Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                

BibTeX records: Wei Wang 0012

download as .bib file

@article{DBLP:journals/compsec/HanLCHWBHW24,
  author       = {Xu Han and
                  Qiang Li and
                  Hongbo Cao and
                  Lei Han and
                  Bin Wang and
                  Xuhua Bao and
                  Yufei Han and
                  Wei Wang},
  title        = {BFS2Adv: Black-box adversarial attack towards hard-to-attack short
                  texts},
  journal      = {Comput. Secur.},
  volume       = {141},
  pages        = {103817},
  year         = {2024},
  url          = {https://doi.org/10.1016/j.cose.2024.103817},
  doi          = {10.1016/J.COSE.2024.103817},
  timestamp    = {Fri, 31 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/HanLCHWBHW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcss/WangYDMWSW24,
  author       = {Bin Wang and
                  Xiaohan Yuan and
                  Li Duan and
                  Hongliang Ma and
                  Bin Wang and
                  Chunhua Su and
                  Wei Wang},
  title        = {DeFiScanner: Spotting DeFi Attacks Exploiting Logic Vulnerabilities
                  on Blockchain},
  journal      = {{IEEE} Trans. Comput. Soc. Syst.},
  volume       = {11},
  number       = {2},
  pages        = {1577--1588},
  year         = {2024},
  url          = {https://doi.org/10.1109/TCSS.2022.3228122},
  doi          = {10.1109/TCSS.2022.3228122},
  timestamp    = {Thu, 23 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcss/WangYDMWSW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/HeWZWZLY24,
  author       = {Yongzhong He and
                  Yiming Wang and
                  Sencun Zhu and
                  Wei Wang and
                  Yunjia Zhang and
                  Qiang Li and
                  Aimin Yu},
  title        = {Automatically Identifying {CVE} Affected Versions With Patches and
                  Developer Logs},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {21},
  number       = {2},
  pages        = {905--919},
  year         = {2024},
  url          = {https://doi.org/10.1109/TDSC.2023.3264567},
  doi          = {10.1109/TDSC.2023.3264567},
  timestamp    = {Thu, 06 Jun 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/HeWZWZLY24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/YuanLWWWLMP24,
  author       = {Xiaohan Yuan and
                  Jiqiang Liu and
                  Bin Wang and
                  Wei Wang and
                  Bin Wang and
                  Tao Li and
                  Xiaobo Ma and
                  Witold Pedrycz},
  title        = {FedComm: {A} Privacy-Enhanced and Efficient Authentication Protocol
                  for Federated Learning in Vehicular Ad-Hoc Networks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {19},
  pages        = {777--792},
  year         = {2024},
  url          = {https://doi.org/10.1109/TIFS.2023.3324747},
  doi          = {10.1109/TIFS.2023.3324747},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/YuanLWWWLMP24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cbm/DaiQLWGWWZ23,
  author       = {Yinyao Dai and
                  Yaguan Qian and
                  Fang Lu and
                  Bin Wang and
                  Zhaoquan Gu and
                  Wei Wang and
                  Jian Wan and
                  Yanchun Zhang},
  title        = {Improving adversarial robustness of medical imaging systems via adding
                  global attention noise},
  journal      = {Comput. Biol. Medicine},
  volume       = {164},
  pages        = {107251},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.compbiomed.2023.107251},
  doi          = {10.1016/J.COMPBIOMED.2023.107251},
  timestamp    = {Sun, 24 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cbm/DaiQLWGWWZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/XuLGLBCWWLWML23,
  author       = {Guangquan Xu and
                  Wenqing Lei and
                  Lixiao Gong and
                  Jian Liu and
                  Hongpeng Bai and
                  Kai Chen and
                  Ran Wang and
                  Wei Wang and
                  Kaitai Liang and
                  Weizhe Wang and
                  Weizhi Meng and
                  Shaoying Liu},
  title        = {{UAF-GUARD:} Defending the use-after-free exploits via fine-grained
                  memory permission management},
  journal      = {Comput. Secur.},
  volume       = {125},
  pages        = {103048},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2022.103048},
  doi          = {10.1016/J.COSE.2022.103048},
  timestamp    = {Fri, 01 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/compsec/XuLGLBCWWLWML23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/MaoQHLTWWY23,
  author       = {Jiaoze Mao and
                  Yaguan Qian and
                  Jianchang Huang and
                  Zejie Lian and
                  Renhui Tao and
                  Bin Wang and
                  Wei Wang and
                  Tengteng Yao},
  title        = {Object-free backdoor attack and defense on semantic segmentation},
  journal      = {Comput. Secur.},
  volume       = {132},
  pages        = {103365},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.cose.2023.103365},
  doi          = {10.1016/J.COSE.2023.103365},
  timestamp    = {Thu, 31 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/MaoQHLTWWY23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeejas/DuanS00L023,
  author       = {Li Duan and
                  Yangyang Sun and
                  Wei Ni and
                  Weiping Ding and
                  Jiqiang Liu and
                  Wei Wang},
  title        = {Attacks Against Cross-Chain Systems and Defense Approaches: {A} Contemporary
                  Survey},
  journal      = {{IEEE} {CAA} J. Autom. Sinica},
  volume       = {10},
  number       = {8},
  pages        = {1647--1667},
  year         = {2023},
  url          = {https://doi.org/10.1109/JAS.2023.123642},
  doi          = {10.1109/JAS.2023.123642},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeejas/DuanS00L023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsa/DuanX0023,
  author       = {Li Duan and
                  Wenyao Xu and
                  Wei Ni and
                  Wei Wang},
  title        = {{BSAF:} {A} blockchain-based secure access framework with privacy
                  protection for cloud-device service collaborations},
  journal      = {J. Syst. Archit.},
  volume       = {140},
  pages        = {102897},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.sysarc.2023.102897},
  doi          = {10.1016/J.SYSARC.2023.102897},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsa/DuanX0023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcbb/WangYYWWC23,
  author       = {Xingze Wang and
                  Guoxian Yu and
                  Zhongmin Yan and
                  Lin Wan and
                  Wei Wang and
                  Lizhen Cui},
  title        = {Lung Cancer Subtype Diagnosis by Fusing Image-Genomics Data and Hybrid
                  Deep Networks},
  journal      = {{IEEE} {ACM} Trans. Comput. Biol. Bioinform.},
  volume       = {20},
  number       = {1},
  pages        = {512--523},
  year         = {2023},
  url          = {https://doi.org/10.1109/TCBB.2021.3132292},
  doi          = {10.1109/TCBB.2021.3132292},
  timestamp    = {Mon, 03 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcbb/WangYYWWC23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/YeZLDW23,
  author       = {Heng Ye and
                  Qiang Zeng and
                  Jiqiang Liu and
                  Xiaojiang Du and
                  Wei Wang},
  title        = {Easy Peasy: {A} New Handy Method for Pairing Multiple {COTS} IoT Devices},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {20},
  number       = {4},
  pages        = {3483--3494},
  year         = {2023},
  url          = {https://doi.org/10.1109/TDSC.2022.3199383},
  doi          = {10.1109/TDSC.2022.3199383},
  timestamp    = {Sat, 05 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/YeZLDW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/XuLWMWHH23,
  author       = {Xiangrui Xu and
                  Pengrui Liu and
                  Wei Wang and
                  Hongliang Ma and
                  Bin Wang and
                  Zhen Han and
                  Yufei Han},
  title        = {{CGIR:} Conditional Generative Instance Reconstruction Attacks Against
                  Federated Learning},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {20},
  number       = {6},
  pages        = {4551--4563},
  year         = {2023},
  url          = {https://doi.org/10.1109/TDSC.2022.3228302},
  doi          = {10.1109/TDSC.2022.3228302},
  timestamp    = {Tue, 28 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/XuLWMWHH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tissec/ChooNAKYW23,
  author       = {Euijin Choo and
                  Mohamed Nabeel and
                  Mashael AlSabah and
                  Issa Khalil and
                  Ting Yu and
                  Wei Wang},
  title        = {DeviceWatch: {A} Data-Driven Network Analysis Approach to Identifying
                  Compromised Mobile Devices with Graph-Inference},
  journal      = {{ACM} Trans. Priv. Secur.},
  volume       = {26},
  number       = {1},
  pages        = {9:1--9:32},
  year         = {2023},
  url          = {https://doi.org/10.1145/3558767},
  doi          = {10.1145/3558767},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tissec/ChooNAKYW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tits/HeWLDHWNW23,
  author       = {Xudong He and
                  Jian Wang and
                  Jiqiang Liu and
                  Weiping Ding and
                  Zhen Han and
                  Bin Wang and
                  Jamel Nebhen and
                  Wei Wang},
  title        = {{DNS} Rebinding Threat Modeling and Security Analysis for Local Area
                  Network of Maritime Transportation Systems},
  journal      = {{IEEE} Trans. Intell. Transp. Syst.},
  volume       = {24},
  number       = {2},
  pages        = {2643--2655},
  year         = {2023},
  url          = {https://doi.org/10.1109/TITS.2021.3135197},
  doi          = {10.1109/TITS.2021.3135197},
  timestamp    = {Wed, 08 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tits/HeWLDHWNW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tkde/WangSWWWDZ23,
  author       = {Wei Wang and
                  Xiaoyang Suo and
                  Xiangyu Wei and
                  Bin Wang and
                  Hao Wang and
                  Hong{-}Ning Dai and
                  Xiangliang Zhang},
  title        = {{HGATE:} Heterogeneous Graph Attention Auto-Encoders},
  journal      = {{IEEE} Trans. Knowl. Data Eng.},
  volume       = {35},
  number       = {4},
  pages        = {3938--3951},
  year         = {2023},
  url          = {https://doi.org/10.1109/TKDE.2021.3138788},
  doi          = {10.1109/TKDE.2021.3138788},
  timestamp    = {Sun, 16 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tkde/WangSWWWDZ23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tnsm/DuanYLNW23,
  author       = {Li Duan and
                  Liu Yang and
                  Chunhong Liu and
                  Wei Ni and
                  Wei Wang},
  title        = {A New Smart Contract Anomaly Detection Method by Fusing Opcode and
