Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Wei Wang 0012
@article{DBLP:journals/compsec/HanLCHWBHW24, author = {Xu Han and Qiang Li and Hongbo Cao and Lei Han and Bin Wang and Xuhua Bao and Yufei Han and Wei Wang}, title = {BFS2Adv: Black-box adversarial attack towards hard-to-attack short texts}, journal = {Comput. Secur.}, volume = {141}, pages = {103817}, year = {2024}, url = {https://doi.org/10.1016/j.cose.2024.103817}, doi = {10.1016/J.COSE.2024.103817}, timestamp = {Fri, 31 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/HanLCHWBHW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcss/WangYDMWSW24, author = {Bin Wang and Xiaohan Yuan and Li Duan and Hongliang Ma and Bin Wang and Chunhua Su and Wei Wang}, title = {DeFiScanner: Spotting DeFi Attacks Exploiting Logic Vulnerabilities on Blockchain}, journal = {{IEEE} Trans. Comput. Soc. Syst.}, volume = {11}, number = {2}, pages = {1577--1588}, year = {2024}, url = {https://doi.org/10.1109/TCSS.2022.3228122}, doi = {10.1109/TCSS.2022.3228122}, timestamp = {Thu, 23 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcss/WangYDMWSW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/HeWZWZLY24, author = {Yongzhong He and Yiming Wang and Sencun Zhu and Wei Wang and Yunjia Zhang and Qiang Li and Aimin Yu}, title = {Automatically Identifying {CVE} Affected Versions With Patches and Developer Logs}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {21}, number = {2}, pages = {905--919}, year = {2024}, url = {https://doi.org/10.1109/TDSC.2023.3264567}, doi = {10.1109/TDSC.2023.3264567}, timestamp = {Thu, 06 Jun 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/HeWZWZLY24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/YuanLWWWLMP24, author = {Xiaohan Yuan and Jiqiang Liu and Bin Wang and Wei Wang and Bin Wang and Tao Li and Xiaobo Ma and Witold Pedrycz}, title = {FedComm: {A} Privacy-Enhanced and Efficient Authentication Protocol for Federated Learning in Vehicular Ad-Hoc Networks}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {19}, pages = {777--792}, year = {2024}, url = {https://doi.org/10.1109/TIFS.2023.3324747}, doi = {10.1109/TIFS.2023.3324747}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/YuanLWWWLMP24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cbm/DaiQLWGWWZ23, author = {Yinyao Dai and Yaguan Qian and Fang Lu and Bin Wang and Zhaoquan Gu and Wei Wang and Jian Wan and Yanchun Zhang}, title = {Improving adversarial robustness of medical imaging systems via adding global attention noise}, journal = {Comput. Biol. Medicine}, volume = {164}, pages = {107251}, year = {2023}, url = {https://doi.org/10.1016/j.compbiomed.2023.107251}, doi = {10.1016/J.COMPBIOMED.2023.107251}, timestamp = {Sun, 24 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cbm/DaiQLWGWWZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/XuLGLBCWWLWML23, author = {Guangquan Xu and Wenqing Lei and Lixiao Gong and Jian Liu and Hongpeng Bai and Kai Chen and Ran Wang and Wei Wang and Kaitai Liang and Weizhe Wang and Weizhi Meng and Shaoying Liu}, title = {{UAF-GUARD:} Defending the use-after-free exploits via fine-grained memory permission management}, journal = {Comput. Secur.}, volume = {125}, pages = {103048}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2022.103048}, doi = {10.1016/J.COSE.2022.103048}, timestamp = {Fri, 01 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/compsec/XuLGLBCWWLWML23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/MaoQHLTWWY23, author = {Jiaoze Mao and Yaguan Qian and Jianchang Huang and Zejie Lian and Renhui Tao and Bin Wang and Wei Wang and Tengteng Yao}, title = {Object-free backdoor attack and defense on semantic segmentation}, journal = {Comput. Secur.}, volume = {132}, pages = {103365}, year = {2023}, url = {https://doi.org/10.1016/j.cose.2023.103365}, doi = {10.1016/J.COSE.2023.103365}, timestamp = {Thu, 31 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/MaoQHLTWWY23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeejas/DuanS00L023, author = {Li Duan and Yangyang Sun and Wei Ni and Weiping Ding and Jiqiang Liu and Wei Wang}, title = {Attacks Against Cross-Chain Systems and Defense Approaches: {A} Contemporary Survey}, journal = {{IEEE} {CAA} J. Autom. Sinica}, volume = {10}, number = {8}, pages = {1647--1667}, year = {2023}, url = {https://doi.org/10.1109/JAS.2023.123642}, doi = {10.1109/JAS.2023.123642}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeejas/DuanS00L023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsa/DuanX0023, author = {Li Duan and Wenyao Xu and Wei Ni and Wei Wang}, title = {{BSAF:} {A} blockchain-based secure access framework with privacy protection for cloud-device service collaborations}, journal = {J. Syst. Archit.}, volume = {140}, pages = {102897}, year = {2023}, url = {https://doi.org/10.1016/j.sysarc.2023.102897}, doi = {10.1016/J.SYSARC.2023.102897}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsa/DuanX0023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcbb/WangYYWWC23, author = {Xingze Wang and Guoxian Yu and Zhongmin Yan and Lin Wan and Wei Wang and Lizhen Cui}, title = {Lung Cancer Subtype Diagnosis by Fusing Image-Genomics Data and Hybrid Deep Networks}, journal = {{IEEE} {ACM} Trans. Comput. Biol. Bioinform.}, volume = {20}, number = {1}, pages = {512--523}, year = {2023}, url = {https://doi.org/10.1109/TCBB.2021.3132292}, doi = {10.1109/TCBB.2021.3132292}, timestamp = {Mon, 03 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcbb/WangYYWWC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/YeZLDW23, author = {Heng Ye and Qiang Zeng and Jiqiang Liu and Xiaojiang Du and Wei Wang}, title = {Easy Peasy: {A} New Handy Method for Pairing Multiple {COTS} IoT Devices}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {20}, number = {4}, pages = {3483--3494}, year = {2023}, url = {https://doi.org/10.1109/TDSC.2022.3199383}, doi = {10.1109/TDSC.2022.3199383}, timestamp = {Sat, 05 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/YeZLDW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/XuLWMWHH23, author = {Xiangrui Xu and Pengrui Liu and Wei Wang and Hongliang Ma and Bin Wang and Zhen Han and Yufei Han}, title = {{CGIR:} Conditional Generative Instance Reconstruction Attacks Against Federated Learning}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {20}, number = {6}, pages = {4551--4563}, year = {2023}, url = {https://doi.org/10.1109/TDSC.2022.3228302}, doi = {10.1109/TDSC.2022.3228302}, timestamp = {Tue, 28 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/XuLWMWHH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tissec/ChooNAKYW23, author = {Euijin Choo and Mohamed Nabeel and Mashael AlSabah and Issa Khalil and Ting Yu and Wei Wang}, title = {DeviceWatch: {A} Data-Driven Network Analysis Approach to Identifying Compromised Mobile Devices with Graph-Inference}, journal = {{ACM} Trans. Priv. Secur.}, volume = {26}, number = {1}, pages = {9:1--9:32}, year = {2023}, url = {https://doi.org/10.1145/3558767}, doi = {10.1145/3558767}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tissec/ChooNAKYW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tits/HeWLDHWNW23, author = {Xudong He and Jian Wang and Jiqiang Liu and Weiping Ding and Zhen Han and Bin Wang and Jamel Nebhen and Wei Wang}, title = {{DNS} Rebinding Threat Modeling and Security Analysis for Local Area Network of Maritime Transportation Systems}, journal = {{IEEE} Trans. Intell. Transp. Syst.}, volume = {24}, number = {2}, pages = {2643--2655}, year = {2023}, url = {https://doi.org/10.1109/TITS.2021.3135197}, doi = {10.1109/TITS.2021.3135197}, timestamp = {Wed, 08 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tits/HeWLDHWNW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tkde/WangSWWWDZ23, author = {Wei Wang and Xiaoyang Suo and Xiangyu Wei and Bin Wang and Hao Wang and Hong{-}Ning Dai and Xiangliang Zhang}, title = {{HGATE:} Heterogeneous Graph Attention Auto-Encoders}, journal = {{IEEE} Trans. Knowl. Data Eng.}, volume = {35}, number = {4}, pages = {3938--3951}, year = {2023}, url = {https://doi.org/10.1109/TKDE.2021.3138788}, doi = {10.1109/TKDE.2021.3138788}, timestamp = {Sun, 16 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tkde/WangSWWWDZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tnsm/DuanYLNW23, author = {Li Duan and Liu Yang and Chunhong Liu and Wei Ni and Wei Wang}, title = {A New Smart Contract Anomaly Detection Method by Fusing Opcode and Source Code Features for Blockchain Services}, journal = {{IEEE} Trans. Netw. Serv. Manag.