019: 528-535 - [c154]Hezhong Pan, Chuanyi Liu, Shaoming Duan, Peiyi Han, Xinyi Zhang
, Binxing Fang:
Deep Learning Based Scene Text Reading for Cloud Audit Information Extraction. DSC 2019: 686-693 - [c153]Xiaomeng Wang, Binxing Fang, Hongli Zhang, Xing Wang:
Analyzing and Predicting the Popularity of Online Content Using the Weak Ties Theory. HPCC/SmartCity/DSS 2019: 1743-1748 - [c152]Jinlin Wang
, Hongli Zhang, Binxing Fang, Xing Wang, Gongzhu Yin, Ximiao Yu:
EDCleaner: Data Cleaning for Entity Information in Social Network. ICC 2019: 1-7 - [c151]Wenfeng Liu, Yu Zhang, Yongyue Li, Binxing Fang:
Modeling, Measuring, and Analyzing the Resolution Process of Popular Domains. ICC 2019: 1-7 - [c150]Liyan Shen, Xiaojun Chen, Jinqiao Shi, Binxing Fang:
A More Efficient Private Set Intersection Protocol Based on Random OT and Balance Hash. ICC 2019: 1-7 - [c149]Di Wu, Binxing Fang, Junnan Wang, Qixu Liu, Xiang Cui:
Evading Machine Learning Botnet Detection Models via Deep Reinforcement Learning. ICC 2019: 1-6 - [c148]Dongyang Zhan
, Huhua Li, Lin Ye, Hongli Zhang, Binxing Fang, Xiaojiang Du:
A Low-Overhead Kernel Object Monitoring Approach for Virtual Machine Introspection. ICC 2019: 1-6 - [c147]Chuanyi Liu, Peiyi Han, Yingfei Dong, Hezhong Pan, Shaoming Duan, Binxing Fang:
CloudDLP: Transparent and Automatic Data Sanitization for Browser-Based Cloud Storage. ICCCN 2019: 1-8 - [c146]Shang Li
, Bin Guo, Yilei Cai, Lin Ye, Hongli Zhang, Binxing Fang:
Legal Case Inspection: An Analogy-Based Approach to Judgment Evaluation. ICAIS (1) 2019: 148-158 - [c145]Jie Lin, Chuanyi Liu, Binxing Fang:
Out-of-Domain Characteristic Based Hierarchical Emulator Detection for Mobile. ICITEE 2019: 144:1-144:5 - [c144]Shang Li
, Boyang Liu, Lin Ye, Hongli Zhang, Binxing Fang:
Element-Aware Legal Judgment Prediction for Criminal Cases with Confusing Charges. ICTAI 2019: 660-667 - [c143]Muqian Chen, Xuebin Wang, Tingwen Liu, Jinqiao Shi, Zelin Yin, Binxing Fang:
SignalCookie: Discovering Guard Relays of Hidden Services in Parallel. ISCC 2019: 1-7 - [c142]Caiyun Huang, Yujia Zhu, Yong Sun, Qingyun Liu, Binxing Fang:
IDNS: A High-Performance Model for Identification of DNS Infrastructures on Large-scale Traffic. ISCC 2019: 1-7 - [i10]Dongyang Zhan, Huhua Li, Lin Ye, Hongli Zhang, Binxing Fang, Xiaojiang Du:
A Low-overhead Kernel Object Monitoring Approach for Virtual Machine Introspection. CoRR abs/1902.05135 (2019) - [i9]Mingtao Lei, Xi Zhang, Lingyang Chu, Zhefeng Wang, Philip S. Yu, Binxing Fang:
Finding Route Hotspots in Large Labeled Networks. CoRR abs/1911.11354 (2019) - 2018
- [j52]Guofeng Wang
, Chuanyi Liu, Yingfei Dong, Peiyi Han, Hezhong Pan, Binxing Fang:
IDCrypt: A Multi-User Searchable Symmetric Encryption Scheme for Cloud Applications. IEEE Access 6: 2908-2921 (2018) - [j51]Guofeng Wang
, Chuanyi Liu, Yingfei Dong, Kim-Kwang Raymond Choo
, Peiyi Han, Hezhong Pan, Binxing Fang:
Leakage Models and Inference Attacks on Searchable Encryption for Cyber-Physical Social Systems. IEEE Access 6: 21828-21839 (2018) - [j50]Xi Zhang
, Siyu Qu, Jieyun Huang
, Binxing Fang, Philip S. Yu:
Stock Market Prediction via Multi-Source Multiple Instance Learning. IEEE Access 6: 50720-50728 (2018) - [j49]Jirui Li
