default search action
Yongxin Zhao
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j26]Yongxin Zhao, Chundong Wang:
Protecting privacy and enhancing utility: A novel approach for personalized trajectory data publishing using noisy prefix tree. Comput. Secur. 144: 103922 (2024) - [j25]Haorong Wu, Ziqi Luo, Fuchun Sun, Xiaoxiao Li, Yongxin Zhao:
An Improvement Method for Improving the Surface Defect Detection of Industrial Products Based on Contour Matching Algorithms. Sensors 24(12): 3932 (2024) - [j24]Yongxin Zhao, Wenhan Wu, Yuan Fei, Zhihao Liu, Yang Li, Yilong Yang, Ling Shi, Bo Zhang:
An architecture refactoring approach to reducing software hierarchy complexity. J. Softw. Evol. Process. 36(4) (2024) - [j23]Kun Ma, Yongjian Li, Shaowei Cai, Yongxin Zhao:
A local search approach to protocol verification. Theor. Comput. Sci. 1008: 114675 (2024) - [c59]Qiang Wang, Huadong Dai, Yongxin Zhao, Min Zhang, Simon Bliudze:
Enabling Behaviour Tree Verification via a Translation to BIP. FACS 2024: 3-20 - [c58]Zhenghai Cai, Yongjian Li, Yongxin Zhao:
Murphi2Chisel: A Protocol Compiler from Murphi to Chisel. Internetware 2024 - [c57]Shenglin Zhang, Yongxin Zhao, Xiao Xiong, Yongqian Sun, Xiaohui Nie, Jiacheng Zhang, Fenglai Wang, Xian Zheng, Yuzhi Zhang, Dan Pei:
Illuminating the Gray Zone: Non-intrusive Gray Failure Localization in Server Operating Systems. SIGSOFT FSE Companion 2024: 126-137 - [c56]Yongjian Li, Hongjian Jiang, Yongxin Zhao:
A Formally Verified Scheme for Security Protocols with the Operational Semantics of Strand Space. TASE 2024: 306-323 - [i1]Shuang Liu, Chenglin Tian, Jun Sun, Ruifeng Wang, Wei Lu, Yongxin Zhao, Yinxing Xue, Junjie Wang, Xiaoyong Du:
Conformance Testing of Relational DBMS Against SQL Specifications. CoRR abs/2406.09469 (2024) - 2023
- [j22]Yunzhou Tang, GuoXu Du, Jinzhong Long, Yongxin Zhao:
Integration of online deep reinforcement learning and federated learning: A dynamic energy management strategy for industrial applications. IET Commun. 17(19): 2162-2177 (2023) - [j21]Miantao Chao, Yueqi Geng, Yongxin Zhao:
A Method of Inertial Regularized ADMM for Separable Nonconvex Optimization Problems. Soft Comput. 27(22): 16741-16757 (2023) - [c55]Xiwei Li, Xi Wu, Yongxin Zhao, Yongjian Li:
Perceptual Risk-Aware Adaptive Responsibility Sensitive Safety for Autonomous Driving. CAiSE 2023: 33-49 - [c54]Mufan Xiang, Yongjian Li, Yongxin Zhao:
ChiselFV: A Formal Verification Framework for Chisel. DATE 2023: 1-6 - [c53]Shuaishuai Feng, Xi Wu, Yongxin Zhao, Yongjian Li:
Dispatching and Scheduling Dependent Tasks Based on Multi-agent Deep Reinforcement Learning. SEKE 2023: 280-285 - [c52]Fengyong Peng, Xi Wu, Yongxin Zhao, Yongjian Li:
Anaphora Ambiguity Detection Method Based on Cross-domain Pronoun Substitution (S). SEKE 2023: 646-649 - [c51]Chundong Wang, Yongxin Zhao:
A Novel Approach for Trajectory Partition Privacy in Location-Based Services. TrustCom 2023: 1464-1469 - 2022