}, volume = {20}, number = {4}, pages = {4354--4368}, year = {2023}, url = {https://doi.org/10.1109/TNSM.2023.3278311}, doi = {10.1109/TNSM.2023.3278311}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tnsm/DuanYLNW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tse/ZhouHXJLWXWLB23, author = {Yingnan Zhou and Xue Hu and Sihan Xu and Yan Jia and Yuhao Liu and Junyong Wang and Guangquan Xu and Wei Wang and Shaoying Liu and Thar Baker}, title = {Multi-Misconfiguration Diagnosis via Identifying Correlated Configuration Parameters}, journal = {{IEEE} Trans. Software Eng.}, volume = {49}, number = {10}, pages = {4624--4638}, year = {2023}, url = {https://doi.org/10.1109/TSE.2023.3308755}, doi = {10.1109/TSE.2023.3308755}, timestamp = {Fri, 27 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tse/ZhouHXJLWXWLB23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LiPXDL023, author = {Chao Li and Balaji Palanisamy and Runhua Xu and Li Duan and Jiqiang Liu and Wei Wang}, editor = {Weizhi Meng and Christian Damsgaard Jensen and Cas Cremers and Engin Kirda}, title = {How Hard is Takeover in DPoS Blockchains? Understanding the Security of Coin-based Voting Governance}, booktitle = {Proceedings of the 2023 {ACM} {SIGSAC} Conference on Computer and Communications Security, {CCS} 2023, Copenhagen, Denmark, November 26-30, 2023}, pages = {150--164}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3576915.3623171}, doi = {10.1145/3576915.3623171}, timestamp = {Mon, 18 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/LiPXDL023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccv/QianHZS0W23, author = {Yaguan Qian and Shuke He and Chenyu Zhao and Jiaqiang Sha and Wei Wang and Bin Wang}, title = {LEA\({}^{\mbox{2}}\): {A} Lightweight Ensemble Adversarial Attack via Non-overlapping Vulnerable Frequency Regions}, booktitle = {{IEEE/CVF} International Conference on Computer Vision, {ICCV} 2023, Paris, France, October 1-6, 2023}, pages = {4487--4498}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/ICCV51070.2023.00416}, doi = {10.1109/ICCV51070.2023.00416}, timestamp = {Mon, 22 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iccv/QianHZS0W23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2310-18596, author = {Chao Li and Balaji Palanisamy and Runhua Xu and Li Duan and Jiqiang Liu and Wei Wang}, title = {How Hard is Takeover in DPoS Blockchains? Understanding the Security of Coin-based Voting Governance}, journal = {CoRR}, volume = {abs/2310.18596}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2310.18596}, doi = {10.48550/ARXIV.2310.18596}, eprinttype = {arXiv}, eprint = {2310.18596}, timestamp = {Mon, 29 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2310-18596.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/LvCZRWCLCW22, author = {Zhuo Lv and Hongbo Cao and Feng Zhang and Yuange Ren and Bin Wang and Cen Chen and Nuannuan Li and Hao Chang and Wei Wang}, title = {{AWFC:} Preventing Label Flipping Attacks Towards Federated Learning for Intelligent IoT}, journal = {Comput. J.}, volume = {65}, number = {11}, pages = {2849--2859}, year = {2022}, url = {https://doi.org/10.1093/comjnl/bxac124}, doi = {10.1093/COMJNL/BXAC124}, timestamp = {Wed, 21 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cj/LvCZRWCLCW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cybersec/LiuXW22, author = {Pengrui Liu and Xiangrui Xu and Wei Wang}, title = {Threats, attacks and defenses to federated learning: issues, taxonomy and perspectives}, journal = {Cybersecur.}, volume = {5}, number = {1}, pages = {4}, year = {2022}, url = {https://doi.org/10.1186/s42400-021-00105-6}, doi = {10.1186/S42400-021-00105-6}, timestamp = {Fri, 17 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cybersec/LiuXW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieicetd/XiangLCLTNLLW22, author = {Yingxiao Xiang and Chao Li and Tong Chen and Yike Li and Endong Tong and Wenjia Niu and Qiong Li and Jiqiang Liu and Wei Wang}, title = {Toward Blockchain-Based Spoofing Defense for Controlled Optimization of Phases in Traffic Signal System}, journal = {{IEICE} Trans. Inf. Syst.}, volume = {105-D}, number = {2}, pages = {280--288}, year = {2022}, url = {https://doi.org/10.1587/transinf.2021bcp0014}, doi = {10.1587/TRANSINF.2021BCP0014}, timestamp = {Thu, 13 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieicetd/XiangLCLTNLLW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijis/ZhangLWSD22, author = {Zikai Zhang and Yidong Li and Wei Wang and Haifeng Song and Hairong Dong}, title = {Malware detection with dynamic evolving graph convolutional networks}, journal = {Int. J. Intell. Syst.}, volume = {37}, number = {10}, pages = {7261--7280}, year = {2022}, url = {https://doi.org/10.1002/int.22880}, doi = {10.1002/INT.22880}, timestamp = {Fri, 22 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijis/ZhangLWSD22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijis/YiSWDMWHW22, author = {Longyang Yi and Yangyang Sun and Bin Wang and Li Duan and Hongliang Ma and Bin Wang and Zhen Han and Wei Wang}, title = {{CCUBI:} {A} cross-chain based premium competition scheme with privacy preservation for usage-based insurance}, journal = {Int. J. Intell. Syst.}, volume = {37}, number = {12}, pages = {11522--11546}, year = {2022}, url = {https://doi.org/10.1002/int.23053}, doi = {10.1002/INT.23053}, timestamp = {Tue, 21 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijis/YiSWDMWHW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jdiq/WangGWHW22, author = {Bin Wang and Pengfei Guo and Xing Wang and Yongzhong He and Wei Wang}, title = {Transparent Aspect-Level Sentiment Analysis Based on Dependency Syntax Analysis and Its Application on {COVID-19}}, journal = {{ACM} J. Data Inf. Qual.}, volume = {14}, number = {2}, pages = {10:1--10:24}, year = {2022}, url = {https://doi.org/10.1145/3460002}, doi = {10.1145/3460002}, timestamp = {Sat, 20 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jdiq/WangGWHW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/YeLZJWW22, author = {Heng Ye and Jiqiang Liu and Hao Zhen and Wenbin Jiang and Bin Wang and Wei Wang}, title = {{VREFL:} Verifiable and Reconnection-Efficient Federated Learning in IoT scenarios}, journal = {J. Netw. Comput. Appl.}, volume = {207}, pages = {103486}, year = {2022}, url = {https://doi.org/10.1016/j.jnca.2022.103486}, doi = {10.1016/J.JNCA.2022.103486}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/YeLZJWW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tai/ZhangTDDWLW22, author = {Chongsheng Zhang and Yuefeng Tao and Kai Du and Weiping Ding and Bin Wang and Ji Liu and Wei Wang}, title = {Character-Level Street View Text Spotting Based on Deep Multisegmentation Network for Smarter Autonomous Driving}, journal = {{IEEE} Trans. Artif. Intell.}, volume = {3}, number = {2}, pages = {297--308}, year = {2022}, url = {https://doi.org/10.1109/TAI.2021.3116216}, doi = {10.1109/TAI.2021.3116216}, timestamp = {Mon, 06 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tai/ZhangTDDWLW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/LiYLWLHLL22, author = {Jin Li and Heng Ye and Tong Li and Wei Wang and Wenjing Lou and Y. Thomas Hou and Jiqiang Liu and Rongxing Lu}, title = {Efficient and Secure Outsourcing of Differentially Private Data Publishing With Multiple Evaluators}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {19}, number = {1}, pages = {67--76}, year = {2022}, url = {https://doi.org/10.1109/TDSC.2020.3015886}, doi = {10.1109/TDSC.2020.3015886}, timestamp = {Thu, 11 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/LiYLWLHLL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEscc/SunYDW22, author = {Yangyang Sun and Longyang Yi and Li Duan and Wei Wang}, editor = {Claudio Agostino Ardagna and Hongyi Bian and Carl K. Chang and Rong N. Chang and Ernesto Damiani and Schahram Dustdar and Jordi Marco and Munindar P. Singh and Ernest Teniente and Robert Ward and Zhongjie Wang and Fatos Xhafa and Jia Zhang}, title = {A Decentralized Cross-Chain Service Protocol based on Notary Schemes and Hash-Locking}, booktitle = {{IEEE} International Conference on Services Computing, {SCC} 2022, Barcelona, Spain, July 10-16, 2022}, pages = {152--157}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/SCC55611.2022.00033}, doi = {10.1109/SCC55611.2022.00033}, timestamp = {Fri, 23 Jun 2023 11:36:46 +0200}, biburl = {https://dblp.org/rec/conf/IEEEscc/SunYDW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bigdataconf/OrsiniBZXHYWGZ22, author = {Helene Orsini and Hongyan Bao and Yujun Zhou and Xiangrui Xu and Yufei Han and Longyang Yi and Wei Wang and Xin Gao and Xiangliang Zhang}, editor = {Shusaku Tsumoto and Yukio Ohsawa and Lei Chen and Dirk Van den Poel and Xiaohua Hu and Yoichi Motomura and Takuya Takagi and Lingfei Wu and Ying Xie and Akihiro Abe and Vijay Raghavan}, title = {AdvCat: Domain-Agnostic Robustness Assessment for Cybersecurity-Critical Applications with Categorical Inputs}, booktitle = {{IEEE} International