Feng

Results: 1237



#Item
41Refund attacks on Bitcoin’s Payment Protocol Patrick McCorry, Siamak F. Shahandashti, Feng Hao School of Computing Science, Newcastle University UK (patrick.mccorry, siamak.shahandashti, feng.hao)@ncl.ac.uk  Abstract.

Refund attacks on Bitcoin’s Payment Protocol Patrick McCorry, Siamak F. Shahandashti, Feng Hao School of Computing Science, Newcastle University UK (patrick.mccorry, siamak.shahandashti, feng.hao)@ncl.ac.uk Abstract.

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2016-01-11 04:15:05
42COE: A General Approach for Efficient Genome-Wide Two-Locus Epistasis Test in Disease Association Study Xiang Zhang 1 , Feng Pan 1 , Yuying Xie 2 , Fei Zou 3 , and Wei Wang 1 Departments of 1 Computer Science, 2 Genetics

COE: A General Approach for Efficient Genome-Wide Two-Locus Epistasis Test in Disease Association Study Xiang Zhang 1 , Feng Pan 1 , Yuying Xie 2 , Fei Zou 3 , and Wei Wang 1 Departments of 1 Computer Science, 2 Genetics

Add to Reading List

Source URL: web.cs.ucla.edu

Language: English - Date: 2009-02-16 14:00:18
    43Refund attacks on Bitcoin’s Payment Protocol Patrick McCorry, Siamak F. Shahandashti, Feng Hao School of Computing Science, Newcastle University UK (patrick.mccorry, siamak.shahandashti, feng.hao)@ncl.ac.uk  Abstract.

    Refund attacks on Bitcoin’s Payment Protocol Patrick McCorry, Siamak F. Shahandashti, Feng Hao School of Computing Science, Newcastle University UK (patrick.mccorry, siamak.shahandashti, feng.hao)@ncl.ac.uk Abstract.

    Add to Reading List

    Source URL: milan2016.scalingbitcoin.org

    Language: English - Date: 2016-09-30 04:48:05
      44REPORTS  Suppression of Cotton Bollworm in Multiple Crops in China in Areas with Bt Toxin–Containing Cotton Kong-Ming Wu,1† Yan-Hui Lu,1 Hong-Qiang Feng,1 Yu-Ying Jiang,2 Jian-Zhou Zhao1*

      REPORTS Suppression of Cotton Bollworm in Multiple Crops in China in Areas with Bt Toxin–Containing Cotton Kong-Ming Wu,1† Yan-Hui Lu,1 Hong-Qiang Feng,1 Yu-Ying Jiang,2 Jian-Zhou Zhao1*

      Add to Reading List

      Source URL: www.fbae.org

      Language: English - Date: 2009-02-17 07:11:47
        45Competing with Complementors: An Empirical Look at Amazon.com Feng Zhu Qihong Liu  Working Paper

        Competing with Complementors: An Empirical Look at Amazon.com Feng Zhu Qihong Liu Working Paper

        Add to Reading List

        Source URL: www.hbs.edu

        Language: English - Date: 2018-06-05 09:31:10
          46IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY  1 Fast Detection of Transformed Data Leaks Xiaokui Shu, Jing Zhang, Danfeng (Daphne) Yao, Senior Member, IEEE, and Wu-chun Feng, Senior

          IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY 1 Fast Detection of Transformed Data Leaks Xiaokui Shu, Jing Zhang, Danfeng (Daphne) Yao, Senior Member, IEEE, and Wu-chun Feng, Senior

          Add to Reading List

          Source URL: people.cs.vt.edu

          Language: English - Date: 2015-11-16 11:42:26
            47A summary report about the WDCM training course Personal introduction Guangda Feng Title: Associate professor Degree: Master

            A summary report about the WDCM training course Personal introduction Guangda Feng Title: Associate professor Degree: Master

            Add to Reading List

            Source URL: www.wdcm.org

            Language: English - Date: 2016-12-22 02:01:48
              48CRD: Fast Co-clustering on Large Datasets Utilizing Sampling-Based Matrix Decomposition Feng Pan, Xiang Zhang, and Wei Wang Dept. of Computer Science, University of North Carolina at Chapel Hill Chapel Hill, NC, US

              CRD: Fast Co-clustering on Large Datasets Utilizing Sampling-Based Matrix Decomposition Feng Pan, Xiang Zhang, and Wei Wang Dept. of Computer Science, University of North Carolina at Chapel Hill Chapel Hill, NC, US

              Add to Reading List

              Source URL: web.cs.ucla.edu

              Language: English - Date: 2008-07-14 23:41:34
                49ZombieCoin: Powering Next-Generation Botnets with Bitcoin Syed Taha Ali, Patrick McCorry, Peter Hyun-Jeen Lee, and Feng Hao Newcastle University, UK {taha.ali,patrick.mccorry,peter.lee,feng.hao}@ncl.ac.uk

                ZombieCoin: Powering Next-Generation Botnets with Bitcoin Syed Taha Ali, Patrick McCorry, Peter Hyun-Jeen Lee, and Feng Hao Newcastle University, UK {taha.ali,patrick.mccorry,peter.lee,feng.hao}@ncl.ac.uk

                Add to Reading List

                Source URL: homepages.cs.ncl.ac.uk

                Language: English - Date: 2015-01-09 18:04:18
                50A 2-Round Anonymous Veto Protocol Feng Hao and Piotr Zieli´ nski Computer Laboratory, University of Cambridge, UK {feng.hao,piotr.zielinski}@cl.cam.ac.uk

                A 2-Round Anonymous Veto Protocol Feng Hao and Piotr Zieli´ nski Computer Laboratory, University of Cambridge, UK {feng.hao,piotr.zielinski}@cl.cam.ac.uk

                Add to Reading List

                Source URL: homepages.cs.ncl.ac.uk

                Language: English - Date: 2010-04-10 14:54:54