SDAP: A secure hop-by-hop data aggregation protocol for sensor networks Y Yang, X Wang, S Zhu, G Cao ACM Transactions on Information and System Security (TISSEC) 11 (4), 18, 2008 | 620 | 2008 |
Heuristic botnet detection X Wang, H Xie US Patent 8,555,388, 2013 | 203 | 2013 |
Sigfree: A signature-free buffer overflow attack blocker X Wang, CC Pan, P Liu, S Zhu Dependable and Secure Computing, IEEE Transactions on 7 (1), 65-79, 2010 | 202 | 2010 |
Distributed software-based attestation for node compromise detection in sensor networks Y Yang, X Wang, S Zhu, G Cao Reliable Distributed Systems, 2007. SRDS 2007. 26th IEEE International …, 2007 | 190 | 2007 |
Behavior based software theft detection X Wang, YC Jhi, S Zhu, P Liu Proceedings of the 16th ACM conference on Computer and communications …, 2009 | 138 | 2009 |
Detecting software theft via system call based birthmarks X Wang, YC Jhi, S Zhu, P Liu Computer Security Applications Conference, 2009. ACSAC'09. Annual, 149-158, 2009 | 124 | 2009 |
Value-based program characterization and its application to software plagiarism detection YC Jhi, X Wang, X Jia, S Zhu, P Liu, D Wu Proceedings of the 33rd International Conference on Software Engineering …, 2011 | 114 | 2011 |
Still: Exploit code detection via static taint and initialization analyses X Wang, YC Jhi, S Zhu, P Liu Computer Security Applications Conference, 2008. ACSAC 2008. Annual, 289-298, 2008 | 96 | 2008 |
Malware family identification using profile signatures K Sanders, X Wang US Patent 9,165,142, 2015 | 77 | 2015 |
High e+/e− Ratio Dense Pair Creation with 1021W. cm− 2 Laser Irradiating Solid Targets E Liang, T Clarke, A Henderson, W Fu, W Lo, D Taylor, P Chaguine, ... Scientific reports 5, 2015 | 65 | 2015 |
Electroacupuncture inhibits excessive interferon-γ evoked up-regulation of P2X4 receptor in spinal microglia in a CCI rat model for neuropathic pain XM Chen, J Xu, JG Song, BJ Zheng, XR Wang British journal of anaesthesia, aeu199, 2014 | 64 | 2014 |
Signature-free buffer overflow attack blocker X Wang, CC Pan, P Liu, S Zhu US Patent 8,443,442, 2013 | 56 | 2013 |
Detection of client-side malware activity JD Call, X Wang, Y Zhao, TD Peacock US Patent 8,997,226, 2015 | 52 | 2015 |
First-principles and spectroscopic studies of Bi (110) films: Thickness-dependent Dirac modes and property oscillations G Bian, X Wang, T Miller, TC Chiang, PJ Kowalczyk, O Mahapatra, ... Physical Review B 90 (19), 195409, 2014 | 39 | 2014 |
Genetic status of Norway spruce (Picea abies) breeding populations for northern Sweden P Androsiuk, A Shimono, J Westin, D Lindgren, A Fries, XR Wang Silvae Genetica 62 (3), 127, 2013 | 34 | 2013 |
Heuristic botnet detection X Wang, H Xie US Patent 9,143,522, 2015 | 30 | 2015 |
Corrosion Behavior of Field-Exposed 7A04 Aluminum Alloy in the Xisha Tropical Marine Atmosphere ZY Cui, XG Li, C Man, K Xiao, CF Dong, X Wang, ZY Liu Journal of Materials Engineering and Performance 24 (8), 2885-2897, 2015 | 30 | 2015 |
Clinical significance of polypeptide N-acetylgalactosaminyl transferase-5 (GalNAc-T5) expression in patients with gastric cancer H He, Z Shen, H Zhang, X Wang, Z Tang, J Xu, Y Sun British journal of cancer 110 (8), 2021, 2014 | 29 | 2014 |
Detecting malware QU Bo, X Wang, K Sanders US Patent 9,104,870, 2015 | 28 | 2015 |
Ultrastructure of medial rectus muscles in patients with intermittent exotropia J Yao, X Wang, H Ren, G Liu, P Lu Eye 30 (1), 146-151, 2016 | 22 | 2016 |