                  Source Code Features for Blockchain Services},
  journal      = {{IEEE} Trans. Netw. Serv. Manag.},
  volume       = {20},
  number       = {4},
  pages        = {4354--4368},
  year         = {2023},
  url          = {https://doi.org/10.1109/TNSM.2023.3278311},
  doi          = {10.1109/TNSM.2023.3278311},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tnsm/DuanYLNW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tse/ZhouHXJLWXWLB23,
  author       = {Yingnan Zhou and
                  Xue Hu and
                  Sihan Xu and
                  Yan Jia and
                  Yuhao Liu and
                  Junyong Wang and
                  Guangquan Xu and
                  Wei Wang and
                  Shaoying Liu and
                  Thar Baker},
  title        = {Multi-Misconfiguration Diagnosis via Identifying Correlated Configuration
                  Parameters},
  journal      = {{IEEE} Trans. Software Eng.},
  volume       = {49},
  number       = {10},
  pages        = {4624--4638},
  year         = {2023},
  url          = {https://doi.org/10.1109/TSE.2023.3308755},
  doi          = {10.1109/TSE.2023.3308755},
  timestamp    = {Fri, 27 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tse/ZhouHXJLWXWLB23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/LiPXDL023,
  author       = {Chao Li and
                  Balaji Palanisamy and
                  Runhua Xu and
                  Li Duan and
                  Jiqiang Liu and
                  Wei Wang},
  editor       = {Weizhi Meng and
                  Christian Damsgaard Jensen and
                  Cas Cremers and
                  Engin Kirda},
  title        = {How Hard is Takeover in DPoS Blockchains? Understanding the Security
                  of Coin-based Voting Governance},
  booktitle    = {Proceedings of the 2023 {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, {CCS} 2023, Copenhagen, Denmark, November
                  26-30, 2023},
  pages        = {150--164},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3576915.3623171},
  doi          = {10.1145/3576915.3623171},
  timestamp    = {Mon, 18 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/LiPXDL023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccv/QianHZS0W23,
  author       = {Yaguan Qian and
                  Shuke He and
                  Chenyu Zhao and
                  Jiaqiang Sha and
                  Wei Wang and
                  Bin Wang},
  title        = {LEA\({}^{\mbox{2}}\): {A} Lightweight Ensemble Adversarial Attack
                  via Non-overlapping Vulnerable Frequency Regions},
  booktitle    = {{IEEE/CVF} International Conference on Computer Vision, {ICCV} 2023,
                  Paris, France, October 1-6, 2023},
  pages        = {4487--4498},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/ICCV51070.2023.00416},
  doi          = {10.1109/ICCV51070.2023.00416},
  timestamp    = {Mon, 22 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/iccv/QianHZS0W23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2310-18596,
  author       = {Chao Li and
                  Balaji Palanisamy and
                  Runhua Xu and
                  Li Duan and
                  Jiqiang Liu and
                  Wei Wang},
  title        = {How Hard is Takeover in DPoS Blockchains? Understanding the Security
                  of Coin-based Voting Governance},
  journal      = {CoRR},
  volume       = {abs/2310.18596},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2310.18596},
  doi          = {10.48550/ARXIV.2310.18596},
  eprinttype    = {arXiv},
  eprint       = {2310.18596},
  timestamp    = {Mon, 29 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2310-18596.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/LvCZRWCLCW22,
  author       = {Zhuo Lv and
                  Hongbo Cao and
                  Feng Zhang and
                  Yuange Ren and
                  Bin Wang and
                  Cen Chen and
                  Nuannuan Li and
                  Hao Chang and
                  Wei Wang},
  title        = {{AWFC:} Preventing Label Flipping Attacks Towards Federated Learning
                  for Intelligent IoT},
  journal      = {Comput. J.},
  volume       = {65},
  number       = {11},
  pages        = {2849--2859},
  year         = {2022},
  url          = {https://doi.org/10.1093/comjnl/bxac124},
  doi          = {10.1093/COMJNL/BXAC124},
  timestamp    = {Wed, 21 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cj/LvCZRWCLCW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cybersec/LiuXW22,
  author       = {Pengrui Liu and
                  Xiangrui Xu and
                  Wei Wang},
  title        = {Threats, attacks and defenses to federated learning: issues, taxonomy
                  and perspectives},
  journal      = {Cybersecur.},
  volume       = {5},
  number       = {1},
  pages        = {4},
  year         = {2022},
  url          = {https://doi.org/10.1186/s42400-021-00105-6},
  doi          = {10.1186/S42400-021-00105-6},
  timestamp    = {Fri, 17 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cybersec/LiuXW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieicetd/XiangLCLTNLLW22,
  author       = {Yingxiao Xiang and
                  Chao Li and
                  Tong Chen and
                  Yike Li and
                  Endong Tong and
                  Wenjia Niu and
                  Qiong Li and
                  Jiqiang Liu and
                  Wei Wang},
  title        = {Toward Blockchain-Based Spoofing Defense for Controlled Optimization
                  of Phases in Traffic Signal System},
  journal      = {{IEICE} Trans. Inf. Syst.},
  volume       = {105-D},
  number       = {2},
  pages        = {280--288},
  year         = {2022},
  url          = {https://doi.org/10.1587/transinf.2021bcp0014},
  doi          = {10.1587/TRANSINF.2021BCP0014},
  timestamp    = {Thu, 13 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieicetd/XiangLCLTNLLW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijis/ZhangLWSD22,
  author       = {Zikai Zhang and
                  Yidong Li and
                  Wei Wang and
                  Haifeng Song and
                  Hairong Dong},
  title        = {Malware detection with dynamic evolving graph convolutional networks},
  journal      = {Int. J. Intell. Syst.},
  volume       = {37},
  number       = {10},
  pages        = {7261--7280},
  year         = {2022},
  url          = {https://doi.org/10.1002/int.22880},
  doi          = {10.1002/INT.22880},
  timestamp    = {Fri, 22 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijis/ZhangLWSD22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijis/YiSWDMWHW22,
  author       = {Longyang Yi and
                  Yangyang Sun and
                  Bin Wang and
                  Li Duan and
                  Hongliang Ma and
                  Bin Wang and
                  Zhen Han and
                  Wei Wang},
  title        = {{CCUBI:} {A} cross-chain based premium competition scheme with privacy
                  preservation for usage-based insurance},
  journal      = {Int. J. Intell. Syst.},
  volume       = {37},
  number       = {12},
  pages        = {11522--11546},
  year         = {2022},
  url          = {https://doi.org/10.1002/int.23053},
  doi          = {10.1002/INT.23053},
  timestamp    = {Tue, 21 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijis/YiSWDMWHW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jdiq/WangGWHW22,
  author       = {Bin Wang and
                  Pengfei Guo and
                  Xing Wang and
                  Yongzhong He and
                  Wei Wang},
  title        = {Transparent Aspect-Level Sentiment Analysis Based on Dependency Syntax
                  Analysis and Its Application on {COVID-19}},
  journal      = {{ACM} J. Data Inf. Qual.},
  volume       = {14},
  number       = {2},
  pages        = {10:1--10:24},
  year         = {2022},
  url          = {https://doi.org/10.1145/3460002},
  doi          = {10.1145/3460002},
  timestamp    = {Sat, 20 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jdiq/WangGWHW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/YeLZJWW22,
  author       = {Heng Ye and
                  Jiqiang Liu and
                  Hao Zhen and
                  Wenbin Jiang and
                  Bin Wang and
                  Wei Wang},
  title        = {{VREFL:} Verifiable and Reconnection-Efficient Federated Learning
                  in IoT scenarios},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {207},
  pages        = {103486},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jnca.2022.103486},
  doi          = {10.1016/J.JNCA.2022.103486},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/YeLZJWW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tai/ZhangTDDWLW22,
  author       = {Chongsheng Zhang and
                  Yuefeng Tao and
                  Kai Du and
                  Weiping Ding and
                  Bin Wang and
                  Ji Liu and
                  Wei Wang},
  title        = {Character-Level Street View Text Spotting Based on Deep Multisegmentation
                  Network for Smarter Autonomous Driving},
  journal      = {{IEEE} Trans. Artif. Intell.},
  volume       = {3},
  number       = {2},
  pages        = {297--308},
  year         = {2022},
  url          = {https://doi.org/10.1109/TAI.2021.3116216},
  doi          = {10.1109/TAI.2021.3116216},
  timestamp    = {Mon, 06 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tai/ZhangTDDWLW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/LiYLWLHLL22,
  author       = {Jin Li and
                  Heng Ye and
                  Tong Li and
                  Wei Wang and
                  Wenjing Lou and
                  Y. Thomas Hou and
                  Jiqiang Liu and
                  Rongxing Lu},
  title        = {Efficient and Secure Outsourcing of Differentially Private Data Publishing
                  With Multiple Evaluators},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {19},
  number       = {1},
  pages        = {67--76},
  year         = {2022},
  url          = {https://doi.org/10.1109/TDSC.2020.3015886},
  doi          = {10.1109/TDSC.2020.3015886},
  timestamp    = {Thu, 11 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/LiYLWLHLL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEscc/SunYDW22,
  author       = {Yangyang Sun and
                  Longyang Yi and
                  Li Duan and
                  Wei Wang},
  editor       = {Claudio Agostino Ardagna and
                  Hongyi Bian and
                  Carl K. Chang and
                  Rong N. Chang and
                  Ernesto Damiani and
                  Schahram Dustdar and
                  Jordi Marco and
                  Munindar P. Singh and
                  Ernest Teniente and
                  Robert Ward and
                  Zhongjie Wang and
                  Fatos Xhafa and
                  Jia Zhang},
  title        = {A Decentralized Cross-Chain Service Protocol based on Notary Schemes
                  and Hash-Locking},
  booktitle    = {{IEEE} International Conference on Services Computing, {SCC} 2022,
                  Barcelona, Spain, July 10-16, 2022},
  pages        = {152--157},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/SCC55611.2022.00033},
  doi          = {10.1109/SCC55611.2022.00033},
  timestamp    = {Fri, 23 Jun 2023 11:36:46 +0200},
