中文|English>>
Publications
Dependable and Secure Computing Laboratory (DSCL)
Publications     Patents

  1. Xiao Yu, Jiqing Rao, Lei Liu, Guancheng Lin, Wenhua Hu, Jacky Wai Keung, Junwei Zhou, Jianwen Xiang: Improving effort-aware defect prediction by directly learning to rank software modules. Information and Software Technology, 2024, 165: 107250. (CCF-B)
  2. Wiraj Udara Wickramaarachchi, Dongdong Zhao, Junwei Zhou, Jianwen Xiang: An effective iris biometric privacy protection scheme with renewability. Journal of Information Security and Applications, 2024, 80: 103684. (CCF-C)

  1. Chen Zhang, Shuo Feng, Wenzhi Xie, Dongdong Zhao, Jianwen Xiang, Roberto Pietrantuono, Roberto Natella, Domenico Cotroneo: IFCM: An improved Fuzzy C-means clustering method to handle Class Overlap on Aging-related Software Bug Prediction. 2023 IEEE 34th International Symposium on Software Reliability Engineering (ISSRE), 2023, pp. 590-600.(CCF-B)
  2. Dongdong Zhao, Lei Liao, Wenjian Luo, Jianwen Xiang, Hao Jiang, Xiaoyi Hu: Generating Random SAT Instances: Multiple Solutions could be Predefined and Deeply Hidden. Journal of Artificial Intelligence Research, 2023, 76: 435-470.(CCF-B)
  3. Dongdong Zhao, Hucheng Liao, Songsong Liao, Huanhuan Li, Jianwen Xiang: Cancelable Iris Biometrics Based on Transformation Network. 2023 IEEE 23rd International Conference on Software Quality, Reliability, and Security (QRS), 2023, pp. 507-516. (CCF-C)
  4. Kai Jia, Xiao Yu, Chen Zhang, Wenhua Hu, Dongdong Zhao, Jianwen Xiang: Software Aging Prediction for Cloud Services Using a Gate Recurrent Unit Neural Network Model Based on Time Series Decomposition. IEEE Transactions on Emerging Topics in Computing, 2023, pp. 580-593.
  5. Peixin Yang, Lin Zhu, Wenhua Hu, Jacky Wai Keung, Liping Lu, Jianwen Xiang: The Impact of the bug number on Effort-Aware Defect Prediction: An Empirical Study. Proceedings of the 14th Asia-Pacific Symposium on Internetware. 2023: 67-78. (CCF-C)
  6. Wenhua Hu, Lei Liu, Peixin Yang, Kuan Zou, Jiajun Li, Guancheng Lin, Jianwen Xiang: Revisiting "code smell severity classification using machine learning techniques". 2023 IEEE 47th Annual Computers, Software, and Applications Conference (COMPSAC), 2023, pp. 840-849. (CCF-C)
  7. Dongdong Zhao, Ying Chen, Jianwen Xiang, Huanhuan Li: DLMT: Outsourcing Deep Learning with Privacy Protection Based on Matrix Transformation. 2023 26th International Conference on Computer Supported Cooperative Work in Design (CSCWD), 2023, pp. 1384-1389. (CCF-C)
  8. Dongdong Zhao, Songsong Liao, Huanhuan Li, Jianwen Xiang: Competitor Attack Model for Privacy-Preserving Deep Learning. 2023 IEEE/ACM 23rd International Symposium on Cluster, Cloud and Internet Computing Workshops (CCGridW), Bangalore, India, 2023, pp. 133-140.
  9. Wenzhi Xie, Chen Zhang, Kai Jia, Dongdong Zhao, Junwei Zhou, Jing Tian, Jianwen Xiang: Cross-Project Aging-Related Bug Prediction Based on Feature Transfer and Class Imbalance Learning. 2023 IEEE 34th International Symposium on Software Reliability Engineering Workshops (ISSREW), 2023, pp. 206-213.
  10. Xiaolei Yu, Kai Jia, Wenhua Hu, Jing Tian, Jianwen Xiang: Black-Box Test Case Prioritization Using Log Analysis and Test Case Diversity. 2023 IEEE 34th International Symposium on Software Reliability Engineering Workshops (ISSREW), 2023, pp. 186-191.