Conference on Big Data, Big Data 2022, Osaka, Japan, December 17-20, 2022}, pages = {1060--1069}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/BigData55660.2022.10021026}, doi = {10.1109/BIGDATA55660.2022.10021026}, timestamp = {Fri, 17 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/bigdataconf/OrsiniBZXHYWGZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cns/SuLZWW22, author = {Dan Su and Jiqiang Liu and Sencun Zhu and Xiaoyang Wang and Wei Wang}, title = {Alexa Skills: Security Vulnerabilities and Countermeasures}, booktitle = {10th {IEEE} Conference on Communications and Network Security, {CNS} 2022, Austin, TX, USA, October 3-5, 2022}, pages = {1--9}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/CNS56114.2022.10066153}, doi = {10.1109/CNS56114.2022.10066153}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/cns/SuLZWW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/colcom/CaoZRWHWW22, author = {Hongbo Cao and Yongsheng Zhu and Yuange Ren and Bin Wang and Mingqing Hu and Wanqi Wang and Wei Wang}, editor = {Honghao Gao and Xinheng Wang and Wei Wei and Tasos Dagiuklas}, title = {Prevention of GAN-Based Privacy Inferring Attacks Towards Federated Learning}, booktitle = {Collaborative Computing: Networking, Applications and Worksharing - 18th {EAI} International Conference, CollaborateCom 2022, Hangzhou, China, October 15-16, 2022, Proceedings, Part {II}}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {461}, pages = {39--54}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-24386-8\_3}, doi = {10.1007/978-3-031-24386-8\_3}, timestamp = {Tue, 14 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/colcom/CaoZRWHWW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/smartcom/CuiDLW22, author = {Jiasheng Cui and Li Duan and Mengchen Li and Wei Wang}, editor = {Meikang Qiu and Zhihui Lu and Cheng Zhang}, title = {A Fine-Grained Access Control Framework for Data Sharing in IoT Based on {IPFS} and Cross-Blockchain Technology}, booktitle = {Smart Computing and Communication - 7th International Conference, SmartCom 2022, New York City, NY, USA, November 18-20, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13828}, pages = {428--438}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-28124-2\_41}, doi = {10.1007/978-3-031-28124-2\_41}, timestamp = {Thu, 06 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/smartcom/CuiDLW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2212-13989, author = {Helene Orsini and Hongyan Bao and Yujun Zhou and Xiangrui Xu and Yufei Han and Longyang Yi and Wei Wang and Xin Gao and Xiangliang Zhang}, title = {AdvCat: Domain-Agnostic Robustness Assessment for Cybersecurity-Critical Applications with Categorical Inputs}, journal = {CoRR}, volume = {abs/2212.13989}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2212.13989}, doi = {10.48550/ARXIV.2212.13989}, eprinttype = {arXiv}, eprint = {2212.13989}, timestamp = {Fri, 17 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2212-13989.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijdsn/WangWZSTW21, author = {Bin Wang and Enhui Wang and Zikun Zhu and Yangyang Sun and Yaodong Tao and Wei Wang}, title = {An explainable sentiment prediction model based on the portraits of users sharing representative opinions in social sensors}, journal = {Int. J. Distributed Sens. Networks}, volume = {17}, number = {10}, pages = {155014772110337}, year = {2021}, url = {https://doi.org/10.1177/15501477211033765}, doi = {10.1177/15501477211033765}, timestamp = {Sat, 25 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijdsn/WangWZSTW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijis/DuanGNW21, author = {Li Duan and Tieliang Gao and Wei Ni and Wei Wang}, title = {A hybrid intelligent service recommendation by latent semantics and explicit ratings}, journal = {Int. J. Intell. Syst.}, volume = {36}, number = {12}, pages = {7867--7894}, year = {2021}, url = {https://doi.org/10.1002/int.22612}, doi = {10.1002/INT.22612}, timestamp = {Wed, 15 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijis/DuanGNW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/imwut/WangCW21, author = {Dawei Wang and Kai Chen and Wei Wang}, title = {Demystifying the Vetting Process of Voice-controlled Skills on Markets}, journal = {Proc. {ACM} Interact. Mob. Wearable Ubiquitous Technol.}, volume = {5}, number = {3}, pages = {130:1--130:28}, year = {2021}, url = {https://doi.org/10.1145/3478101}, doi = {10.1145/3478101}, timestamp = {Sat, 27 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/imwut/WangCW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/TianLTNCCLW21, author = {Yunzhe Tian and Jiqiang Liu and Endong Tong and Wenjia Niu and Liang Chang and Qi Alfred Chen and Gang Li and Wei Wang}, title = {Towards Revealing Parallel Adversarial Attack on Politician Socialnet of Graph Structure}, journal = {Secur. Commun. Networks}, volume = {2021}, pages = {6631247:1--6631247:13}, year = {2021}, url = {https://doi.org/10.1155/2021/6631247}, doi = {10.1155/2021/6631247}, timestamp = {Fri, 30 Apr 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/TianLTNCCLW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tits/LiZLW21, author = {Yidong Li and Li Zhang and Zhuo Lv and Wei Wang}, title = {Detecting Anomalies in Intelligent Vehicle Charging and Station Power Supply Systems With Multi-Head Attention Models}, journal = {{IEEE} Trans. Intell. Transp. Syst.}, volume = {22}, number = {1}, pages = {555--564}, year = {2021}, url = {https://doi.org/10.1109/TITS.2020.3018259}, doi = {10.1109/TITS.2020.3018259}, timestamp = {Mon, 02 Aug 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tits/LiZLW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tits/ZhangDPFW21, author = {Chongsheng Zhang and Weiping Ding and Guowen Peng and Feifei Fu and Wei Wang}, title = {Street View Text Recognition With Deep Learning for Urban Scene Understanding in Intelligent Transportation Systems}, journal = {{IEEE} Trans. Intell. Transp. Syst.}, volume = {22}, number = {7}, pages = {4727--4743}, year = {2021}, url = {https://doi.org/10.1109/TITS.2020.3017632}, doi = {10.1109/TITS.2020.3017632}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tits/ZhangDPFW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tnse/ZhangLDGJW21, author = {Zikai Zhang and Yidong Li and Hairong Dong and Honghao Gao and Yi Jin and Wei Wang}, title = {Spectral-Based Directed Graph Network for Malware Detection}, journal = {{IEEE} Trans. Netw. Sci. Eng.}, volume = {8}, number = {2}, pages = {957--970}, year = {2021}, url = {https://doi.org/10.1109/TNSE.2020.3024557}, doi = {10.1109/TNSE.2020.3024557}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tnse/ZhangLDGJW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tnse/WangSXLWS21, author = {Wei Wang and Jingjing Song and Guangquan Xu and Yidong Li and Hao Wang and Chunhua Su}, title = {ContractWard: Automated Vulnerability Detection Models for Ethereum Smart Contracts}, journal = {{IEEE} Trans. Netw. Sci. Eng.}, volume = {8}, number = {2}, pages = {1133--1144}, year = {2021}, url = {https://doi.org/10.1109/TNSE.2020.2968505}, doi = {10.1109/TNSE.2020.2968505}, timestamp = {Thu, 16 Sep 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tnse/WangSXLWS21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/toit/ChengLJLW21, author = {Lichen Cheng and Jiqiang Liu and Yi Jin and Yidong Li and Wei Wang}, title = {Account Guarantee Scheme: Making Anonymous Accounts Supervised in Blockchain}, journal = {{ACM} Trans. Internet Techn.}, volume = {21}, number = {1}, pages = {11:1--11:19}, year = {2021}, url = {https://doi.org/10.1145/3406092}, doi = {10.1145/3406092}, timestamp = {Sat, 08 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/toit/ChengLJLW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2109-03798, author = {Dan Su and Jiqiang Liu and Sencun Zhu and Xiaoyang Wang and Wei Wang and Xiangliang Zhang}, title = {AppQ: Warm-starting App Recommendation Based on View Graphs}, journal = {CoRR}, volume = {abs/2109.03798}, year = {2021}, url = {https://arxiv.org/abs/2109.03798}, eprinttype = {arXiv}, eprint = {2109.03798}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2109-03798.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fcsc/HeAW20, author = {Yongzhong He and Endalew Elsabeth Alem and Wei Wang}, title = {Hybritus: a password strength checker by ensemble learning from the query feedbacks of websites}, journal = {Frontiers Comput. Sci.}, volume = {14}, number = {3}, pages = {143802}, year = {2020}, url = {https://doi.org/10.1007/s11704-019-7342-y}, doi = {10.1007/S11704-019-7342-Y}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fcsc/HeAW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/YeLWLLL20, author = {Heng Ye and Jiqiang Liu and Wei Wang and Ping Li and Tong Li and Jin Li}, title = {Secure and efficient outsourcing differential privacy data release scheme in Cyber-physical system}, journal = {Future Gener. Comput. Syst.