  biburl       = {https://dblp.org/rec/conf/IEEEscc/SunYDW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bigdataconf/OrsiniBZXHYWGZ22,
  author       = {Helene Orsini and
                  Hongyan Bao and
                  Yujun Zhou and
                  Xiangrui Xu and
                  Yufei Han and
                  Longyang Yi and
                  Wei Wang and
                  Xin Gao and
                  Xiangliang Zhang},
  editor       = {Shusaku Tsumoto and
                  Yukio Ohsawa and
                  Lei Chen and
                  Dirk Van den Poel and
                  Xiaohua Hu and
                  Yoichi Motomura and
                  Takuya Takagi and
                  Lingfei Wu and
                  Ying Xie and
                  Akihiro Abe and
                  Vijay Raghavan},
  title        = {AdvCat: Domain-Agnostic Robustness Assessment for Cybersecurity-Critical
                  Applications with Categorical Inputs},
  booktitle    = {{IEEE} International Conference on Big Data, Big Data 2022, Osaka,
                  Japan, December 17-20, 2022},
  pages        = {1060--1069},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/BigData55660.2022.10021026},
  doi          = {10.1109/BIGDATA55660.2022.10021026},
  timestamp    = {Fri, 17 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/bigdataconf/OrsiniBZXHYWGZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cns/SuLZWW22,
  author       = {Dan Su and
                  Jiqiang Liu and
                  Sencun Zhu and
                  Xiaoyang Wang and
                  Wei Wang},
  title        = {Alexa Skills: Security Vulnerabilities and Countermeasures},
  booktitle    = {10th {IEEE} Conference on Communications and Network Security, {CNS}
                  2022, Austin, TX, USA, October 3-5, 2022},
  pages        = {1--9},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/CNS56114.2022.10066153},
  doi          = {10.1109/CNS56114.2022.10066153},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/cns/SuLZWW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/colcom/CaoZRWHWW22,
  author       = {Hongbo Cao and
                  Yongsheng Zhu and
                  Yuange Ren and
                  Bin Wang and
                  Mingqing Hu and
                  Wanqi Wang and
                  Wei Wang},
  editor       = {Honghao Gao and
                  Xinheng Wang and
                  Wei Wei and
                  Tasos Dagiuklas},
  title        = {Prevention of GAN-Based Privacy Inferring Attacks Towards Federated
                  Learning},
  booktitle    = {Collaborative Computing: Networking, Applications and Worksharing
                  - 18th {EAI} International Conference, CollaborateCom 2022, Hangzhou,
                  China, October 15-16, 2022, Proceedings, Part {II}},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {461},
  pages        = {39--54},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-24386-8\_3},
  doi          = {10.1007/978-3-031-24386-8\_3},
  timestamp    = {Tue, 14 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/colcom/CaoZRWHWW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/smartcom/CuiDLW22,
  author       = {Jiasheng Cui and
                  Li Duan and
                  Mengchen Li and
                  Wei Wang},
  editor       = {Meikang Qiu and
                  Zhihui Lu and
                  Cheng Zhang},
  title        = {A Fine-Grained Access Control Framework for Data Sharing in IoT Based
                  on {IPFS} and Cross-Blockchain Technology},
  booktitle    = {Smart Computing and Communication - 7th International Conference,
                  SmartCom 2022, New York City, NY, USA, November 18-20, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13828},
  pages        = {428--438},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-28124-2\_41},
  doi          = {10.1007/978-3-031-28124-2\_41},
  timestamp    = {Thu, 06 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/smartcom/CuiDLW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2212-13989,
  author       = {Helene Orsini and
                  Hongyan Bao and
                  Yujun Zhou and
                  Xiangrui Xu and
                  Yufei Han and
                  Longyang Yi and
                  Wei Wang and
                  Xin Gao and
                  Xiangliang Zhang},
  title        = {AdvCat: Domain-Agnostic Robustness Assessment for Cybersecurity-Critical
                  Applications with Categorical Inputs},
  journal      = {CoRR},
  volume       = {abs/2212.13989},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2212.13989},
  doi          = {10.48550/ARXIV.2212.13989},
  eprinttype    = {arXiv},
  eprint       = {2212.13989},
  timestamp    = {Fri, 17 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2212-13989.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijdsn/WangWZSTW21,
  author       = {Bin Wang and
                  Enhui Wang and
                  Zikun Zhu and
                  Yangyang Sun and
                  Yaodong Tao and
                  Wei Wang},
  title        = {An explainable sentiment prediction model based on the portraits of
                  users sharing representative opinions in social sensors},
  journal      = {Int. J. Distributed Sens. Networks},
  volume       = {17},
  number       = {10},
  pages        = {155014772110337},
  year         = {2021},
  url          = {https://doi.org/10.1177/15501477211033765},
  doi          = {10.1177/15501477211033765},
  timestamp    = {Sat, 25 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijdsn/WangWZSTW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijis/DuanGNW21,
  author       = {Li Duan and
                  Tieliang Gao and
                  Wei Ni and
                  Wei Wang},
  title        = {A hybrid intelligent service recommendation by latent semantics and
                  explicit ratings},
  journal      = {Int. J. Intell. Syst.},
  volume       = {36},
  number       = {12},
  pages        = {7867--7894},
  year         = {2021},
  url          = {https://doi.org/10.1002/int.22612},
  doi          = {10.1002/INT.22612},
  timestamp    = {Wed, 15 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijis/DuanGNW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/imwut/WangCW21,
  author       = {Dawei Wang and
                  Kai Chen and
                  Wei Wang},
  title        = {Demystifying the Vetting Process of Voice-controlled Skills on Markets},
  journal      = {Proc. {ACM} Interact. Mob. Wearable Ubiquitous Technol.},
  volume       = {5},
  number       = {3},
  pages        = {130:1--130:28},
  year         = {2021},
  url          = {https://doi.org/10.1145/3478101},
  doi          = {10.1145/3478101},
  timestamp    = {Sat, 27 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/imwut/WangCW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/TianLTNCCLW21,
  author       = {Yunzhe Tian and
                  Jiqiang Liu and
                  Endong Tong and
                  Wenjia Niu and
                  Liang Chang and
                  Qi Alfred Chen and
                  Gang Li and
                  Wei Wang},
  title        = {Towards Revealing Parallel Adversarial Attack on Politician Socialnet
                  of Graph Structure},
  journal      = {Secur. Commun. Networks},
  volume       = {2021},
  pages        = {6631247:1--6631247:13},
  year         = {2021},
  url          = {https://doi.org/10.1155/2021/6631247},
  doi          = {10.1155/2021/6631247},
  timestamp    = {Fri, 30 Apr 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/TianLTNCCLW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tits/LiZLW21,
  author       = {Yidong Li and
                  Li Zhang and
                  Zhuo Lv and
                  Wei Wang},
  title        = {Detecting Anomalies in Intelligent Vehicle Charging and Station Power
                  Supply Systems With Multi-Head Attention Models},
  journal      = {{IEEE} Trans. Intell. Transp. Syst.},
  volume       = {22},
  number       = {1},
  pages        = {555--564},
  year         = {2021},
  url          = {https://doi.org/10.1109/TITS.2020.3018259},
  doi          = {10.1109/TITS.2020.3018259},
  timestamp    = {Mon, 02 Aug 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tits/LiZLW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tits/ZhangDPFW21,
  author       = {Chongsheng Zhang and
                  Weiping Ding and
                  Guowen Peng and
                  Feifei Fu and
                  Wei Wang},
  title        = {Street View Text Recognition With Deep Learning for Urban Scene Understanding
                  in Intelligent Transportation Systems},
  journal      = {{IEEE} Trans. Intell. Transp. Syst.},
  volume       = {22},
  number       = {7},
  pages        = {4727--4743},
  year         = {2021},
  url          = {https://doi.org/10.1109/TITS.2020.3017632},
  doi          = {10.1109/TITS.2020.3017632},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tits/ZhangDPFW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tnse/ZhangLDGJW21,
  author       = {Zikai Zhang and
                  Yidong Li and
                  Hairong Dong and
                  Honghao Gao and
                  Yi Jin and
                  Wei Wang},
  title        = {Spectral-Based Directed Graph Network for Malware Detection},
  journal      = {{IEEE} Trans. Netw. Sci. Eng.},
  volume       = {8},
  number       = {2},
  pages        = {957--970},
  year         = {2021},
  url          = {https://doi.org/10.1109/TNSE.2020.3024557},
  doi          = {10.1109/TNSE.2020.3024557},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tnse/ZhangLDGJW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tnse/WangSXLWS21,
  author       = {Wei Wang and
                  Jingjing Song and
                  Guangquan Xu and
                  Yidong Li and
                  Hao Wang and
                  Chunhua Su},
  title        = {ContractWard: Automated Vulnerability Detection Models for Ethereum
                  Smart Contracts},
  journal      = {{IEEE} Trans. Netw. Sci. Eng.},
  volume       = {8},
  number       = {2},
  pages        = {1133--1144},
  year         = {2021},
  url          = {https://doi.org/10.1109/TNSE.2020.2968505},
  doi          = {10.1109/TNSE.2020.2968505},
  timestamp    = {Thu, 16 Sep 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tnse/WangSXLWS21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/toit/ChengLJLW21,
  author       = {Lichen Cheng and
                  Jiqiang Liu and
                  Yi Jin and
                  Yidong Li and
                  Wei Wang},
  title        = {Account Guarantee Scheme: Making Anonymous Accounts Supervised in
                  Blockchain},
  journal      = {{ACM} Trans. Internet Techn.},
  volume       = {21},
  number       = {1},
  pages        = {11:1--11:19},
  year         = {2021},
  url          = {https://doi.org/10.1145/3406092},
  doi          = {10.1145/3406092},
  timestamp    = {Sat, 08 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/toit/ChengLJLW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2109-03798,
  author       = {Dan Su and
                  Jiqiang Liu and
                  Sencun Zhu and
                  Xiaoyang Wang and
                  Wei Wang and
                  Xiangliang Zhang},
  title        = {AppQ: Warm-starting App Recommendation Based on View Graphs},
  journal      = {CoRR},
  volume       = {abs/2109.03798},
  year         = {2021},