, Xiaoyong Li
, Yunquan Gao
, Jie Yuan, Binxing Fang:
Dynamic Trustworthiness Overlapping Community Discovery in Mobile Internet of Things. IEEE Access 6: 74579-74597 (2018) - [j48]Dongyang Zhan
, Lin Ye, Hongli Zhang, Binxing Fang, Huhua Li
, Yang Liu, Xiaojiang Du, Mohsen Guizani:
A high-performance virtual machine filesystem monitor in cloud-assisted cognitive IoT. Future Gener. Comput. Syst. 88: 209-219 (2018) - [j47]Xi Zhang, Jiawei Shi, Di Wang, Binxing Fang:
Exploiting investors social network for stock prediction in China's market. J. Comput. Sci. 28: 294-303 (2018) - [j46]Xi Zhang, Yunjia Zhang, Senzhang Wang, Yuntao Yao, Binxing Fang, Philip S. Yu:
Improving stock market prediction via heterogeneous information fusion. Knowl. Based Syst. 143: 236-247 (2018) - [j45]Lihua Yin, Yanwei Sun
, Zhen Wang, Yunchuan Guo
, Fenghua Li, Binxing Fang:
Security Measurement for Unknown Threats Based on Attack Preferences. Secur. Commun. Networks 2018: 7412627:1-7412627:13 (2018) - [j44]Dongyang Zhan
, Lin Ye, Binxing Fang, Hongli Zhang, Xiaojiang Du:
Checking virtual machine kernel control-flow integrity using a page-level dynamic tracing approach. Soft Comput. 22(23): 7977-7987 (2018) - [c141]Liyan Shen, Xiaojun Chen, Dakui Wang, Binxing Fang, Ye Dong
:
Efficient and Private Set Intersection of Human Genomes. BIBM 2018: 761-764 - [c140]Zhongyue Pei, Xi Zhang, Fangwei Zhang, Binxing Fang:
Attributed Multi-layer Network Embedding. IEEE BigData 2018: 3701-3710 - [c139]Yan Jia, Lu Deng, Bin Zhou, Binxing Fang, Weihong Han, Aiping Li, Qiang Liu, Yong Quan:
Topic Analysis Model for Online Social Network. DSC 2018: 39-44 - [c138]Yan Jia, Qiang Liu, Binxing Fang, Bin Zhou, Lu Deng, Yong Quan:
Virtual Community Detection Model and Related Research in Online Social Networks. DSC 2018: 61-68 - [c137]Di Wu, Binxing Fang, Jie Yin, Fangjiao Zhang, Xiang Cui:
SLBot: A Serverless Botnet Based on Service Flux. DSC 2018: 181-188 - [c136]Yan Li, Peiyi Han, Chuanyi Liu, Binxing Fang:
Automatically Crawling Dynamic Web Applications via Proxy-Based JavaScript Injection and Runtime Analysis. DSC 2018: 242-249 - [c135]Xiaomeng Wang, Binxing Fang, Hongli Zhang, Shen Su:
Predicting the Popularity of Online Content Based on the Weak Ties Theory. DSC 2018: 386-391 - [c134]Shang Li
, Hongli Zhang, Lin Ye, Xiaoding Guo, Binxing Fang:
Evaluating the Rationality of Judicial Decision with LSTM-Based Case Modeling. DSC 2018: 392-397 - [c133]Pin Lv, Lingling Bai, Tingwen Liu, Zhenhu Ning, Jinqiao Shi, Binxing Fang:
Detection of Malicious Domain Names Based on Hidden Markov Model. DSC 2018: 659-664 - [c132]Jinlin Wang
, Hongli Zhang, Binxing Fang, Xing Wang, Yuanxin Zhang:
Evaluation on Availability of Entity Information in Cyberspace. DSC 2018: 811-818 - [c131]Fangfang Yuan, Yanan Cao, Yanmin Shang, Yanbing Liu, Jianlong Tan, Binxing Fang:
Insider Threat Detection with Deep Neural Network. ICCS (1) 2018: 43-54 - [c130]Pin Lv, Jing Ya, Tingwen Liu, Jinqiao Shi, Binxing Fang, Zhaojun Gu:
You Have More Abbreviations Than You Know: A Study of AbbrevSquatting Abuse. ICCS (1) 2018: 221-233 - [c129]Yanwei Sun, Lihua Yin, Zhen Wang, Yunchuan Guo, Binxing Fang:
Identifying the Propagation Sources of Stealth Worms. ICCS (3) 2018: 811-817 - [c128]Chao Zheng, Xiang Li, Qingyun Liu, Yong Sun, Binxing Fang:
Hashing Incomplete and Unordered Network Streams. IFIP Int. Conf. Digital Forensics 2018: 199-224 - [c127]Chao Zheng, Qiuwen Lu, Jia Li, Qinyun Liu, Binxing Fang:
A flexible and efficient container-based NFV platform for middlebox networking. SAC 2018: 989-995 - [c126]Yan Jia, Yong Quan, Weihong Han, Binxing Fang, Qiang Liu, Lu Deng:
Individual Analysis Model and Related Research in Social Networks. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2018: 1837-1843 - [i8]Xi Zhang, Yunjia Zhang, Senzhang Wang, Yuntao Yao, Binxing Fang, Philip S. Yu:
Improving Stock Market Prediction via Heterogeneous Information Fusion. CoRR abs/1801.00588 (2018) - [i7]Xi Zhang, Jiawei Shi, Di Wang, Binxing Fang:
Exploiting Investors Social Network for Stock Prediction in China's Market. CoRR abs/1801.00597 (2018) - [i6]Dongyang Zhan, Lin Ye, Hongli Zhang, Binxing Fang, Huhua Li, Yang Liu, Xiaojiang Du, Mohsen Guizani:
A high-performance virtual machine filesystem monitor in cloud-assisted cognitive IoT. CoRR abs/1804.01633 (2018) - [i5]Xi Zhang, Yixuan Li, Senzhang Wang, Binxing Fang, Philip S. Yu:
Enhancing Stock Market Prediction with Extended Coupled Hidden Markov Model over Multi-Sourced Data. CoRR abs/1809.00306 (2018) - [i4]Jinyu Shi, Zhongru Wang, Qiang Ruan, Yue Wu, Binxing Fang:
Research on CRO's Dilemma In Sapiens Chain: A Game Theory Method. CoRR abs/1811.10857 (2018) - [i3]Yu Han, Zhongru Wang, Qiang Ruan, Binxing Fang:
Sapiens Chain: A Blockchain-based Cybersecurity Framework. CoRR abs/1811.10868 (2018) - 2017
- [j43]Yanbin Sun, Yu Zhang, Binxing Fang, Hongli Zhang:
Succinct and practical greedy embedding for geometric routing. Comput. Commun. 114: 51-61 (2017) - [j42]Qiu Tang, Lei Jiang, Qiong Dai, Majing Su, Hongtao Xie, Binxing Fang:
RICS-DFA: a space and time-efficient signature matching algorithm with Reduced Input Character Set. Concurr. Comput. Pract. Exp. 29(20) (2017) - [j41]Dongyang Zhan
, Lin Ye, Binxing Fang, Xiaojiang Du, Zhikai Xu:
Protecting Critical Files Using Target-Based Virtual Machine Introspection Approach. IEICE Trans. Inf. Syst. 100-D(10): 2307-2318 (2017) - [j40]Binxing Fang, Yan Jia, Xiaoyong Li
, Aiping Li, Xindong Wu
:
Big Search in Cyberspace. IEEE Trans. Knowl. Data Eng. 29(9): 1793-1805 (2017) - [c125]Yuan Su, Xi Zhang, Sihong Xie, Philip S. Yu, Binxing Fang:
Efficient Revenue Maximization for Viral Marketing in Social Networks. ADMA 2017: 209-224 - [c124]Jinlin Wang
, Hongli Zhang, Binxing Fang, Xing Wang, Lin Ye:
A Survey on Data Cleaning Methods in Cyberspace. DSC 2017: 74-81 - [c123]Xiaomeng Wang, Binxing Fang, Hongli Zhang, XuanYu:
Predicting the Popularity of News Based on Competitive Matrix. DSC 2017: 151-155 - [c122]Liang Fang, Lihua Yin, Qiaoduo Zhang, Fenghua Li, Binxing Fang:
Who Is Visible: Resolving Access Policy Conflicts in Online Social Networks. GLOBECOM 2017: 1-6 - [c121]Yanwei Sun, Lihua Yin, Yunchuan Guo, Fenghua Li, Binxing Fang:
Optimally Selecting the Timing of Zero-Day Attack via Spatial Evolutionary Game. ICA3PP 2017: 313-327 - [c120]Shang Li
, Zhigang Zhou, Hongli Zhang, Binxing Fang:
An approximate search framework for big data. ICC 2017: 1-6 - [c119]