}, volume = {108}, pages = {1314--1323}, year = {2020}, url = {https://doi.org/10.1016/j.future.2018.03.034}, doi = {10.1016/J.FUTURE.2018.03.034}, timestamp = {Thu, 19 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fgcs/YeLWLLL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/XuWJLLZLXG20, author = {Guangquan Xu and Wei Wang and Litao Jiao and Xiaotong Li and Kaitai Liang and James Xi Zheng and Wenjuan Lian and Hequn Xian and Honghao Gao}, title = {SoProtector: Safeguard Privacy for Native {SO} Files in Evolving Mobile IoT Applications}, journal = {{IEEE} Internet Things J.}, volume = {7}, number = {4}, pages = {2539--2552}, year = {2020}, url = {https://doi.org/10.1109/JIOT.2019.2944006}, doi = {10.1109/JIOT.2019.2944006}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iotj/XuWJLLZLXG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/WangSHLL20, author = {Wei Wang and Yaoyao Shang and Yongzhong He and Yidong Li and Jiqiang Liu}, title = {BotMark: Automated botnet detection with hybrid analysis of flow-based and graph-based traffic behaviors}, journal = {Inf. Sci.}, volume = {511}, pages = {284--296}, year = {2020}, url = {https://doi.org/10.1016/j.ins.2019.09.024}, doi = {10.1016/J.INS.2019.09.024}, timestamp = {Wed, 27 Nov 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isci/WangSHLL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/HeWXLXW20, author = {Yongzhong He and Chao Wang and Guangquan Xu and Wenjuan Lian and Hequn Xian and Wei Wang}, title = {Privacy-preserving categorization of mobile applications based on large-scale usage data}, journal = {Inf. Sci.}, volume = {514}, pages = {557--570}, year = {2020}, url = {https://doi.org/10.1016/j.ins.2019.11.007}, doi = {10.1016/J.INS.2019.11.007}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isci/HeWXLXW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jss/WangXLMSPW20, author = {Yingjie Wang and Guangquan Xu and Xing Liu and Weixuan Mao and Chengxiang Si and Witold Pedrycz and Wei Wang}, title = {Identifying vulnerabilities of {SSL/TLS} certificate verification in Android apps with static and dynamic analysis}, journal = {J. Syst. Softw.}, volume = {167}, pages = {110609}, year = {2020}, url = {https://doi.org/10.1016/j.jss.2020.110609}, doi = {10.1016/J.JSS.2020.110609}, timestamp = {Wed, 15 Jul 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jss/WangXLMSPW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcss/WeiXWHHW20, author = {Xiangyu Wei and Guangquan Xu and Hao Wang and Yongzhong He and Zhen Han and Wei Wang}, title = {Sensing Users' Emotional Intelligence in Social Networks}, journal = {{IEEE} Trans. Comput. Soc. Syst.}, volume = {7}, number = {1}, pages = {103--112}, year = {2020}, url = {https://doi.org/10.1109/TCSS.2019.2944687}, doi = {10.1109/TCSS.2019.2944687}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcss/WeiXWHHW20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tfs/LiuSWG20, author = {Xiaoming Liu and Chao Shen and Wei Wang and Xiaohong Guan}, title = {CoEvil: {A} Coevolutionary Model for Crime Inference Based on Fuzzy Rough Feature Selection}, journal = {{IEEE} Trans. Fuzzy Syst.}, volume = {28}, number = {5}, pages = {806--817}, year = {2020}, url = {https://doi.org/10.1109/TFUZZ.2019.2939957}, doi = {10.1109/TFUZZ.2019.2939957}, timestamp = {Fri, 22 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tfs/LiuSWG20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmc/LiuLZWZ20, author = {Xing Liu and Jiqiang Liu and Sencun Zhu and Wei Wang and Xiangliang Zhang}, title = {Privacy Risk Analysis and Mitigation of Analytics Libraries in the Android Ecosystem}, journal = {{IEEE} Trans. Mob. Comput.}, volume = {19}, number = {5}, pages = {1184--1199}, year = {2020}, url = {https://doi.org/10.1109/TMC.2019.2903186}, doi = {10.1109/TMC.2019.2903186}, timestamp = {Fri, 22 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tmc/LiuLZWZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/colcom/XuLLCWWLTL20, author = {Guangquan Xu and Miao Li and Xiaotong Li and Kai Chen and Ran Wang and Wei Wang and Kaitai Liang and Qiang Tang and Shaoying Liu}, editor = {Honghao Gao and Xinheng Wang and Muddesar Iqbal and Yuyu Yin and Jianwei Yin and Ning Gu}, title = {Defending Use-After-Free via Relationship Between Memory and Pointer}, booktitle = {Collaborative Computing: Networking, Applications and Worksharing - 16th {EAI} International Conference, CollaborateCom 2020, Shanghai, China, October 16-18, 2020, Proceedings, Part {I}}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {349}, pages = {583--597}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-67537-0\_35}, doi = {10.1007/978-3-030-67537-0\_35}, timestamp = {Wed, 13 Jul 2022 15:43:08 +0200}, biburl = {https://dblp.org/rec/conf/colcom/XuLLCWWLTL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fcs2/HeWLHL020, author = {Xudong He and Jian Wang and Jiqiang Liu and Zhen Han and Zhuo Lv and Wei Wang}, editor = {Guangquan Xu and Kaitai Liang and Chunhua Su}, title = {{DNS} Rebinding Detection for Local Internet of Things Devices}, booktitle = {Frontiers in Cyber Security - Third International Conference, {FCS} 2020, Tianjin, China, November 15-17, 2020, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1286}, pages = {19--29}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-981-15-9739-8\_2}, doi = {10.1007/978-981-15-9739-8\_2}, timestamp = {Wed, 07 Dec 2022 09:54:09 +0100}, biburl = {https://dblp.org/rec/conf/fcs2/HeWLHL020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2006-10842, author = {Qiang Yang and Hind Alamro and Somayah Albaradei and Adil Salhi and Xiaoting Lv and Changsheng Ma and Manal Alshehri and Inji Jaber and Faroug Tifratene and Wei Wang and Takashi Gojobori and Carlos M. Duarte and Xin Gao and Xiangliang Zhang}, title = {SenWave: Monitoring the Global Sentiments under the {COVID-19} Pandemic}, journal = {CoRR}, volume = {abs/2006.10842}, year = {2020}, url = {https://arxiv.org/abs/2006.10842}, eprinttype = {arXiv}, eprint = {2006.10842}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2006-10842.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2010-10788, author = {Dan Su and Jiqiang Liu and Sencun Zhu and Xiaoyang Wang and Wei Wang}, title = {"Are you home alone?" "Yes" Disclosing Security and Privacy Vulnerabilities in Alexa Skills}, journal = {CoRR}, volume = {abs/2010.10788}, year = {2020}, url = {https://arxiv.org/abs/2010.10788}, eprinttype = {arXiv}, eprint = {2010.10788}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2010-10788.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/SuLWW19, author = {Dan Su and Jiqiang Liu and Xiaoyang Wang and Wei Wang}, title = {Detecting Android Locker-Ransomware on Chinese Social Networks}, journal = {{IEEE} Access}, volume = {7}, pages = {20381--20393}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2018.2888568}, doi = {10.1109/ACCESS.2018.2888568}, timestamp = {Wed, 12 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/SuLWW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/MaoSXLSW19, author = {Weixuan Mao and Bo Sun and Guangquan Xu and Cheng Liu and Chengxiang Si and Wei Wang}, title = {Understanding Effects of Collaborations in Developing Mobile Computing Systems: Popularity, Efficiency, and Quality}, journal = {{IEEE} Access}, volume = {7}, pages = {33380--33392}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2904333}, doi = {10.1109/ACCESS.2019.2904333}, timestamp = {Wed, 17 Apr 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/MaoSXLSW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/WangZGXXLZ19, author = {Wei Wang and Meichen Zhao and Zhenzhen Gao and Guangquan Xu and Hequn Xian and Yuanyuan Li and Xiangliang Zhang}, title = {Constructing Features for Detecting Android Malicious Applications: Issues, Taxonomy and Directions}, journal = {{IEEE} Access}, volume = {7}, pages = {67602--67631}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2918139}, doi = {10.1109/ACCESS.2019.2918139}, timestamp = {Wed, 11 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/WangZGXXLZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fcsc/XieWWL19, author = {Nannan Xie and Xing Wang and Wei Wang and Jiqiang Liu}, title = {Fingerprinting Android malware families}, journal = {Frontiers Comput. Sci.