  url          = {https://arxiv.org/abs/2109.03798},
  eprinttype    = {arXiv},
  eprint       = {2109.03798},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2109-03798.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fcsc/HeAW20,
  author       = {Yongzhong He and
                  Endalew Elsabeth Alem and
                  Wei Wang},
  title        = {Hybritus: a password strength checker by ensemble learning from the
                  query feedbacks of websites},
  journal      = {Frontiers Comput. Sci.},
  volume       = {14},
  number       = {3},
  pages        = {143802},
  year         = {2020},
  url          = {https://doi.org/10.1007/s11704-019-7342-y},
  doi          = {10.1007/S11704-019-7342-Y},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fcsc/HeAW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/YeLWLLL20,
  author       = {Heng Ye and
                  Jiqiang Liu and
                  Wei Wang and
                  Ping Li and
                  Tong Li and
                  Jin Li},
  title        = {Secure and efficient outsourcing differential privacy data release
                  scheme in Cyber-physical system},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {108},
  pages        = {1314--1323},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.future.2018.03.034},
  doi          = {10.1016/J.FUTURE.2018.03.034},
  timestamp    = {Thu, 19 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fgcs/YeLWLLL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/XuWJLLZLXG20,
  author       = {Guangquan Xu and
                  Wei Wang and
                  Litao Jiao and
                  Xiaotong Li and
                  Kaitai Liang and
                  James Xi Zheng and
                  Wenjuan Lian and
                  Hequn Xian and
                  Honghao Gao},
  title        = {SoProtector: Safeguard Privacy for Native {SO} Files in Evolving Mobile
                  IoT Applications},
  journal      = {{IEEE} Internet Things J.},
  volume       = {7},
  number       = {4},
  pages        = {2539--2552},
  year         = {2020},
  url          = {https://doi.org/10.1109/JIOT.2019.2944006},
  doi          = {10.1109/JIOT.2019.2944006},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iotj/XuWJLLZLXG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/WangSHLL20,
  author       = {Wei Wang and
                  Yaoyao Shang and
                  Yongzhong He and
                  Yidong Li and
                  Jiqiang Liu},
  title        = {BotMark: Automated botnet detection with hybrid analysis of flow-based
                  and graph-based traffic behaviors},
  journal      = {Inf. Sci.},
  volume       = {511},
  pages        = {284--296},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.ins.2019.09.024},
  doi          = {10.1016/J.INS.2019.09.024},
  timestamp    = {Wed, 27 Nov 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isci/WangSHLL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/HeWXLXW20,
  author       = {Yongzhong He and
                  Chao Wang and
                  Guangquan Xu and
                  Wenjuan Lian and
                  Hequn Xian and
                  Wei Wang},
  title        = {Privacy-preserving categorization of mobile applications based on
                  large-scale usage data},
  journal      = {Inf. Sci.},
  volume       = {514},
  pages        = {557--570},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.ins.2019.11.007},
  doi          = {10.1016/J.INS.2019.11.007},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isci/HeWXLXW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jss/WangXLMSPW20,
  author       = {Yingjie Wang and
                  Guangquan Xu and
                  Xing Liu and
                  Weixuan Mao and
                  Chengxiang Si and
                  Witold Pedrycz and
                  Wei Wang},
  title        = {Identifying vulnerabilities of {SSL/TLS} certificate verification
                  in Android apps with static and dynamic analysis},
  journal      = {J. Syst. Softw.},
  volume       = {167},
  pages        = {110609},
  year         = {2020},
  url          = {https://doi.org/10.1016/j.jss.2020.110609},
  doi          = {10.1016/J.JSS.2020.110609},
  timestamp    = {Wed, 15 Jul 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jss/WangXLMSPW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcss/WeiXWHHW20,
  author       = {Xiangyu Wei and
                  Guangquan Xu and
                  Hao Wang and
                  Yongzhong He and
                  Zhen Han and
                  Wei Wang},
  title        = {Sensing Users' Emotional Intelligence in Social Networks},
  journal      = {{IEEE} Trans. Comput. Soc. Syst.},
  volume       = {7},
  number       = {1},
  pages        = {103--112},
  year         = {2020},
  url          = {https://doi.org/10.1109/TCSS.2019.2944687},
  doi          = {10.1109/TCSS.2019.2944687},
  timestamp    = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcss/WeiXWHHW20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tfs/LiuSWG20,
  author       = {Xiaoming Liu and
                  Chao Shen and
                  Wei Wang and
                  Xiaohong Guan},
  title        = {CoEvil: {A} Coevolutionary Model for Crime Inference Based on Fuzzy
                  Rough Feature Selection},
  journal      = {{IEEE} Trans. Fuzzy Syst.},
  volume       = {28},
  number       = {5},
  pages        = {806--817},
  year         = {2020},
  url          = {https://doi.org/10.1109/TFUZZ.2019.2939957},
  doi          = {10.1109/TFUZZ.2019.2939957},
  timestamp    = {Fri, 22 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tfs/LiuSWG20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmc/LiuLZWZ20,
  author       = {Xing Liu and
                  Jiqiang Liu and
                  Sencun Zhu and
                  Wei Wang and
                  Xiangliang Zhang},
  title        = {Privacy Risk Analysis and Mitigation of Analytics Libraries in the
                  Android Ecosystem},
  journal      = {{IEEE} Trans. Mob. Comput.},
  volume       = {19},
  number       = {5},
  pages        = {1184--1199},
  year         = {2020},
  url          = {https://doi.org/10.1109/TMC.2019.2903186},
  doi          = {10.1109/TMC.2019.2903186},
  timestamp    = {Fri, 22 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tmc/LiuLZWZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/colcom/XuLLCWWLTL20,
  author       = {Guangquan Xu and
                  Miao Li and
                  Xiaotong Li and
                  Kai Chen and
                  Ran Wang and
                  Wei Wang and
                  Kaitai Liang and
                  Qiang Tang and
                  Shaoying Liu},
  editor       = {Honghao Gao and
                  Xinheng Wang and
                  Muddesar Iqbal and
                  Yuyu Yin and
                  Jianwei Yin and
                  Ning Gu},
  title        = {Defending Use-After-Free via Relationship Between Memory and Pointer},
  booktitle    = {Collaborative Computing: Networking, Applications and Worksharing
                  - 16th {EAI} International Conference, CollaborateCom 2020, Shanghai,
                  China, October 16-18, 2020, Proceedings, Part {I}},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {349},
  pages        = {583--597},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-67537-0\_35},
  doi          = {10.1007/978-3-030-67537-0\_35},
  timestamp    = {Wed, 13 Jul 2022 15:43:08 +0200},
  biburl       = {https://dblp.org/rec/conf/colcom/XuLLCWWLTL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fcs2/HeWLHL020,
  author       = {Xudong He and
                  Jian Wang and
                  Jiqiang Liu and
                  Zhen Han and
                  Zhuo Lv and
                  Wei Wang},
  editor       = {Guangquan Xu and
                  Kaitai Liang and
                  Chunhua Su},
  title        = {{DNS} Rebinding Detection for Local Internet of Things Devices},
  booktitle    = {Frontiers in Cyber Security - Third International Conference, {FCS}
                  2020, Tianjin, China, November 15-17, 2020, Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {1286},
  pages        = {19--29},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-981-15-9739-8\_2},
  doi          = {10.1007/978-981-15-9739-8\_2},
  timestamp    = {Wed, 07 Dec 2022 09:54:09 +0100},
  biburl       = {https://dblp.org/rec/conf/fcs2/HeWLHL020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2006-10842,
  author       = {Qiang Yang and
                  Hind Alamro and
                  Somayah Albaradei and
                  Adil Salhi and
                  Xiaoting Lv and
                  Changsheng Ma and
                  Manal Alshehri and
                  Inji Jaber and
                  Faroug Tifratene and
                  Wei Wang and
                  Takashi Gojobori and
                  Carlos M. Duarte and
                  Xin Gao and
                  Xiangliang Zhang},
  title        = {SenWave: Monitoring the Global Sentiments under the {COVID-19} Pandemic},
  journal      = {CoRR},
  volume       = {abs/2006.10842},
  year         = {2020},
  url          = {https://arxiv.org/abs/2006.10842},
  eprinttype    = {arXiv},
  eprint       = {2006.10842},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2006-10842.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2010-10788,
  author       = {Dan Su and
                  Jiqiang Liu and
                  Sencun Zhu and
                  Xiaoyang Wang and
                  Wei Wang},
  title        = {"Are you home alone?" "Yes" Disclosing Security
                  and Privacy Vulnerabilities in Alexa Skills},
  journal      = {CoRR},
  volume       = {abs/2010.10788},
  year         = {2020},
  url          = {https://arxiv.org/abs/2010.10788},
  eprinttype    = {arXiv},
  eprint       = {2010.10788},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2010-10788.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/SuLWW19,
  author       = {Dan Su and
                  Jiqiang Liu and
                  Xiaoyang Wang and
                  Wei Wang},
  title        = {Detecting Android Locker-Ransomware on Chinese Social Networks},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {20381--20393},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2018.2888568},
  doi          = {10.1109/ACCESS.2018.2888568},
  timestamp    = {Wed, 12 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/SuLWW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/MaoSXLSW19,
  author       = {Weixuan Mao and
                  Bo Sun and
                  Guangquan Xu and
                  Cheng Liu and
                  Chengxiang Si and
                  Wei Wang},
  title        = {Understanding Effects of Collaborations in Developing Mobile Computing
                  Systems: Popularity, Efficiency, and Quality},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {33380--33392},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2019.2904333},
  doi          = {10.1109/ACCESS.2019.2904333},
  timestamp    = {Wed, 17 Apr 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/MaoSXLSW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/WangZGXXLZ19,
  author       = {Wei Wang and
                  Meichen Zhao and
                  Zhenzhen Gao and
                  Guangquan Xu and
                  Hequn Xian and
                  Yuanyuan Li and
                  Xiangliang Zhang},