- [j20]Zhonglong Guo, Zheng Kuang, Yongxin Zhao, Yang Deng, Hao He, Miaomiao Wan, Yihan Tao, Dong Wang, Jianhua Wei, Lei Li, Xiaozeng Yang:
PmiREN2.0: from data annotation to functional exploration of plant microRNAs. Nucleic Acids Res. 50(D1): 1475-1482 (2022) - [c50]Panfeng Qiu, Xi Wu, Yongxin Zhao:
Generating Natural Language Adversarial Examples Based on the Approximating Top-K Combination Token Substitution. HPCC/DSS/SmartCity/DependSys 2022: 1675-1681 - [c49]Mufan Xiang, Yongjian Li, Sijun Tan, Yongxin Zhao, Yiwei Chi:
Parameterized Design and Formal Verification of Multi-ported Memory. ICECCS 2022: 33-41 - [c48]Weiyu Xu, Xi Wu, Yongxin Zhao, Yongjian Li:
Formal Verification and Analysis of Time-Sensitive Software-Defined Network Architecture. SEKE 2022: 369-375 - [c47]Zhenheng Dong, Yongxin Zhao, Qiang Wang:
An Information Flow Security Logic for Permission-Based Declassification Strategy. SEKE 2022: 519-524 - 2021
- [j19]Yongxin Zhao, Zheng Kuang, Ying Wang, Lei Li, Xiaozeng Yang:
MicroRNA annotation in plants: current status and challenges. Briefings Bioinform. 22(5) (2021) - [j18]Wanqing Wu, Yongxin Zhao:
Quantum private comparison of size using d-level Bell states with a semi-honest third party. Quantum Inf. Process. 20(4): 155 (2021) - [j17]Jin Lv, Yongxin Zhao, Xi Wu, Yongjian Li, Qiang Wang:
Formal Analysis of TSN Scheduler for Real-Time Communications. IEEE Trans. Reliab. 70(3): 1286-1294 (2021) - [c46]Qiang Wang, Jiawei Jiang, Yongxin Zhao, Weipeng Cao, Chunjiang Wang, Shengdong Li:
Algorithm selection for software verification based on adversarial LSTM. BigDataSecurity 2021: 87-92 - [c45]Zhihao Liu, Qiang Wang, Yongjian Li, Yongxin Zhao:
CMSS: Collaborative Modeling of Safety and Security Requirements for Network Protocols. ISPA/BDCloud/SocialCom/SustainCom 2021: 185-192 - [c44]Wenhan Wu, Yongxin Zhao, Chao Peng, Yongjian Li, Qin Li:
Analyzing and Recommending Development Order Based on Design Class Diagram. KSEM 2021: 524-537 - [c43]Yongxin Zhao, Jing Hu, Ying Gu, Yanmin Wan, Fang Liu, Chengjie Ye, Xiaobo Zhang:
Development and Implementation of Pediatric Nursing-Clinical Decision Support System for Hyperthermia: A Pre- and Post-Test. Nursing Informatics 2021: 421-425 - [c42]Zhiming Hu, Zheng Wang, Hongjian Jiang, Yuyuan Zhang, Yongxin Zhao:
HHML: A Hierarchical Hybrid Modeling Language for Mode-based Periodic Controllers. SEKE 2021: 31-36 - [c41]Yongxin Zhao, Hongjian Jiang, Jin Lv, Sijun Tan, Yongjian Li:
AnB2Murphi: A Translator for Converting AliceBob Specifications to Murphi. SEKE 2021: 108-113 - [c40]Hongjian Jiang, Yongjian Li, Sijun Tan, Yongxin Zhao:
Encoding Induction Proof in Dafny. TASE 2021: 95-102 - [c39]Shiling Feng, Xiaohong Chen, Qin Li, Yongxin Zhao:
RE2B: Enhancing Correctness of Both Requirements and Design Models. TASE 2021: 191-198 - [c38]Yongxin Zhao, Wanqing Wu, Chaofan Di:
Release of Trajectory Data based on Space Segmentation using Differential Privacy. TrustCom 2021: 1246-1253 - 2020
