default search action
BibTeX records: Mingdi Xu
@inproceedings{DBLP:conf/trustcom/XuXCJW23, author = {Mingdi Xu and Bo Xie and Feng Cui and Chaoyang Jin and Yu Wang}, editor = {Jia Hu and Geyong Min and Guojun Wang and Nektarios Georgalas}, title = {{SQL} injection attack sample generation based on {IE-GAN}}, booktitle = {22nd {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2024, Exeter, UK, November 1-3, 2023}, pages = {1014--1021}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/TrustCom60117.2023.00142}, doi = {10.1109/TRUSTCOM60117.2023.00142}, timestamp = {Tue, 20 Aug 2024 07:54:43 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/XuXCJW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijseke/HuangMDXG18, author = {Weihua Huang and Zhong Ma and Xinfa Dai and Mingdi Xu and Yi Gao}, title = {Fuzzy Clustering with Feature Weight Preferences for Load Balancing in Cloud}, journal = {Int. J. Softw. Eng. Knowl. Eng.}, volume = {28}, number = {5}, pages = {593--618}, year = {2018}, url = {https://doi.org/10.1142/S021819401850016X}, doi = {10.1142/S021819401850016X}, timestamp = {Wed, 22 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijseke/HuangMDXG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsc/RenWWX18, author = {Zhengwei Ren and Lina Wang and Qian Wang and Mingdi Xu}, title = {Dynamic Proofs of Retrievability for Coded Cloud Storage Systems}, journal = {{IEEE} Trans. Serv. Comput.}, volume = {11}, number = {4}, pages = {685--698}, year = {2018}, url = {https://doi.org/10.1109/TSC.2015.2481880}, doi = {10.1109/TSC.2015.2481880}, timestamp = {Fri, 15 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tsc/RenWWX18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icics/ZhangZXLHC18, author = {Fan Zhang and Cong Zhang and Mingdi Xu and Xiaoli Liu and Fangning Hu and Han{-}Chieh Chao}, editor = {David Naccache and Shouhuai Xu and Sihan Qing and Pierangela Samarati and Gregory Blanc and Rongxing Lu and Zonghua Zhang and Ahmed Meddahi}, title = {Automated Verification of Noninterference Property}, booktitle = {Information and Communications Security - 20th International Conference, {ICICS} 2018, Lille, France, October 29-31, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11149}, pages = {629--646}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-01950-1\_37}, doi = {10.1007/978-3-030-01950-1\_37}, timestamp = {Sat, 05 Sep 2020 18:01:07 +0200}, biburl = {https://dblp.org/rec/conf/icics/ZhangZXLHC18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uic/HuangMDX18, author = {Weihua Huang and Zhong Ma and Xinfa Dai and Mingdi Xu}, editor = {Guojun Wang and Qi Han and Md. Zakirul Alam Bhuiyan and Xiaoxing Ma and Fr{\'{e}}d{\'{e}}ric Loulergue and Peng Li and Manuel Roveri and Lei Chen}, title = {Connectivity Probability Based Spray and Wait Routing Algorithm in Mobile Opportunistic Networks}, booktitle = {2018 {IEEE} SmartWorld, Ubiquitous Intelligence {\&} Computing, Advanced {\&} Trusted Computing, Scalable Computing {\&} Communications, Cloud {\&} Big Data Computing, Internet of People and Smart City Innovation, SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2018, Guangzhou, China, October 8-12, 2018}, pages = {1636--1642}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/SmartWorld.2018.00280}, doi = {10.1109/SMARTWORLD.2018.00280}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/uic/HuangMDX18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/chinacom/TongZCXQ17, author = {Yan Tong and Jian Zhang and Wei Chen and Mingdi Xu and Tao Qin}, editor = {Bo Li and Lei Shu and Deze Zeng}, title = {Dynamic Group Behavior Analysis and Its Application in Network Abnormal Behavior Detection}, booktitle = {Communications and Networking - 12th International Conference, ChinaCom 2017, Xi'an, China, October 10-12, 2017, Proceedings, Part {II}}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {237}, pages = {292--301}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-78139-6\_30}, doi = {10.1007/978-3-319-78139-6\_30}, timestamp = {Thu, 18 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/chinacom/TongZCXQ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chinaf/ShenZWWZYYZX10, author = {Changxiang Shen and Huanguo Zhang and Huaimin Wang and Ji Wang and Bo Zhao and Fei Yan and Fajiang Yu and Liqiang Zhang and Mingdi Xu}, title = {Research on trusted computing and its development}, journal = {Sci. China Inf. Sci.