  title        = {Constructing Features for Detecting Android Malicious Applications:
                  Issues, Taxonomy and Directions},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {67602--67631},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2019.2918139},
  doi          = {10.1109/ACCESS.2019.2918139},
  timestamp    = {Wed, 11 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/WangZGXXLZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fcsc/XieWWL19,
  author       = {Nannan Xie and
                  Xing Wang and
                  Wei Wang and
                  Jiqiang Liu},
  title        = {Fingerprinting Android malware families},
  journal      = {Frontiers Comput. Sci.},
  volume       = {13},
  number       = {3},
  pages        = {637--646},
  year         = {2019},
  url          = {https://doi.org/10.1007/s11704-017-6493-y},
  doi          = {10.1007/S11704-017-6493-Y},
  timestamp    = {Wed, 12 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fcsc/XieWWL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/ChengLSLXW19,
  author       = {Lichen Cheng and
                  Jiqiang Liu and
                  Chunhua Su and
                  Kaitai Liang and
                  Guangquan Xu and
                  Wei Wang},
  title        = {Polynomial-based modifiable blockchain structure for removing fraud
                  transactions},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {99},
  pages        = {154--163},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.future.2019.04.028},
  doi          = {10.1016/J.FUTURE.2019.04.028},
  timestamp    = {Mon, 03 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fgcs/ChengLSLXW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/istr/HeYHW19,
  author       = {Yongzhong He and
                  Xuejun Yang and
                  Binghui Hu and
                  Wei Wang},
  title        = {Dynamic privacy leakage analysis of Android third-party libraries},
  journal      = {J. Inf. Secur. Appl.},
  volume       = {46},
  pages        = {259--270},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.jisa.2019.03.014},
  doi          = {10.1016/J.JISA.2019.03.014},
  timestamp    = {Wed, 04 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/istr/HeYHW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jaihc/WangZW19,
  author       = {Wei Wang and
                  Mengxue Zhao and
                  Jigang Wang},
  title        = {Effective android malware detection with a hybrid model based on deep
                  autoencoder and convolutional neural network},
  journal      = {J. Ambient Intell. Humaniz. Comput.},
  volume       = {10},
  number       = {8},
  pages        = {3035--3043},
  year         = {2019},
  url          = {https://doi.org/10.1007/s12652-018-0803-6},
  doi          = {10.1007/S12652-018-0803-6},
  timestamp    = {Mon, 10 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jaihc/WangZW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcss/ChengLXZWDWW19,
  author       = {Lichen Cheng and
                  Jiqiang Liu and
                  Guangquan Xu and
                  Zonghua Zhang and
                  Hao Wang and
                  Hong{-}Ning Dai and
                  Yulei Wu and
                  Wei Wang},
  title        = {{SCTSC:} {A} Semicentralized Traffic Signal Control Mode With Attribute-Based
                  Blockchain in IoVs},
  journal      = {{IEEE} Trans. Comput. Soc. Syst.},
  volume       = {6},
  number       = {6},
  pages        = {1373--1385},
  year         = {2019},
  url          = {https://doi.org/10.1109/TCSS.2019.2904633},
  doi          = {10.1109/TCSS.2019.2904633},
  timestamp    = {Mon, 08 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcss/ChengLXZWDWW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tist/LiXZLPLWS19,
  author       = {Xiaoming Li and
                  Guangquan Xu and
                  Xi Zheng and
                  Kaitai Liang and
                  Emmanouil Panaousis and
                  Tao Li and
                  Wei Wang and
                  Chao Shen},
  title        = {Using Sparse Representation to Detect Anomalies in Complex WSNs},
  journal      = {{ACM} Trans. Intell. Syst. Technol.},
  volume       = {10},
  number       = {6},
  pages        = {64:1--64:18},
  year         = {2019},
  url          = {https://doi.org/10.1145/3331147},
  doi          = {10.1145/3331147},
  timestamp    = {Thu, 02 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tist/LiXZLPLWS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acmturc/WangLM019,
  author       = {Yingjie Wang and
                  Xing Liu and
                  Weixuan Mao and
                  Wei Wang},
  title        = {DCDroid: automated detection of {SSL/TLS} certificate verification
                  vulnerabilities in Android apps},
  booktitle    = {Proceedings of the {ACM} Turing Celebration Conference - China, {ACM}
                  {TUR-C} 2019, Chengdu, China, May 17-19, 2019},
  pages        = {137:1--137:9},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3321408.3326665},
  doi          = {10.1145/3321408.3326665},
  timestamp    = {Thu, 11 Mar 2021 17:04:51 +0100},
  biburl       = {https://dblp.org/rec/conf/acmturc/WangLM019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/ZhangLZCLL019,
  author       = {Li Zhang and
                  Zhuo Lv and
                  Xuesong Zhang and
                  Cen Chen and
                  Nuannuan Li and
                  Yidong Li and
                  Wei Wang},
  editor       = {Joseph K. Liu and
                  Xinyi Huang},
  title        = {A Novel Approach for Traffic Anomaly Detection in Power Distributed
                  Control System and Substation System},
  booktitle    = {Network and System Security - 13th International Conference, {NSS}
                  2019, Sapporo, Japan, December 15-18, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11928},
  pages        = {408--417},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-36938-5\_24},
  doi          = {10.1007/978-3-030-36938-5\_24},
  timestamp    = {Wed, 17 Aug 2022 14:30:35 +0200},
  biburl       = {https://dblp.org/rec/conf/nss/ZhangLZCLL019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/SongHLSX019,
  author       = {Jingjing Song and
                  Haiwu He and
                  Zhuo Lv and
                  Chunhua Su and
                  Guangquan Xu and
                  Wei Wang},
  editor       = {Joseph K. Liu and
                  Xinyi Huang},
  title        = {An Efficient Vulnerability Detection Model for Ethereum Smart Contracts},
  booktitle    = {Network and System Security - 13th International Conference, {NSS}
                  2019, Sapporo, Japan, December 15-18, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11928},
  pages        = {433--442},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-36938-5\_26},
  doi          = {10.1007/978-3-030-36938-5\_26},
  timestamp    = {Thu, 19 Dec 2019 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nss/SongHLSX019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/socialsec/WeiLHW19,
  author       = {Xiangyu Wei and
                  Jin Li and
                  Zhen Han and
                  Wei Wang},
  editor       = {Weizhi Meng and
                  Steven Furnell},
  title        = {Predicting Users' Emotional Intelligence with Social Networking Data},
  booktitle    = {Security and Privacy in Social Networks and Big Data - 5th International
                  Symposium, SocialSec 2019, Copenhagen, Denmark, July 14-17, 2019,
                  Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {1095},
  pages        = {191--202},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-981-15-0758-8\_15},
  doi          = {10.1007/978-981-15-0758-8\_15},
  timestamp    = {Thu, 02 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/socialsec/WeiLHW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1911-12080,
  author       = {Euijin Choo and
                  Mohamed Nabeel and
                  Mashael AlSabah and
                  Issa Khalil and
                  Ting Yu and
                  Wei Wang},
  title        = {DeviceWatch: Identifying Compromised Mobile Devices through Network
                  Traffic Analysis and Graph Inference},
  journal      = {CoRR},
  volume       = {abs/1911.12080},
  year         = {2019},
  url          = {http://arxiv.org/abs/1911.12080},
  eprinttype    = {arXiv},
  eprint       = {1911.12080},
  timestamp    = {Tue, 22 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1911-12080.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/WangGZLLZ18,
  author       = {Wei Wang and
                  Zhenzhen Gao and
                  Meichen Zhao and
                  Yidong Li and
                  Jiqiang Liu and
                  Xiangliang Zhang},
  title        = {DroidEnsemble: Detecting Android Malicious Applications With Ensemble
                  of String and Structural Static Features},
  journal      = {{IEEE} Access},
  volume       = {6},
  pages        = {31798--31807},
  year         = {2018},
  url          = {https://doi.org/10.1109/ACCESS.2018.2835654},
  doi          = {10.1109/ACCESS.2018.2835654},
  timestamp    = {Wed, 15 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/WangGZLLZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/adhoc/SuLWWDG18,
  author       = {Dan Su and
                  Jiqiang Liu and
                  Wei Wang and
                  Xiaoyang Wang and
                  Xiaojiang Du and
                  Mohsen Guizani},
  title        = {Discovering communities of malapps on Android-based mobile cyber-physical
                  systems},
  journal      = {Ad Hoc Networks},
  volume       = {80},
  pages        = {104--115},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.adhoc.2018.07.015},
  doi          = {10.1016/J.ADHOC.2018.07.015},
  timestamp    = {Wed, 29 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/adhoc/SuLWWDG18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/WangLWLZ18,
  author       = {Wei Wang and
                  Yuanyuan Li and
                  Xing Wang and
                  Jiqiang Liu and
                  Xiangliang Zhang},
  title        = {Detecting Android malicious apps and categorizing benign apps with
                  ensemble of classifiers},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {78},
  pages        = {987--994},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.future.2017.01.019},
  doi          = {10.1016/J.FUTURE.2017.01.019},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fgcs/WangLWLZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/LiuLWZ18,
  author       = {Xing Liu and
                  Jiqiang Liu and
                  Wei Wang and
                  Sencun Zhu},
  title        = {Android single sign-on security: Issues, taxonomy and directions},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {89},
  pages        = {402--420},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.future.2018.06.049},
  doi          = {10.1016/J.FUTURE.2018.06.049},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fgcs/LiuLWZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/WangLPZ18,
  author       = {Wei Wang and
                  Jiqiang Liu and
                  Georgios Pitsilis and
                  Xiangliang Zhang},
  title        = {Abstracting massive data for lightweight intrusion detection in computer
