The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Publications of "Wei Wang 0012" ( http://dblp.L3S.de/Authors/Wei_Wang_0012 )

URL (Homepage):  http://infosec.bjtu.edu.cn/wangwei/  Author page on DBLP  Author page in RDF  Community of Wei Wang 0012 in ASPL-2

Publication years (Num. hits)
2004-2010 (17) 2011-2017 (15) 2018-2019 (18) 2020 (1)
Publication types (Num. hits)
article(28) inproceedings(23)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 7 occurrences of 5 keywords

Results
Found 52 publication records. Showing 51 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
1Wei Wang 0012, Yaoyao Shang, Yongzhong He, Yidong Li, Jiqiang Liu BotMark: Automated botnet detection with hybrid analysis of flow-based and graph-based traffic behaviors. Search on Bibsonomy Inf. Sci. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
1Yongzhong He, Xuejun Yang, Binghui Hu, Wei Wang 0012 Dynamic privacy leakage analysis of Android third-party libraries. Search on Bibsonomy J. Inf. Sec. Appl. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Wei Wang 0012, Mengxue Zhao, Jigang Wang Effective android malware detection with a hybrid model based on deep autoencoder and convolutional neural network. Search on Bibsonomy J. Ambient Intelligence and Humanized Computing The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Weixuan Mao, Bo Sun, Guangquan Xu, Cheng Liu, Chengxiang Si, Wei Wang 0012 Understanding Effects of Collaborations in Developing Mobile Computing Systems: Popularity, Efficiency, and Quality. Search on Bibsonomy IEEE Access The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Dan Su, Jiqiang Liu, Xiaoyang Wang, Wei Wang 0012 Detecting Android Locker-Ransomware on Chinese Social Networks. Search on Bibsonomy IEEE Access The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Nannan Xie, Xing Wang, Wei Wang 0012, Jiqiang Liu Fingerprinting Android malware families. Search on Bibsonomy Frontiers Comput. Sci. The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Yingjie Wang, Xing Liu, Weixuan Mao, Wei Wang 0012 DCDroid: automated detection of SSL/TLS certificate verification vulnerabilities in Android apps. Search on Bibsonomy ACM TUR-C The full citation details ... 2019 DBLP  DOI  BibTeX  RDF
1Wei Wang 0012, Jiqiang Liu, Georgios Pitsilis, Xiangliang Zhang 0001 Abstracting massive data for lightweight intrusion detection in computer networks. Search on Bibsonomy Inf. Sci. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Xing Liu, Jiqiang Liu, Wei Wang 0012, Yongzhong He, Xiangliang Zhang 0001 Discovering and understanding android sensor usage behaviors with data flow analysis. Search on Bibsonomy World Wide Web The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Shuo Qiu, Jiqiang Liu, Yanfeng Shi, Ming Li 0003, Wei Wang 0012 Identity-Based Private Matching over Outsourced Encrypted Datasets. Search on Bibsonomy IEEE Trans. Cloud Computing The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Wei Wang 0012, Zhenzhen Gao, Meichen Zhao, Yidong Li, Jiqiang Liu, Xiangliang Zhang 0001 DroidEnsemble: Detecting Android Malicious Applications With Ensemble of String and Structural Static Features. Search on Bibsonomy IEEE Access The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Dan Su, Jiqiang Liu, Wei Wang 0012, Xiaoyang Wang, Xiaojiang Du, Mohsen Guizani Discovering communities of malapps on Android-based mobile cyber-physical systems. Search on Bibsonomy Ad Hoc Networks The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Lun Li, Jiqiang Liu, Lichen Cheng, Shuo Qiu, Wei Wang 0012, Xiangliang Zhang 0001, Zonghua Zhang CreditCoin: A Privacy-Preserving Blockchain-Based Incentive Announcement Network for Communications of Smart Vehicles. Search on Bibsonomy IEEE Trans. Intelligent Transportation Systems The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Dan Su, Jiqiang Liu, Wei Wang 0012, Xiaoyang Wang, Xiaojiang Du, Mohsen Guizani Discovering Communities of Malapps on Android-based Mobile Cyber-physical Systems. Search on Bibsonomy CoRR The full citation details ... 2018 DBLP  BibTeX  RDF