- [j16]Jianmin Jiang, Huibiao Zhu, Qin Li, Yongxin Zhao, Shi Zhang, Ping Gong, Zhong Hong:
Event-based functional decomposition. Inf. Comput. 271: 104484 (2020) - [j15]Zhonglong Guo, Zheng Kuang, Ying Wang, Yongxin Zhao, Yihan Tao, Chen Cheng, Jing Yang, Xiayang Lu, Chen Hao, Tianxin Wang, Xiaoyan Cao, Jianhua Wei, Lei Li, Xiaozeng Yang:
PmiREN: a comprehensive encyclopedia of plant miRNAs. Nucleic Acids Res. 48(Database-Issue): D1114-D1121 (2020) - [c37]Huaiwei Yang, Shuang Liu, Lin Gui, Yongxin Zhao, Jun Sun, Junjie Chen:
What Makes Open Source Software Projects Impactful: A Data-Driven Approach. Internetware 2020: 126-135 - [c36]Genwang Gou, Yongxin Zhao, Jiawei Jiang, Ling Shi:
The Prediction of Delay Time and Route Planning for Autonomous Vehicles. SEKE 2020: 7-12 - [c35]Jiawei Jiang, Yongxin Zhao, Xi Wu, Genwang Gou:
A Detect-and-Modify Region-based Classifier to Defend Evasion Attacks. SEKE 2020: 19-24
2010 – 2019
- 2019
- [j14]Peng Zhang, Yu Liu, Jianqi Shi, Yanhong Huang, Yongxin Zhao:
A Feasibility Analysis Framework of Time-Sensitive Networking Using Real-Time Calculus. IEEE Access 7: 90069-90081 (2019) - [j13]Xin Li, Jian Guo, Yongxin Zhao, Xiaoran Zhu:
Formal Modeling and Verifying the TTCAN Protocol from a Probabilistic Perspective. J. Circuits Syst. Comput. 28(10): 1950177:1-1950177:21 (2019) - [j12]Genwang Gou, Yongxin Zhao, Qin Li, Qiwen Xu:
A mathematical analysis of improved EigenAnt algorithm. J. Exp. Theor. Artif. Intell. 31(2): 291-309 (2019) - [j11]Jianmin Jiang, Huibiao Zhu, Qin Li, Yongxin Zhao, Zhong Hong, Shi Zhang, Ping Gong:
Isolation Modeling and Analysis Based on Mobility. ACM Trans. Softw. Eng. Methodol. 28(2): 10:1-10:31 (2019) - [c34]Yongxin Zhao, Xiujuan Zhang, Ling Shi, Gan Zeng, Feng Sheng, Shuang Liu:
Towards a Formal Approach to Defining and Computing the Complexity of Component Based Software. APSEC 2019: 331-338 - [c33]Yilong Yang, Wei Ke, Weiru Wang, Yongxin Zhao:
Deep Learning for Web Services Classification. ICWS 2019: 440-442 - [c32]Siteng Cao, Yongxin Zhao, Ling Shi:
Software Complexity Reduction by Automated Refactoring Schema. TASE 2019: 208-215 - 2018
- [j10]Ling Shi, Yongxin Zhao, Yang Liu, Jun Sun, Jin Song Dong, Shengchao Qin:
A UTP semantics for communicating processes with shared variables and its formal encoding in PVS. Formal Aspects Comput. 30(3-4): 351-380 (2018) - [c31]Yongxin Zhao, Xi Wu, Jing Liu, Yilong Yang:
Formal Modeling and Security Analysis for OpenFlow-Based Networks. ICECCS 2018: 201-204 - 2017
- [j9]Jianmin Jiang, Huibiao Zhu, Qin Li, Yongxin Zhao, Lin Zhao, Shi Zhang, Ping Gong, Zhong Hong, Donghuo Chen:
Event-Based Mobility Modeling and Analysis. ACM Trans. Cyber Phys. Syst. 1(2): 9:1-9:32 (2017) - 2016
- [c30]Xi Wu, Yongxin Zhao, Huibiao Zhu:
Integrating a Calculus with Mobility and Quality for Wireless Sensor Networks. HASE 2016: 220-227 - 2015
- [j8]Yanhong Huang, Jifeng He, Huibiao Zhu, Yongxin Zhao, Jianqi Shi, Shengchao Qin:
Semantic theories of programs with nested interrupts. Frontiers Comput. Sci. 9(3): 331-345 (2015) - [j7]Jianmin Jiang, Huibiao Zhu, Qin Li, Yongxin Zhao, Lin Zhao, Shi Zhang, Ping Gong, Zhong Hong:
Analyzing Event-Based Scheduling in Concurrent Reactive Systems. ACM Trans. Embed. Comput. Syst. 14(4): 86:1-86:27 (2015) - [c29]Bo Li, Mengdi Wang, Yongxin Zhao, Geguang Pu, Huibiao Zhu, Fu Song:
Modeling and Verifying Google File System. HASE 2015: 207-214 - [c28]Yanhong Huang, Yongxin Zhao, Shengchao Qin, Jifeng He:
Probabilistic Denotational Semantics for an Interrupt Modelling Language. ICECCS 2015: 160-169 - 2014
- [j6]Qin Li, Yongxin Zhao, Huibiao Zhu, Jifeng He:
A UTP semantic model for Orc language with execution status and fault handling. Frontiers Comput. Sci. 8(5): 709-725 (2014) - [j5]Yongxin Zhao, Yanhong Huang, Qin Li, Huibiao Zhu, Jifeng He, Jianwen Li, Xi Wu:
Investigating System Survivability from a Probabilistic Perspective. IEICE Trans. Inf. Syst. 97-D(9): 2356-2370 (2014) - [j4]Yongxin Zhao, Hao Xiao, Zheng Wang, Geguang Pu, Ting Su:
The semantics and verification of timed service choreography. Int. J. Comput. Math. 91(3): 384-402 (2014) - [c27]Yongxin Zhao, Jin Song Dong, Yang Liu, Jun Sun:
Towards a Combination of CafeOBJ and PAT. Specification, Algebra, and Software 2014: 151-170 - [c26]Mengdi Wang, Bo Li, Yongxin Zhao, Geguang Pu:
Formalizing Google File System. PRDC 2014: 190-191 - [c25]Xi Wu, Si Liu, Huibiao Zhu, Yongxin Zhao:
Reasoning about Group-Based Mobility in MANETs. PRDC 2014: 244-253 - 2013
- [j3]Xi Wu, Huibiao Zhu, Yongxin Zhao, Zheng Wang, Si Liu:
Modeling and verifying the Ariadne protocol using process algebra. Comput. Sci. Inf. Syst. 10(1): 393-421 (2013) - [j2]Zheng Wang, Geguang Pu, Jianwen Li, Yuxiang Chen, Yongxin Zhao, Mingsong Chen, Bin Gu, Mengfei Yang, Jifeng He:
A novel requirement analysis approach for periodic control systems. Frontiers Comput. Sci. 7(2): 214-235 (2013) - [c24]Longfei Zhu, Yongxin Zhao, Huibiao Zhu, Qiwen Xu:
Towards a Modeling Language for Cyber-Physical Systems. Theories of Programming and Formal Methods 2013: 394-411 - [c23]Ling Shi, Yongxin Zhao, Yang Liu, Jun Sun, Jin Song Dong, Shengchao Qin:
A UTP Semantics for Communicating Processes with Shared Variables. ICFEM 2013: 215-230 - [c22]Yanhong Huang, Yongxin Zhao, Jianqi Shi, Huibiao Zhu:
A Denotational Model for Interrupt-Driven Programs. ICST Workshops 2013: 15-20 - 2012
- [c21]Xi Wu, Si Liu, Huibiao Zhu, Yongxin Zhao, Lei Chen:
Modeling and Verifying the Ariadne Protocol Using CSP. ECBS 2012: 24-32 - [c20]Yanhong Huang, Yongxin Zhao, Jianqi Shi, Huibiao Zhu, Shengchao Qin:
Investigating Time Properties of Interrupt-Driven Programs. SBMF 2012: 131-146 - [c19]Yongxin Zhao, Longfei Zhu, Huibiao Zhu, Jifeng He:
A Denotational Model for Instantaneous Signal Calculus. SEFM 2012: 126-140 - [c18]Yanhong Huang, Yongxin Zhao, Shengchao Qin, Guanhua He, João F. Ferreira:
A Timed CSP Model for the Time-Triggered Language Giotto. SEW 2012: 110-119 - [c17]Chengcheng Wu, Yongxin Zhao, Huibiao Zhu:
Unifying Operational Semantics with Algebraic Semantics for Instantaneous Reactions. UTP 2012: 186-203 - [c16]Xi Wu, Yue Zhang, Huibiao Zhu, Yongxin Zhao, Zailiang Sun, Peng Liu:
Formal Modeling and Analysis of the REST Architecture Using CSP. WS-FM 2012: 87-102 - 2011
- [c15]Yongxin Zhao, Zheng Wang, Hao Xiao, Jing Ping, Geguang Pu, Jifeng He, Huibiao Zhu:
A Unifying Approach to Validating Specification-Oriented XML Constraints. HASE 2011: 33-40 - [c14]Jianwen Li, Zheng Wang, Yongxin Zhao, Geguang Pu, Yanxia Qi, Bin Gu:
An Event-B Interpretation for SPARDL Model. HASE 2011: 41-48 - [c13]Si Liu, Yongxin Zhao, Huibiao Zhu, Qin Li:
A Calculus for Mobile Ad Hoc Networks from a Group Probabilistic Perspective. HASE 2011: 157-162 - [c12]Yongxin Zhao, Yanhong Huang, Jifeng He, Si Liu:
Formal Model of Interrupt Program from a Probabilistic Perspective. ICECCS 2011: 87-94 - [c11]Yongxin Zhao, Jifeng He:
Towards a Signal Calculus for Event-Based Synchronous Languages. ICFEM 2011: 1-13 - [c10]Yanhong Huang, Yongxin Zhao, Longfei Zhu, Qin Li, Huibiao Zhu, Jianqi Shi:
Modeling and Verifying the Code-Level OSEK/VDX Operating System with CSP. TASE 2011: 142-149 - [c9]Si Liu, Yongxin Zhao, Huibiao Zhu, Qin Li:
Towards a Probabilistic Calculus for Mobile Ad Hoc Networks. TASE 2011: 195-198 - [c8]Mengying Wang, Huibiao Zhu, Yongxin Zhao, Si Liu:
Modeling and Analyzing the (mu)TESLA Protocol Using CSP. TASE 2011: 247-250 - 2010
- [j1]Zheng Wang, Lei Zhou, Yongxin Zhao, Jing Ping, Hao Xiao, Geguang Pu, Huibiao Zhu:
Web services choreography validation. Serv. Oriented Comput. Appl. 4(4): 291-305 (2010) - [c7]Zheng Wang, Jianwen Li, Yongxin Zhao, Yanxia Qi, Geguang Pu, Jifeng He, Bin Gu:
SPARDL: A Requirement Modeling Language for Periodic Control System. ISoLA (1) 2010: 594-608 - [c6]Yongxin Zhao, Zheng Wang, Geguang Pu, Huibiao Zhu:
A Formal Model for Service Choreography with Exception Handling and Finalization. TASE 2010: 15-24 - [c5]Yongxin Zhao, Yanhong Huang, Jianwen Li, Huibiao Zhu:
Probabilistic Model of System Survivability. TASE 2010: 193-200 - [c4]Qin Li, Yongxin Zhao, Xiaofeng Wu, Si Liu:
Promoting Models. UTP 2010: 234-252 - [c3]Yongxin Zhao, Xu Wang, Huibiao Zhu:
Towards a Pomset Semantics for a Shared-Variable Parallel Language. UTP 2010: 271-285
2000 – 2009
- 2009
- [c2]Huibiao Zhu, Yongxin Zhao, Jifeng He:
Locality-Based Normal Form Approach to Linking Algebraic Semantics and Operational Semantics for an Event-Driven System-Level Language. Australian Software Engineering Conference 2009: 297-306 - 2008
- [c1]Geguang Pu, Yongxin Zhao, Zheng Wang, Libo Feng, Huibiao Zhu, Jifeng He:
A Denotational Model for Web Services Choreography. ICDCIT 2008: 1-12
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-10 21:15 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint