default search action
Dongbin Wang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c32]Kai Wang, Dongbin Wang, Hui Zhi, Yujie Chen, Xu Zhang:
Hash Time Lock with Dynamic Premium Based on Credit in Cross-Chain Transaction. Blockchain 2024: 123-130 - [c31]Jiarui Li, Dongbin Wang, Hui Zhi, Wencheng Zhu, Jianing Li, Zedong Wang:
WBRP: Consensus Algorithm Based on Weak Proof of Work. Blockchain 2024: 269-275 - [c30]Huan Li, Dongbin Wang, Hui Zhi, Yuchen Wang, Tao Yang, Jiang Song:
A Dynamic Sharding Scheme For Blockchain Based On Graph Partitioning. Blockchain 2024: 286-293 - [c29]Jing Ma, Dongbin Wang, Haimei Li, Zhengbing Guo:
Developing a Multi-phase Stakeholder Game Framework for Recyclable Resource Management System. GDN 2024: 27-37 - [c28]Yitao Li, Baojiang Cui, Dongbin Wang, Yue Yu, Can Zhang:
An Efficient Smart Contracts Event Ordering Vulnerability Detection System Based on Symbolic Execution and Fuzz Testing. IMIS 2024: 280-287 - [c27]Zhehao Liang, Baojiang Cui, Dongbin Wang, Jie Xu, Huipeng Liu:
A Smart Contract Vulnerability Detection System Based on BERT Model and Fuzz Testing. IMIS 2024: 288-295 - 2023
- [j4]Huashuang Yang, Jinqiao Shi, Yue Gao, Xuebin Wang, Yanwei Sun, Ruisheng Shi, Dongbin Wang:
Evicting and filling attack for linking multiple network addresses of Bitcoin nodes. Cybersecur. 6(1): 50 (2023) - [j3]Dongbin Wang, Yu Zhao, Hui Zhi, Dongzhe Wu, Weihan Zhuo, Yueming Lu, Xu Zhang:
DoSDefender: A Kernel-Mode TCP DoS Prevention in Software-Defined Networking. Sensors 23(12): 5426 (2023) - 2022
- [c26]Weidong Xiao, Xu Zhang, Dongbin Wang:
Cross-Security Domain Dynamic Orchestration Algorithm of Network Security Functions. DSC 2022: 413-419 - [c25]Kun Guo, Yibo Gao, Dongbin Wang, Hui Zhi, Tao Zhang, Yueming Lu:
A Hybrid Routing Mutation Mechanism based on Mutation Cost and Resource Trustworthiness in Network Moving Target Defense. DSC 2022: 426-431 - [c24]Kun Guo, Dongbin Wang, Hui Zhi, Yibo Gao, Yueming Lu:
Privacy-preserving Trajectory Generation Algorithm Considering Utility based on Semantic Similarity Awareness. ICC 2022: 992-997 - [c23]Huiyang Li, Xu Zhang, Jing Li, Dongbin Wang:
A microservice based generic consensus engine for BaaS. ICIT 2022: 1-8 - 2020
- [j2]Kun Guo, Dongbin Wang, Hui Zhi, Yueming Lu, Zhengang Jiao:
A Trusted Resource-Based Routing Algorithm With Entropy Estimation in Integrated Space-Terrestrial Network. IEEE Access 8: 122456-122468 (2020)
2010 – 2019
- 2019
- [j1]Wenbin Yao, Yue Shen, Dongbin Wang:
A Weighted PageRank-Based Algorithm for Virtual Machine Placement in Cloud Computing. IEEE Access 7: 176369-176381 (2019) - [c22]Yuezhen Qi, Dongbin Wang, Wenbin Yao, Haifeng Li, Yuhua Cao:
Towards Multi-Controller Placement for SDN Based on Density Peaks Clustering. ICC 2019: 1-6 - [c21]Xiaosen Zeng, Dongbin Wang, Shuwen Han, Wenbin Yao, Zhao Wang, Rui Chen:
An Effective Load Balance Using Link Bandwidth for SDN-Based Data Centers. ICAIS (4) 2019: 256-265 - [c20]Renhui Hou, Dongbin Wang, Yao Wang, Zhouyi Zhu:
A Congestion Control Methodology with Probability Routing Based on MNL for Datacenter Network. ICAIS (4) 2019: 343-352 - [c19]Zilong Yin, Dongbin Wang, Yinxing Zhao, Yaoyao Guo, Shuwen Han:
Fast Failover for Link Failures in Software Defined Networks. ICAIS (4) 2019: 353-361 - 2018
- [c18]Xueyu Li, Xu Zhang, Dongbin Wang:
Spatiotemporal Cyberspace Situation Awareness Mechanism for Backbone Networks. BigCom 2018: 168-173 - 2017
- [c17]Yiwei Yang, Wenbin Yao, Dongbin Wang:
Ranking the Influence of Micro-blog Users Based on Activation Forwarding Relationship. CollaborateCom 2017: 383-393 - [c16]Wenbin Yao, Yiwei Yang, Dongbin Wang:
UR Rank: Micro-blog User Influence Ranking Algorithm Based on User Relationship. CollaborateCom 2017: 394-404 - [c15]Wenbin Yao, Yijie Chen, Dongbin Wang:
Cloud Multimedia Files Assured Deletion Based on Bit Stream Transformation with Chaos Sequence. ICA3PP 2017: 441-451 - [c14]Guoping Du, Wenbin Yao, Dongbin Wang, Xiaole Wen:
A Group-Based Replica Consistency Schema for Cloud Storage. ICCCS (1) 2017: 214-225 - [c13]Jinxia Dou, Wenbin Yao, Dongbin Wang:
A Credibility Evaluation Method in Opportunistic Networks. ICCCS (1) 2017: 385-397 - [c12]Wenying Bao, Wenbin Yao, Ming Zong, Dongbin Wang:
Cross-site Scripting Attacks on Android Hybrid Applications. ICCSP 2017: 56-61 - [c11]Erxin Wang, Wenbin Yao, Dongbin Wang:
Collaborative filtering recommendation algorithm optimization based on latent factor model clustering. ICNC-FSKD 2017: 1715-1719 - [c10]Na Chen, Xiaoguang Zhang, Zheng Zhou, Xiaoxin Chen, Songlin Sun, Dongbin Wang:
An SDN controlled self-optimizing approach in circular array equipped small cells. ISCIT 2017: 1-5 - [c9]Wenbin Yao, Zhen Guo, Dongbin Wang:
An Energy Efficient Virtual Machine Placement Algorithm Based on Graph Partitioning in Cloud Data Center. ISPA/IUCC 2017: 412-416 - [c8]Zhen Guo, Wenbin Yao, Dongbin Wang:
A Virtual Machine Migration Algorithm Based on Group Selection in Cloud Data Center. NPC 2017: 24-36 - [c7]Zhengbo Liu, Wenbin Yao, Dongbin Wang:
Implementing an Inference Engine for RDFS/OWL Constructs and User-Defined Rules in HBase. SKG 2017: 159-164 - 2016
- [c6]Jinshun Yang, Xu Zhang, Dongbin Wang:
A Decision Level Fusion Algorithm for Time Series in Cyber Physical System. BigCom 2016: 409-420 - [c5]Yin Chen, Wenbin Yao, Ming Zong, Dongbin Wang:
An Effective Buffer Management Policy for Opportunistic Networks. CollaborateCom 2016: 242-251 - [c4]Leilei Lou, Xu Zhang, Dongbin Wang:
An Optimal Controller Design for CPS with Stochastic Time Delay. MSN 2016: 335-342 - 2014
- [c3]Jiqiang Tang, Xiaoxiang Zou, Dongbin Wang:
Design and Performance Analysis of Utility Maximization-Based Cooperative MAC in Multi-rate WiFi Networks. ISCTCS 2014: 213-220 - 2010
- [c2]Tetsuo Noda, Sangmook Yi, Dongbin Wang:
Open Source Policy and Promotion of IT Industries in East Asia. OSS 2010: 425-426
2000 – 2009
- 2008
- [c1]Dongbin Wang, Mingzeng Hu, Hui Zhi:
A Survey of Secure Routing in Ad Hoc Networks. WAIM 2008: 482-486
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-16 20:31 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint