default search action
Xiaohui Kuang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j29]Ming Zhang, Yongkang Chen, Hu Li, Cheng Qian, Xiaohui Kuang:
Dynamic loss yielding more transferable targeted adversarial examples. Neurocomputing 590: 127754 (2024) - [j28]Yafeng Li, Changchun Li, Qian Cheng, Fuyi Duan, Weiguang Zhai, Zongpeng Li, Bohan Mao, Fan Ding, Xiaohui Kuang, Zhen Chen:
Estimating Maize Crop Height and Aboveground Biomass Using Multi-Source Unmanned Aerial Vehicle Remote Sensing and Optuna-Optimized Ensemble Learning Algorithms. Remote. Sens. 16(17): 3176 (2024) - [c70]Wei Kong, Hu Li, Qianjin Du, Huayang Cao, Xiaohui Kuang:
A New Perspective of Deep Learning Testing Framework: Human-Computer Interaction Based Neural Network Testing. ICRA 2024: 16299-16305 - [c69]Tong Wang, Taotao Gu, Huan Deng, Hu Li, Xiaohui Kuang, Gang Zhao:
Dance of the ADS: Orchestrating Failures through Historically-Informed Scenario Fuzzing. ISSTA 2024: 1086-1098 - [i1]Tong Wang, Taotao Gu, Huan Deng, Hu Li, Xiaohui Kuang, Gang Zhao:
Dance of the ADS: Orchestrating Failures through Historically-Informed Scenario Fuzzing. CoRR abs/2407.04359 (2024) - 2023
- [j27]Tao Zhang, Changqiao Xu, Yibo Lian, Haijiang Tian, Jiawen Kang, Xiaohui Kuang, Dusit Niyato:
When Moving Target Defense Meets Attack Prediction in Digital Twins: A Convolutional and Hierarchical Reinforcement Learning Approach. IEEE J. Sel. Areas Commun. 41(10): 3293-3305 (2023) - [j26]Tengchao Ma, Changqiao Xu, Shujie Yang, Yiting Huang, Qingzhao An, Xiaohui Kuang, Luigi Alfredo Grieco:
A Mutation-Enabled Proactive Defense Against Service-Oriented Man-in-The-Middle Attack in Kubernetes. IEEE Trans. Computers 72(7): 1843-1856 (2023) - [j25]Zan Zhou, Changqiao Xu, Ming-Ze Wang, Xiaohui Kuang, Yirong Zhuang, Shui Yu:
A Multi-Shuffler Framework to Establish Mutual Confidence for Secure Federated Learning. IEEE Trans. Dependable Secur. Comput. 20(5): 4230-4244 (2023) - [j24]Tao Zhang, Changqiao Xu, Bingchi Zhang, Xinran Li, Xiaohui Kuang, Luigi Alfredo Grieco:
Towards Attack-Resistant Service Function Chain Migration: A Model-Based Adaptive Proximal Policy Optimization Approach. IEEE Trans. Dependable Secur. Comput. 20(6): 4913-4927 (2023) - [j23]Tao Zhang, Changqiao Xu, Jiahao Shen, Xiaohui Kuang, Luigi Alfredo Grieco:
How to Disturb Network Reconnaissance: A Moving Target Defense Approach Based on Deep Reinforcement Learning. IEEE Trans. Inf. Forensics Secur. 18: 5735-5748 (2023) - [j22]Tao Zhang, Changqiao Xu, Ping Zou, Haijiang Tian, Xiaohui Kuang, Shujie Yang, Lujie Zhong, Dusit Niyato:
How to Mitigate DDoS Intelligently in SD-IoV: A Moving Target Defense Approach. IEEE Trans. Ind. Informatics 19(1): 1097-1106 (2023) - [c68]Wei Kong, Qianjin Du, Huayang Cao, Hu Li, Tong Wang, Jianwen Tian, Xiaohui Kuang:
Test Suite Generation Based on Context-Adapted Structural Coverage for Testing DNN. APNOMS 2023: 1-6 - [c67]Qianjin Du, Xiaohui Kuang, Xiang Li, Gang Zhao:
Fine-Grained Software Vulnerability Detection via Neural Architecture Search. DASFAA (4) 2023: 224-238 - [c66]Yaning Zheng, Dongxia Wang, Huayang Cao, Cheng Qian, Xiaohui Kuang, Honglin Zhuang:
A Study on Vulnerability Code Labeling Method in Open-Source C Programs. DEXA (1) 2023: 52-67 - [c65]Hu Li, Qiongmin Ma, Ming Zhang, Xiaohui Kuang:
Machine Learning Security Analysis Framework Based on Threat Matrix. DSC 2023: 456-460 - [c64]Jiahe Ji, Wei Kong, Jianwen Tian, Taotao Gu, Yuanping Nie, Xiaohui Kuang:
Survey on Fuzzing Techniques in Deep Learning Libraries. DSC 2023: 461-467 - [c63]Qianjin Du, Shiji Zhou, Xiaohui Kuang, Gang Zhao, Jidong Zhai:
Joint Geometrical and Statistical Domain Adaptation for Cross-domain Code Vulnerability Detection. EMNLP 2023: 12791-12800 - [c62]Qianjin Du, Wei Kun, Xiaohui Kuang, Xiang Li, Gang Zhao:
Automated Software Vulnerability Detection via Curriculum Learning. ICME 2023: 2855-2860 - [c61]Huan Deng, Minhuan Huang, Tong Wang, Hu Li, Jianwen Tian, Qian Yan, Xiaohui Kuang:
ADV-POST: Physically Realistic Adversarial Poster for Attacking Semantic Segmentation Models in Autonomous Driving. ICONIP (13) 2023: 351-364 - [c60]Tong Wang, Xiaohui Kuang, Huan Deng, Taotao Gu, Wei Kong, Jianwen Tian, Gang Zhao:
Risk Scenario Generation for Autonomous Driving Systems based on Scenario Evaluation Model. IJCNN 2023: 1-8 - [c59]Tong Wang, Xiaohui Kuang, Hu Li, Qianjin Du, Zhanhao Hu, Huan Deng, Gang Zhao:
Driving into Danger: Adversarial Patch Attack on End-to-End Autonomous Driving Systems Using Deep Learning. ISCC 2023: 995-1000 - [c58]Jingjing Wang, Minhuan Huang, Yuanping Nie, Xiaohui Kuang, Xiang Li, Wenjing Zhong:
Fine-Grained Source Code Vulnerability Detection via Graph Neural Networks (S). SEKE 2023: 222-227 - [c57]Jianwen Tian, Kefan Qiu, Debin Gao, Zhi Wang, Xiaohui Kuang, Gang Zhao:
Sparsity Brings Vulnerabilities: Exploring New Metrics in Backdoor Attacks. USENIX Security Symposium 2023: 2689-2706 - 2022
- [j21]Qikun Zhang, Kunyuan Zhao, Xiaohui Kuang, Yongjiao Li, Yuanpan Zheng, Junling Yuan, Ruifang Wang:
Multidomain security authentication for the Internet of things. Concurr. Comput. Pract. Exp. 34(16) (2022) - [j20]Zhi Wang, Leshi Shao, Kai Cheng, Yuanzhao Liu, Jianan Jiang, Yuanping Nie, Xiang Li, Xiaohui Kuang:
ICDF: Intrusion collaborative detection framework based on confidence. Int. J. Intell. Syst. 37(10): 7180-7199 (2022) - [j19]Tengchao Ma, Changqiao Xu, Shujie Yang, Yiting Huang, Xiaohui Kuang, Hong Tang, Luigi Alfredo Grieco:
An intelligent proactive defense against the client-side DNS cache poisoning attack via self-checking deep reinforcement learning. Int. J. Intell. Syst. 37(10): 8170-8197 (2022) - [j18]Tao Zhang, Changqiao Xu, Bingchi Zhang, Jiahao Shen, Xiaohui Kuang, Luigi Alfredo Grieco:
Toward Attack-Resistant Route Mutation for VANETs: An Online and Adaptive Multiagent Reinforcement Learning Approach. IEEE Trans. Intell. Transp. Syst. 23(12): 23254-23267 (2022) - [c56]Yabin Li, Yuanping Nie, Xiaohui Kuang:
Fuzzing DBMS via NNLM. DSC 2022: 367-374 - [c55]Qianjin Du, Xiaohui Kuang, Gang Zhao:
Code Vulnerability Detection via Nearest Neighbor Mechanism. EMNLP (Findings) 2022: 6173-6178 - [c54]Chenxu Wang, Ming Zhang, Jinjing Zhao, Xiaohui Kuang, Han Zhang, Xuhong Zhang:
A Data-free Black-box Attack for Generating Transferable Adversarial Examples. HPCC/DSS/SmartCity/DependSys 2022: 672-678 - [c53]Tengchao Ma, Changqiao Xu, Qingzhao An, Xiaohui Kuang, Lujie Zhong, Luigi Alfredo Grieco:
A Proactive Defense Strategy Against SGX Side-channel Attacks via self-checking DRL in the Cloud. ICC 2022: 4174-4179 - [c52]Chenxu Wang, Ming Zhang, Jinjing Zhao, Xiaohui Kuang:
Black-Box Adversarial Attacks on Deep Neural Networks: A Survey. ICDIS 2022: 88-93 - [c51]Mingyuan Ma, Hu Li, Xiaohui Kuang:
Detecting Backdoor Attacks on Deep Neural Networks Based on Model Parameters Analysis. ICTAI 2022: 630-637 - [c50]Ming Zhang, Xiaohui Kuang, Hu Li, Zhendong Wu, Yuanping Nie, Gang Zhao:
Improving Transferability of Adversarial Examples with Virtual Step and Auxiliary Gradients. IJCAI 2022: 1629-1635 - [c49]Shangyuan Zhuang, Jiyan Sun, Hangsheng Zhang, Xiaohui Kuang, Ling Pang, Haitao Liu, Yinlong Liu:
StinAttack: A Lightweight and Effective Adversarial Attack Simulation to Ensemble IDSs for Satellite- Terrestrial Integrated Network. ISCC 2022: 1-8 - [c48]Yucheng Shi, Yahong Han, Yu-an Tan, Xiaohui Kuang:
Decision-based Black-box Attack Against Vision Transformers via Patch-wise Adversarial Removal. NeurIPS 2022 - [c47]Taotao Gu, Xiang Li, Shuaibing Lu, Jianwen Tian, Yuanping Nie, Xiaohui Kuang, Zhechao Lin, Chenyifan Liu, Jie Liang, Yu Jiang:
Group-based corpus scheduling for parallel fuzzing. ESEC/SIGSOFT FSE 2022: 1521-1532 - [c46]Yongkang Chen, Ming Zhang, Jin Li, Xiaohui Kuang, Xuhong Zhang, Han Zhang:
Dynamic and Diverse Transformations for Defending Against Adversarial Examples. TrustCom 2022: 976-983 - [c45]Xuewei Feng, Qi Li, Kun Sun, Zhiyun Qian, Gang Zhao, Xiaohui Kuang, Chuanpu Fu, Ke Xu:
Off-Path Network Traffic Manipulation via Revitalized ICMP Redirect Attacks. USENIX Security Symposium 2022: 2619-2636 - 2021
- [j17]Changqiao Xu, Tao Zhang, Xiaohui Kuang, Zan Zhou, Shui Yu:
Context-Aware Adaptive Route Mutation Scheme: A Reinforcement Learning Approach. IEEE Internet Things J. 8(17): 13528-13541 (2021) - [j16]Xiaohui Kuang, Xianfeng Gao, Lianfang Wang, Gang Zhao, Lishan Ke, Quanxin Zhang:
A discrete cosine transform-based query efficient attack on black-box object detectors. Inf. Sci. 546: 596-607 (2021) - [j15]Yajie Wang, Haoran Lv, Xiaohui Kuang, Gang Zhao, Yu-an Tan, Quanxin Zhang, Jingjing Hu:
Towards a physical-world adversarial patch for blinding object detection models. Inf. Sci. 556: 459-471 (2021) - [j14]Yutian Zhou, Yu-an Tan, Quanxin Zhang, Xiaohui Kuang, Yahong Han, Jingjing Hu:
An Evolutionary-Based Black-Box Attack to Deep Neural Network Classifiers. Mob. Networks Appl. 26(4): 1616-1629 (2021) - [j13]Xianmin Wang, Xiaohui Kuang, Jin Li, Jing Li, Xiaofeng Chen, Zheli Liu:
Oblivious Transfer for Privacy-Preserving in VANET's Feature Matching. IEEE Trans. Intell. Transp. Syst. 22(7): 4359-4366 (2021) - [c44]Yinfan Qin, Xiang Li, Jianwen Tian, Taotao Gu, Xiaohui Kuang:
Gradient-oriented gray-box protocol fuzzing. DSC 2021: 353-360 - [c43]Yabin Li, Yinfan Qin, Jianwen Tian, Taotao Gu, Yuanping Nie, Xiaohui Kuang:
Generating Highly Structured Inputs: A Survey. DSC 2021: 466-473 - [c42]Wei Kong, Huayang Cao, Jianwen Tian, Xiaohui Kuang:
Detecting Adversarial Samples in Neural Network with Statistical Metrics: A Practical Approach. DSC 2021: 662-669 - [c41]Haitao Zhang, Yucheng Shi, Benyu Dong, Yahong Han, Yuanzhang Li, Xiaohui Kuang:
Free Adversarial Training with Layerwise Heuristic Learning. ICIG (2) 2021: 120-131 - [c40]Jiahao Shen, Tao Zhang, Bingchi Zhang, Weixiao Ji, Xiaohui Kuang, Changqiao Xu:
PPO-RM: Proximal Policy Optimization Based Route Mutation for Multimedia Services. IWCMC 2021: 35-40 - 2020
- [j12]Jingjing Hu, Shuangshuang Guo, Xiaohui Kuang, Fankun Meng, Dongsheng Hu, Zhiyu Shi:
I-HMM-Based Multidimensional Network Security Risk Assessment. IEEE Access 8: 1431-1442 (2020) - [j11]Zan Zhou, Xiaohui Kuang, Limin Sun, Lujie Zhong, Changqiao Xu:
Endogenous Security Defense against Deductive Attack: When Artificial Intelligence Meets Active Defense for Online Service. IEEE Commun. Mag. 58(6): 58-64 (2020) - [j10]Jing Li, Xiaohui Kuang, Shujie Lin, Xu Ma, Yi Tang:
Privacy preservation for machine learning training and classification based on homomorphic encryption schemes. Inf. Sci. 526: 166-179 (2020) - [j9]Yajie Wang, Yu-an Tan, Wenjiao Zhang, Yuhang Zhao, Xiaohui Kuang:
An adversarial attack on DNN-based black-box object detectors. J. Netw. Comput. Appl. 161: 102634 (2020) - [j8]Yucheng Shi, Yahong Han, Quanxin Zhang, Xiaohui Kuang:
Adaptive iterative attack towards explainable adversarial robustness. Pattern Recognit. 105: 107309 (2020) - [j7]Xiang Li, Yuanping Nie, Zhi Wang, Xiaohui Kuang, Kefan Qiu, Cheng Qian, Gang Zhao:
BMOP: Bidirectional Universal Adversarial Learning for Binary OpCode Features. Wirel. Commun. Mob. Comput. 2020: 8876632:1-8876632:11 (2020) - [c39]Tengchao Ma, Changqiao Xu, Zan Zhou, Xiaohui Kuang, Lujie Zhong, Luigi Alfredo Grieco:
Intelligent-driven Adapting Defense Against the Client-side DNS Cache Poisoning in the Cloud. GLOBECOM 2020: 1-6 - [c38]Zan Zhou, Changqiao Xu, Tengchao Ma, Xiaohui Kuang:
Multi-vNIC Intelligent Mutation: A Moving Target Defense to thwart Client-side DNS Cache Attack. ICC 2020: 1-6 - [c37]Haitao Zhang, Fan Jia, Quanxin Zhang, Yahong Han, Xiaohui Kuang, Yu-an Tan:
Two-Way Feature-Aligned And Attention-Rectified Adversarial Training. ICME 2020: 1-6 - [c36]Ming Zhang, Hu Li, Xiaohui Kuang, Yuanping Nie, Cheng Qian, Zhendong Wu, Gang Zhao:
Non-norm-bounded Attack for Generating Adversarial Examples. ICONIP (5) 2020: 420-428 - [c35]Cheng Qian, Ming Zhang, Xiaohui Kuang, Gang Zhao:
A Study on Mesh Hybrid Memory Cube Network. ISPASS 2020: 218-219 - [c34]Tao Zhang, Changqiao Xu, Bingchi Zhang, Xiaohui Kuang, Yue Wang, Shujie Yang, Gabriel-Miro Muntean:
DQ-RM: Deep Reinforcement Learning-based Route Mutation Scheme for Multimedia Services. IWCMC 2020: 291-296 - [c33]Meng Ming, Gang Zhao, Xiaohui Kuang, Lu Liu, Ruyun Zhang:
An Adaptive Data Protection Scheme for Optimizing Storage Space. ML4CS (2) 2020: 250-260 - [c32]Xiangxiang Jiang, Yuxi Ma, Gang Zhao, Xiaohui Kuang, Yuanzhang Li, Ruyun Zhang:
A File-Level Continuous Data Protection Scheme for Enforcing Security Baseline. ML4CS (1) 2020: 519-529 - [c31]Shuaibing Lu, Xiaohui Kuang, Yuanping Nie, Zhechao Lin:
A Hybrid Interface Recovery Method for Android Kernels Fuzzing. QRS 2020: 335-346 - [c30]Jianping Yu, Gang Zhao, Xiaohui Kuang, Ruyun Zhang:
A Real-Time Audio and Video Streaming Transmission Scheme for Social Media. SocialSec 2020: 143-152 - [c29]Lianfang Wang, Ye Wang, Gang Zhao, Lu Liu, Xiaohui Kuang:
Keeping Privacy Data Secure Under Factory Recovery. SocialSec 2020: 224-233 - [c28]Ming Yan, Bo Zhang, Gang Zhao, Xiaohui Kuang, Lu Liu, Ruyun Zhang:
An Intelligent File Transfer Optimization for Poor Network Conditions. SocialSec 2020: 234-244 - [c27]Shuo Feng, Yu-an Tan, Gang Zhao, Xiaohui Kuang, Xiao Yu, Juan Wang:
A VirtualXposed-Based Inline Hooking Framework for Android Native Methods. SocialSec 2020: 245-253 - [c26]Kai Yang, Ling Pang, Bo Zhang, Gang Zhao, Xiaohui Kuang:
An Android Data Protection Scheme for System-as-Root Architectures. SocialSec 2020: 254-262 - [c25]Xuewei Feng, Dongxia Wang, Zhechao Lin, Xiaohui Kuang, Gang Zhao:
Enhancing Randomization Entropy of x86-64 Code while Preserving Semantic Consistency. TrustCom 2020: 1-12
2010 – 2019
- 2019
- [j6]Xiaohui Kuang, Hongyi Liu, Ye Wang, Qikun Zhang, Quanxin Zhang, Jun Zheng:
A CMA-ES-Based Adversarial Attack on Black-Box Deep Neural Networks. IEEE Access 7: 172938-172947 (2019) - [j5]Feng Guo, Qingjie Zhao, Xuan Li, Xiaohui Kuang, Jianwei Zhang, Yahong Han, Yu-an Tan:
Detecting adversarial examples via prediction difference for deep neural networks. Inf. Sci. 501: 182-192 (2019) - [j4]Xianmin Wang, Jing Li, Xiaohui Kuang, Yu-an Tan, Jin Li:
The security of machine learning in an adversarial setting: A survey. J. Parallel Distributed Comput. 130: 12-23 (2019) - [j3]Qiang Liu, Xiaohui Kuang, Hua Chen, Xiang Li, Guangke Li:
一种基于程序切片相似度匹配的脆弱性发现方法 (Vulnerability Discovery Approach Based on Similarity Matching of Program Slicing). 计算机科学 46(7): 126-132 (2019) - [c24]Xinxin Wang, Yuanzhang Li, Quanxin Zhang, Xiaohui Kuang:
Boosting Training for PDF Malware Classifier via Active Learning. CSS (2) 2019: 101-110 - [c23]Xiaohui Kuang, Ming Zhang, Hu Li, Gang Zhao, Huayang Cao, Zhendong Wu, Xianmin Wang:
DeepWAF: Detecting Web Attacks Based on CNN and LSTM Models. CSS (2) 2019: 121-136 - [c22]Yaxiao Wang, Yuanzhang Li, Quanxin Zhang, Jingjing Hu, Xiaohui Kuang:
Evading PDF Malware Classifiers with Generative Adversarial Network. CSS (1) 2019: 374-387 - [c21]Tao Zhang, Xiaohui Kuang, Zan Zhou, Hongquan Gao, Changqiao Xu:
An Intelligent Route Mutation Mechanism against Mixed Attack Based on Security Awareness. GLOBECOM 2019: 1-6 - [c20]Zan Zhou, Changqiao Xu, Xiaohui Kuang, Tao Zhang, Limin Sun:
An Efficient and Agile Spatio-Temporal Route Mutation Moving Target Defense Mechanism. ICC 2019: 1-6 - [c19]Ming Zhang, Hu Li, Xiaohui Kuang, Ling Pang, Zhendong Wu:
Neuron Selecting: Defending Against Adversarial Examples in Deep Neural Networks. ICICS 2019: 613-629 - [c18]Aming Wu, Yahong Han, Quanxin Zhang, Xiaohui Kuang:
Untargeted Adversarial Attack via Expanding the Semantic Gap. ICME 2019: 514-519 - [c17]Tengchao Ma, Changqiao Xu, Zan Zhou, Xiaohui Kuang, Lujie Zhong:
SE-PSO: Resource Scheduling Strategy for Multimedia Cloud Platform Based on Security Enhanced Virtual Migration. IWCMC 2019: 650-655 - [c16]Jinjing Zhao, Yan Wen, Xiang Li, Ling Pang, Xiaohui Kuang, Dongxia Wang:
A heuristic fuzz test generator for Java native interface. SQUADE@ESEC/SIGSOFT FSE 2019: 1-7 - 2018
- [c15]Honghao Yang, Dong Liang, Xiaohui Kuang, Changqiao Xu:
A Vulnerability Test Method for Speech Recognition Systems Based on Frequency Signal Processing. DSC 2018: 943-947 - [c14]Liang Ming, Gang Zhao, Minhuan Huang, Xiaohui Kuang, Hu Li, Ming Zhang:
Security Analysis of Intelligent Transportation Systems Based on Simulation Data. ICDIS 2018: 184-187 - [c13]Xiaohui Kuang, Jin Li, Fei Xu:
Network Traffic Generator Based on Distributed Agent for Large-Scale Network Emulation Environment. IScIDE 2018: 68-79 - [c12]Jinjing Zhao, Ling Pang, Xiaohui Kuang, Rong Jin:
Balancing the QOS and Security in Dijkstra Algorithm by SDN Technology. NPC 2018: 126-131 - [c11]Liang Ming, Gang Zhao, Minhuan Huang, Xiaohui Kuang, Jingzhe Zhang, Huayang Cao, Fei Xu:
A General Testing Framework Based on Veins for Securing VANET Applications. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2018: 2068-2073 - 2017
- [c10]Zhechao Lin, Xiang Li, Xiaohui Kuang:
Machine Learning in Vulnerability Databases. ISCID (1) 2017: 108-113 - 2016
- [j2]Xiaohui Kuang, Jin Li, Gang Zhao:
一种基于多层拓扑的大规模分布式系统结构脆弱性分析算法 (Multilayer Topology Structural Vulnerability Analysis Algorithm for Large-scale Distributed System). 计算机科学 43(8): 26-29 (2016) - [c9]Jie Gong, Xiaohui Kuang, Qiang Liu:
Survey on Software Vulnerability Analysis Method Based on Machine Learning. DSC 2016: 642-647 - 2015
- [j1]Xiaohui Kuang, Li Liu, Qiang Liu, Xiang Li:
A clustering approach based on convergence degree chain for wireless sensor networks. Secur. Commun. Networks 8(10): 1878-1889 (2015) - 2014
- [c8]Xiaohui Kuang, Bowen Li, Li Liu:
On Effectiveness of Clustering Principles in Maximizing Wireless Sensor Network Lifespan. WASA 2014: 412-423 - 2013
- [c7]Xiaohui Kuang, Xiang Li, Jinjing Zhao:
Architecture of Network Environment for High-Risk Security Experimentation. ICT-EurAsia 2013: 479-484 - 2012
- [c6]Qiang Liu, Li Liu, Xiaohui Kuang, Yan Wen:
Secure Service and Management for Security-Critical Wireless Sensor Network. IMIS 2012: 445-449 - 2011
- [c5]Liang Ming, Minhuan Huang, Dongxia Wang, Xiaohui Kuang, Chunlei Wang, Xuewei Feng:
Research on survivability metrics based on survivable process of network system. SIN 2011: 247-250 - 2010
- [c4]Yan Wen, Minhuan Huang, Jinjing Zhao, Xiaohui Kuang:
Implicit detection of stealth software with a local-booted virtual machine. ICIS 2010: 152-157
2000 – 2009
- 2009
- [c3]Gang Zhao, Xiaohui Kuang, Weimin Zheng:
An Emulation Environment for Vulnerability Analysis of Large-Scale Distributed System. GCC 2009: 97-105 - [c2]Minhuan Huang, Xiaohui Kuang, Yan Wen, Hong Tang, Fei Xu:
Research on Technologies of Building Experimental Environment for Network Worm Simulation. ICPADS 2009: 902-906 - 2005
- [c1]Guangming Hu, Xiaohui Kuang, Zhenghu Gong:
A Cluster-Based Group Rekeying Algorithm in Mobile Ad Hoc Networks. ICCNMC 2005: 344-353
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-04 21:05 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint