default search action
Search dblp for Publications
export results for "Donghai Tian"
@article{DBLP:journals/eswa/LiZTJH24, author = {Qiyuan Li and Bo Zhang and Donghai Tian and Xiaoqi Jia and Changzhen Hu}, title = {MDGraph: {A} novel malware detection method based on memory dump and graph neural network}, journal = {Expert Syst. Appl.}, volume = {255}, pages = {124776}, year = {2024}, url = {https://doi.org/10.1016/j.eswa.2024.124776}, doi = {10.1016/J.ESWA.2024.124776}, timestamp = {Thu, 22 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eswa/LiZTJH24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jss/WangMHZHZT24, author = {Xiajing Wang and Rui Ma and Wei Huo and Zheng Zhang and Jinyuan He and Chaonan Zhang and Donghai Tian}, title = {{SYNTONY:} Potential-aware fuzzing with particle swarm optimization}, journal = {J. Syst. Softw.}, volume = {208}, pages = {111880}, year = {2024}, url = {https://doi.org/10.1016/j.jss.2023.111880}, doi = {10.1016/J.JSS.2023.111880}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jss/WangMHZHZT24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tim/GuoLLTQXFLHLLQ24, author = {Di Guo and Sijin Li and Jun Liu and Zhangren Tu and Tianyu Qiu and Jingjing Xu and Liubin Feng and Donghai Lin and Qing Hong and Meijin Lin and Yanqin Lin and Xiaobo Qu}, title = {CloudBrain-NMR: An Intelligent Cloud-Computing Platform for {NMR} Spectroscopy Processing, Reconstruction, and Analysis}, journal = {{IEEE} Trans. Instrum. Meas.}, volume = {73}, pages = {1--11}, year = {2024}, url = {https://doi.org/10.1109/TIM.2024.3415787}, doi = {10.1109/TIM.2024.3415787}, timestamp = {Fri, 19 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tim/GuoLLTQXFLHLLQ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tim/YuanLHQSTL24, author = {Di Yuan and Donghai Liao and Feng Huang and Zhaobing Qiu and Xiu Shu and Chunwei Tian and Qiao Liu}, title = {Hierarchical Attention Siamese Network for Thermal Infrared Target Tracking}, journal = {{IEEE} Trans. Instrum. Meas.}, volume = {73}, pages = {1--11}, year = {2024}, url = {https://doi.org/10.1109/TIM.2024.3462973}, doi = {10.1109/TIM.2024.3462973}, timestamp = {Thu, 24 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tim/YuanLHQSTL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tits/TongWJQSMTG24, author = {Lei Tong and Zhipeng Wang and Limin Jia and Yong Qin and Donghai Song and Bidong Miao and Tian Tang and Yixuan Geng}, title = {TriRNet: Real-Time Rail Recognition Network for UAV-Based Railway Inspection}, journal = {{IEEE} Trans. Intell. Transp. Syst.}, volume = {25}, number = {5}, pages = {3927--3943}, year = {2024}, url = {https://doi.org/10.1109/TITS.2023.3328379}, doi = {10.1109/TITS.2023.3328379}, timestamp = {Sun, 08 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tits/TongWJQSMTG24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tjs/ZhouHXT24, author = {Bo Zhou and Hai Huang and Jun Xia and Donghai Tian}, title = {A novel malware detection method based on {API} embedding and {API} parameters}, journal = {J. Supercomput.}, volume = {80}, number = {2}, pages = {2748--2766}, year = {2024}, url = {https://doi.org/10.1007/s11227-023-05556-x}, doi = {10.1007/S11227-023-05556-X}, timestamp = {Fri, 02 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tjs/ZhouHXT24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cniot/WanWST24, author = {Yifeng Wan and Wenting Wang and Jiajun Sun and Donghai Tian}, title = {Directed Fuzzing Based on Bottleneck Detection}, booktitle = {Proceedings of the 2024 5th International Conference on Computing, Networks and Internet of Things, {CNIOT} 2024, Tokyo, Japan, May 24-26, 2024}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3670105.3670111}, doi = {10.1145/3670105.3670111}, timestamp = {Fri, 02 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cniot/WanWST24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2406-15513, author = {Jiaming Ji and Donghai Hong and Borong Zhang and Boyuan Chen and Josef Dai and Boren Zheng and Tianyi Qiu and Boxun Li and Yaodong Yang}, title = {PKU-SafeRLHF: {A} Safety Alignment Preference Dataset for Llama Family Models}, journal = {CoRR}, volume = {abs/2406.15513}, year = {2024}, url = {https://doi.org/10.48550/arXiv.2406.15513}, doi = {10.48550/ARXIV.2406.15513}, eprinttype = {arXiv}, eprint = {2406.15513}, timestamp = {Tue, 16 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2406-15513.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/apin/NiZZZL23, author = {Panpan Ni and Xiaobo Zhang and Donghai Zhai and Yuxin Zhou and Tianrui Li}, title = {Enhancing diversity and robustness of clustering ensemble via reliability weighted measure}, journal = {Appl. Intell.