                  networks},
  journal      = {Inf. Sci.},
  volume       = {433-434},
  pages        = {417--430},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.ins.2016.10.023},
  doi          = {10.1016/J.INS.2016.10.023},
  timestamp    = {Mon, 07 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/WangLPZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcc/QiuLSLW18,
  author       = {Shuo Qiu and
                  Jiqiang Liu and
                  Yanfeng Shi and
                  Ming Li and
                  Wei Wang},
  title        = {Identity-Based Private Matching over Outsourced Encrypted Datasets},
  journal      = {{IEEE} Trans. Cloud Comput.},
  volume       = {6},
  number       = {3},
  pages        = {747--759},
  year         = {2018},
  url          = {https://doi.org/10.1109/TCC.2015.2511723},
  doi          = {10.1109/TCC.2015.2511723},
  timestamp    = {Sun, 21 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcc/QiuLSLW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tits/LiLCQWZZ18,
  author       = {Lun Li and
                  Jiqiang Liu and
                  Lichen Cheng and
                  Shuo Qiu and
                  Wei Wang and
                  Xiangliang Zhang and
                  Zonghua Zhang},
  title        = {CreditCoin: {A} Privacy-Preserving Blockchain-Based Incentive Announcement
                  Network for Communications of Smart Vehicles},
  journal      = {{IEEE} Trans. Intell. Transp. Syst.},
  volume       = {19},
  number       = {7},
  pages        = {2204--2220},
  year         = {2018},
  url          = {https://doi.org/10.1109/TITS.2017.2777990},
  doi          = {10.1109/TITS.2017.2777990},
  timestamp    = {Sat, 05 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tits/LiLCQWZZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/www/LiuLWHZ18,
  author       = {Xing Liu and
                  Jiqiang Liu and
                  Wei Wang and
                  Yongzhong He and
                  Xiangliang Zhang},
  title        = {Discovering and understanding android sensor usage behaviors with
                  data flow analysis},
  journal      = {World Wide Web},
  volume       = {21},
  number       = {1},
  pages        = {105--126},
  year         = {2018},
  url          = {https://doi.org/10.1007/s11280-017-0446-0},
  doi          = {10.1007/S11280-017-0446-0},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/www/LiuLWHZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/esorics/LiYWLHLL18,
  author       = {Jin Li and
                  Heng Ye and
                  Wei Wang and
                  Wenjing Lou and
                  Y. Thomas Hou and
                  Jiqiang Liu and
                  Rongxing Lu},
  editor       = {Javier L{\'{o}}pez and
                  Jianying Zhou and
                  Miguel Soriano},
  title        = {Efficient and Secure Outsourcing of Differentially Private Data Publication},
  booktitle    = {Computer Security - 23rd European Symposium on Research in Computer
                  Security, {ESORICS} 2018, Barcelona, Spain, September 3-7, 2018, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11099},
  pages        = {187--206},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-98989-1\_10},
  doi          = {10.1007/978-3-319-98989-1\_10},
  timestamp    = {Thu, 11 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/esorics/LiYWLHLL18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/ShangYW18,
  author       = {Yaoyao Shang and
                  Shuangmao Yang and
                  Wei Wang},
  editor       = {Xingming Sun and
                  Zhaoqing Pan and
                  Elisa Bertino},
  title        = {Botnet Detection with Hybrid Analysis on Flow Based and Graph Based
                  Features of Network Traffic},
  booktitle    = {Cloud Computing and Security - 4th International Conference, {ICCCS}
                  2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11064},
  pages        = {612--621},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-00009-7\_55},
  doi          = {10.1007/978-3-030-00009-7\_55},
  timestamp    = {Wed, 01 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icccsec/ShangYW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdis/Men0LH18,
  author       = {Jiaping Men and
                  Wei Wang and
                  Jiqiang Liu and
                  Zhen Han},
  title        = {Designing Mutual Authentication Protocols in Industrial Wireless Network},
  booktitle    = {1st International Conference on Data Intelligence and Security, {ICDIS}
                  2018, South Padre Island, TX, USA, April 8-10, 2018},
  pages        = {153--158},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/ICDIS.2018.00033},
  doi          = {10.1109/ICDIS.2018.00033},
  timestamp    = {Wed, 16 Oct 2019 14:14:52 +0200},
  biburl       = {https://dblp.org/rec/conf/icdis/Men0LH18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pakdd/ChenWZ18,
  author       = {Yan Chen and
                  Wei Wang and
                  Xiangliang Zhang},
  editor       = {Dinh Q. Phung and
                  Vincent S. Tseng and
                  Geoffrey I. Webb and
                  Bao Ho and
                  Mohadeseh Ganji and
                  Lida Rashidi},
  title        = {Randomizing {SVM} Against Adversarial Attacks Under Uncertainty},
  booktitle    = {Advances in Knowledge Discovery and Data Mining - 22nd Pacific-Asia
                  Conference, {PAKDD} 2018, Melbourne, VIC, Australia, June 3-6, 2018,
                  Proceedings, Part {III}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10939},
  pages        = {556--568},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-93040-4\_44},
  doi          = {10.1007/978-3-319-93040-4\_44},
  timestamp    = {Mon, 07 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pakdd/ChenWZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/pdcat/WangLJW18,
  author       = {Xiaochun Wang and
                  Yidong Li and
                  Yi Jin and
                  Wei Wang},
  editor       = {Jong Hyuk Park and
                  Hong Shen and
                  Yunsick Sung and
                  Hui Tian},
  title        = {Spectrum-Centric Differential Privacy for Hypergraph Spectral Clustering},
  booktitle    = {Parallel and Distributed Computing, Applications and Technologies,
                  19th International Conference, {PDCAT} 2018, Jeju Island, South Korea,
                  August 20-22, 2018, Revised Selected Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {931},
  pages        = {3--14},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-981-13-5907-1\_1},
  doi          = {10.1007/978-981-13-5907-1\_1},
  timestamp    = {Thu, 15 Jul 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/pdcat/WangLJW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1804-01641,
  author       = {Dan Su and
                  Jiqiang Liu and
                  Wei Wang and
                  Xiaoyang Wang and
                  Xiaojiang Du and
                  Mohsen Guizani},
  title        = {Discovering Communities of Malapps on Android-based Mobile Cyber-physical
                  Systems},
  journal      = {CoRR},
  volume       = {abs/1804.01641},
  year         = {2018},
  url          = {http://arxiv.org/abs/1804.01641},
  eprinttype    = {arXiv},
  eprint       = {1804.01641},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1804-01641.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/bioinformatics/AlzahraniKWG17,
  author       = {Majed Alzahrani and
                  Hiroyuki Kuwahara and
                  Wei Wang and
                  Xin Gao},
  title        = {Gracob: a novel graph-based constant-column biclustering method for
                  mining growth phenotype data},
  journal      = {Bioinform.},
  volume       = {33},
  number       = {16},
  pages        = {2523--2531},
  year         = {2017},
  url          = {https://doi.org/10.1093/bioinformatics/btx199},
  doi          = {10.1093/BIOINFORMATICS/BTX199},
  timestamp    = {Tue, 31 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/bioinformatics/AlzahraniKWG17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/WangWHLHZ17,
  author       = {Xing Wang and
                  Wei Wang and
                  Yongzhong He and
                  Jiqiang Liu and
                  Zhen Han and
                  Xiangliang Zhang},
  title        = {Characterizing Android apps' behavior for effective detection of malapps
                  at large scale},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {75},
  pages        = {30--45},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.future.2017.04.041},
  doi          = {10.1016/J.FUTURE.2017.04.041},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fgcs/WangWHLHZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/FanLWLTL17,
  author       = {Ming Fan and
                  Jun Liu and
                  Wei Wang and
                  Haifei Li and
                  Zhenzhou Tian and
                  Ting Liu},
  title        = {{DAPASA:} Detecting Android Piggybacked Apps Through Sensitive Subgraph
                  Analysis},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {12},
  number       = {8},
  pages        = {1772--1785},
  year         = {2017},
  url          = {https://doi.org/10.1109/TIFS.2017.2687880},
  doi          = {10.1109/TIFS.2017.2687880},
  timestamp    = {Wed, 30 Mar 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/FanLWLTL17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/QiuWLVLS016,
  author       = {Shuo Qiu and
                  Boyang Wang and
                  Ming Li and
                  Jesse Victors and
                  Jiqiang Liu and
                  Yanfeng Shi and
                  Wei Wang},
  editor       = {Sheng Zhong and
                  Anna Cinzia Squicciarini},
  title        = {Fast, Private and Verifiable: Server-aided Approximate Similarity
                  Computation over Large-Scale Datasets},
  booktitle    = {Proceedings of the 4th {ACM} International Workshop on Security in
                  Cloud Computing, SCC@AsiaCCS, Xi'an, China, May 30 - June 3, 2016},
  pages        = {29--36},
  publisher    = {{ACM}},
  year         = {2016},
  url          = {https://doi.org/10.1145/2898445.2898453},
  doi          = {10.1145/2898445.2898453},
  timestamp    = {Tue, 10 Nov 2020 16:06:16 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/QiuWLVLS016.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hucc/ZhuZWH16,
  author       = {Yongfei Zhu and
                  Di Zhao and
                  Wei Wang and
                  Haiwu He},
  editor       = {Qiaohong Zu and
                  Bo Hu},
  title        = {A Novel Load Balancing Algorithm Based on Improved Particle Swarm
                  Optimization in Cloud Computing Environment},
  booktitle    = {Human Centered Computing - Second International Conference, {HCC}
                  2016, Colombo, Sri Lanka, January 7-9, 2016, Revised Selected Papers},
  series       = {Lecture Notes in Computer Science},
  volume       = {9567},
  pages        = {634--645},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-31854-7\_57},
  doi          = {10.1007/978-3-319-31854-7\_57},
  timestamp    = {Wed, 01 Dec 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hucc/ZhuZWH16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/securecomm/LiuZWL16,
  author       = {Xing Liu and
                  Sencun Zhu and
