Pascal and Francis Bibliographic Databases

Help

Search results

Your search

au.\*:("LINGYU WANG")

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 22 of 22

  • Page / 1
Export

Selection :

  • and

Hyperluminous infrared galaxies from IIFSCzROWAN-ROBINSON, Michael; LINGYU WANG.Monthly notices of the Royal Astronomical Society (Print). 2010, Vol 406, Num 2, pp 720-728, issn 0035-8711, 9 p.Article

The Imperial IRAS-FSC Redshift CatalogueLINGYU WANG; ROWAN-ROBINSON, Michael.Monthly notices of the Royal Astronomical Society (Print). 2009, Vol 398, Num 1, pp 109-118, issn 0035-8711, 10 p.Article

Minutiae feature analysis for infrared hand vein pattern biometrics : Feacture generation and machine learing for robut multimodal biometricsLINGYU WANG; LEEDHAM, Graham; CHO, David Siu-Yeung et al.Pattern recognition. 2008, Vol 41, Num 3, pp 920-929, issn 0031-3203, 10 p.Article

Minimum-cost network hardening using attack graphsLINGYU WANG; NOEL, Steven; JAJODIA, Sushil et al.Computer communications. 2006, Vol 29, Num 18, pp 3812-3824, issn 0140-3664, 13 p.Article

TLD technique for reducing ice-induced vibration on platformsXING CHEN; LINGYU WANG; JIZU XU et al.Journal of cold regions engineering. 1999, Vol 13, Num 3, pp 139-152, issn 0887-381XArticle

Securing OLAP data cubes against privacy breachesLINGYU WANG; JAJODIA, Sushil; WIJESEKERA, Duminda et al.IEEE symposium on security and privacy. 2004, pp 161-175, isbn 0-7695-2136-3, 1Vol, 15 p.Conference Paper

Using attack graphs for correlating, hypothesizing, and predicting intrusion alertsLINGYU WANG; ANYI LIU; JAJODIA, Sushil et al.Computer communications. 2006, Vol 29, Num 15, pp 2917-2933, issn 0140-3664, 17 p.Article

Preventing interval-based inference by random data perturbationYINGJIU LI; LINGYU WANG; JAJODIA, Sushil et al.Lecture notes in computer science. 2003, pp 160-170, issn 0302-9743, isbn 3-540-00565-X, 11 p.Conference Paper

Modeling and evaluating information leakage caused by inferences in supply chainsDA YONG ZHANG; YONG ZENG; LINGYU WANG et al.Computers in industry. 2011, Vol 62, Num 3, pp 351-363, issn 0166-3615, 13 p.Article

Cardinality-based inference control in sum-only data cubesLINGYU WANG; WIJESEKERA, Duminda; JAJODIA, Sushil et al.Lecture notes in computer science. 2002, pp 55-71, issn 0302-9743, isbn 3-540-44345-2, 17 p.Conference Paper

Secure collaboration in global design and supply chain environment: Problem analysis and literature reviewYONG ZENG; LINGYU WANG; XIAOGUANG DENG et al.Computers in industry. 2012, Vol 63, Num 6, pp 545-556, issn 0166-3615, 12 p.Article

Principal component analysis of the Spitzer IRS spectra of ultraluminous infrared galaxiesLINGYU WANG; FARRAH, Duncan; CONNOLLY, Brian et al.Monthly notices of the Royal Astronomical Society (Print). 2011, Vol 411, Num 3, pp 1809-1818, issn 0035-8711, 10 p.Article

A privacy-enhanced microaggregation methodYINGJIU LI; SENCUN ZHU; LINGYU WANG et al.Lecture notes in computer science. 2002, pp 148-159, issn 0302-9743, isbn 3-540-43220-5Conference Paper

A thermal hand vein pattern verification systemLINGYU WANG; LEEDHAM, Graham.Lecture notes in computer science. 2005, issn 0302-9743, isbn 3-540-28757-4, 2Vol, Part II, 58-65Conference Paper

Precisely answering multi-dimensional range queries without privacy breachesLINGYU WANG; YINGJIU LI; WIJESEKERA, Duminda et al.Lecture notes in computer science. 2003, pp 100-115, issn 0302-9743, isbn 3-540-20300-1, 16 p.Conference Paper

An efficient and unified approach to correlating, hypothesizing, and predicting intrusion alertsLINGYU WANG; ANYI LIU; JAJODIA, Sushil et al.Lecture notes in computer science. 2005, pp 247-266, issn 0302-9743, isbn 3-540-28963-1, 1Vol, 20 p.Conference Paper

Indistinguishability : The other aspect of privacyCHAO YAO; LINGYU WANG; WANG, Sean X et al.Lecture notes in computer science. 2006, pp 1-17, issn 0302-9743, isbn 3-540-38984-9, 1Vol, 17 p.Conference Paper

Interactive analysis of attack graphs using relational queriesLINGYU WANG; CHAO YAO; SINGHAL, Anoop et al.Lecture notes in computer science. 2006, pp 119-132, issn 0302-9743, isbn 3-540-36796-9, 1Vol, 14 p.Conference Paper

Auditing interval-based inferenceYINGJIU LI; LINGYU WANG; WANG, X. Sean et al.Lecture notes in computer science. 2002, pp 553-567, issn 0302-9743, isbn 3-540-43738-X, 15 p.Conference Paper

A game-theoretic intrusion detection model for mobile ad hoc networksOTROK, Hadi; MOHAMMED, Noman; LINGYU WANG et al.Computer communications. 2008, Vol 31, Num 4, pp 708-721, issn 0140-3664, 14 p.Article

Transforming DNA Uptake Gene Orthologs Do Not Mediate Spontaneous Plasmid Transformation in Escherichia coliDONGCHANG SUN; XUEWU ZHANG; LINGYU WANG et al.Journal of bacteriology. 2009, Vol 191, Num 3, pp 713-719, issn 0021-9193, 7 p.Article

Timeline analysis and wavelet multiscale analysis of the AKARI All-Sky Survey at 90 μmLINGYU WANG; ROWAN-ROBINSON, Michael; GOTO, Tomotsugu et al.Monthly Notices of the Royal Astronomical Society. 2008, Vol 387, Num 2, pp 601-615, issn 0035-8711, 15 p.Article

  • Page / 1