  1. Siwei Zhou, Luyao Ye, Shengwu Xiong, Jianwen Xiang: Reliability analysis of dynamic fault trees with Priority-AND gates based on irrelevance coverage model. Reliability Engineering & System Safety, 2022, 224: 108553. (中科院1区Top)
  2. Jianwen Xiang, Zixiang Wang, Chuanli Wu, Dongdong Zhao, Jing Tian: Optimal redundancies of parallel–series systems in irrelevancy coverage model. Reliability Engineering & System Safety, 2022, 224: 108567. (中科院1区Top)
  3. Siwei Zhou, Jianwen Xiang, and W. Eric Wong: A generalized ternary decision diagram for reliability analysis on fault-tolerant systems in different coverage models. Journal of Nuclear Science and Technology, 2022: 1-19.
  4. Junwei Zhou, Yijia Qian, Qingtian Zou, Peng Liu, Jianwen Xiang: DeepSyslog: Deep Anomaly Detection on Syslog Using Sentence Embedding and Metadata. IEEE Transactions on Information Forensics and Security, 2022, pp. 3051-3061. (CCF-A)
  5. Kai Jia, Xiao Yu, Chen Zhang, Wenhua Hu, Dongdong Zhao, Jianwen Xiang: The Impact of Software Aging and Rejuvenation on the User Experience for Android System. 2022 IEEE 33rd International Symposium on Software Reliability Engineering (ISSRE), 2022, pp. 435-445. (CCF-B)
  6. Longmin Deng, Dongdong Zhao, Junwei Zhou, Zhe Xia, Jianwen Xiang: CBSDI: Cross-Architecture Binary Code Similarity Detection based on Index Table. 2022 IEEE 22nd International Conference on Software Quality, Reliability and Security (QRS),2022, pp. 527-536.(CCF-C)
  7. Dongdong Zhao, Zhao Wang, Huanhuan Li, Jianwen Xiang: GAN-Based Privacy-Preserving Unsupervised Domain Adaptation. 2022 IEEE 22nd International Conference on Software Quality, Reliability and Security (QRS), Guangzhou, China, 2022, pp. 117-126.(CCF-C)

  1. Luyao Ye, Erqing Li, Dongdong Zhao, Shengwu Xiong, Siwei Zhou, Jianwen Xiang: An Efficient Approximation for Quantitative Analysis of Dynamic Fault Trees. The 32nd International Symposium of Software Reliability Engineering, ISSRE2021. (CCF-B)
  2. Dongdong Zhao, Xiaoyi Hu, Shengwu Xiong, Jing Tian, Jianwen Xiang, Jing Zhou, Huanhuan Li: k-means clustering and kNN classification based on negative databases. Appl. Soft Comput. 110: 107732 (2021). (JCR: Q1)
  3. Luyao Ye, Dongdong Zhao, Jianwen Xiang, Laura Carnevali, Enrico Vicario: Quantitative Analysis of the Dynamic Relevance of Systems. IEEE Trans. Reliab. 70(1): 82-98 (2021). (JCR: Q1)
  4. Dongdong Zhao, Pingchuan Zhang, Jianwen Xiang, Jing Tian: NegDL: Privacy-Preserving Deep Learning Based on Negative Database. CoRR abs/2103.05854 (2021).
  5. Mengting Liang, Dimeng Li, Bin Xu, Dongdong Zhao, Xiao Yu, Jianwen Xiang: Within-Project Software Aging Defect Prediction Based on Active Learning. ISSRE Workshops 2021: 1-8.
  6. Dimeng Li, Mengting Liang, Bin Xu, Xiao Yu, Junwei Zhou, Jianwen Xiang: A Cross-Project Aging-Related Bug Prediction Approach Based on Joint Probability Domain Adaptation and k-means SMOTE. QRS Companion 2021: 350-358.
  7. Jiqing Rao, Xiao Yu, Chen Zhang, Junwei Zhou, Jianwen Xiang: Learning to rank software modules for effort-aware defect prediction. QRS Companion 2021: 372-380.