1Xing Liu, Jiqiang Liu, Wei Wang 0012, Sencun Zhu Android single sign-on security: Issues, taxonomy and directions. Search on Bibsonomy Future Generation Comp. Syst. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Wei Wang 0012, Yuanyuan Li, Xing Wang, Jiqiang Liu, Xiangliang Zhang 0001 Detecting Android malicious apps and categorizing benign apps with ensemble of classifiers. Search on Bibsonomy Future Generation Comp. Syst. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Jin Li, Heng Ye, Wei Wang 0012, Wenjing Lou, Y. Thomas Hou, Jiqiang Liu, Rongxing Lu Efficient and Secure Outsourcing of Differentially Private Data Publication. Search on Bibsonomy ESORICS (2) The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Jiaping Men, Wei Wang 0012, Jiqiang Liu, Zhen Han Designing Mutual Authentication Protocols in Industrial Wireless Network. Search on Bibsonomy ICDIS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Yan Chen, Wei Wang 0012, Xiangliang Zhang 0001 Randomizing SVM Against Adversarial Attacks Under Uncertainty. Search on Bibsonomy PAKDD (3) The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
1Xing Wang, Wei Wang 0012, Yongzhong He, Jiqiang Liu, Zhen Han, Xiangliang Zhang 0001 Characterizing Android apps' behavior for effective detection of malapps at large scale. Search on Bibsonomy Future Generation Comp. Syst. The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
1Shuo Qiu, Boyang Wang, Ming Li 0003, Jesse Victors, Jiqiang Liu, Yanfeng Shi, Wei Wang 0012 Fast, Private and Verifiable: Server-aided Approximate Similarity Computation over Large-Scale Datasets. Search on Bibsonomy SCC@AsiaCCS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Xing Liu, Sencun Zhu, Wei Wang 0012, Jiqiang Liu Alde: Privacy Risk Analysis of Analytics Libraries in the Android Ecosystem. Search on Bibsonomy SecureComm The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Dan Su, Wei Wang 0012, Xing Wang, Jiqiang Liu Anomadroid: Profiling Android Applications' Behaviors for Identifying Unknown Malapps. Search on Bibsonomy Trustcom/BigDataSE/ISPA The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
1Wei Wang 0012, Yongzhong He, Jiqiang Liu, Sylvain Gombault Constructing important features from massive network traffic for lightweight intrusion detection. Search on Bibsonomy IET Information Security The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Georgios Pitsilis, Wei Wang 0012 Harnessing the power of social bookmarking for improving tag-based recommendations. Search on Bibsonomy Computers in Human Behavior The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Xing Liu, Wei Wang 0012, Jiqiang Liu POSTER: The Popular Apps in Your Pocket Are Leaking Your Privacy. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Xing Liu, Jiqiang Liu, Wei Wang 0012 Exploring sensor usage behaviors of Android applications based on data flow analysis. Search on Bibsonomy IPCCC The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
1Georgios Pitsilis, Wei Wang 0012 Harnessing the power of Social Bookmarking for improving tag-based Recommendations. Search on Bibsonomy CoRR The full citation details ... 2014 DBLP  BibTeX  RDF
1Wei Wang 0012, Thomas Guyet, René Quiniou, Marie-Odile Cordier, Florent Masseglia, Xiangliang Zhang 0001 Autonomic intrusion detection: Adaptively detecting anomalies over unlabeled audit data streams in computer networks. Search on Bibsonomy Knowl.-Based Syst. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Wei Wang 0012, Xing Wang, Dawei Feng, Jiqiang Liu, Zhen Han, Xiangliang Zhang 0001 Exploring Permission-Induced Risk in Android Applications for Malicious Application Detection. Search on Bibsonomy IEEE Trans. Information Forensics and Security The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
1Wei Wang 0012, Xiangliang Zhang 0001, Wenchang Shi, Shiguo Lian, Dengguo Feng Understanding and analyzing network traffic. Search on Bibsonomy IEEE Network The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
1Wei Wang 0012, Xiangliang Zhang 0001, Wenchang Shi, Shiguo Lian, Dengguo Feng Network traffic monitoring, analysis and anomaly detection [Guest Editorial]. Search on Bibsonomy IEEE Network The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Wei Wang 0012, Xiangliang Zhang 0001 High-speed web attack detection through extracting exemplars from HTTP traffic. Search on Bibsonomy SAC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Georgios Pitsilis, Xiangliang Zhang 0001, Wei Wang 0012 Clustering Recommenders in Collaborative Filtering Using Explicit Trust Information. Search on Bibsonomy IFIPTM The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
