Long-distance free-space quantum key distribution in daylight towards inter-satellite communication SK Liao, HL Yong, C Liu, GL Shentu, DD Li, J Lin, H Dai, SQ Zhao, B Li, ... Nature Photonics 11 (8), 509-513, 2017 | 409 | 2017 |
Experimental round-robin differential phase-shift quantum key distribution YH Li, Y Cao, H Dai, J Lin, Z Zhang, W Chen, Y Xu, JY Guan, SK Liao, ... Physical Review A 93 (3), 030302, 2016 | 57 | 2016 |
Abstract interpretation from Büchi automata M Hofmann, W Chen Proceedings of the Joint Meeting of the Twenty-Third EACSL Annual Conference …, 2014 | 29 | 2014 |
More semantics more robust: Improving android malware classifiers W Chen, D Aspinall, AD Gordon, C Sutton, I Muttik Proceedings of the 9th ACM conference on security & privacy in wireless and …, 2016 | 28 | 2016 |
Proof-of-principle demonstration of quantum key distribution with seawater channel: towards space-to-underwater quantum communication DD Li, Q Shen, W Chen, Y Li, X Han, KX Yang, Y Xu, J Lin, CZ Wang, ... Optics Communications 452, 220-226, 2019 | 24 | 2019 |
Potential pharmaceutical resources of the Qinling Mountain in central China: medicinal fungi Q Shen, W Chen, Z Yan, Z Xie Frontiers of biology in China 4, 89-93, 2009 | 18 | 2009 |
Ground test of satellite constellation based quantum communication SK Liao, HL Yong, C Liu, GL Shentu, DD Li, J Lin, H Dai, SQ Zhao, B Li, ... arXiv preprint arXiv:1611.09982, 2016 | 12 | 2016 |
A Text-Mining Approach to Explain Unwanted Behaviours W Chen, D Aspinall, AD Gordon, C Sutton, I Muttik 9th European Workshop on System Security, 2016 | 11 | 2016 |
Space-bound optical source for satellite-ground decoy-state quantum key distribution Y Li, SK Liao, XL Chen, W Chen, K Cheng, Y Cao, HL Yong, T Wang, ... Optics express 22 (22), 27281-27289, 2014 | 11 | 2014 |
The algorithmics of solitaire-like games R Backhouse, W Chen, JF Ferreira Mathematics of Program Construction: 10th International Conference, MPC 2010 …, 2010 | 10 | 2010 |
Megahertz high voltage pulse generator suitable for capacitive load Y Xu, W Chen, H Liang, YH Li, FT Liang, Q Shen, SK Liao, CZ Peng AIP Advances 7 (11), 2017 | 9 | 2017 |
Diurnal activity rhythms and time budgets of captive Qinling golden takin (Budorcas taxicolor bedfordi) in the Qinling Mountains, Shaanxi, China W Chen, Q Shen, Q Ma, G Pan, C Lei Journal of Forestry research 18, 149-152, 2007 | 9 | 2007 |
On Robust Malware Classifiers by Verifying Unwanted Behaviours W Chen, D Aspinall, AD Gordon, C Sutton, I Muttik 12th International Conference on integrated Formal Methods, 2016 | 6 | 2016 |
The algorithmics of solitaire-like games R Backhouse, W Chen, JF Ferreira Mathematics of Program Construction: 10th International Conference, MPC 2010 …, 2010 | 6 | 2010 |
B\" uchi Types for Infinite Traces and Liveness M Hofmann, W Chen arXiv preprint arXiv:1401.5107, 2014 | 5 | 2014 |
Development and validation of a nomogram for predicting the risk of coronavirus-associated acute respiratory distress syndrome: a retrospective cohort study L Zhang, J Xu, X Qi, Z Tao, Z Yang, W Chen, X Wang, T Pan, Y Dai, ... Infection and Drug Resistance, 2371-2381, 2022 | 4 | 2022 |
Towards intelligible robust anomaly detection by learning interpretable behavioural models G Grov, M Sabate, W Chen, D Aspinall NISK J 32, 1-16, 2019 | 4 | 2019 |
Checking Contact Tracing App Implementations with Bespoke Static Analysis R Flood, SC Chan, W Chen, D Aspinall SN computer science 3 (6), 496, 2022 | 3 | 2022 |
Formal analysis of Sneak-Peek: a data centre attack and its mitigations W Chen, Y Lin, V Galpin, V Nigam, M Lee, D Aspinall ICT Systems Security and Privacy Protection: 33rd IFIP TC 11 International …, 2018 | 3 | 2018 |
More semantics more robust W Chen, D Aspinall, AD Gordon, C Sutton, I Muttik Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and …, 2016 | 1 | 2016 |