2024
Collusive attack that exploits biometric similarity difference and basic countermeasures.
Wirel. Networks, July, 2024
2022
Continuous Authentication against Collusion Attacks.
Sensors, 2022
2021
Recommendation with Diversity: Mass Diffusion Model Based on Trust Network and Object Reputation.
Mob. Inf. Syst., 2021
Active Attack that Exploits Biometric Similarity Difference and Basic Countermeasures.
Proceedings of the Ad Hoc Networks and Tools for IT - 13th EAI International Conference, 2021
2020
Your Eyes Reveal Your Secrets: An Eye Movement Based Password Inference on Smartphone.
IEEE Trans. Mob. Comput., 2020
Trust circle recommended model based on different fields.
Int. J. Inf. Commun. Technol., 2020
2019
Secure Your Voice: An Oral Airflow-Based Continuous Liveness Detection for Voice Assistants.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2019
2018
A Combined Static and Dynamic Analysis Approach to Detect Malicious Browser Extensions.
Secur. Commun. Networks, 2018
GazeRevealer: Inferring Password Using Smartphone Front Camera.
Proceedings of the 15th EAI International Conference on Mobile and Ubiquitous Systems: Computing, 2018
2017
Modeling of large-scale social network services based on mechanisms of information diffusion: Sina Weibo as a case study.
Future Gener. Comput. Syst., 2017
High-performance social networking: microblog community detection based on efficient interactive characteristic clustering.
Clust. Comput., 2017
2016
The study of the dynamic model on KAD network information spreading.
Telecommun. Syst., 2016
A deep learning approach for detecting malicious JavaScript code.
Secur. Commun. Networks, 2016
Forums-Oriented Research on the Spreading and Inhibition of Rumors.
Int. J. Found. Comput. Sci., 2016
Uncovering and Characterizing Internet Water Army in Online Forums.
Proceedings of the IEEE First International Conference on Data Science in Cyberspace, 2016
2015
A sequential game-theoretic study of the retweeting behavior in Sina Weibo.
J. Supercomput., 2015
On Burst Detection and Prediction in Retweeting Sequence.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2015
Detection and Analysis of Water Army Groups on Virtual Community.
Proceedings of the Computer Engineering and Technology - 19th CCF Conference, 2015
2014
Forum-Oriented Research on Water Army Detection for Bursty Topics.
Proceedings of the 9th IEEE International Conference on Networking, 2014
Analysis of the retweetting behavior of Weibo users based on game theory.
Proceedings of the 2014 5th International Conference on Game Theory for Networks, 2014
2013
Statistical analysis technique on Ad Hoc network topology dynamic characteristics: Markov stochastic process.
Telecommun. Syst., 2013
Empirical Analysis of Human Behavior Patterns in BBS.
Proceedings of the Computer Engineering and Technology - 17th CCF Conference, 2013
2012
Examining Multi-factor Interactions in Microblogging Based on Log-linear Modeling.
Proceedings of the International Conference on Advances in Social Networks Analysis and Mining, 2012
2011
The correlation between social tie and reciprocity in social media.
Proceedings of the International Conference on Electronic and Mechanical Engineering and Information Technology, 2011
2010
Ad Hoc Network Measurement Based on Network Tomography: Theory, Technique, and Application.
J. Networks, 2010
Routing Topology Identification Based on Multiple Sources End-to-End Measurements.
Proceedings of the 2010 Asia-Pacific Conference on Wearable Computing Systems, 2010
2009
Interior Link Delay Reference of Ad Hoc Networks Based on End-to-End Measurement: Linear Analysis Model of Delay.
J. Networks, 2009
A Simple Graph-structure Network Tomography Topology Identification Method.
Proceedings of the First IITA International Joint Conference on Artificial Intelligence, 2009
Link Delay Estimation in Network with Stochastic Routing.
Proceedings of the CSIE 2009, 2009 WRI World Congress on Computer Science and Information Engineering, March 31, 2009
2008
Research on the Model of Multiple Levels for Determining Sentiment of Text.
Proceedings of the PACIIA 2008, 2008
Adaptive Safety Critical Middleware for Distributed and Embedded Safety Critical System.
Proceedings of the NCM 2008, The Fourth International Conference on Networked Computing and Advanced Information Management, Gyeongju, Korea, September 2-4, 2008, 2008
Topology variety model for mobile ad hoc networks.
Proceedings of the 1st International Conference on MOBILe Wireless MiddleWARE, 2008
A Holonic Model in Wireless Sensor Networks.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008
Location Scheme in Wireless Sensor Networks.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008
A RIO Approach for Modeling Wireless Sensor Network.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008
2007
Survivable Embedded Mission-Critical Network Base on Fibre Channel.
Proceedings of the 2007 International Conference on Parallel Processing Workshops (ICPP Workshops 2007), 2007
An Efficient Threshold Multi-group-Secret Sharing Scheme.
Proceedings of the Fuzzy Information and Engineering, 2007
Loss Tomography in Wireless Sensor Network Using Gibbs Sampling.
Proceedings of the Wireless Sensor Networks, 2007
MPIDA: A Sensor Network Topology Inference Algorithm.
Proceedings of the Computational Intelligence and Security, International Conference, 2007
2006
Lossy Node Identification in Wireless Sensor Network.
Proceedings of the Fifth IEEE International Symposium on Network Computing and Applications, 2006
2005
Study on Security iSCSI Based on SSH.
Proceedings of the Computational Intelligence and Security, International Conference, 2005