}, volume = {13}, number = {3}, pages = {637--646}, year = {2019}, url = {https://doi.org/10.1007/s11704-017-6493-y}, doi = {10.1007/S11704-017-6493-Y}, timestamp = {Wed, 12 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fcsc/XieWWL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/ChengLSLXW19, author = {Lichen Cheng and Jiqiang Liu and Chunhua Su and Kaitai Liang and Guangquan Xu and Wei Wang}, title = {Polynomial-based modifiable blockchain structure for removing fraud transactions}, journal = {Future Gener. Comput. Syst.}, volume = {99}, pages = {154--163}, year = {2019}, url = {https://doi.org/10.1016/j.future.2019.04.028}, doi = {10.1016/J.FUTURE.2019.04.028}, timestamp = {Mon, 03 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fgcs/ChengLSLXW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/istr/HeYHW19, author = {Yongzhong He and Xuejun Yang and Binghui Hu and Wei Wang}, title = {Dynamic privacy leakage analysis of Android third-party libraries}, journal = {J. Inf. Secur. Appl.}, volume = {46}, pages = {259--270}, year = {2019}, url = {https://doi.org/10.1016/j.jisa.2019.03.014}, doi = {10.1016/J.JISA.2019.03.014}, timestamp = {Wed, 04 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/istr/HeYHW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jaihc/WangZW19, author = {Wei Wang and Mengxue Zhao and Jigang Wang}, title = {Effective android malware detection with a hybrid model based on deep autoencoder and convolutional neural network}, journal = {J. Ambient Intell. Humaniz. Comput.}, volume = {10}, number = {8}, pages = {3035--3043}, year = {2019}, url = {https://doi.org/10.1007/s12652-018-0803-6}, doi = {10.1007/S12652-018-0803-6}, timestamp = {Mon, 10 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jaihc/WangZW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcss/ChengLXZWDWW19, author = {Lichen Cheng and Jiqiang Liu and Guangquan Xu and Zonghua Zhang and Hao Wang and Hong{-}Ning Dai and Yulei Wu and Wei Wang}, title = {{SCTSC:} {A} Semicentralized Traffic Signal Control Mode With Attribute-Based Blockchain in IoVs}, journal = {{IEEE} Trans. Comput. Soc. Syst.}, volume = {6}, number = {6}, pages = {1373--1385}, year = {2019}, url = {https://doi.org/10.1109/TCSS.2019.2904633}, doi = {10.1109/TCSS.2019.2904633}, timestamp = {Mon, 08 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcss/ChengLXZWDWW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tist/LiXZLPLWS19, author = {Xiaoming Li and Guangquan Xu and Xi Zheng and Kaitai Liang and Emmanouil Panaousis and Tao Li and Wei Wang and Chao Shen}, title = {Using Sparse Representation to Detect Anomalies in Complex WSNs}, journal = {{ACM} Trans. Intell. Syst. Technol.}, volume = {10}, number = {6}, pages = {64:1--64:18}, year = {2019}, url = {https://doi.org/10.1145/3331147}, doi = {10.1145/3331147}, timestamp = {Thu, 02 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tist/LiXZLPLWS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acmturc/WangLM019, author = {Yingjie Wang and Xing Liu and Weixuan Mao and Wei Wang}, title = {DCDroid: automated detection of {SSL/TLS} certificate verification vulnerabilities in Android apps}, booktitle = {Proceedings of the {ACM} Turing Celebration Conference - China, {ACM} {TUR-C} 2019, Chengdu, China, May 17-19, 2019}, pages = {137:1--137:9}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3321408.3326665}, doi = {10.1145/3321408.3326665}, timestamp = {Thu, 11 Mar 2021 17:04:51 +0100}, biburl = {https://dblp.org/rec/conf/acmturc/WangLM019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/ZhangLZCLL019, author = {Li Zhang and Zhuo Lv and Xuesong Zhang and Cen Chen and Nuannuan Li and Yidong Li and Wei Wang}, editor = {Joseph K. Liu and Xinyi Huang}, title = {A Novel Approach for Traffic Anomaly Detection in Power Distributed Control System and Substation System}, booktitle = {Network and System Security - 13th International Conference, {NSS} 2019, Sapporo, Japan, December 15-18, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11928}, pages = {408--417}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-36938-5\_24}, doi = {10.1007/978-3-030-36938-5\_24}, timestamp = {Wed, 17 Aug 2022 14:30:35 +0200}, biburl = {https://dblp.org/rec/conf/nss/ZhangLZCLL019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/SongHLSX019, author = {Jingjing Song and Haiwu He and Zhuo Lv and Chunhua Su and Guangquan Xu and Wei Wang}, editor = {Joseph K. Liu and Xinyi Huang}, title = {An Efficient Vulnerability Detection Model for Ethereum Smart Contracts}, booktitle = {Network and System Security - 13th International Conference, {NSS} 2019, Sapporo, Japan, December 15-18, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11928}, pages = {433--442}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-36938-5\_26}, doi = {10.1007/978-3-030-36938-5\_26}, timestamp = {Thu, 19 Dec 2019 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nss/SongHLSX019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/socialsec/WeiLHW19, author = {Xiangyu Wei and Jin Li and Zhen Han and Wei Wang}, editor = {Weizhi Meng and Steven Furnell}, title = {Predicting Users' Emotional Intelligence with Social Networking Data}, booktitle = {Security and Privacy in Social Networks and Big Data - 5th International Symposium, SocialSec 2019, Copenhagen, Denmark, July 14-17, 2019, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {1095}, pages = {191--202}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-981-15-0758-8\_15}, doi = {10.1007/978-981-15-0758-8\_15}, timestamp = {Thu, 02 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/socialsec/WeiLHW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1911-12080, author = {Euijin Choo and Mohamed Nabeel and Mashael AlSabah and Issa Khalil and Ting Yu and Wei Wang}, title = {DeviceWatch: Identifying Compromised Mobile Devices through Network Traffic Analysis and Graph Inference}, journal = {CoRR}, volume = {abs/1911.12080}, year = {2019}, url = {http://arxiv.org/abs/1911.12080}, eprinttype = {arXiv}, eprint = {1911.12080}, timestamp = {Tue, 22 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1911-12080.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/WangGZLLZ18, author = {Wei Wang and Zhenzhen Gao and Meichen Zhao and Yidong Li and Jiqiang Liu and Xiangliang Zhang}, title = {DroidEnsemble: Detecting Android Malicious Applications With Ensemble of String and Structural Static Features}, journal = {{IEEE} Access}, volume = {6}, pages = {31798--31807}, year = {2018}, url = {https://doi.org/10.1109/ACCESS.2018.2835654}, doi = {10.1109/ACCESS.2018.2835654}, timestamp = {Wed, 15 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/WangGZLLZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/adhoc/SuLWWDG18, author = {Dan Su and Jiqiang Liu and Wei Wang and Xiaoyang Wang and Xiaojiang Du and Mohsen Guizani}, title = {Discovering communities of malapps on Android-based mobile cyber-physical systems}, journal = {Ad Hoc Networks}, volume = {80}, pages = {104--115}, year = {2018}, url = {https://doi.org/10.1016/j.adhoc.2018.07.015}, doi = {10.1016/J.ADHOC.2018.07.015}, timestamp = {Wed, 29 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/adhoc/SuLWWDG18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/WangLWLZ18, author = {Wei Wang and Yuanyuan Li and Xing Wang and Jiqiang Liu and Xiangliang Zhang}, title = {Detecting Android malicious apps and categorizing benign apps with ensemble of classifiers}, journal = {Future Gener. Comput. Syst.}, volume = {78}, pages = {987--994}, year = {2018}, url = {https://doi.org/10.1016/j.future.2017.01.019}, doi = {10.1016/J.FUTURE.2017.01.019}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fgcs/WangLWLZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/LiuLWZ18, author = {Xing Liu and Jiqiang Liu and Wei Wang and Sencun Zhu}, title = {Android single sign-on security: Issues, taxonomy and directions}, journal = {Future Gener. Comput. Syst.}, volume = {89}, pages = {402--420}, year = {2018}, url = {https://doi.org/10.1016/j.future.2018.06.049}, doi = {10.1016/J.FUTURE.2018.06.049}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fgcs/LiuLWZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/WangLPZ18, author = {Wei Wang and Jiqiang Liu and Georgios Pitsilis and Xiangliang Zhang}, title = {Abstracting massive data for lightweight intrusion detection in computer networks}, journal = {Inf. Sci.}, volume = {433-434}, pages = {417--430}, year = {2018}, url = {https://doi.org/10.1016/j.ins.2016.10.023}, doi = {10.1016/J.INS.2016.10.023}, timestamp = {Mon, 07 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/WangLPZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcc/QiuLSLW18, author = {Shuo Qiu and Jiqiang Liu and Yanfeng Shi and Ming Li and Wei Wang}, title = {Identity-Based Private Matching over Outsourced Encrypted Datasets}, journal = {{IEEE} Trans. Cloud Comput.