}, volume = {53}, number = {24}, pages = {30778--30802}, year = {2023}, url = {https://doi.org/10.1007/s10489-023-05181-4}, doi = {10.1007/S10489-023-05181-4}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/apin/NiZZZL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/inffus/ZhangZLZL23, author = {Xiaobo Zhang and Donghai Zhai and Tianrui Li and Yuxin Zhou and Yang Lin}, title = {Image inpainting based on deep learning: {A} review}, journal = {Inf. Fusion}, volume = {90}, pages = {74--94}, year = {2023}, url = {https://doi.org/10.1016/j.inffus.2022.08.033}, doi = {10.1016/J.INFFUS.2022.08.033}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/inffus/ZhangZLZL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/ChenYLTMJ23, author = {Jiaqi Chen and Chong Yuan and Jiashuo Li and Donghai Tian and Rui Ma and Xiaoqi Jia}, title = {{ELAMD:} An ensemble learning framework for adversarial malware defense}, journal = {J. Inf. Secur. Appl.}, volume = {75}, pages = {103508}, year = {2023}, url = {https://doi.org/10.1016/j.jisa.2023.103508}, doi = {10.1016/J.JISA.2023.103508}, timestamp = {Fri, 07 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/ChenYLTMJ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tci/GuoTGZWWQXCFHLHGLQ23, author = {Di Guo and Zhangren Tu and Yi Guo and Yirong Zhou and Jian Wang and Zi Wang and Tianyu Qiu and Min Xiao and Yinran Chen and Liubin Feng and Yuqing Huang and Donghai Lin and Qing Hong and Amir Goldbourt and Meijin Lin and Xiaobo Qu}, title = {XCloud-VIP: Virtual Peak Enables Highly Accelerated {NMR} Spectroscopy and Faithful Quantitative Measures}, journal = {{IEEE} Trans. Computational Imaging}, volume = {9}, pages = {1043--1057}, year = {2023}, url = {https://doi.org/10.1109/TCI.2023.3330298}, doi = {10.1109/TCI.2023.3330298}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tci/GuoTGZWWQXCFHLHGLQ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2305-05455, author = {Shengkai Lin and Peirui Cao and Tianyi Huang and Shizhen Zhao and Quan Tian and Qi Wu and Donghai Han and Xinbing Wang and Chenghu Zhou}, title = {XMasq: Low-Overhead Container Overlay Network Based on eBPF}, journal = {CoRR}, volume = {abs/2305.05455}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2305.05455}, doi = {10.48550/ARXIV.2305.05455}, eprinttype = {arXiv}, eprint = {2305.05455}, timestamp = {Mon, 15 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2305-05455.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2309-07178, author = {Di Guo and Sijin Li and Jun Liu and Zhangren Tu and Tianyu Qiu and Jingjing Xu and Liubin Feng and Donghai Lin and Qing Hong and Meijin Lin and Yanqin Lin and Xiaobo Qu}, title = {CloudBrain-NMR: An Intelligent Cloud Computing Platform for {NMR} Spectroscopy Processing, Reconstruction and Analysis}, journal = {CoRR}, volume = {abs/2309.07178}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2309.07178}, doi = {10.48550/ARXIV.2309.07178}, eprinttype = {arXiv}, eprint = {2309.07178}, timestamp = {Fri, 22 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2309-07178.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bioinformatics/TianLMZTWKLY22, author = {Leqi Tian and Zhenjiang Li and Guoxuan Ma and Xiaoyue Zhang and Ziyin Tang and Siheng Wang and Jian Kang and Donghai Liang and Tianwei Yu}, title = {Metapone: a Bioconductor package for joint pathway testing for untargeted metabolomics data}, journal = {Bioinform.}, volume = {38}, number = {14}, pages = {3662--3664}, year = {2022}, url = {https://doi.org/10.1093/bioinformatics/btac364}, doi = {10.1093/BIOINFORMATICS/BTAC364}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/bioinformatics/TianLMZTWKLY22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ejwcn/YuanHGHTAA22, author = {Weiwei Yuan and Yun Han and Donghai Guan and Guangjie Han and Yuan Tian and Abdullah Al{-}Dhelaan and Mohammed Al{-}Dhelaan}, title = {Weighted enclosing subgraph-based link prediction for complex network}, journal = {{EURASIP} J. Wirel. Commun. Netw.}, volume = {2022}, number = {1}, pages = {65}, year = {2022}, url = {https://doi.org/10.1186/s13638-022-02143-1}, doi = {10.1186/S13638-022-02143-1}, timestamp = {Fri, 05 Aug 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ejwcn/YuanHGHTAA22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ett/TianZMJSHL22, author = {Donghai Tian and Runze Zhao and Rui Ma and Xiaoqi Jia and Qi Shen and Changzhen Hu and Wenmao Liu}, title = {{MDCD:} {A} malware detection approach in cloud using deep learning}, journal = {Trans. Emerg. Telecommun. Technol.}, volume = {33}, number = {11}, year = {2022}, url = {https://doi.org/10.1002/ett.4584}, doi = {10.1002/ETT.4584}, timestamp = {Mon, 05 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ett/TianZMJSHL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/grid/YingYTJMH22, author = {Qianjin Ying and Yulei Yu and Donghai Tian and Xiaoqi Jia and Rui Ma and Changzhen Hu}, title = {CJSpector: {A} Novel Cryptojacking Detection Method Using Hardware Trace and Deep Learning}, journal = {J. Grid Comput.