Follow
Wei Wang
Wei Wang
Verified email at bjtu.edu.cn - Homepage
Title
Cited by
Cited by
Year
CreditCoin: A Privacy-Preserving Blockchain-Based Incentive Announcement Network for Communications of Smart Vehicles
L Li, J Liu, L Cheng, S Qiu, W Wang, X Zhang, Z Zhang
IEEE Transactions on Intelligent Transportation Systems, 2018
5472018
Exploring permission-induced risk in Android applications for malicious application detection
W Wang, X Wang, D Feng, J Liu, Z Han, X Zhang
IEEE Transactions on Information Forensics and Security 9 (11), 1869-1882, 2014
3852014
Effective android malware detection with a hybrid model based on deep autoencoder and convolutional neural network
W Wang, M Zhao, J Wang
Journal of Ambient Intelligence and Humanized Computing 10, 3035-3043, 2019
2842019
Detecting Android malicious apps and categorizing benign apps with ensemble of classifiers
W Wang, Y Li, X Wang, J Liu, X Zhang
Future Generation Computer Systems 78, 987-994, 2018
2542018
Contractward: Automated vulnerability detection models for ethereum smart contracts
W Wang, J Song, G Xu, Y Li, H Wang, C Su
IEEE Transactions on Network Science and Engineering 8 (2), 1133-1144, 2020
2072020
BotMark: Automated botnet detection with hybrid analysis of flow-based and graph-based traffic behaviors
W Wang, Y Shang, Y He, Y Li, J Liu
Information Sciences 511, 284-296, 2020
1802020
An out-of-band authentication scheme for internet of things using blockchain technology
L Wu, X Du, W Wang, B Lin
2018 International Conference on Computing, Networking and Communications …, 2018
1752018
DAPASA: detecting android piggybacked apps through sensitive subgraph analysis
M Fan, J Liu, W Wang, H Li, Z Tian, T Liu
IEEE Transactions on Information Forensics and Security 12 (8), 1772-1785, 2017
1432017
Identifying intrusions in computer networks with principal component analysis
W Wang, R Battiti
First International Conference on Availability, Reliability and Security …, 2006
1382006
Privacy risk analysis and mitigation of analytics libraries in the android ecosystem
X Liu, J Liu, S Zhu, W Wang, X Zhang
IEEE Transactions on Mobile Computing 19 (5), 1184-1199, 2019
1282019
Attribute normalization in network intrusion detection
W Wang, X Zhang, S Gombault, SJ Knapskog
2009 10th International Symposium on Pervasive Systems, Algorithms, and …, 2009
1262009
Processing of massive audit data streams for real-time anomaly intrusion detection
W Wang, X Guan, X Zhang
Computer Communications 31 (1), 58-72, 2008
1232008
DroidEnsemble: Detecting Android malicious applications with ensemble of string and structural static features
W Wang, Z Gao, M Zhao, Y Li, J Liu, X Zhang
IEEE Access 6, 31798-31807, 2018
1122018
Vulnerability detection with deep learning
F Wu, J Wang, J Liu, W Wang
2017 3rd IEEE International Conference on Computer and Communications (ICCC …, 2017
1112017
Profiling program behavior for anomaly intrusion detection based on the transition and frequency property of computer audit data
W Wang, X Guan, X Zhang, L Yang
computers & security 25 (7), 539-550, 2006
1112006
Constructing features for detecting android malicious applications: issues, taxonomy and directions
W Wang, M Zhao, Z Gao, G Xu, H Xian, Y Li, X Zhang
IEEE Access 7, 67602-67631, 2019
1102019
Autonomic intrusion detection: Adaptively detecting anomalies over unlabeled audit data streams in computer networks
W Wang, T Guyet, R Quiniou, MO Cordier, F Masseglia, X Zhang
Knowledge-Based Systems 70, 103-117, 2014
1102014
Threats, attacks and defenses to federated learning: issues, taxonomy and perspectives
P Liu, X Xu, W Wang
Cybersecurity 5 (1), 4, 2022
1032022
Characterizing Android apps’ behavior for effective detection of malapps at large scale
X Wang, W Wang, Y He, J Liu, Z Han, X Zhang
Future Generation Computer Systems 75, 30-45, 2017
932017
SCTSC: A semicentralized traffic signal control mode with attribute-based blockchain in iovs
L Cheng, J Liu, G Xu, Z Zhang, H Wang, HN Dai, Y Wu, W Wang
IEEE Transactions on Computational Social Systems 6 (6), 1373-1385, 2019
902019
The system can't perform the operation now. Try again later.
Articles 1–20