                  Wei Wang and
                  Jiqiang Liu},
  editor       = {Robert H. Deng and
                  Jian Weng and
                  Kui Ren and
                  Vinod Yegneswaran},
  title        = {Alde: Privacy Risk Analysis of Analytics Libraries in the Android
                  Ecosystem},
  booktitle    = {Security and Privacy in Communication Networks - 12th International
                  Conference, SecureComm 2016, Guangzhou, China, October 10-12, 2016,
                  Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {198},
  pages        = {655--672},
  publisher    = {Springer},
  year         = {2016},
  url          = {https://doi.org/10.1007/978-3-319-59608-2\_36},
  doi          = {10.1007/978-3-319-59608-2\_36},
  timestamp    = {Tue, 12 May 2020 10:32:53 +0200},
  biburl       = {https://dblp.org/rec/conf/securecomm/LiuZWL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/SuWWL16,
  author       = {Dan Su and
                  Wei Wang and
                  Xing Wang and
                  Jiqiang Liu},
  title        = {Anomadroid: Profiling Android Applications' Behaviors for Identifying
                  Unknown Malapps},
  booktitle    = {2016 {IEEE} Trustcom/BigDataSE/ISPA, Tianjin, China, August 23-26,
                  2016},
  pages        = {691--698},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/TrustCom.2016.0127},
  doi          = {10.1109/TRUSTCOM.2016.0127},
  timestamp    = {Wed, 16 Oct 2019 14:14:49 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/SuWWL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/chb/Pitsilis015,
  author       = {Georgios Pitsilis and
                  Wei Wang},
  title        = {Harnessing the power of social bookmarking for improving tag-based
                  recommendations},
  journal      = {Comput. Hum. Behav.},
  volume       = {50},
  pages        = {239--251},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.chb.2015.03.045},
  doi          = {10.1016/J.CHB.2015.03.045},
  timestamp    = {Tue, 18 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/chb/Pitsilis015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iet-ifs/0012HLG15,
  author       = {Wei Wang and
                  Yongzhong He and
                  Jiqiang Liu and
                  Sylvain Gombault},
  title        = {Constructing important features from massive network traffic for lightweight
                  intrusion detection},
  journal      = {{IET} Inf. Secur.},
  volume       = {9},
  number       = {6},
  pages        = {374--379},
  year         = {2015},
  url          = {https://doi.org/10.1049/iet-ifs.2014.0353},
  doi          = {10.1049/IET-IFS.2014.0353},
  timestamp    = {Thu, 27 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/iet-ifs/0012HLG15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/LiuWL15,
  author       = {Xing Liu and
                  Wei Wang and
                  Jiqiang Liu},
  editor       = {Indrajit Ray and
                  Ninghui Li and
                  Christopher Kruegel},
  title        = {{POSTER:} The Popular Apps in Your Pocket Are Leaking Your Privacy},
  booktitle    = {Proceedings of the 22nd {ACM} {SIGSAC} Conference on Computer and
                  Communications Security, Denver, CO, USA, October 12-16, 2015},
  pages        = {1653--1655},
  publisher    = {{ACM}},
  year         = {2015},
  url          = {https://doi.org/10.1145/2810103.2810127},
  doi          = {10.1145/2810103.2810127},
  timestamp    = {Tue, 10 Nov 2020 19:58:09 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/LiuWL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ipccc/LiuL015,
  author       = {Xing Liu and
                  Jiqiang Liu and
                  Wei Wang},
  title        = {Exploring sensor usage behaviors of Android applications based on
                  data flow analysis},
  booktitle    = {34th {IEEE} International Performance Computing and Communications
                  Conference, {IPCCC} 2015, Nanjing, China, December 14-16, 2015},
  pages        = {1--8},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/PCCC.2015.7410335},
  doi          = {10.1109/PCCC.2015.7410335},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ipccc/LiuL015.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/kbs/WangGQCMZ14,
  author       = {Wei Wang and
                  Thomas Guyet and
                  Ren{\'{e}} Quiniou and
                  Marie{-}Odile Cordier and
                  Florent Masseglia and
                  Xiangliang Zhang},
  title        = {Autonomic intrusion detection: Adaptively detecting anomalies over
                  unlabeled audit data streams in computer networks},
  journal      = {Knowl. Based Syst.},
  volume       = {70},
  pages        = {103--117},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.knosys.2014.06.018},
  doi          = {10.1016/J.KNOSYS.2014.06.018},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/kbs/WangGQCMZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/WangWFLHZ14,
  author       = {Wei Wang and
                  Xing Wang and
                  Dawei Feng and
                  Jiqiang Liu and
                  Zhen Han and
                  Xiangliang Zhang},
  title        = {Exploring Permission-Induced Risk in Android Applications for Malicious
                  Application Detection},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {9},
  number       = {11},
  pages        = {1869--1882},
  year         = {2014},
  url          = {https://doi.org/10.1109/TIFS.2014.2353996},
  doi          = {10.1109/TIFS.2014.2353996},
  timestamp    = {Thu, 06 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/WangWFLHZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/Pitsilis014,
  author       = {Georgios Pitsilis and
                  Wei Wang},
  title        = {Harnessing the power of Social Bookmarking for improving tag-based
                  Recommendations},
  journal      = {CoRR},
  volume       = {abs/1410.5072},
  year         = {2014},
  url          = {http://arxiv.org/abs/1410.5072},
  eprinttype    = {arXiv},
  eprint       = {1410.5072},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/Pitsilis014.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/network/WangZSLF12,
  author       = {Wei Wang and
                  Xiangliang Zhang and
                  Wenchang Shi and
                  Shiguo Lian and
                  Dengguo Feng},
  title        = {Understanding and analyzing network traffic},
  journal      = {{IEEE} Netw.},
  volume       = {26},
  number       = {1},
  pages        = {4--5},
  year         = {2012},
  url          = {https://doi.org/10.1109/MNET.2012.6135849},
  doi          = {10.1109/MNET.2012.6135849},
  timestamp    = {Fri, 11 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/network/WangZSLF12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/network/WangZSLF11,
  author       = {Wei Wang and
                  Xiangliang Zhang and
                  Wenchang Shi and
                  Shiguo Lian and
                  Dengguo Feng},
  title        = {Network traffic monitoring, analysis and anomaly detection [Guest
                  Editorial]},
  journal      = {{IEEE} Netw.},
  volume       = {25},
  number       = {3},
  pages        = {6--7},
  year         = {2011},
  url          = {https://doi.org/10.1109/MNET.2011.5772054},
  doi          = {10.1109/MNET.2011.5772054},
  timestamp    = {Fri, 11 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/network/WangZSLF11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ifiptm/PitsilisZW11,
  author       = {Georgios Pitsilis and
                  Xiangliang Zhang and
                  Wei Wang},
  editor       = {Ian Wakeman and
                  Ehud Gudes and
                  Christian Damsgaard Jensen and
                  Jason Crampton},
  title        = {Clustering Recommenders in Collaborative Filtering Using Explicit
                  Trust Information},
  booktitle    = {Trust Management V, 5th {IFIP} {WG} 11.11 International Conference,
                  {IFIPTM} 2011, Copenhagen, Denmark, June 29-July 1, 2011, Proceedings},
  series       = {{IFIP} Advances in Information and Communication Technology},
  volume       = {358},
  pages        = {82--97},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-22200-9\_9},
  doi          = {10.1007/978-3-642-22200-9\_9},
  timestamp    = {Mon, 07 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ifiptm/PitsilisZW11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sac/WangZ11,
  author       = {Wei Wang and
                  Xiangliang Zhang},
  editor       = {William C. Chu and
                  W. Eric Wong and
                  Mathew J. Palakal and
                  Chih{-}Cheng Hung},
  title        = {High-speed web attack detection through extracting exemplars from
                  {HTTP} traffic},
  booktitle    = {Proceedings of the 2011 {ACM} Symposium on Applied Computing (SAC),
                  TaiChung, Taiwan, March 21 - 24, 2011},
  pages        = {1538--1543},
  publisher    = {{ACM}},
  year         = {2011},
  url          = {https://doi.org/10.1145/1982185.1982512},
  doi          = {10.1145/1982185.1982512},
  timestamp    = {Mon, 07 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/sac/WangZ11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/adma/ZhangW10,
  author       = {Xiangliang Zhang and
                  Wei Wang},
  editor       = {Longbing Cao and
                  Yong Feng and
                  Jiang Zhong},
  title        = {Self-adaptive Change Detection in Streaming Data with Non-stationary
                  Distribution},
  booktitle    = {Advanced Data Mining and Applications - 6th International Conference,
                  {ADMA} 2010, Chongqing, China, November 19-21, 2010, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {6440},
  pages        = {334--345},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17316-5\_33},
  doi          = {10.1007/978-3-642-17316-5\_33},
  timestamp    = {Mon, 07 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/adma/ZhangW10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdm/ZhangWNS10,
  author       = {Xiangliang Zhang and
                  Wei Wang and
                  Kjetil N{\o}rv{\aa}g and
                  Mich{\`{e}}le Sebag},
  editor       = {Geoffrey I. Webb and
                  Bing Liu and
                  Chengqi Zhang and
                  Dimitrios Gunopulos and
                  Xindong Wu},
  title        = {{K-AP:} Generating Specified {K} Clusters by Efficient Affinity Propagation},
  booktitle    = {{ICDM} 2010, The 10th {IEEE} International Conference on Data Mining,
                  Sydney, Australia, 14-17 December 2010},
  pages        = {1187--1192},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/ICDM.2010.107},
  doi          = {10.1109/ICDM.2010.107},
  timestamp    = {Tue, 07 May 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icdm/ZhangWNS10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iciss/WangZP10,
  author       = {Wei Wang and
                  Xiangliang Zhang and
                  Georgios Pitsilis},
  editor       = {Somesh Jha and
                  Anish Mathuria},
  title        = {Abstracting Audit Data for Lightweight Intrusion Detection},
  booktitle    = {Information Systems Security - 6th International Conference, {ICISS}
                  2010, Gandhinagar, India, December 17-19, 2010. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {6503},