}, volume = {20}, number = {3}, pages = {31}, year = {2022}, url = {https://doi.org/10.1007/s10723-022-09621-2}, doi = {10.1007/S10723-022-09621-2}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/grid/YingYTJMH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/YuanCTMJL22, author = {Chong Yuan and Jingxuan Cai and Donghai Tian and Rui Ma and Xiaoqi Jia and Wenmao Liu}, title = {Towards time evolved malware identification using two-head neural network}, journal = {J. Inf. Secur. Appl.}, volume = {65}, pages = {103098}, year = {2022}, url = {https://doi.org/10.1016/j.jisa.2021.103098}, doi = {10.1016/J.JISA.2021.103098}, timestamp = {Fri, 01 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/istr/YuanCTMJL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcc/TianZWLH22, author = {Donghai Tian and Qiang Zeng and Dinghao Wu and Peng Liu and Changzhen Hu}, title = {Semi-Synchronized Non-Blocking Concurrent Kernel Cruising}, journal = {{IEEE} Trans. Cloud Comput.}, volume = {10}, number = {2}, pages = {1428--1444}, year = {2022}, url = {https://doi.org/10.1109/TCC.2020.2970183}, doi = {10.1109/TCC.2020.2970183}, timestamp = {Tue, 28 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcc/TianZWLH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tie/YinLXZJ22, author = {Tianxiang Yin and Lei Lin and Chen Xu and Donghai Zhu and Kaiyuan Jing}, title = {A Hybrid Modular Multilevel Converter Comprising SiC {MOSFET} and Si {IGBT} With Its Specialized Modulation and Voltage Balancing Scheme}, journal = {{IEEE} Trans. Ind. Electron.}, volume = {69}, number = {11}, pages = {11272--11282}, year = {2022}, url = {https://doi.org/10.1109/TIE.2021.3118372}, doi = {10.1109/TIE.2021.3118372}, timestamp = {Tue, 28 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tie/YinLXZJ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2210-10959, author = {Jianqiu Chen and Mingshan Sun and Ye Zheng and Tianpeng Bao and Zhenyu He and Donghai Li and Guoqiang Jin and Rui Zhao and Liwei Wu and Xiaoke Jiang}, title = {Uni6Dv3: 5D Anchor Mechanism for 6D Pose Estimation}, journal = {CoRR}, volume = {abs/2210.10959}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2210.10959}, doi = {10.48550/ARXIV.2210.10959}, eprinttype = {arXiv}, eprint = {2210.10959}, timestamp = {Wed, 16 Oct 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2210-10959.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/TianYJMHL21, author = {Donghai Tian and Qianjin Ying and Xiaoqi Jia and Rui Ma and Changzhen Hu and Wenmao Liu}, title = {{MDCHD:} {A} novel malware detection method in cloud using hardware trace and deep learning}, journal = {Comput. Networks}, volume = {198}, pages = {108394}, year = {2021}, url = {https://doi.org/10.1016/j.comnet.2021.108394}, doi = {10.1016/J.COMNET.2021.108394}, timestamp = {Fri, 08 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/TianYJMHL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ese/WangHMTH21, author = {Xiajing Wang and Changzhen Hu and Rui Ma and Donghai Tian and Jinyuan He}, title = {CMFuzz: context-aware adaptive mutation for fuzzers}, journal = {Empir. Softw. Eng.}, volume = {26}, number = {1}, pages = {10}, year = {2021}, url = {https://doi.org/10.1007/s10664-020-09927-3}, doi = {10.1007/S10664-020-09927-3}, timestamp = {Tue, 26 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ese/WangHMTH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eswa/TianJMLLH21, author = {Donghai Tian and Xiaoqi Jia and Rui Ma and Shuke Liu and Wenjing Liu and Changzhen Hu}, title = {BinDeep: {A} deep learning approach to binary code similarity detection}, journal = {Expert Syst. Appl.}, volume = {168}, pages = {114348}, year = {2021}, url = {https://doi.org/10.1016/j.eswa.2020.114348}, doi = {10.1016/J.ESWA.2020.114348}, timestamp = {Tue, 02 Mar 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/eswa/TianJMLLH21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/kbs/ZhangYZLCW21, author = {Xiaobo Zhang and Yan Yang and Donghai Zhai and Tianrui Li and Jielei Chu and Hao Wang}, title = {Local2Global: Unsupervised multi-view deep graph representation learning with Nearest Neighbor Constraint}, journal = {Knowl. Based Syst.}, volume = {231}, pages = {107439}, year = {2021}, url = {https://doi.org/10.1016/j.knosys.2021.107439}, doi = {10.1016/J.KNOSYS.2021.107439}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/kbs/ZhangYZLCW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tgrs/ZhengLZWVSWWS21, author = {Donghai Zheng and Xin Li and Tianjie Zhao and Jun Wen and Rogier van der Velde and Mike Schwank and Xin Wang and Zuoliang Wang and Zhongbo Su}, title = {Impact of Soil Permittivity and Temperature Profile on L-Band Microwave Emission of Frozen Soil}, journal = {{IEEE} Trans. Geosci. Remote. Sens.