Obserwuj
Wei Wang
Wei Wang
Zweryfikowany adres z bjtu.edu.cn - Strona główna
Tytuł
Cytowane przez
Cytowane przez
Rok
CreditCoin: A Privacy-Preserving Blockchain-Based Incentive Announcement Network for Communications of Smart Vehicles
L Li, J Liu, L Cheng, S Qiu, W Wang, X Zhang, Z Zhang
IEEE Transactions on Intelligent Transportation Systems, 2018
3852018
Exploring permission-induced risk in Android applications for malicious application detection
W Wang, X Wang, D Feng, J Liu, Z Han, X Zhang
IEEE Transactions on Information Forensics and Security 9 (11), 1869-1882, 2014
3102014
Detecting Android malicious apps and categorizing benign apps with ensemble of classifiers
W Wang, Y Li, X Wang, J Liu, X Zhang
Future Generation Computer Systems 78, 987-994, 2018
1982018
Effective android malware detection with a hybrid model based on deep autoencoder and convolutional neural network
W Wang, M Zhao, J Wang
Journal of Ambient Intelligence and Humanized Computing 10 (8), 3035-3043, 2019
1882019
An out-of-band authentication scheme for internet of things using blockchain technology
L Wu, X Du, W Wang, B Lin
2018 International Conference on Computing, Networking and Communications …, 2018
1402018
Identifying intrusions in computer networks with principal component analysis
W Wang, R Battiti
First International Conference on Availability, Reliability and Security …, 2006
1352006
Processing of massive audit data streams for real-time anomaly intrusion detection
W Wang, X Guan, X Zhang
Computer Communications 31 (1), 58-72, 2008
1202008
Attribute normalization in network intrusion detection
W Wang, X Zhang, S Gombault, SJ Knapskog
2009 10th International Symposium on Pervasive Systems, Algorithms, and …, 2009
1122009
Profiling program behavior for anomaly intrusion detection based on the transition and frequency property of computer audit data
W Wang, X Guan, X Zhang, L Yang
computers & security 25 (7), 539-550, 2006
1092006
BotMark: Automated botnet detection with hybrid analysis of flow-based and graph-based traffic behaviors
W Wang, Y Shang, Y He, Y Li, J Liu
Information Sciences 511, 284-296, 2020
1082020
Autonomic intrusion detection: Adaptively detecting anomalies over unlabeled audit data streams in computer networks
W Wang, T Guyet, R Quiniou, MO Cordier, F Masseglia, X Zhang
Knowledge-Based Systems 70, 103-117, 2014
1042014
DAPASA: detecting android piggybacked apps through sensitive subgraph analysis
M Fan, J Liu, W Wang, H Li, Z Tian, T Liu
IEEE Transactions on Information Forensics and Security 12 (8), 1772-1785, 2017
1012017
Modeling program behaviors by hidden Markov models for intrusion detection
W Wang, XH Guan, XL Zhang
Proceedings of 2004 International Conference on Machine Learning and …, 2004
882004
A novel intrusion detection method based on principle component analysis in computer security
W Wang, X Guan, X Zhang
International Symposium on Neural Networks, 657-662, 2004
872004
DroidEnsemble: Detecting Android malicious applications with ensemble of string and structural static features
W Wang, Z Gao, M Zhao, Y Li, J Liu, X Zhang
IEEE Access 6, 31798-31807, 2018
802018
Privacy risk analysis and mitigation of analytics libraries in the android ecosystem
X Liu, J Liu, S Zhu, W Wang, X Zhang
IEEE Transactions on Mobile Computing 19 (5), 1184-1199, 2019
762019
K-AP: generating specified K clusters by efficient affinity propagation
X Zhang, W Wang, K Nørvåg, M Sebag
2010 IEEE International Conference on Data Mining, 1187-1192, 2010
752010
Characterizing Android apps’ behavior for effective detection of malapps at large scale
X Wang, W Wang, Y He, J Liu, Z Han, X Zhang
Future Generation Computer Systems 75, 30-45, 2017
732017
Constructing features for detecting android malicious applications: issues, taxonomy and directions
W Wang, M Zhao, Z Gao, G Xu, H Xian, Y Li, X Zhang
IEEE Access 7, 67602-67631, 2019
692019
Abstracting massive data for lightweight intrusion detection in computer networks
W Wang, J Liu, G Pitsilis, X Zhang
Information Sciences 433, 417-430, 2018
662018
Nie można teraz wykonać tej operacji. Spróbuj ponownie później.
Prace 1–20