Suivre
Wei Wang
Wei Wang
Adresse e-mail validée de bjtu.edu.cn - Page d'accueil
Titre
Citée par
Citée par
Année
CreditCoin: A Privacy-Preserving Blockchain-Based Incentive Announcement Network for Communications of Smart Vehicles
L Li, J Liu, L Cheng, S Qiu, W Wang, X Zhang, Z Zhang
IEEE Transactions on Intelligent Transportation Systems, 2018
5422018
Exploring permission-induced risk in Android applications for malicious application detection
W Wang, X Wang, D Feng, J Liu, Z Han, X Zhang
IEEE Transactions on Information Forensics and Security 9 (11), 1869-1882, 2014
3812014
Effective android malware detection with a hybrid model based on deep autoencoder and convolutional neural network
W Wang, M Zhao, J Wang
Journal of Ambient Intelligence and Humanized Computing 10, 3035-3043, 2019
2822019
Detecting Android malicious apps and categorizing benign apps with ensemble of classifiers
W Wang, Y Li, X Wang, J Liu, X Zhang
Future Generation Computer Systems 78, 987-994, 2018
2512018
Contractward: Automated vulnerability detection models for ethereum smart contracts
W Wang, J Song, G Xu, Y Li, H Wang, C Su
IEEE Transactions on Network Science and Engineering 8 (2), 1133-1144, 2020
2002020
BotMark: Automated botnet detection with hybrid analysis of flow-based and graph-based traffic behaviors
W Wang, Y Shang, Y He, Y Li, J Liu
Information Sciences 511, 284-296, 2020
1782020
An out-of-band authentication scheme for internet of things using blockchain technology
L Wu, X Du, W Wang, B Lin
2018 International Conference on Computing, Networking and Communications …, 2018
1722018
DAPASA: detecting android piggybacked apps through sensitive subgraph analysis
M Fan, J Liu, W Wang, H Li, Z Tian, T Liu
IEEE Transactions on Information Forensics and Security 12 (8), 1772-1785, 2017
1422017
Identifying intrusions in computer networks with principal component analysis
W Wang, R Battiti
First International Conference on Availability, Reliability and Security …, 2006
1382006
Privacy risk analysis and mitigation of analytics libraries in the android ecosystem
X Liu, J Liu, S Zhu, W Wang, X Zhang
IEEE Transactions on Mobile Computing 19 (5), 1184-1199, 2019
1262019
Attribute normalization in network intrusion detection
W Wang, X Zhang, S Gombault, SJ Knapskog
2009 10th International Symposium on Pervasive Systems, Algorithms, and …, 2009
1242009
Processing of massive audit data streams for real-time anomaly intrusion detection
W Wang, X Guan, X Zhang
Computer Communications 31 (1), 58-72, 2008
1232008
Profiling program behavior for anomaly intrusion detection based on the transition and frequency property of computer audit data
W Wang, X Guan, X Zhang, L Yang
computers & security 25 (7), 539-550, 2006
1112006
DroidEnsemble: Detecting Android malicious applications with ensemble of string and structural static features
W Wang, Z Gao, M Zhao, Y Li, J Liu, X Zhang
IEEE Access 6, 31798-31807, 2018
1092018
Vulnerability detection with deep learning
F Wu, J Wang, J Liu, W Wang
2017 3rd IEEE International Conference on Computer and Communications (ICCC …, 2017
1092017
Autonomic intrusion detection: Adaptively detecting anomalies over unlabeled audit data streams in computer networks
W Wang, T Guyet, R Quiniou, MO Cordier, F Masseglia, X Zhang
Knowledge-Based Systems 70, 103-117, 2014
1092014
Constructing features for detecting android malicious applications: issues, taxonomy and directions
W Wang, M Zhao, Z Gao, G Xu, H Xian, Y Li, X Zhang
IEEE Access 7, 67602-67631, 2019
1052019
Threats, attacks and defenses to federated learning: issues, taxonomy and perspectives
P Liu, X Xu, W Wang
Cybersecurity 5 (1), 1-19, 2022
992022
Characterizing Android apps’ behavior for effective detection of malapps at large scale
X Wang, W Wang, Y He, J Liu, Z Han, X Zhang
Future Generation Computer Systems 75, 30-45, 2017
932017
SCTSC: A semicentralized traffic signal control mode with attribute-based blockchain in iovs
L Cheng, J Liu, G Xu, Z Zhang, H Wang, HN Dai, Y Wu, W Wang
IEEE Transactions on Computational Social Systems 6 (6), 1373-1385, 2019
912019
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20