}, volume = {59}, number = {5}, pages = {4080--4093}, year = {2021}, url = {https://doi.org/10.1109/TGRS.2020.3024971}, doi = {10.1109/TGRS.2020.3024971}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tgrs/ZhengLZWVSWWS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/HuangZYRYHZ20, author = {Donghai Huang and Yongli Zhao and Tiancheng Yang and Sabidur Rahman and Xiaosong Yu and Xinyi He and Jie Zhang}, title = {Quantum Key Distribution Over Double-Layer Quantum Satellite Networks}, journal = {{IEEE} Access}, volume = {8}, pages = {16087--16098}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2020.2966683}, doi = {10.1109/ACCESS.2020.2966683}, timestamp = {Fri, 07 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/HuangZYRYHZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/WangTMJZM20, author = {Wenjie Wang and Donghai Tian and Weizhi Meng and Xiaoqi Jia and Runze Zhao and Rui Ma}, title = {{MSYM:} {A} multichannel communication system for android devices}, journal = {Comput. Networks}, volume = {168}, year = {2020}, url = {https://doi.org/10.1016/j.comnet.2019.107024}, doi = {10.1016/J.COMNET.2019.107024}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cn/WangTMJZM20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/www/YuanHSGTAA20, author = {Weiwei Yuan and Kangya He and Chenyang Shi and Donghai Guan and Yuan Tian and Abdullah Al{-}Dhelaan and Mohammed Al{-}Dhelaan}, title = {Multi-view network embedding with node similarity ensemble}, journal = {World Wide Web}, volume = {23}, number = {5}, pages = {2699--2714}, year = {2020}, url = {https://doi.org/10.1007/s11280-020-00799-7}, doi = {10.1007/S11280-020-00799-7}, timestamp = {Fri, 18 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/www/YuanHSGTAA20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/Wang0TW20, author = {Xuefei Wang and Rui Ma and Donghai Tian and Xiajing Wang}, title = {{VCPEC:} Vulnerability Correlation Analysis Based on Privilege Escalation and Coritivity Theory}, booktitle = {{ICCNS} 2020: The 10th International Conference on Communication and Network Security, Tokyo, Japan, November 27-29, 2020}, pages = {99--108}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3442520.3442526}, doi = {10.1145/3442520.3442526}, timestamp = {Thu, 12 Aug 2021 15:30:47 +0200}, biburl = {https://dblp.org/rec/conf/iccns/Wang0TW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/GuanWYZTAA19, author = {Donghai Guan and Tingting Wang and Weiwei Yuan and Lejun Zhang and Yuan Tian and Mohammed Al{-}Dhelaan and Abdullah Al{-}Dhelaan}, title = {{SWNF:} Sign Prediction of Weak Ties Based on the Network Features}, journal = {{IEEE} Access}, volume = {7}, pages = {102054--102063}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2928438}, doi = {10.1109/ACCESS.2019.2928438}, timestamp = {Wed, 21 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/GuanWYZTAA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/TianMJH19, author = {Donghai Tian and Rui Ma and Xiaoqi Jia and Changzhen Hu}, title = {A Kernel Rootkit Detection Approach Based on Virtualization and Machine Learning}, journal = {{IEEE} Access}, volume = {7}, pages = {91657--91666}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2928060}, doi = {10.1109/ACCESS.2019.2928060}, timestamp = {Thu, 08 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/TianMJH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/WangMLTW19, author = {Xiajing Wang and Rui Ma and Binbin Li and Donghai Tian and Xuefei Wang}, title = {{E-WBM:} An Effort-Based Vulnerability Discovery Model}, journal = {{IEEE} Access}, volume = {7}, pages = {44276--44292}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2907977}, doi = {10.1109/ACCESS.2019.2907977}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/WangMLTW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/complexity/YuanPGTAA19, author = {Weiwei Yuan and Jiali Pang and Donghai Guan and Yuan Tian and Abdullah Al{-}Dhelaan and Mohammed Al{-}Dhelaan}, title = {Sign Prediction on Unlabeled Social Networks Using Branch and Bound Optimized Transfer Learning}, journal = {Complex.}, volume = {2019}, pages = {4906903:1--4906903:11}, year = {2019}, url = {https://doi.org/10.1155/2019/4906903}, doi = {10.1155/2019/4906903}, timestamp = {Thu, 24 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/complexity/YuanPGTAA19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/concurrency/TianJZZHX19, author = {Donghai Tian and Xiaoqi Jia and Zhaolong Zhang and Li Zhan and Changzhen Hu and Jingfeng Xue}, title = {An online approach to defeating {ROP} attacks{\({_\ast}\)}}, journal = {Concurr. Comput. Pract. Exp.