  8. Zixiang Wang, Siwei Zhou, Dongdong Zhao, Jianwen Xiang: Reliability-redundancy allocation problem considering imperfect fault coverage. QRS 2021: 394-403. (CCF-C)
  9. Zhi Jin, Xuandong Li, Jianwen Xiang, Leonardo Mariani, Ting Liu, Xiao Yu, Nahgmeh Ivaki: 32nd IEEE International Symposium on Software Reliability Engineering. ISSRE 2021, Wuhan, China, October 25-28, 2021. IEEE 2021, ISBN 978-1-6654-2587-2

  1. Siwei Zhou, Jianwen Xiang, W. Eric Wong: Reliability analysis of dynamic fault trees with spare gates using conditional binary decision diagrams[J]. Journal of Systems and Software, 2020, 170: 110766. (CCF-B)
  2. Bin Xu, Dongdong Zhao, Kai Jia,Junwei Zhou,Jing Tian,Jianwen Xiang: Cross-Project Aging-Related Bug Prediction Based on Joint Distribution Adaptation and Improved Subclass Discriminant Analysis. The 31th International Symposium of Software Reliability Engineering, ISSRE2020. (CCF-B)
  3. Zhongwei Xie, Lin Li, Xian Zhong, Luo Zhong, Jianwen Xiang: Image-to-video person re-identification with cross-modal embeddings. Pattern Recognit. Lett. 133: 70-76 (2020) (CCF-C)
  4. Abdeldjalil Saidani, Jianwen Xiang, Deloula Mansouri: A Lossless Compression Approach Based on Delta Encoding and T-RLE in WSNs. Wirel. Commun. Mob. Comput. 2020: 8824954:1-8824954:10 (2020)
  5. Dongdong Zhao, Xiaoyan Zhou, Jianwen Xiang, Wenjian Luo:NDBIris with Better Unlinkability. SSCI 2020: 2948-2956
  6. Zhibin Zhang, Dian Zhou, Jiqing Rao, Dongdong Zhao, Wenhua Hu, Jianwen Xiang, Zhongjin Liu, Yanzhen Xing:VSFBS: Vulnerability Search in Firmware Based on String. DSA 2020: 555-563
  7. Qinchen Liu, Jianwen Xiang, Bin Xu, Dongdong Zhao, Wenhua Hu, Jian Wang:Aging-Related Bugs Prediction Via Convolutional Neural Network. DSA 2020: 90-98
  8. Yousif A Alhaj, Mohammed AA Al-qaness, Abdelghani Dahou, Mohamed Abd Elaziz, Dongdong Zhao, Jianwen Xiang:Effects of Light Stemming on Feature Extraction and Selection for Arabic Documents Classification. Recent Advances in NLP: The Case of Arabic Language59-79

  1. Man Yu, Dongdong Zhao, Dian Zhou, Linjun Ran, Jianwen Xiang, Zhongjin Liu, Yanzhen Xing: Vulnerability Detection in Firmware Based on Clonal Selection Algorithm. 2019 IEEE Symposium Series on Computational Intelligence (SSCI).IEEE,2019:1915-1921.
  2. Dongdong Zhao, Xiaoyi Hu, Shengwu Xiong, Jing Tian, Jianwen Xiang, Jing Zhou, Huanhuan Li: A Fine-grained Privacy-preserving k-means Clustering Algorithm Upon Negative Databases. 2019 IEEE Symposium Series on Computational Intelligence (SSCI).IEEE, 2019: 1945-1951.
  3. Jianwen Xiang, Caisheng Weng, Dongdong Zhao, Artur Andrzejak, Shengwu Xiong, Lin Li, Jing Tian: Software aging and rejuvenation in android: new models and metrics. Software Quality Journal, 2019:1-22. (CCF-C)
  4. Abdeldjalil Saidani, Jianwen Xiang, Deloula Mansouri: A New Lossless Compression Scheme for WSNs Using RLE Algorithm. 2019 20th Asia-Pacific Network Operations and Management Symposium (APNOMS), 2019: 1-6. (CCF-C)
  5. YOUSIF A. ALHAJ, JIANWEN XIANG1, DONGDONG ZHAO, MOHAMMED A. A. AL-QANESS, MOHAMED ABD ELAZIZ, ABDELGHANI DAHOU: A Study of the Effects of Stemming Strategies on Arabic Document Classification. IEEE Access, 2019, 7: 32664-32671.