  pages        = {201--215},
  publisher    = {Springer},
  year         = {2010},
  url          = {https://doi.org/10.1007/978-3-642-17714-9\_15},
  doi          = {10.1007/978-3-642-17714-9\_15},
  timestamp    = {Mon, 07 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/iciss/WangZP10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/GuanWZ09,
  author       = {Xiaohong Guan and
                  Wei Wang and
                  Xiangliang Zhang},
  title        = {Fast intrusion detection based on a non-negative matrix factorization
                  model},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {32},
  number       = {1},
  pages        = {31--44},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.jnca.2008.04.006},
  doi          = {10.1016/J.JNCA.2008.04.006},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/GuanWZ09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jss/WangZG09,
  author       = {Wei Wang and
                  Xiangliang Zhang and
                  Sylvain Gombault},
  title        = {Constructing attribute weights from computer audit data for effective
                  intrusion detection},
  journal      = {J. Syst. Softw.},
  volume       = {82},
  number       = {12},
  pages        = {1974--1981},
  year         = {2009},
  url          = {https://doi.org/10.1016/j.jss.2009.06.040},
  doi          = {10.1016/J.JSS.2009.06.040},
  timestamp    = {Mon, 24 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jss/WangZG09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/f-egc/GuyetWQC09,
  author       = {Thomas Guyet and
                  Wei Wang and
                  Rene Quiniou and
                  Marie{-}Odile Cordier},
  editor       = {Jean{-}Gabriel Ganascia and
                  Pierre Gan{\c{c}}arski},
  title        = {Diagnostic multi-sources adaptatif. Application {\`{a}} la d{\'{e}}tection
                  d'intrusion dans des serveurs Web},
  booktitle    = {Extraction et gestion des connaissances (EGC'2009), Actes, Strasbourg,
                  France, 27 au 30 janvier 2009},
  series       = {Revue des Nouvelles Technologies de l'Information},
  volume       = {{RNTI-E-15}},
  pages        = {325--336},
  publisher    = {C{\'{e}}padu{\`{e}}s-{\'{E}}ditions},
  year         = {2009},
  url          = {http://editions-rnti.fr/?inprocid=1000777},
  timestamp    = {Wed, 11 Jul 2018 09:48:47 +0200},
  biburl       = {https://dblp.org/rec/conf/f-egc/GuyetWQC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/f-egc/WangGQCM09,
  author       = {Wei Wang and
                  Thomas Guyet and
                  Rene Quiniou and
                  Marie{-}Odile Cordier and
                  Florent Masseglia},
  editor       = {Jean{-}Gabriel Ganascia and
                  Pierre Gan{\c{c}}arski},
  title        = {Online and adaptive anomaly Detection: detecting intrusions in unlabelled
                  audit data streams},
  booktitle    = {Extraction et gestion des connaissances (EGC'2009), Actes, Strasbourg,
                  France, 27 au 30 janvier 2009},
  series       = {Revue des Nouvelles Technologies de l'Information},
  volume       = {{RNTI-E-15}},
  pages        = {457--458},
  publisher    = {C{\'{e}}padu{\`{e}}s-{\'{E}}ditions},
  year         = {2009},
  url          = {http://editions-rnti.fr/?inprocid=1000802},
  timestamp    = {Thu, 24 Apr 2014 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/f-egc/WangGQCM09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispan/WangZGK09,
  author       = {Wei Wang and
                  Xiangliang Zhang and
                  Sylvain Gombault and
                  Svein J. Knapskog},
  title        = {Attribute Normalization in Network Intrusion Detection},
  booktitle    = {The 10th International Symposium on Pervasive Systems, Algorithms,
                  and Networks, {ISPAN} 2009, Kaohsiung, Taiwan, December 14-16, 2009},
  pages        = {448--453},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/I-SPAN.2009.49},
  doi          = {10.1109/I-SPAN.2009.49},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ispan/WangZGK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/raid/WangGK09,
  author       = {Wei Wang and
                  Thomas Guyet and
                  Svein J. Knapskog},
  editor       = {Engin Kirda and
                  Somesh Jha and
                  Davide Balzarotti},
  title        = {Autonomic Intrusion Detection System},
  booktitle    = {Recent Advances in Intrusion Detection, 12th International Symposium,
                  {RAID} 2009, Saint-Malo, France, September 23-25, 2009. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {5758},
  pages        = {359--361},
  publisher    = {Springer},
  year         = {2009},
  url          = {https://doi.org/10.1007/978-3-642-04342-0\_24},
  doi          = {10.1007/978-3-642-04342-0\_24},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/raid/WangGK09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/WangMGQC09,
  author       = {Wei Wang and
                  Florent Masseglia and
                  Thomas Guyet and
                  Rene Quiniou and
                  Marie{-}Odile Cordier},
  editor       = {Juan Quemada and
                  Gonzalo Le{\'{o}}n and
                  Yo{\"{e}}lle S. Maarek and
                  Wolfgang Nejdl},
  title        = {A general framework for adaptive and online detection of web attacks},
  booktitle    = {Proceedings of the 18th International Conference on World Wide Web,
                  {WWW} 2009, Madrid, Spain, April 20-24, 2009},
  pages        = {1141--1142},
  publisher    = {{ACM}},
  year         = {2009},
  url          = {https://doi.org/10.1145/1526709.1526897},
  doi          = {10.1145/1526709.1526897},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/www/WangMGQC09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-0907-3819,
  author       = {Thomas Guyet and
                  Rene Quiniou and
                  Wei Wang and
                  Marie{-}Odile Cordier},
  title        = {Self-adaptive web intrusion detection system},
  journal      = {CoRR},
  volume       = {abs/0907.3819},
  year         = {2009},
  url          = {http://arxiv.org/abs/0907.3819},
  eprinttype    = {arXiv},
  eprint       = {0907.3819},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-0907-3819.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comcom/WangGZ08,
  author       = {Wei Wang and
                  Xiaohong Guan and
                  Xiangliang Zhang},
  title        = {Processing of massive audit data streams for real-time anomaly intrusion
                  detection},
  journal      = {Comput. Commun.},
  volume       = {31},
  number       = {1},
  pages        = {58--72},
  year         = {2008},
  url          = {https://doi.org/10.1016/j.comcom.2007.10.010},
  doi          = {10.1016/J.COMCOM.2007.10.010},
  timestamp    = {Thu, 20 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comcom/WangGZ08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/crisis/0012G08,
  author       = {Wei Wang and
                  Sylvain Gombault},
  editor       = {Mohamed Jmaiel and
                  Mohamed Mosbah},
  title        = {Efficient detection of DDoS attacks with important attributes},
  booktitle    = {CRiSIS '08, Third International Conference on Risks and Security of
                  Internet and Systems, Tozeur, Tunisia, October 28-30, 2008},
  pages        = {61--67},
  publisher    = {{IEEE}},
  year         = {2008},
  url          = {https://doi.org/10.1109/CRISIS.2008.4757464},
  doi          = {10.1109/CRISIS.2008.4757464},
  timestamp    = {Tue, 11 Oct 2022 14:59:07 +0200},
  biburl       = {https://dblp.org/rec/conf/crisis/0012G08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/csreaSAM/WangG07,
  author       = {Wei Wang and
                  Sylvain Gombault},
  editor       = {Selim Aissi and
                  Hamid R. Arabnia},
  title        = {Distance Measures for Anomaly Intrusion Detection},
  booktitle    = {Proceedings of the 2007 International Conference on Security {\&}
                  Management, {SAM} 2007, Las Vegas, Nevada, USA, June 25-28, 2007},
  pages        = {17--23},
  publisher    = {{CSREA} Press},
  year         = {2007},
  timestamp    = {Mon, 22 Mar 2010 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/csreaSAM/WangG07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/WangGZY06,
  author       = {Wei Wang and
                  Xiaohong Guan and
                  Xiangliang Zhang and
                  Liwei Yang},
  title        = {Profiling program behavior for anomaly intrusion detection based on
                  the transition and frequency property of computer audit data},
  journal      = {Comput. Secur.},
  volume       = {25},
  number       = {7},
  pages        = {539--550},
  year         = {2006},
  url          = {https://doi.org/10.1016/j.cose.2006.05.005},
  doi          = {10.1016/J.COSE.2006.05.005},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/WangGZY06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEares/WangB06,
  author       = {Wei Wang and
                  Roberto Battiti},
  title        = {Identifying Intrusions in Computer Networks with Principal Component
                  Analysis},
  booktitle    = {Proceedings of the The First International Conference on Availability,
                  Reliability and Security, {ARES} 2006, The International Dependability
                  Conference - Bridging Theory and Practice, April 20-22 2006, Vienna
                  University of Technology, Austria},
  pages        = {270--279},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/ARES.2006.73},
  doi          = {10.1109/ARES.2006.73},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEares/WangB06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cdc/WangGZ04,
  author       = {Wei Wang and
                  Xiaohong Guan and
                  Xiangliang Zhang},
  title        = {Profiling program and user behaviors for anomaly intrusion detection
                  based on non-negative matrix factorization},
  booktitle    = {43rd {IEEE} Conference on Decision and Control, {CDC} 2004, Nassau,
                  Bahamas, December 14-17, 2004},
  pages        = {99--104},
  publisher    = {{IEEE}},
  year         = {2004},
  url          = {https://doi.org/10.1109/CDC.2004.1428613},
  doi          = {10.1109/CDC.2004.1428613},
  timestamp    = {Fri, 04 Mar 2022 13:24:31 +0100},
  biburl       = {https://dblp.org/rec/conf/cdc/WangGZ04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isnn/WangGZ04,
  author       = {Wei Wang and
                  Xiaohong Guan and
                  Xiangliang Zhang},
  editor       = {Fuliang Yin and
                  Jun Wang and
                  Chengan Guo},
  title        = {A Novel Intrusion Detection Method Based on Principle Component Analysis
                  in Computer Security},
  booktitle    = {Advances in Neural Networks - {ISNN} 2004, International Symposium
                  on Neural Networks, Dalian, China, August 19-21, 2004, Proceedings,
                  Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {3174},
  pages        = {657--662},
  publisher    = {Springer},
  year         = {2004},
  url          = {https://doi.org/10.1007/978-3-540-28648-6\_105},
  doi          = {10.1007/978-3-540-28648-6\_105},
  timestamp    = {Thu, 09 Jan 2020 18:22:01 +0100},
  biburl       = {https://dblp.org/rec/conf/isnn/WangGZ04.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}