}, volume = {31}, number = {22}, year = {2019}, url = {https://doi.org/10.1002/cpe.4775}, doi = {10.1002/CPE.4775}, timestamp = {Mon, 02 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/concurrency/TianJZZHX19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/TianMJH19, author = {Donghai Tian and Rui Ma and Xiaoqi Jia and Changzhen Hu}, title = {KEcruiser: {A} novel control flow protection for kernel extensions}, journal = {Future Gener. Comput. Syst.}, volume = {100}, pages = {1--9}, year = {2019}, url = {https://doi.org/10.1016/j.future.2019.05.008}, doi = {10.1016/J.FUTURE.2019.05.008}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fgcs/TianMJH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/remotesensing/ZhouZWTDWZXP19, author = {Qian Zhou and Xiang Zhao and Donghai Wu and Rongyun Tang and Xiaozheng Du and Haoyu Wang and Jiacheng Zhao and Peipei Xu and Yifeng Peng}, title = {Impact of Urbanization and Climate on Vegetation Coverage in the Beijing-Tianjin-Hebei Region of China}, journal = {Remote. Sens.}, volume = {11}, number = {20}, pages = {2452}, year = {2019}, url = {https://doi.org/10.3390/rs11202452}, doi = {10.3390/RS11202452}, timestamp = {Thu, 04 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/remotesensing/ZhouZWTDWZXP19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/GuanWYHTAA18, author = {Donghai Guan and Hongqiang Wei and Weiwei Yuan and Guangjie Han and Yuan Tian and Mohammed Al{-}Dhelaan and Abdullah Al{-}Dhelaan}, title = {Improving Label Noise Filtering by Exploiting Unlabeled Data}, journal = {{IEEE} Access}, volume = {6}, pages = {11154--11165}, year = {2018}, url = {https://doi.org/10.1109/ACCESS.2018.2807779}, doi = {10.1109/ACCESS.2018.2807779}, timestamp = {Wed, 04 Jul 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/GuanWYHTAA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/puc/ZhaoLCT18, author = {Chunzhe Zhao and Donghai Li and Jianwei Cui and Lingling Tian}, title = {Decentralized low-order {ADRC} design for {MIMO} system with unknown order and relative degree}, journal = {Pers. Ubiquitous Comput.}, volume = {22}, number = {5-6}, pages = {987--1004}, year = {2018}, url = {https://doi.org/10.1007/s00779-018-1158-x}, doi = {10.1007/S00779-018-1158-X}, timestamp = {Thu, 09 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/puc/ZhaoLCT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/spe/TianXHL18, author = {Donghai Tian and Xi Xiong and Changzhen Hu and Peng Liu}, title = {A policy-centric approach to protecting {OS} kernel from vulnerable LKMs}, journal = {Softw. Pract. Exp.}, volume = {48}, number = {6}, pages = {1269--1284}, year = {2018}, url = {https://doi.org/10.1002/spe.2576}, doi = {10.1002/SPE.2576}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/spe/TianXHL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/malware/WangZJT18, author = {Chang Wang and Zhaolong Zhang and Xiaoqi Jia and Donghai Tian}, title = {Binary Obfuscation Based Reassemble}, booktitle = {13th International Conference on Malicious and Unwanted Software, {MALWARE} 2018, Nantucket, MA, USA, October 22-24, 2018}, pages = {153--160}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/MALWARE.2018.8659363}, doi = {10.1109/MALWARE.2018.8659363}, timestamp = {Wed, 16 Oct 2019 14:14:55 +0200}, biburl = {https://dblp.org/rec/conf/malware/WangZJT18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jise/TianJCH17, author = {Donghai Tian and Xiaoqi Jia and Junhua Chen and Changzhen Hu}, title = {An Online Approach for Kernel-level Keylogger Detection and Defense}, journal = {J. Inf. Sci. Eng.}, volume = {33}, number = {2}, pages = {445--461}, year = {2017}, url = {https://jise.iis.sinica.edu.tw/JISESearch/pages/View/PaperView.jsf?keyId=155\_2013}, timestamp = {Fri, 17 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jise/TianJCH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/css/TianJZHX17, author = {Donghai Tian and Xiaoqi Jia and Li Zhan and Changzhen Hu and Jingfeng Xue}, editor = {Sheng Wen and Wei Wu and Aniello Castiglione}, title = {An Online Approach to Defeating Return-Oriented-Programming Attacks}, booktitle = {Cyberspace Safety and Security - 9th International Symposium, {CSS} 2017, Xi'an, China, October 23-25, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10581}, pages = {236--247}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-69471-9\_18}, doi = {10.1007/978-3-319-69471-9\_18}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/css/TianJZHX17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdf2c/JiaZHZT17, author = {Xiaoqi Jia and Guangzhe Zhou and Qingjia Huang and Weijuan Zhang and Donghai Tian}, editor = {Petr Matousek and Martin Schmiedecker}, title = {FindEvasion: An Effective Environment-Sensitive Malware Detection System for the Cloud}, booktitle = {Digital Forensics and Cyber Crime - 9th International Conference, {ICDF2C} 2017, Prague, Czech Republic, October 9-11, 2017, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {216}, pages = {3--17}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-73697-6\_1}, doi = {10.1007/978-3-319-73697-6\_1}, timestamp = {Fri, 03 Apr 2020 16:46:09 +0200}, biburl = {https://dblp.org/rec/conf/icdf2c/JiaZHZT17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/TianQZYHX17, author = {Donghai Tian and Dingjun Qi and Li Zhan and Yuhang Yin and Changzhen Hu and Jingfeng Xue}, editor = {Zheng Yan and Refik Molva and Wojciech Mazurczyk and Raimo Kantola}, title = {A Practical Method to Confine Sensitive {API} Invocations on Commodity Hardware}, booktitle = {Network and System Security - 11th International Conference, {NSS} 2017, Helsinki, Finland, August 21-23, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10394}, pages = {145--159}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-64701-2\_11}, doi = {10.1007/978-3-319-64701-2\_11}, timestamp = {Sun, 06 Oct 2024 21:12:36 +0200}, biburl = {https://dblp.org/rec/conf/nss/TianQZYHX17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jise/TianCHX16, author = {Donghai Tian and Junhua Chen and Changzhen Hu and Jingfeng Xue}, title = {A Secure and Efficient Kernel Log Transfer Mechanism for Virtualization Environments}, journal = {J. Inf. Sci. Eng.}, volume = {32}, number = {5}, pages = {1131--1143}, year = {2016}, url = {http://www.iis.sinica.edu.tw/page/jise/2016/201609\_01.html}, timestamp = {Fri, 16 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jise/TianCHX16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/concurrency/MaLSTWG15, author = {Tinghuai Ma and Yinhua Lu and Sunyuan Shi and Wei Tian and Xin Wang and Donghai Guan}, title = {Data resource discovery model based on hybrid architecture in data grid environment}, journal = {Concurr. Comput. Pract. Exp.}, volume = {27}, number = {3}, pages = {507--525}, year = {2015}, url = {https://doi.org/10.1002/cpe.3222}, doi = {10.1002/CPE.3222}, timestamp = {Wed, 05 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/concurrency/MaLSTWG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cis/LiTH15, author = {Jiani Li and Donghai Tian and Changzhen Hu}, title = {Dynamic Tracking Reinforcement Based on Simplified Control Flow}, booktitle = {11th International Conference on Computational Intelligence and Security, {CIS} 2015, Shenzhen, China, December 19-20, 2015}, pages = {358--362}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/CIS.2015.93}, doi = {10.1109/CIS.2015.93}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cis/LiTH15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cee/TianXH014, author = {Donghai Tian and Xi Xiong and Changzhen Hu and Peng Liu}, title = {Defeating buffer overflow attacks via virtualization}, journal = {Comput. Electr. Eng.}, volume = {40}, number = {6}, pages = {1940--1950}, year = {2014}, url = {https://doi.org/10.1016/j.compeleceng.2013.11.032}, doi = {10.1016/J.COMPELECENG.2013.11.032}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cee/TianXH014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/TianLCH14, author = {Donghai Tian and Xuanya Li and Mo Chen and Changzhen Hu}, title = {iCruiser: An Improved Approach for Concurrent Heap Buffer Overflow Monitoring}, journal = {{IEICE} Trans. Inf. Syst.}, volume = {97-D}, number = {3}, pages = {601--605}, year = {2014}, url = {https://doi.org/10.1587/transinf.E97.D.601}, doi = {10.1587/TRANSINF.E97.D.601}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/TianLCH14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/TianXHL14, author = {Donghai Tian and Jingfeng Xue and Changzhen Hu and Xuanya Li}, title = {A Virtualization-Based Approach for Application Whitelisting}, journal = {{IEICE} Trans. Inf. Syst.}, volume = {97-D}, number = {6}, pages = {1648--1651}, year = {2014}, url = {https://doi.org/10.1587/transinf.E97.D.1648}, doi = {10.1587/TRANSINF.E97.D.1648}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/TianXHL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@incollection{DBLP:books/sp/securecloud14/Wu0ZT14, author = {Dinghao Wu and Peng Liu and Qiang Zeng and Donghai Tian}, editor = {Sushil Jajodia and Krishna Kant and Pierangela Samarati and Anoop Singhal and Vipin Swarup and Cliff Wang}, title = {Software Cruising: {A} New Technology for Building Concurrent Software Monitor}, booktitle = {Secure Cloud Computing}, pages = {303--324}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-1-4614-9278-8\_14}, doi = {10.1007/978-1-4614-9278-8\_14}, timestamp = {Thu, 13 Feb 2020 15:16:45 +0100}, biburl = {https://dblp.org/rec/books/sp/securecloud14/Wu0ZT14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicet/TianCHL13, author = {Donghai Tian and Mo Chen and Changzhen Hu and Xuanya Li}, title = {Efficient Shellcode Detection on Commodity Hardware}, journal = {{IEICE} Trans. Inf. Syst.}, volume = {96-D}, number = {10}, pages = {2272--2276}, year = {2013}, url = {https://doi.org/10.1587/transinf.E96.D.2272}, doi = {10.1587/TRANSINF.E96.D.2272}, timestamp = {Sat, 11 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicet/TianCHL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/kbs/MaYTGL13, author = {Tinghuai Ma and Qiaoqiao Yan and Wei Tian and Donghai Guan and Sungyoung Lee}, title = {Replica creation strategy based on quantum evolutionary algorithm in data gird}, journal = {Knowl. Based Syst.}, volume = {42}, pages = {85--96}, year = {2013}, url = {https://doi.org/10.1016/j.knosys.2013.01.020}, doi = {10.1016/J.KNOSYS.2013.01.020}, timestamp = {Wed, 03 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/kbs/MaYTGL13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/KongTPLW13, author = {Deguang Kong and Donghai Tian and Qiha Pan and Peng Liu and Dinghao Wu}, title = {Semantic aware attribution analysis of remote exploits}, journal = {Secur. Commun. Networks}, volume = {6}, number = {7}, pages = {818--832}, year = {2013}, url = {https://doi.org/10.1002/sec.613}, doi = {10.1002/SEC.613}, timestamp = {Thu, 10 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/KongTPLW13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/HuoJZZZFS13, author = {Yanyan Huo and Tianqing Jia and Yi Zhang and Hua Zhao and Shian Zhang and Donghai Feng and Zhenrong Sun}, title = {Narrow and Deep Fano Resonances in a Rod and Concentric Square Ring-Disk Nanostructures}, journal = {Sensors}, volume = {13}, number = {9}, pages = {11350--11361}, year = {2013}, url = {https://doi.org/10.3390/s130911350}, doi = {10.3390/S130911350}, timestamp = {Wed, 14 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sensors/HuoJZZZFS13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/igarss/GuoGCXC12, author = {Jing Guo and Xingfa Gu and Tianhai Cheng and Donghai Xie and Hao Chen}, title = {Regional trend analysis of the aerosol optical depth comparing to {MODIS} and {MISR} aerosol products}, booktitle = {2012 {IEEE} International Geoscience and Remote Sensing Symposium, {IGARSS} 2012, Munich, Germany, July 22-27, 2012}, pages = {3654--3657}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/IGARSS.2012.6350624}, doi = {10.1109/IGARSS.2012.6350624}, timestamp = {Wed, 24 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/igarss/GuoGCXC12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/TianZW0H12, author = {Donghai Tian and Qiang Zeng and Dinghao Wu and Peng Liu and Changzhen Hu}, title = {Kruiser: Semi-synchronized Non-blocking Concurrent Kernel Heap Buffer Overflow Monitoring}, booktitle = {19th Annual Network and Distributed System Security Symposium, {NDSS} 2012, San Diego, California, USA, February 5-8, 2012}, publisher = {The Internet Society}, year = {2012}, url = {https://www.ndss-symposium.org/ndss2012/kruiser-semi-synchronized-non-blocking-concurrent-kernel-heap-buffer-overflow-monitoring}, timestamp = {Mon, 01 Feb 2021 08:42:14 +0100}, biburl = {https://dblp.org/rec/conf/ndss/TianZW0H12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/itiis/MaTGL11, author = {Tinghuai Ma and Wei Tian and Donghai Guan and Sungyoung Lee}, title = {Quantizing Personal Privacy in Ubiquitous Computing}, journal = {{KSII} Trans. Internet Inf. Syst.}, volume = {5}, number = {9}, pages = {1653--1667}, year = {2011}, url = {https://doi.org/10.3837/tiis.2011.09.009}, doi = {10.3837/TIIS.2011.09.009}, timestamp = {Wed, 03 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/itiis/MaTGL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/TianXHL11, author = {Donghai Tian and Xi Xiong and Changzhen Hu and Peng Liu}, editor = {Feng Bao and Jian Weng}, title = {Policy-Centric Protection of {OS} Kernel from Vulnerable Loadable Kernel Modules}, booktitle = {Information Security Practice and Experience - 7th International Conference, {ISPEC} 2011, Guangzhou, China, May 30 - June 1, 2011. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6672}, pages = {317--332}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-21031-0\_24}, doi = {10.1007/978-3-642-21031-0\_24}, timestamp = {Tue, 12 May 2020 10:56:38 +0200}, biburl = {https://dblp.org/rec/conf/ispec/TianXHL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/XiongTL11, author = {Xi Xiong and Donghai Tian and Peng Liu}, title = {Practical Protection of Kernel Integrity for Commodity {OS} from Untrusted Extensions}, booktitle = {Proceedings of the Network and Distributed System Security Symposium, {NDSS} 2011, San Diego, California, USA, 6th February - 9th February 2011}, publisher = {The Internet Society}, year = {2011}, url = {https://www.ndss-symposium.org/ndss2011/practical-protection-of-kernel-integrity-for-commodity-os-from-untrusted-extensions}, timestamp = {Mon, 01 Feb 2021 08:42:10 +0100}, biburl = {https://dblp.org/rec/conf/ndss/XiongTL11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/KongTLW11, author = {Deguang Kong and Donghai Tian and Peng Liu and Dinghao Wu}, editor = {Muttukrishnan Rajarajan and Fred Piper and Haining Wang and George Kesidis}, title = {{SA3:} Automatic Semantic Aware Attribution Analysis of Remote Exploits}, booktitle = {Security and Privacy in Communication Networks - 7th International {ICST} Conference, SecureComm 2011, London, UK, September 7-9, 2011, Revised Selected Papers}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {96}, pages = {190--208}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-31909-9\_11}, doi = {10.1007/978-3-642-31909-9\_11}, timestamp = {Mon, 24 Jun 2024 20:34:51 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/KongTLW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isw/TianXHL10, author = {Donghai Tian and Xi Xiong and Changzhen Hu and Peng Liu}, editor = {Mike Burmester and Gene Tsudik and Spyros S. Magliveras and Ivana Ilic}, title = {Integrating Offline Analysis and Online Protection to Defeat Buffer Overflow Attacks}, booktitle = {Information Security - 13th International Conference, {ISC} 2010, Boca Raton, FL, USA, October 25-28, 2010, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {6531}, pages = {409--415}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-18178-8\_34}, doi = {10.1007/978-3-642-18178-8\_34}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/isw/TianXHL10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securware/TianKH010, author = {Donghai Tian and Deguang Kong and Changzhen Hu and Peng Liu}, editor = {Reijo Savola and Masaru Takesue and Rainer Falk and Manuela Popescu}, title = {Protecting Kernel Data through Virtualization Technology}, booktitle = {Fourth International Conference on Emerging Security Information Systems and Technologies, {SECURWARE} 2010, Venice, Italy, July 18-25, 2010}, pages = {5--10}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/SECURWARE.2010.9}, doi = {10.1109/SECURWARE.2010.9}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/securware/TianKH010.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEias/TianCQJ09, author = {Donghai Tian and Changzhen Hu and Yang Qi and Jianqiao Wang}, title = {Hierarchical Distributed Alert Correlation Model}, booktitle = {Proceedings of the Fifth International Conference on Information Assurance and Security, {IAS} 2009, Xi'An, China, 18-20 August 2009}, pages = {765--768}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/IAS.2009.26}, doi = {10.1109/IAS.2009.26}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEias/TianCQJ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csie/TianLS09, author = {Lingling Tian and Donghai Li and Xianfang Sun}, editor = {Mark Burgin and Masud H. Chowdhury and Chan H. Ham and Simone A. Ludwig and Weilian Su and Sumanth Yenduri}, title = {Adaptive Synchronization of the Modified Chua's Circuit Systems}, booktitle = {{CSIE} 2009, 2009 {WRI} World Congress on Computer Science and Information Engineering, March 31 - April 2, 2009, Los Angeles, California, USA, 7 Volumes}, pages = {254--258}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/CSIE.2009.258}, doi = {10.1109/CSIE.2009.258}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csie/TianLS09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijon/TianLS08, author = {Lingling Tian and Donghai Li and Xianfang Sun}, title = {Nonlinear-estimator-based robust synchronization of Hodgkin-Huxley neurons}, journal = {Neurocomputing}, volume = {72}, number = {1-3}, pages = {186--196}, year = {2008}, url = {https://doi.org/10.1016/j.neucom.2008.04.051}, doi = {10.1016/J.NEUCOM.2008.04.051}, timestamp = {Tue, 06 Jun 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijon/TianLS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iros/ZhangTSW06, author = {Yu Zhang and Jiaping Tian and Donghai Su and Shijie Wang}, title = {Research on the Hierarchical Supervisory Control of Underwater Glider}, booktitle = {2006 {IEEE/RSJ} International Conference on Intelligent Robots and Systems, {IROS} 2006, October 9-15, 2006, Beijing, China}, pages = {5509--5513}, publisher = {{IEEE}}, year = {2006}, url = {https://doi.org/10.1109/IROS.2006.282186}, doi = {10.1109/IROS.2006.282186}, timestamp = {Wed, 16 Oct 2019 14:14:51 +0200}, biburl = {https://dblp.org/rec/conf/iros/ZhangTSW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.