  6. Dongdong Zhao, Hong Lin, Linjun Ran, Mushuai Han, Jing Tian, Liping Lu, Shengwu Xiong, Jianwen Xiang: CVSkSA: cross-architecture vulnerability search in firmware based on kNN-SVM and attributed control flow graph. Software Quality Journal ,2019: 1-24. (CCF-C)
  7. M Yang, D Zhao, L Ye, S Zhou, J Xiang: Reliability Analysis of Phased-Mission System in Irrelevancy Coverage Model. 2019 IEEE 19th International Conference on Software Quality, Reliability and Security (QRS). IEEE, 2019: 89-96. (CCF-C)
  8. Mushuai Han, Dongdong Zhao, Hong Lin, Dian Zhou, Jianwen Xiang, Zhongjin Liu, Yanzhen Xing: VSkLCG A Method for Cross-Platform Vulnerability Search in Firmware. DSA 2019: 395-400

  1. Dongdong Zhao, Xiaoyi Hu, Jing Tian, Shengwu Xiong, Jianwen Xiang: Iris Template Protection Based on Randomized Response Technique and Aggregated Block Information ISSRE 2018: 248-258. (CCF-B)
  2. Jianwen Xiang, Caisheng Weng, Dongdong Zhao, Jing Tian, Shengwu Xiong, Lin Li, Artur Andrzejak: A New Software Rejuvenation Model for Android. ISSREW 2018: 293-299
  3. Zhongwei Xie, Lin Li, Xian Zhong, Luo Zhong, Qing Xie, Jianwen Xiang:A hybrid Model Reuse Traning Approach for Multilingula OCR. WISE 2018: 497-512
  4. Ruoyu Wang, Guoqiang Li, Jianwen Xiang, Hongming Cai: A Customised Automata Algorithm and Toolkit for Language Learning and Application. IJBDI 5(1/2): 114-123 (2018)
  5. Dongdong Zhao, Shu Fang, Jianwen Xiang, Jing Tian, Shengwu Xiong: Iris Template Protection Based on Local Ranking. Security and Communication Networks 2018: 4519548:1-4519548:9 (2018). (CCF-C)
  6. KPN Jayasena, Lin Li, Mohamed Abd Elaziz, Shengwu Xiong, Jianwen Xiang:Optimizing the energy efficient VM consolidation by a multi-objective algorithm. CSCWD 2018: 81-86
  7. Xing Liu, Haiying Zhou, Jianwen Xiang, Shengwu Xiong, Kun Mean Hou, Christophe De Vaulx, Huan Wang, Tianhui Shen, Qing Wang: Energy and Delay Optimization of Heterogeneous Multicore Wireless Multimedia Sensor Nodes by Adaptive Genetic-Simulated Annealing Algorithm. Wireless Communications and Mobile Computing 2018 (2018).
  8. Jianwen Xiang, Shu Fang, Dongdong Zhao, Jing Tian, Shengwu Xiong, Dong Li, Chunhui Yang:Handling Unreasonable Data in Negative Surveys. DASFAA (2) 2018: 395-403
  9. Yang Liu, Lin Li, Jianwen Xiang: Using Clustering Labels to Supervise Mashup Service Classification. ER Workshops 2018: 35-38
  10. Shouyu Huo, Dongdong Zhao, Xing Liu, Jianwen Xiang, Yingshou Zhong, Haiguo Yu:Using Machine Learning for Software Aging Detection in Android System. ICACI 2018: 741-746
  11. Erqing Li, Chuangming Xia, Dongdong Zhao, Liping Lu, Jianwen Xiang, Yueying He, Jin Wang, Jiangning Wu: Improved Heatmap Visualization of Pareto-Optimal Set in Multi-Objective Optimization of Defensive Strategy. QRS Companion 2018: 345-352.
  12. Junwei Zhou, Fang Liu, Lee-Ming Cheng: Image authentication using distributed arithmetic coding. Multimedia Tools Appl. 77(12): 15505-15520 (2018)
  13. Hao Jiang, Wenjian Luo, Dongdong Zhao: A Novel Negative Location Collection Method for Finding Aggregated Locations. IEEE Trans. Intelligent Transportation Systems 19(6): 1741-1753 (2018). (CCF-B)
  14. Dongdong Zhao, Wenjian Luo, Ran Liu and Lihua Yue. Negative Iris Recognition. IEEE Transactions on Dependable and Secure Computing, 15(1): 112 - 125, January, 2018. (CCF-A)

  1. Fumio Machida, Jianwen Xiang, Kumiko Tadano, Yoshiharu Maeno: Lifetime Extension of Software Execution Subject to Aging. IEEE Trans. Reliability 66(1): 123-134 (2017). (JCR: Q2)
  2. Jianguo Wu, Jianwen Xiang, Dongdong Zhao, Huanhuan Li, Qing Xie, Xiaoyi Hu: Negative Survey with Manual Selection: A Case Study in Chinese Universities . APWeb/WAIM (1) 2017: 57-65. (CCF-C)
  3. Yiyun Pan, Junwei Zhou, Yongsheng Gao, Jianwen Xiang, Shengwu Xiong, Yanchao Yang: Robust Facial Landmark Localization Using LBP Histogram Correlation Based Initialization. FG 2017: 619-625. (CCF-C)
  4. Chunhui Yang, Yan Gao, Xuedong Kong, Dingfang Chen, Shengwu Xiong, Jianwen Xiang: Analysis and Estimate the Effect of Knowledge on Software Reliability Distribution. HCC 2017: 561-570
  5. Xiaohong Zhang, Jianwen Xiang, Shengwu Xiong:Shape retrieval using multiscale ellipse descriptor. ICIP 2017: 1042-1046. (CCF-C)
  6. Caisheng Weng, Dongdong Zhao, Liping Lu, Jianwen Xiang, Chunhui Yang, Dong Li: A Rejuvenation Strategy in Android. ISSRE Workshops 2017: 273-279
  7. Shanmuganathan Vasanthapriyan, Jing Tian, Dongdong Zhao, Shengwu Xiong, Jianwen Xiang:An Ontology-Based Knowledge Sharing Portal for Software Testing. QRS Companion 2017: 472-479.
  8. Jing Sun, Van-Nam Huynh, Yoshiteru Nakamori, Jianguo Wu, Jing Tian, Jianwen Xiang: Knowledge Management in Graduate Research. QRS Companion 2017: 480-485.
  9. Jianguo Wu, Dongdong Zhao, Liping Lu, Jing Tian, Jianwen Xiang: A Comparative Study of Knowledge Management on Undergraduate by Questionnaire. QRS Companion 2017: 486-492.
  10. Shanmuganathan Vasanthapriyan, Jianwen Xiang, Jing Tian, Shengwu Xiong: Knowledge Synthesis in Software Industries: a survey in Sri Lanka. Knowledge Management Research & Practice 15(3): 413-430. (JCR: Q2)
  11. Shanmuganathan Vasanthapriyan, Jing Tian, Dongdong Zhao, Shengwu Xiong, Jianwen Xiang: An Ontology-based Knowledge Management System for Software Testing. SEKE 2017: 230-235. (CCF-C)
  12. Xinrong Wu, Junwei Zhou, Yiyun Pan: Initial Shape Pool Construction for Facial Landmark Localization Under Occlusion. IEEE Access 5: 16649-16655 (2017)
  13. Junwei Zhou, Hui Duan, Kaitai Liang, Qiao Yan, Fei Chen, F. Richard Yu, Jieming Wu, Jianyong Chen: Securing Outsourced Data in the Multi-Authority Cloud with Fine-Grained Access Control and Efficient Attribute Revocation. Comput. J. 60(8): 1210-1222 (2017). (CCF-B)
  14. Junwei Zhou, Fang Liu, Lee-Ming Cheng: Image authentication using distributed arithmetic coding, Multimedia Tools and Applications, pp. 1-16, 2017. (JCR: Q2)
  15. Lein Harn, Ching-Fang Hsu , Zhe Xia, Junwei Zhou: How to share secret efficiently over networks, Security and Communication Networks, vol. 1, pp. 1-7, 2017.