}, volume = {6}, number = {3}, pages = {747--759}, year = {2018}, url = {https://doi.org/10.1109/TCC.2015.2511723}, doi = {10.1109/TCC.2015.2511723}, timestamp = {Sun, 21 Jun 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcc/QiuLSLW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tits/LiLCQWZZ18, author = {Lun Li and Jiqiang Liu and Lichen Cheng and Shuo Qiu and Wei Wang and Xiangliang Zhang and Zonghua Zhang}, title = {CreditCoin: {A} Privacy-Preserving Blockchain-Based Incentive Announcement Network for Communications of Smart Vehicles}, journal = {{IEEE} Trans. Intell. Transp. Syst.}, volume = {19}, number = {7}, pages = {2204--2220}, year = {2018}, url = {https://doi.org/10.1109/TITS.2017.2777990}, doi = {10.1109/TITS.2017.2777990}, timestamp = {Sat, 05 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tits/LiLCQWZZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/www/LiuLWHZ18, author = {Xing Liu and Jiqiang Liu and Wei Wang and Yongzhong He and Xiangliang Zhang}, title = {Discovering and understanding android sensor usage behaviors with data flow analysis}, journal = {World Wide Web}, volume = {21}, number = {1}, pages = {105--126}, year = {2018}, url = {https://doi.org/10.1007/s11280-017-0446-0}, doi = {10.1007/S11280-017-0446-0}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/www/LiuLWHZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/esorics/LiYWLHLL18, author = {Jin Li and Heng Ye and Wei Wang and Wenjing Lou and Y. Thomas Hou and Jiqiang Liu and Rongxing Lu}, editor = {Javier L{\'{o}}pez and Jianying Zhou and Miguel Soriano}, title = {Efficient and Secure Outsourcing of Differentially Private Data Publication}, booktitle = {Computer Security - 23rd European Symposium on Research in Computer Security, {ESORICS} 2018, Barcelona, Spain, September 3-7, 2018, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11099}, pages = {187--206}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-98989-1\_10}, doi = {10.1007/978-3-319-98989-1\_10}, timestamp = {Thu, 11 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/esorics/LiYWLHLL18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/ShangYW18, author = {Yaoyao Shang and Shuangmao Yang and Wei Wang}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {Botnet Detection with Hybrid Analysis on Flow Based and Graph Based Features of Network Traffic}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11064}, pages = {612--621}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00009-7\_55}, doi = {10.1007/978-3-030-00009-7\_55}, timestamp = {Wed, 01 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icccsec/ShangYW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdis/Men0LH18, author = {Jiaping Men and Wei Wang and Jiqiang Liu and Zhen Han}, title = {Designing Mutual Authentication Protocols in Industrial Wireless Network}, booktitle = {1st International Conference on Data Intelligence and Security, {ICDIS} 2018, South Padre Island, TX, USA, April 8-10, 2018}, pages = {153--158}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/ICDIS.2018.00033}, doi = {10.1109/ICDIS.2018.00033}, timestamp = {Wed, 16 Oct 2019 14:14:52 +0200}, biburl = {https://dblp.org/rec/conf/icdis/Men0LH18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pakdd/ChenWZ18, author = {Yan Chen and Wei Wang and Xiangliang Zhang}, editor = {Dinh Q. Phung and Vincent S. Tseng and Geoffrey I. Webb and Bao Ho and Mohadeseh Ganji and Lida Rashidi}, title = {Randomizing {SVM} Against Adversarial Attacks Under Uncertainty}, booktitle = {Advances in Knowledge Discovery and Data Mining - 22nd Pacific-Asia Conference, {PAKDD} 2018, Melbourne, VIC, Australia, June 3-6, 2018, Proceedings, Part {III}}, series = {Lecture Notes in Computer Science}, volume = {10939}, pages = {556--568}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-93040-4\_44}, doi = {10.1007/978-3-319-93040-4\_44}, timestamp = {Mon, 07 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pakdd/ChenWZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/pdcat/WangLJW18, author = {Xiaochun Wang and Yidong Li and Yi Jin and Wei Wang}, editor = {Jong Hyuk Park and Hong Shen and Yunsick Sung and Hui Tian}, title = {Spectrum-Centric Differential Privacy for Hypergraph Spectral Clustering}, booktitle = {Parallel and Distributed Computing, Applications and Technologies, 19th International Conference, {PDCAT} 2018, Jeju Island, South Korea, August 20-22, 2018, Revised Selected Papers}, series = {Communications in Computer and Information Science}, volume = {931}, pages = {3--14}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-981-13-5907-1\_1}, doi = {10.1007/978-981-13-5907-1\_1}, timestamp = {Thu, 15 Jul 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/pdcat/WangLJW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1804-01641, author = {Dan Su and Jiqiang Liu and Wei Wang and Xiaoyang Wang and Xiaojiang Du and Mohsen Guizani}, title = {Discovering Communities of Malapps on Android-based Mobile Cyber-physical Systems}, journal = {CoRR}, volume = {abs/1804.01641}, year = {2018}, url = {http://arxiv.org/abs/1804.01641}, eprinttype = {arXiv}, eprint = {1804.01641}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1804-01641.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/bioinformatics/AlzahraniKWG17, author = {Majed Alzahrani and Hiroyuki Kuwahara and Wei Wang and Xin Gao}, title = {Gracob: a novel graph-based constant-column biclustering method for mining growth phenotype data}, journal = {Bioinform.}, volume = {33}, number = {16}, pages = {2523--2531}, year = {2017}, url = {https://doi.org/10.1093/bioinformatics/btx199}, doi = {10.1093/BIOINFORMATICS/BTX199}, timestamp = {Tue, 31 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/bioinformatics/AlzahraniKWG17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/WangWHLHZ17, author = {Xing Wang and Wei Wang and Yongzhong He and Jiqiang Liu and Zhen Han and Xiangliang Zhang}, title = {Characterizing Android apps' behavior for effective detection of malapps at large scale}, journal = {Future Gener. Comput. Syst.}, volume = {75}, pages = {30--45}, year = {2017}, url = {https://doi.org/10.1016/j.future.2017.04.041}, doi = {10.1016/J.FUTURE.2017.04.041}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fgcs/WangWHLHZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/FanLWLTL17, author = {Ming Fan and Jun Liu and Wei Wang and Haifei Li and Zhenzhou Tian and Ting Liu}, title = {{DAPASA:} Detecting Android Piggybacked Apps Through Sensitive Subgraph Analysis}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {8}, pages = {1772--1785}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2017.2687880}, doi = {10.1109/TIFS.2017.2687880}, timestamp = {Wed, 30 Mar 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/FanLWLTL17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/QiuWLVLS016, author = {Shuo Qiu and Boyang Wang and Ming Li and Jesse Victors and Jiqiang Liu and Yanfeng Shi and Wei Wang}, editor = {Sheng Zhong and Anna Cinzia Squicciarini}, title = {Fast, Private and Verifiable: Server-aided Approximate Similarity Computation over Large-Scale Datasets}, booktitle = {Proceedings of the 4th {ACM} International Workshop on Security in Cloud Computing, SCC@AsiaCCS, Xi'an, China, May 30 - June 3, 2016}, pages = {29--36}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/2898445.2898453}, doi = {10.1145/2898445.2898453}, timestamp = {Tue, 10 Nov 2020 16:06:16 +0100}, biburl = {https://dblp.org/rec/conf/ccs/QiuWLVLS016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hucc/ZhuZWH16, author = {Yongfei Zhu and Di Zhao and Wei Wang and Haiwu He}, editor = {Qiaohong Zu and Bo Hu}, title = {A Novel Load Balancing Algorithm Based on Improved Particle Swarm Optimization in Cloud Computing Environment}, booktitle = {Human Centered Computing - Second International Conference, {HCC} 2016, Colombo, Sri Lanka, January 7-9, 2016, Revised Selected Papers}, series = {Lecture Notes in Computer Science}, volume = {9567}, pages = {634--645}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-31854-7\_57}, doi = {10.1007/978-3-319-31854-7\_57}, timestamp = {Wed, 01 Dec 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hucc/ZhuZWH16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/securecomm/LiuZWL16, author = {Xing Liu and Sencun Zhu and Wei Wang and Jiqiang Liu}, editor = {Robert H. Deng and Jian Weng and Kui Ren and Vinod Yegneswaran}, title = {Alde: Privacy Risk Analysis of Analytics Libraries in the Android Ecosystem}, booktitle = {Security and Privacy in Communication Networks - 12th International Conference, SecureComm 2016, Guangzhou, China, October 10-12, 2016, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {198}, pages = {655--672}, publisher = {Springer}, year = {2016}, url = {https://doi.org/10.1007/978-3-319-59608-2\_36}, doi = {10.1007/978-3-319-59608-2\_36}, timestamp = {Tue, 12 May 2020 10:32:53 +0200}, biburl = {https://dblp.org/rec/conf/securecomm/LiuZWL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/SuWWL16, author = {Dan Su and Wei Wang and Xing Wang and Jiqiang Liu}, title = {Anomadroid: Profiling Android Applications' Behaviors for Identifying Unknown Malapps}, booktitle = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26, 2016}, pages = {691--698}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/TrustCom.2016.0127}, doi = {10.1109/TRUSTCOM.2016.0127}, timestamp = {Wed, 16 Oct 2019 14:14:49 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/SuWWL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/chb/Pitsilis015, author = {Georgios Pitsilis and Wei Wang}, title = {Harnessing the power of social bookmarking for improving tag-based recommendations}, journal = {Comput. Hum. Behav.