}, volume = {53}, number = {3}, pages = {405--433}, year = {2010}, url = {https://doi.org/10.1007/s11432-010-0069-x}, doi = {10.1007/S11432-010-0069-X}, timestamp = {Tue, 06 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/chinaf/ShenZWWZYYZX10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chinaf/ZhangYFXYHZ10, author = {Huanguo Zhang and Fei Yan and Jianming Fu and Mingdi Xu and Yang Yang and Fan He and Jing Zhan}, title = {Research on theory and key technology of trusted computing platform security testing and evaluation}, journal = {Sci. China Inf. Sci.}, volume = {53}, number = {3}, pages = {434--453}, year = {2010}, url = {https://doi.org/10.1007/s11432-010-0062-4}, doi = {10.1007/S11432-010-0062-4}, timestamp = {Mon, 02 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/chinaf/ZhangYFXYHZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dasc/ZhuXZ09, author = {Zhiqiang Zhu and Mingdi Xu and Huanguo Zhang}, title = {Research on Secure and Reconfigurable Architecture Based on Embedded Hardware}, booktitle = {Eighth {IEEE} International Conference on Dependable, Autonomic and Secure Computing, {DASC} 2009, Chengdu, China, 12-14 December, 2009}, pages = {127--131}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/DASC.2009.89}, doi = {10.1109/DASC.2009.89}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dasc/ZhuXZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/dasc/ZhuXZ09a, author = {Zhiqiang Zhu and Mingdi Xu and Huanguo Zhang}, title = {Research and Implement of Secure Bootstrap for Virtual Machine Based on Trusted Computing Platform}, booktitle = {Eighth {IEEE} International Conference on Dependable, Autonomic and Secure Computing, {DASC} 2009, Chengdu, China, 12-14 December, 2009}, pages = {514--519}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/DASC.2009.88}, doi = {10.1109/DASC.2009.88}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/dasc/ZhuXZ09a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isecs/XiangXWZ08, author = {Shuang Xiang and Mingdi Xu and Li Wang and Huanguo Zhang}, editor = {Fei Yu and Qi Luo and Yongjun Chen and Zhigang Chen}, title = {Design Secure Contexts Detect Based on Lattice for Grid Computing Environment}, booktitle = {Proceedings of The International Symposium on Electronic Commerce and Security, {ISECS} 2008, August 3-5, 2008, Guangzhou, China}, pages = {110--113}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ISECS.2008.101}, doi = {10.1109/ISECS.2008.101}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isecs/XiangXWZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isecs/HeX08, author = {Jian He and Mingdi Xu}, editor = {Fei Yu and Qi Luo and Yongjun Chen and Zhigang Chen}, title = {Research on Storage Security Based on Trusted Computing Platform}, booktitle = {Proceedings of The International Symposium on Electronic Commerce and Security, {ISECS} 2008, August 3-5, 2008, Guangzhou, China}, pages = {448--452}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ISECS.2008.144}, doi = {10.1109/ISECS.2008.144}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isecs/HeX08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/snpd/XuHZZ07, author = {Mingdi Xu and Jian He and Bo Zhang and Huanguo Zhang}, editor = {Wenying Feng and Feng Gao}, title = {A New Data Protecting Scheme Based on {TPM}}, booktitle = {Proceedings of the 8th {ACIS} International Conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, {SNPD} 2007, July 30 - August 1, 2007, Qingdao, China}, pages = {943--947}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/SNPD.2007.276}, doi = {10.1109/SNPD.2007.276}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/snpd/XuHZZ07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.