Yang, Wen Xiang
2250  Ergebnisse:
Personensuche X
?
1

The Design and Application of Software Measurement and Eval..:

, In: 2021 2nd International Conference on Big Data & Artificial Intelligence & Software Engineering (ICBASE),
Li, Wen Xing ; Gu, Zi Yi ; Yang, Xiang Lin. - p. 649-653 , 2021
 
?
2

Research on Positioning Accuracy of Welding Robot Based on ..:

, In: 2022 International Conference on Inventive Computation Technologies (ICICT),
Shen, Yanping ; Hu, Mengxi ; Teng, Kai... - p. 702-705 , 2022
 
?
3

Risk Analysis and Prediction for Prostate Cancer based on D..:

, In: 2022 International Conference on Industrial IoT, Big Data and Supply Chain (IIoTBDSC),
Gui, Ying ; Li, Zhiyue ; Wang, Haixu... - p. 245-250 , 2022
 
?
4

Research and application of an improved method for testing ..:

, In: 2017 IEEE 3rd Information Technology and Mechatronics Engineering Conference (ITOEC),
Cao, NanJun ; Wang, Zheng ; Xiang, Wen... - p. 1126-1129 , 2017
 
?
5

Dynalogue: A Transformer-Based Dialogue System with Dynamic..:

, In: Proceedings of the ACM Web Conference 2023,
Zhang, Rongjunchen ; Wu, Tingmin ; Chen, Xiao... - p. 1604-1615 , 2023
 
?
6

Siamese Adaptive Template Update Network for Visual Trackin:

, In: Lecture Notes in Computer Science; Advanced Intelligent Computing Technology and Applications,
Wen, Jia ; Ren, Kejun ; Xiang, Yang. - p. 485-497 , 2023
 
?
7

A Comparative Study on the Security of Cryptocurrency Walle..:

, In: 2022 IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom),
Qi, Minfeng ; Xu, Zhiyu ; Jiao, Tengyun... - p. 399-406 , 2022
 
?
8

Supporting Cyber-Attacks and System Anomaly Detection Resea..:

, In: Network and System Security; Lecture Notes in Computer Science,
Shi, Lei ; Krishnan, Shanti ; Wen, Sheng. - p. 335-353 , 2022
 
?
9

Cross-language Android permission specification:

, In: Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering,
Li, Chaoran ; Chen, Xiao ; Sun, Ruoxi... - p. 772-783 , 2022
 
?
10

Snipuzz: Black-box Fuzzing of IoT Firmware via Message Snip..:

, In: Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security,
Feng, Xiaotao ; Sun, Ruoxi ; Zhu, Xiaogang... - p. 337-350 , 2021
 
?
11

RBAC-GL: A Role-Based Access Control Gasless Architecture o..:

, In: Algorithms and Architectures for Parallel Processing; Lecture Notes in Computer Science,
Xu, Zhiyu ; Jiao, Tengyun ; Yang, Lin... - p. 439-453 , 2020
 
?
12

PPM: A Provenance-Provided Data Sharing Model for Open Bank..:

, In: Proceedings of the Australasian Computer Science Week Multiconference,
Xu, Zhiyu ; Wang, Qin ; Wang, Ziyaun... - p. 1-8 , 2020
 
?
13

BHDA - A Blockchain-Based Hierarchical Data Access Model fo..:

, In: 2020 IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom),
Xu, Zhiyu ; Yang, Lin ; Wang, Ziyuan... - p. 530-538 , 2020
 
?
14

What risk? I don't understand. An Empirical Study on Users'..:

, In: Proceedings of the 15th ACM Asia Conference on Computer and Communications Security,
Wu, Tingmin ; Zhang, Rongjunchen ; Ma, Wanlun... - p. 248-262 , 2020
 
?
15

An Efficient Supply Chain Architecture Based on Blockchain ..:

, In: Proceedings of the 2019 ACM International Symposium on Blockchain and Secure Critical Infrastructure,
Xu, Zhiyu ; Jiao, Tengyun ; Wang, Qin... - p. 81-88 , 2019
 
1-15