}, volume = {50}, pages = {239--251}, year = {2015}, url = {https://doi.org/10.1016/j.chb.2015.03.045}, doi = {10.1016/J.CHB.2015.03.045}, timestamp = {Tue, 18 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/chb/Pitsilis015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iet-ifs/0012HLG15, author = {Wei Wang and Yongzhong He and Jiqiang Liu and Sylvain Gombault}, title = {Constructing important features from massive network traffic for lightweight intrusion detection}, journal = {{IET} Inf. Secur.}, volume = {9}, number = {6}, pages = {374--379}, year = {2015}, url = {https://doi.org/10.1049/iet-ifs.2014.0353}, doi = {10.1049/IET-IFS.2014.0353}, timestamp = {Thu, 27 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iet-ifs/0012HLG15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/LiuWL15, author = {Xing Liu and Wei Wang and Jiqiang Liu}, editor = {Indrajit Ray and Ninghui Li and Christopher Kruegel}, title = {{POSTER:} The Popular Apps in Your Pocket Are Leaking Your Privacy}, booktitle = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and Communications Security, Denver, CO, USA, October 12-16, 2015}, pages = {1653--1655}, publisher = {{ACM}}, year = {2015}, url = {https://doi.org/10.1145/2810103.2810127}, doi = {10.1145/2810103.2810127}, timestamp = {Tue, 10 Nov 2020 19:58:09 +0100}, biburl = {https://dblp.org/rec/conf/ccs/LiuWL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ipccc/LiuL015, author = {Xing Liu and Jiqiang Liu and Wei Wang}, title = {Exploring sensor usage behaviors of Android applications based on data flow analysis}, booktitle = {34th {IEEE} International Performance Computing and Communications Conference, {IPCCC} 2015, Nanjing, China, December 14-16, 2015}, pages = {1--8}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/PCCC.2015.7410335}, doi = {10.1109/PCCC.2015.7410335}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ipccc/LiuL015.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/kbs/WangGQCMZ14, author = {Wei Wang and Thomas Guyet and Ren{\'{e}} Quiniou and Marie{-}Odile Cordier and Florent Masseglia and Xiangliang Zhang}, title = {Autonomic intrusion detection: Adaptively detecting anomalies over unlabeled audit data streams in computer networks}, journal = {Knowl. Based Syst.}, volume = {70}, pages = {103--117}, year = {2014}, url = {https://doi.org/10.1016/j.knosys.2014.06.018}, doi = {10.1016/J.KNOSYS.2014.06.018}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/kbs/WangGQCMZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/WangWFLHZ14, author = {Wei Wang and Xing Wang and Dawei Feng and Jiqiang Liu and Zhen Han and Xiangliang Zhang}, title = {Exploring Permission-Induced Risk in Android Applications for Malicious Application Detection}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {9}, number = {11}, pages = {1869--1882}, year = {2014}, url = {https://doi.org/10.1109/TIFS.2014.2353996}, doi = {10.1109/TIFS.2014.2353996}, timestamp = {Thu, 06 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/WangWFLHZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/Pitsilis014, author = {Georgios Pitsilis and Wei Wang}, title = {Harnessing the power of Social Bookmarking for improving tag-based Recommendations}, journal = {CoRR}, volume = {abs/1410.5072}, year = {2014}, url = {http://arxiv.org/abs/1410.5072}, eprinttype = {arXiv}, eprint = {1410.5072}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/Pitsilis014.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/network/WangZSLF12, author = {Wei Wang and Xiangliang Zhang and Wenchang Shi and Shiguo Lian and Dengguo Feng}, title = {Understanding and analyzing network traffic}, journal = {{IEEE} Netw.}, volume = {26}, number = {1}, pages = {4--5}, year = {2012}, url = {https://doi.org/10.1109/MNET.2012.6135849}, doi = {10.1109/MNET.2012.6135849}, timestamp = {Fri, 11 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/network/WangZSLF12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/network/WangZSLF11, author = {Wei Wang and Xiangliang Zhang and Wenchang Shi and Shiguo Lian and Dengguo Feng}, title = {Network traffic monitoring, analysis and anomaly detection [Guest Editorial]}, journal = {{IEEE} Netw.}, volume = {25}, number = {3}, pages = {6--7}, year = {2011}, url = {https://doi.org/10.1109/MNET.2011.5772054}, doi = {10.1109/MNET.2011.5772054}, timestamp = {Fri, 11 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/network/WangZSLF11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ifiptm/PitsilisZW11, author = {Georgios Pitsilis and Xiangliang Zhang and Wei Wang}, editor = {Ian Wakeman and Ehud Gudes and Christian Damsgaard Jensen and Jason Crampton}, title = {Clustering Recommenders in Collaborative Filtering Using Explicit Trust Information}, booktitle = {Trust Management V, 5th {IFIP} {WG} 11.11 International Conference, {IFIPTM} 2011, Copenhagen, Denmark, June 29-July 1, 2011, Proceedings}, series = {{IFIP} Advances in Information and Communication Technology}, volume = {358}, pages = {82--97}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-22200-9\_9}, doi = {10.1007/978-3-642-22200-9\_9}, timestamp = {Mon, 07 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ifiptm/PitsilisZW11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sac/WangZ11, author = {Wei Wang and Xiangliang Zhang}, editor = {William C. Chu and W. Eric Wong and Mathew J. Palakal and Chih{-}Cheng Hung}, title = {High-speed web attack detection through extracting exemplars from {HTTP} traffic}, booktitle = {Proceedings of the 2011 {ACM} Symposium on Applied Computing (SAC), TaiChung, Taiwan, March 21 - 24, 2011}, pages = {1538--1543}, publisher = {{ACM}}, year = {2011}, url = {https://doi.org/10.1145/1982185.1982512}, doi = {10.1145/1982185.1982512}, timestamp = {Mon, 07 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/sac/WangZ11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/adma/ZhangW10, author = {Xiangliang Zhang and Wei Wang}, editor = {Longbing Cao and Yong Feng and Jiang Zhong}, title = {Self-adaptive Change Detection in Streaming Data with Non-stationary Distribution}, booktitle = {Advanced Data Mining and Applications - 6th International Conference, {ADMA} 2010, Chongqing, China, November 19-21, 2010, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {6440}, pages = {334--345}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17316-5\_33}, doi = {10.1007/978-3-642-17316-5\_33}, timestamp = {Mon, 07 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/adma/ZhangW10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdm/ZhangWNS10, author = {Xiangliang Zhang and Wei Wang and Kjetil N{\o}rv{\aa}g and Mich{\`{e}}le Sebag}, editor = {Geoffrey I. Webb and Bing Liu and Chengqi Zhang and Dimitrios Gunopulos and Xindong Wu}, title = {{K-AP:} Generating Specified {K} Clusters by Efficient Affinity Propagation}, booktitle = {{ICDM} 2010, The 10th {IEEE} International Conference on Data Mining, Sydney, Australia, 14-17 December 2010}, pages = {1187--1192}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/ICDM.2010.107}, doi = {10.1109/ICDM.2010.107}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icdm/ZhangWNS10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iciss/WangZP10, author = {Wei Wang and Xiangliang Zhang and Georgios Pitsilis}, editor = {Somesh Jha and Anish Mathuria}, title = {Abstracting Audit Data for Lightweight Intrusion Detection}, booktitle = {Information Systems Security - 6th International Conference, {ICISS} 2010, Gandhinagar, India, December 17-19, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6503}, pages = {201--215}, publisher = {Springer}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-17714-9\_15}, doi = {10.1007/978-3-642-17714-9\_15}, timestamp = {Mon, 07 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iciss/WangZP10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/GuanWZ09, author = {Xiaohong Guan and Wei Wang and Xiangliang Zhang}, title = {Fast intrusion detection based on a non-negative matrix factorization model}, journal = {J. Netw. Comput. Appl.