Qiyan "Chiyan" Wang
Qiyan "Chiyan" Wang
Principal Research Engineer at Symantec
Geverifieerd e-mailadres voor symantec.com - Homepage
Geciteerd door
Geciteerd door
Detecting false data injection attacks on dc state estimation
RB Bobba, KM Rogers, Q Wang, H Khurana, K Nahrstedt, TJ Overbye
The First Workshop on Secure Control Systems, CPSWEEK 2010, 2010
Atomistic free-volume zones and inelastic deformation of metallic glasses
JC Ye, J Lu, CT Liu, Q Wang, Y Yang
Nature materials 9 (8), 619-623, 2010
Unusual fast secondary relaxation in metallic glass
Q Wang, ST Zhang, Y Yang, YD Dong, CT Liu, J Lu
Nature Communications 6 (1), 7876, 2015
Universal secondary relaxation and unusual brittle-to-ductile transition in metallic glasses
Q Wang, JJ Liu, YF Ye, TT Liu, S Wang, CT Liu, J Lu, Y Yang
Materials Today 20 (6), 293-300, 2017
CensorSpoofer: Asymmetric Communication using IP Spoofing for Censorship-Resistant Web Browsing
Q Wang, X Gong, GTK Nguyen, A Houmansadr, N Borisov
19th ACM conference on Computer and communications security (CCS'12) Pages …, 2012
Manipulation of free volumes in a metallic glass through Xe-ion irradiation
XL Bian, G Wang, HC Chen, L Yan, JG Wang, Q Wang, PF Hu, JL Ren, ...
Acta Materialia 106, 66-77, 2016
Time valid one-time signature for time-critical multicast data authentication
Q Wang, H Khurana, Y Huang, K Nahrstedt
The 28th IEEE International Conference on Computer Communications (INFOCOM …, 2009
Fishmeal replacement by mixed plant proteins and maggot meal on growth performance, target of rapamycin signalling and metabolism in juvenile turbot (S cophthalmus maximus L.)
Q Wang, G He, K Mai, W Xu, H Zhou
Aquaculture Nutrition 22 (4), 752-758, 2016
Microstructure evolution and strengthening mechanisms of cold-drawn commercially pure aluminum wire
JP Hou, Q Wang, HJ Yang, XM Wu, CH Li, XW Li, ZF Zhang
Materials Science and Engineering: A 639, 103-106, 2015
Nano-scale precipitates: The key to high strength and high conductivity in Al alloy wire
JP Hou, Q Wang, ZJ Zhang, YZ Tian, XM Wu, HJ Yang, XW Li, ZF Zhang
Materials & Design 132, 148-157, 2017
Breaking the trade-off relation of strength and electrical conductivity in pure Al wire by controlling texture and grain boundary
JP Hou, R Li, Q Wang, HY Yu, ZJ Zhang, QY Chen, H Ma, XM Wu, XW Li, ...
Journal of Alloys and Compounds 769, 96-109, 2018
MIS: malicious nodes identification scheme in network-coding-based peer-to-peer streaming
Q Wang, L Vu, K Nahrstedt, H Khurana
The 29th IEEE International Conference on Computer Communications (INFOCOM …, 2010
Improved fracture toughness and ductility of PLA composites by incorporating a small amount of surface-modified helical carbon nanotubes
Y Wang, Y Mei, Q Wang, W Wei, F Huang, Y Li, J Li, Z Zhou
Composites Part B: Engineering 162, 54-61, 2019
Controlled engineering of WS2 nanosheets–CdS nanoparticle heterojunction with enhanced photoelectrochemical activity
M Zirak, M Zhao, O Moradlou, M Samadi, N Sarikhani, Q Wang, HL Zhang, ...
Solar Energy Materials and Solar Cells 141, 260-269, 2015
Octopus: A Secure and Anonymous DHT Lookup
Q Wang, N Borisov
The 32nd IEEE International Conference on Distributed Computing Systems …, 2012
Hardness, yield strength, and plastic flow in thin film metallic-glass
JC Ye, JP Chu, YC Chen, Q Wang, Y Yang
Journal of Applied Physics 112 (5), 2012
Three principles for preparing Al wire with high strength and high electrical conductivity
JP Hou, R Li, Q Wang, HY Yu, ZJ Zhang, QY Chen, H Ma, XM Wu, XW Li, ...
Journal of Materials Science & Technology 35 (5), 742-751, 2019
Visdrone-sot2018: The vision meets drone single-object tracking challenge results
L Wen, P Zhu, D Du, X Bian, H Ling, Q Hu, C Liu, H Cheng, X Liu, W Ma, ...
Proceedings of the European conference on computer vision (ECCV) workshops, 0-0, 2018
L.; McMaster, J.; Wilson, C.; Schröder, M
Q Wang, JE Barclay, AJ Blake, ES Davies, DJ Evans, AC Marr, ...
Chem. Eur. J 10, 3384-3396, 2004
In search of an anonymous and secure lookup: attacks on structured peer-to-peer anonymous communication systems
Q Wang, P Mittal, N Borisov
17th ACM conference on Computer and communications security (CCS'10), 308-318, 2010
Het systeem kan de bewerking nu niet uitvoeren. Probeer het later opnieuw.
Artikelen 1–20