1Xiangliang Zhang 0001, Wei Wang 0012, Kjetil Nørvåg, Michèle Sebag K-AP: Generating Specified K Clusters by Efficient Affinity Propagation. Search on Bibsonomy ICDM The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Wei Wang 0012, Xiangliang Zhang 0001, Georgios Pitsilis Abstracting Audit Data for Lightweight Intrusion Detection. Search on Bibsonomy ICISS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Xiangliang Zhang 0001, Wei Wang 0012 Self-adaptive Change Detection in Streaming Data with Non-stationary Distribution. Search on Bibsonomy ADMA (1) The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
1Thomas Guyet, Rene Quiniou, Wei Wang 0012, Marie-Odile Cordier Self-adaptive web intrusion detection system Search on Bibsonomy CoRR The full citation details ... 2009 DBLP  BibTeX  RDF
1Xiaohong Guan, Wei Wang 0012, Xiangliang Zhang 0001 Fast intrusion detection based on a non-negative matrix factorization model. Search on Bibsonomy J. Network and Computer Applications The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Wei Wang 0012, Xiangliang Zhang 0001, Sylvain Gombault Constructing attribute weights from computer audit data for effective intrusion detection. Search on Bibsonomy Journal of Systems and Software The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Wei Wang 0012, Florent Masseglia, Thomas Guyet, Rene Quiniou, Marie-Odile Cordier A general framework for adaptive and online detection of web attacks. Search on Bibsonomy WWW The full citation details ... 2009 DBLP  DOI  BibTeX  RDF clustering, intrusion detection, anomaly detection
1Wei Wang 0012, Thomas Guyet, Rene Quiniou, Marie-Odile Cordier, Florent Masseglia Online and adaptive anomaly Detection: detecting intrusions in unlabelled audit data streams. Search on Bibsonomy EGC The full citation details ... 2009 DBLP  BibTeX  RDF
1Thomas Guyet, Wei Wang 0012, Rene Quiniou, Marie-Odile Cordier Diagnostic multi-sources adaptatif. Application à la détection d'intrusion dans des serveurs Web. Search on Bibsonomy EGC The full citation details ... 2009 DBLP  BibTeX  RDF
1Wei Wang 0012, Thomas Guyet, Svein J. Knapskog Autonomic Intrusion Detection System. Search on Bibsonomy RAID The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
1Wei Wang 0012, Xiangliang Zhang 0001, Sylvain Gombault, Svein J. Knapskog Attribute Normalization in Network Intrusion Detection. Search on Bibsonomy ISPAN The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Intrusion detection, PCA, anomaly detection, data normalization
1Wei Wang 0012, Xiaohong Guan, Xiangliang Zhang 0001 Processing of massive audit data streams for real-time anomaly intrusion detection. Search on Bibsonomy Computer Communications The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Wei Wang 0012, Sylvain Gombault Efficient detection of DDoS attacks with important attributes. Search on Bibsonomy CRiSIS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
1Wei Wang 0012, Sylvain Gombault Distance Measures for Anomaly Intrusion Detection. Search on Bibsonomy Security and Management The full citation details ... 2007 DBLP  BibTeX  RDF
1Wei Wang 0012, Xiaohong Guan, Xiangliang Zhang 0001, Liwei Yang Profiling program behavior for anomaly intrusion detection based on the transition and frequency property of computer audit data. Search on Bibsonomy Computers & Security The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Wei Wang 0012, Roberto Battiti Identifying Intrusions in Computer Networks with Principal Component Analysis. Search on Bibsonomy ARES The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
1Wei Wang 0012, Xiaohong Guan, Xiangliang Zhang 0001 A Novel Intrusion Detection Method Based on Principle Component Analysis in Computer Security. Search on Bibsonomy ISNN (2) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #51 of 51 (100 per page; Change: )
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license