SDAP: A secure hop-by-hop data aggregation protocol for sensor networks Y Yang, X Wang, S Zhu, G Cao ACM Transactions on Information and System Security (TISSEC) 11 (4), 18, 2008 | 630 | 2008 |
Heuristic botnet detection X Wang, H Xie US Patent 8,555,388, 2013 | 220 | 2013 |
Distributed software-based attestation for node compromise detection in sensor networks Y Yang, X Wang, S Zhu, G Cao Reliable Distributed Systems, 2007. SRDS 2007. 26th IEEE International …, 2007 | 208 | 2007 |
Sigfree: A signature-free buffer overflow attack blocker X Wang, CC Pan, P Liu, S Zhu Dependable and Secure Computing, IEEE Transactions on 7 (1), 65-79, 2010 | 207 | 2010 |
Behavior based software theft detection X Wang, YC Jhi, S Zhu, P Liu Proceedings of the 16th ACM conference on Computer and communications …, 2009 | 145 | 2009 |
Detecting software theft via system call based birthmarks X Wang, YC Jhi, S Zhu, P Liu Computer Security Applications Conference, 2009. ACSAC'09. Annual, 149-158, 2009 | 132 | 2009 |
Value-based program characterization and its application to software plagiarism detection YC Jhi, X Wang, X Jia, S Zhu, P Liu, D Wu Proceedings of the 33rd International Conference on Software Engineering …, 2011 | 122 | 2011 |
Still: Exploit code detection via static taint and initialization analyses X Wang, YC Jhi, S Zhu, P Liu Computer Security Applications Conference, 2008. ACSAC 2008. Annual, 289-298, 2008 | 99 | 2008 |
Malware family identification using profile signatures K Sanders, X Wang US Patent 9,165,142, 2015 | 98 | 2015 |
Signature-free buffer overflow attack blocker X Wang, CC Pan, P Liu, S Zhu US Patent 8,443,442, 2013 | 95 | 2013 |
High e+/e− Ratio Dense Pair Creation with 1021W. cm− 2 Laser Irradiating Solid Targets E Liang, T Clarke, A Henderson, W Fu, W Lo, D Taylor, P Chaguine, ... Scientific reports 5, 2015 | 83 | 2015 |
Electroacupuncture inhibits excessive interferon-γ evoked up-regulation of P2X4 receptor in spinal microglia in a CCI rat model for neuropathic pain XM Chen, J Xu, JG Song, BJ Zheng, XR Wang British journal of anaesthesia, aeu199, 2014 | 78 | 2014 |
Detection of client-side malware activity JD Call, X Wang, Y Zhao, TD Peacock US Patent 8,997,226, 2015 | 53 | 2015 |
First-principles and spectroscopic studies of Bi (110) films: Thickness-dependent Dirac modes and property oscillations G Bian, X Wang, T Miller, TC Chiang, PJ Kowalczyk, O Mahapatra, ... Physical Review B 90 (19), 195409, 2014 | 46 | 2014 |
Genetic status of Norway spruce (Picea abies) breeding populations for northern Sweden P Androsiuk, A Shimono, J Westin, D Lindgren, A Fries, XR Wang Silvae Genetica 62 (3), 127, 2013 | 41 | 2013 |
Corrosion Behavior of Field-Exposed 7A04 Aluminum Alloy in the Xisha Tropical Marine Atmosphere ZY Cui, XG Li, C Man, K Xiao, CF Dong, X Wang, ZY Liu Journal of Materials Engineering and Performance 24 (8), 2885-2897, 2015 | 37 | 2015 |
Heuristic botnet detection X Wang, H Xie US Patent 9,143,522, 2015 | 34 | 2015 |
Clinical significance of polypeptide N-acetylgalactosaminyl transferase-5 (GalNAc-T5) expression in patients with gastric cancer H He, Z Shen, H Zhang, X Wang, Z Tang, J Xu, Y Sun British journal of cancer 110 (8), 2021, 2014 | 32 | 2014 |
Detecting malware QU Bo, X Wang, K Sanders US Patent 9,104,870, 2015 | 31 | 2015 |
Aldo-keto reductase 1C3 may be a new radioresistance marker in non-small-cell lung cancer L Xie, J Yu, W Guo, L Wei, Y Liu, X Wang, X Song Cancer gene therapy 20 (4), 260-266, 2013 | 30 | 2013 |