[2] Guo Baozhu, Wang Jianxin. Unbounded energy solution for free vibration of axially moving strings. Journal of Vibration and Control, Volume 6, No.5, 2000, pp65 1-665.
, Wu Zhanjiang, Wang. Research on Fidelity of Spatial Locality Storage of Data Structure (I). Computer Engineering and Application, Volume 37,No. 13, 200 1, pp5-36.
Wang Jianxin, Wang Xinhui, Zhang Ye. Research on Fidelity of Spatial Locality Storage of Data Structure (Ⅱ). Computer Engineering and Application, Volume 37,No. 15, 200 1, pp58-60.
Wang Jianxin, Xia Hong, Zhang Ye. Study on the fidelity of spatial locality storage of data structures (3). Computer Engineering and Application, Volume 37,No. 17, 200 1, pp46-47.
[6] Yang Bingru, Wang Jianxin. Research on cooperation mechanism of KDD double databases (I). China Engineering Science, Volume 4, No.4, 2002, pp4 1-5 1.
Yang Bingru, Wang Jianxin, Sun Haihong. Research on the Cooperation Mechanism of KDD Double Database (Ⅱ). China Engineering Science, Vol.4, No.5, 2002, pp.34-43.
Meng, Pang Chunjiang,. Global time-varying weight combination forecasting method. Computer Engineering and Application, Volume 38,No. 10, 2002, pp. 98-99.
[8] Wang Jianxin, Geng Zhao, Wei Wei,. TTT language and TTT security log analyzer. International Conference on Applied Cryptography and Network Security (ACNS), pp3 16-324. In 2004, Huangshan, China.
[9] Wang Jianxin, Geng Zhao,. Subjective distance of clustering security events. International Conference on Communications, Circuits and Systems (ICCCAS), pp. 74-78. Hong Kong, China, 27-30 May 2005.
Liu Fangfang Wang Jianxin Geng Zhao. Analysis of some recently proposed public key encryption algorithms based on chaos. International Conference on Communications, Circuits and Systems (ICCCAS), pp 1573- 1576. June 25th-28th, 2006, Guilin, China.
Wang Jianxin, Hongzhou Wang, Geng Zhao. Solution to NP-hard problem of security event clustering based on genetic algorithm. Proceedings of the International Conference on Communications, Circuits and Systems, pp. 2093-2097. June 25th-28th, 2006, Guilin, China.
Zheng Xiao, Wang Jianxin, Hou Zifeng, Wei Wei. Design and research of efficient alarm clustering algorithm and Bayesian classifier based on search tree. Computer Science, Volume 33, No.8, 2006, P 190- 194.
Wang Jianxin, Chen Zhibo, Wang Chunling, Zhang Haiyan, Sun Qiao. Research on the application of ACM programming contest in data structure teaching. Proceedings of Journal of Beijing Forestry University Social Science Edition.
[14] Cloud,,,, "Binary Mail Classification Method Using Binary Decision Tree", Proceedings of the 6th International Conference on Machine Learning and Cybernetics (ICMLC), Volume 6, 3459-3464, 19-22, August 2007, Hong Kong.
[15] Wang Jianxin, Xia Yunqing, Hongzhou Wang. Clustering method based on SA to mine intrusion detection alerts. Proceedings of the 2007 International Conference on Communications, Circuits and Systems, p905-909, Kokura, Fukuoka, Japan. July 2007 1 1- 13. (EI)
Wang Jianxin, Geng Zhao, Xia Yunqing. A more general form of Apriori and its application in security event clustering. Proceedings of the 2007 International Conference on Communications, Circuits and Systems, p954-958, Kokura, Fukuoka, Japan. July 2007 1 1- 13.
Zhu Jinqing, Wang Jianxin, Chen Zhibo. Hierarchical clustering algorithm based on APRIORI and its application in IDS log analysis. Computer Research and Development, Volume 44 Supplement, 2007, 10. pp326-330。
Hu Yong, Wang Jianxin and Wang Na. Application of analytic hierarchy process in specialty setting in colleges and universities. Computer applications and software. Volume 26, No.9, September 2009. P 126- 128, 14 1。
[19] Wang Jianxin, Cui Baojiang. Clustering IDS alarms with IGA-based method. Proceedings of the 2009 International Conference on Communications, Circuits and Systems, San Jose, USA and Chengdu, China, July 23-25, 2009, p586-590.
[20] Wang Jianxin. Using genetic algorithm to reduce the overlap between hierarchical clustering. No 1st international conference on information science and engineering (ICISE2009), Nanjing, China, 20091February 26-28, p22 1-226.
Cui Baojiang, Guo Pengfei City, Wang Jianxin. Binary code execution path analysis based on symbolic execution and actual execution. Journal of Tsinghua University, Natural Science Edition (Supplement), S2, 2009.
[22] Wang Jianxin, Li Liren. Explaining two difficulties in Java grammar with syllogism principle. Computer Education, 20 10No. 10 (totalNo. 1 18), p85-87.
[23],,,,, May. An effective hybrid crossover operator of genetic algorithm. Proceedings of the 6th International Conference on Natural Computing, p227 1-2275.
[24] Zhang Haiyan, Wang Jianxin and Wei Meng. An improved algorithm for feature point correspondence of three-dimensional objects. Proceedings of the 6th International Conference on Natural Computing, p 10 1- 105.