  16. Lingying Chen, Guanghui Zhao, Junwei Zhou, Li Kuang: Real-time traffic sign classification using combined convolutional neural networks, Asian Conference on Pattern Recognition, pp. 1-6, 2017.
  17. Guanghui Zhao, Xingyan Zi, Kaitai Liang, Panyi Yun, Junwei Zhou:A modified segmentation approach for overlapping elliptical objects with various sizes, 12th International Conference on Green, Pervasive and Cloud Computing (GPC 2017), pp. 1-15.
  18. Dongdong Zhao, Wenjian Luo: One-time password authentication scheme based on the negative database. Eng. Appl. of AI 62: 396-404 (2017). (CCF-C)
  19. Wenjian Luo, Yihui Lu, Dongdong Zhao, Hao Jiang: On Location and Trace Privacy of the Moving Object Using the Negative Survey. IEEE Trans. Emerging Topics in Comput. Intellig. 1(2): 125-134 (2017)
  20. Dongdong Zhao, Wenjian Luo, Ran Liu, Lihua Yue: Experimental analyses of the K-hidden algorithm. . Appl. of AI 62: 331-340 (2017). (CCF-C)
  21. Wenjian Luo, Hao Jiang and Dongdong Zhao. Rating Credits of Online Merchants Using Negative Ranks. IEEE Transactions on Emerging Topics in Computational Intelligence, 1(5): 354 - 365, October, 2017

  1. Chuangming Xia, Jing Tian, Erqing Li, Junwei Zhou, Jianwen Xiang, Jin Wang, Liang Bai, Yueying He: An Efficient Tool for Industrial Control System Security Analysis. DASC/PiCom/DataCom/CyberSciTech 2016: 424-427
  2. Caisheng Weng, Jianwen Xiang, Shengwu Xiong, Dongdong Zhao, Chunhui Yang:Analysis of Software Aging in Android.ISSRE Workshops 2016: 78-83
  3. Hanbing Yao, Nana Xing, Junwei Zhou, Zhe Xia: Secure Index for Resource-Constraint Mobile Devices in Cloud Computing. IEEE Access 4: 9119-9128 (2016).
  4. Yanchao Yang, Junwei Zhou, Feipeng Duan, Fang Liu, Lee-Ming Cheng: Wave atom transform based image hashing using distributed source coding. J. Inf. Sec. Appl. 31: 75-82 (2016). (CCF-C)
  5. Shulan Wang, Junwei Zhou, Joseph K. Liu, Jianping Yu, Jianyong Chen, Weixin Xie: An Efficient File Hierarchy Attribute-Based Encryption Scheme in Cloud Computing. IEEE Trans. Information Forensics and Security 11(6): 1265-1277 (2016). (CCF-A)
  6. Abdelghani Dahou, Shengwu Xiong, Junwei Zhou, Mohamed Houcine Haddoud, Pengfei Duan: Word Embeddings and Convolutional Neural Network for Arabic Sentiment Classification. COLING 2016: 2418-2427. (CCF-B)
  7. Ning Wang, Zhe Xia, Jianwen Xiang: Editorial: Special issue on security and dependability of internet of things. J. Inf. Sec. Appl. 31: 1-2 (2016). (CCF-C)
  8. Dongdong Zhao, Wenjian Luo, Lihua Yue: Reconstructing Positive Surveys from Negative Surveys with Background Knowledge. DMBD 2016: 86-99

  1. Jianwen Xiang, Fumio Machida, Kumiko Tadano, Yoshiharu Maeno: An Imperfect Fault Coverage Model With Coverage of Irrelevant Components. IEEE Trans. Reliability 64(1): 320-332.
  2. Fumio Machida, Jianwen Xiang, Kumiko Tadano, Shigeru Hosono:An Asset-Based Development Approach for Availability and Safety Analysis on a Flood Alert System.DSN Workshops 2015: 51-56
  3. Yoshiteru Nakamori, Fei Meng, Michitaka Kosaka, Jing Tian, Jianwen Xiang:Service Systems Development Based on a Knowledge Synthesis Methodology.QRS Companion 2015: 245-250. (CCF-C)
  4. Junwei Zhou, Kwok-Wo Wong, Yanchao Yang: Distributed arithmetic coding with interval swapping. Signal Processing 116: 29-37 (2015). (JCR: Q2)
  5. Junwei Zhou, Fang Liu, Jianyong Chen, Lee-Ming Cheng, Yanchao Yang, Pengfei Duan: Wave atoms based image authentication using Slepian-Wolf coding, The 2nd International Symposium on De-pendable Computing and Internet of Things, pp. 1–5, 2015.
  6. Dongdong Zhao, Wenjian Luo, Ran Liu and Lihua Yue. A Fine-grained Algorithm for Generating Hard-to-reverse Negative Databases. Proceedings of the 2015 International Workshop on Artificial Immune Systems (AIS-2015), July 17-18, 2015, Taormina, Italy, pp. 84-91
  7. Linli Wu, Wenjian Luo and Dongdong Zhao. SvdNPD: A Negative Data Publication Method Based on the Sensitive Value Distribution. Proceedings of the 2015 International Workshop on Artificial Immune Systems (AIS-2015), July 17-18, 2015, Taormina, Italy, pp. 98-106

  1. Jianwen Xiang, Fumio Machida, Kumiko Tadano, Shigeru Hosono: Is Cut Sequence Necessary in Dynamic Fault Trees?ISSRE Workshops 2014: 138-139
  2. Jianwen Xiang, Fumio Machida, Kumiko Tadano, Yoshiharu Maeno: Analysis of Persistence of Relevance in Systems with Imperfect Fault Coverage.SAFECOMP 2014: 109-124
  3. Guodong Ye, Junwei Zhou: A block chaotic image encryption scheme based on self-adaptive modelling. Appl. Soft Comput. 22: 351-357 (2014)
  4. Qiuzhen Lin, Kwok-Wo Wong, Junwei Zhou, and Leo Yu Zhang: A Comparative Study of Various Simultaneous Compression and Encryption Schemes Based on Chaotic Systems, International Symposium on Nonlinear Theory and its Applications, pp. 381–384, 2014.
  5. Yihui Lu, Wenjian Luo and Dongdong Zhao. Fast Searching Optimal Negative Surveys. Proceedings of the 2014 International Conference of Information and Network Security (ICINS 2014), November 14-16, 2014, Beijing, China, pp. 172-180
  6. Xuehai Du, Wenjian Luo and Dongdong Zhao. Negative Publication of Data. Immune Computation, 2(2): 1-14, December, 2014

  1. Kumiko Tadano, Jianwen Xiang, Fumio Machida, Yoshiharu Maeno: Identification of Smallest Unacceptable Combinations of Simultaneous Component Failures in Information Systems. IEICE Transactions 96-D(9): 1941-1951(2013).
  2. Jianwen Xiang, Fumio Machida, Kumiko Tadano, Yoshiharu Maeno, Kazuo Yanoo: Coverage of Irrelevant Components in Systems with Imperfect Fault Coverage.IEICE Transactions 96-A(7): 1649-1652 (2013).
  3. Fumio Machida, Jianwen Xiang, Kumiko Tadano, Yoshiharu Maeno, Takashi Horikawa: Performability analysis of RAID10 versus RAID6.DSN 2013: 1-2. (CCF-B)
  4. Fumio Machida, Jianwen Xiang, Kumiko Tadano, Yoshiharu Maeno: Composing hierarchical stochastic model from SysML for system availability analysis.ISSRE 2013: 51-60. (CCF-B)
  5. Jianwen Xiang, Fumio Machida, Kumiko Tadano, Kazuo Yanoo, Wei Sun, Yoshiharu Maeno: A Static Analysis of Dynamic Fault Trees with Priority-AND Gates. LADC 2013: 58-67
  6. Junwei Zhou, Kwok-Wo Wong, Jianyong Chen: Distributed Block Arithmetic Coding for Equiprobable Sources, IEEE Sensors Journal, 13(7): pp. 2750–2756, July 2013. (JCR: Q2)
  7. Dongdong Zhao, Wenjian Luo: A Study of the Private Set Intersection Protocol Based on Negative Databases. DASC 2013: 58-64
  8. Dongdong Zhao, Wenjian Luo: Real-Valued Negative Databases. ECAL 2013: 884-890.