}, volume = {32}, number = {1}, pages = {31--44}, year = {2009}, url = {https://doi.org/10.1016/j.jnca.2008.04.006}, doi = {10.1016/J.JNCA.2008.04.006}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/GuanWZ09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jss/WangZG09, author = {Wei Wang and Xiangliang Zhang and Sylvain Gombault}, title = {Constructing attribute weights from computer audit data for effective intrusion detection}, journal = {J. Syst. Softw.}, volume = {82}, number = {12}, pages = {1974--1981}, year = {2009}, url = {https://doi.org/10.1016/j.jss.2009.06.040}, doi = {10.1016/J.JSS.2009.06.040}, timestamp = {Mon, 24 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jss/WangZG09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/f-egc/GuyetWQC09, author = {Thomas Guyet and Wei Wang and Rene Quiniou and Marie{-}Odile Cordier}, editor = {Jean{-}Gabriel Ganascia and Pierre Gan{\c{c}}arski}, title = {Diagnostic multi-sources adaptatif. Application {\`{a}} la d{\'{e}}tection d'intrusion dans des serveurs Web}, booktitle = {Extraction et gestion des connaissances (EGC'2009), Actes, Strasbourg, France, 27 au 30 janvier 2009}, series = {Revue des Nouvelles Technologies de l'Information}, volume = {{RNTI-E-15}}, pages = {325--336}, publisher = {C{\'{e}}padu{\`{e}}s-{\'{E}}ditions}, year = {2009}, url = {http://editions-rnti.fr/?inprocid=1000777}, timestamp = {Wed, 11 Jul 2018 09:48:47 +0200}, biburl = {https://dblp.org/rec/conf/f-egc/GuyetWQC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/f-egc/WangGQCM09, author = {Wei Wang and Thomas Guyet and Rene Quiniou and Marie{-}Odile Cordier and Florent Masseglia}, editor = {Jean{-}Gabriel Ganascia and Pierre Gan{\c{c}}arski}, title = {Online and adaptive anomaly Detection: detecting intrusions in unlabelled audit data streams}, booktitle = {Extraction et gestion des connaissances (EGC'2009), Actes, Strasbourg, France, 27 au 30 janvier 2009}, series = {Revue des Nouvelles Technologies de l'Information}, volume = {{RNTI-E-15}}, pages = {457--458}, publisher = {C{\'{e}}padu{\`{e}}s-{\'{E}}ditions}, year = {2009}, url = {http://editions-rnti.fr/?inprocid=1000802}, timestamp = {Thu, 24 Apr 2014 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/f-egc/WangGQCM09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispan/WangZGK09, author = {Wei Wang and Xiangliang Zhang and Sylvain Gombault and Svein J. Knapskog}, title = {Attribute Normalization in Network Intrusion Detection}, booktitle = {The 10th International Symposium on Pervasive Systems, Algorithms, and Networks, {ISPAN} 2009, Kaohsiung, Taiwan, December 14-16, 2009}, pages = {448--453}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/I-SPAN.2009.49}, doi = {10.1109/I-SPAN.2009.49}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ispan/WangZGK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/raid/WangGK09, author = {Wei Wang and Thomas Guyet and Svein J. Knapskog}, editor = {Engin Kirda and Somesh Jha and Davide Balzarotti}, title = {Autonomic Intrusion Detection System}, booktitle = {Recent Advances in Intrusion Detection, 12th International Symposium, {RAID} 2009, Saint-Malo, France, September 23-25, 2009. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {5758}, pages = {359--361}, publisher = {Springer}, year = {2009}, url = {https://doi.org/10.1007/978-3-642-04342-0\_24}, doi = {10.1007/978-3-642-04342-0\_24}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/raid/WangGK09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/WangMGQC09, author = {Wei Wang and Florent Masseglia and Thomas Guyet and Rene Quiniou and Marie{-}Odile Cordier}, editor = {Juan Quemada and Gonzalo Le{\'{o}}n and Yo{\"{e}}lle S. Maarek and Wolfgang Nejdl}, title = {A general framework for adaptive and online detection of web attacks}, booktitle = {Proceedings of the 18th International Conference on World Wide Web, {WWW} 2009, Madrid, Spain, April 20-24, 2009}, pages = {1141--1142}, publisher = {{ACM}}, year = {2009}, url = {https://doi.org/10.1145/1526709.1526897}, doi = {10.1145/1526709.1526897}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/www/WangMGQC09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-0907-3819, author = {Thomas Guyet and Rene Quiniou and Wei Wang and Marie{-}Odile Cordier}, title = {Self-adaptive web intrusion detection system}, journal = {CoRR}, volume = {abs/0907.3819}, year = {2009}, url = {http://arxiv.org/abs/0907.3819}, eprinttype = {arXiv}, eprint = {0907.3819}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-0907-3819.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comcom/WangGZ08, author = {Wei Wang and Xiaohong Guan and Xiangliang Zhang}, title = {Processing of massive audit data streams for real-time anomaly intrusion detection}, journal = {Comput. Commun.}, volume = {31}, number = {1}, pages = {58--72}, year = {2008}, url = {https://doi.org/10.1016/j.comcom.2007.10.010}, doi = {10.1016/J.COMCOM.2007.10.010}, timestamp = {Thu, 20 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comcom/WangGZ08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/crisis/0012G08, author = {Wei Wang and Sylvain Gombault}, editor = {Mohamed Jmaiel and Mohamed Mosbah}, title = {Efficient detection of DDoS attacks with important attributes}, booktitle = {CRiSIS '08, Third International Conference on Risks and Security of Internet and Systems, Tozeur, Tunisia, October 28-30, 2008}, pages = {61--67}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/CRISIS.2008.4757464}, doi = {10.1109/CRISIS.2008.4757464}, timestamp = {Tue, 11 Oct 2022 14:59:07 +0200}, biburl = {https://dblp.org/rec/conf/crisis/0012G08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/csreaSAM/WangG07, author = {Wei Wang and Sylvain Gombault}, editor = {Selim Aissi and Hamid R. Arabnia}, title = {Distance Measures for Anomaly Intrusion Detection}, booktitle = {Proceedings of the 2007 International Conference on Security {\&} Management, {SAM} 2007, Las Vegas, Nevada, USA, June 25-28, 2007}, pages = {17--23}, publisher = {{CSREA} Press}, year = {2007}, timestamp = {Mon, 22 Mar 2010 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/csreaSAM/WangG07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/WangGZY06, author = {Wei Wang and Xiaohong Guan and Xiangliang Zhang and Liwei Yang}, title = {Profiling program behavior for anomaly intrusion detection based on the transition and frequency property of computer audit data}, journal = {Comput. Secur.}, volume = {25}, number = {7}, pages = {539--550}, year = {2006}, url = {https://doi.org/10.1016/j.cose.2006.05.005}, doi = {10.1016/J.COSE.2006.05.005}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/WangGZY06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEares/WangB06, author = {Wei Wang and Roberto Battiti}, title = {Identifying Intrusions in Computer Networks with Principal Component Analysis}, booktitle = {Proceedings of the The First International Conference on Availability, Reliability and Security, {ARES} 2006, The International Dependability Conference - Bridging Theory and Practice, April 20-22 2006, Vienna University of Technology, Austria}, pages = {270--279}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/ARES.2006.73}, doi = {10.1109/ARES.2006.73}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEares/WangB06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cdc/WangGZ04, author = {Wei Wang and Xiaohong Guan and Xiangliang Zhang}, title = {Profiling program and user behaviors for anomaly intrusion detection based on non-negative matrix factorization}, booktitle = {43rd {IEEE} Conference on Decision and Control, {CDC} 2004, Nassau, Bahamas, December 14-17, 2004}, pages = {99--104}, publisher = {{IEEE}}, year = {2004}, url = {https://doi.org/10.1109/CDC.2004.1428613}, doi = {10.1109/CDC.2004.1428613}, timestamp = {Fri, 04 Mar 2022 13:24:31 +0100}, biburl = {https://dblp.org/rec/conf/cdc/WangGZ04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isnn/WangGZ04, author = {Wei Wang and Xiaohong Guan and Xiangliang Zhang}, editor = {Fuliang Yin and Jun Wang and Chengan Guo}, title = {A Novel Intrusion Detection Method Based on Principle Component Analysis in Computer Security}, booktitle = {Advances in Neural Networks - {ISNN} 2004, International Symposium on Neural Networks, Dalian, China, August 19-21, 2004, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {3174}, pages = {657--662}, publisher = {Springer}, year = {2004}, url = {https://doi.org/10.1007/978-3-540-28648-6\_105}, doi = {10.1007/978-3-540-28648-6\_105}, timestamp = {Thu, 09 Jan 2020 18:22:01 +0100}, biburl = {https://dblp.org/rec/conf/isnn/WangGZ04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.