Changguang Wang
Orcid: 0000-0002-2054-9215
According to our database1,
Changguang Wang
authored at least 38 papers
between 2005 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Preserving Differential Privacy in Deep Learning Based on Feature Relevance Region Segmentation.
IEEE Trans. Emerg. Top. Comput., 2024
MalSort: Lightweight and efficient image-based malware classification using masked self-supervised framework with Swin Transformer.
J. Inf. Secur. Appl., 2024
2023
Proceedings of the Ubiquitous Security, 2023
Proceedings of the 22nd IEEE International Conference on Trust, 2023
A Multivariate Time Series Anomaly Detection Model Based on Spatio-Temporal Dual Features.
Proceedings of the International Conference on Networking and Network Applications, 2023
Efficient Black-Box Adversarial Attacks with Training Surrogate Models Towards Speaker Recognition Systems.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2023
An Android Malware Detection Method Based on Metapath Aggregated Graph Neural Network.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2023
2022
Symmetry, 2022
Int. J. Intell. Syst., 2022
Proceedings of the Algorithms and Architectures for Parallel Processing, 2022
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2022
2021
An Improved K -Means Clustering Intrusion Detection Algorithm for Wireless Networks Based on Federated Learning.
Wirel. Commun. Mob. Comput., 2021
Binary Black-Box Adversarial Attacks with Evolutionary Learning against IoT Malware Detection.
Wirel. Commun. Mob. Comput., 2021
A Novel Malware Detection and Family Classification Scheme for IoT Based on DEAM and DenseNet.
Secur. Commun. Networks, 2021
An internet of things malware classification method based on mixture of experts neural network.
Trans. Emerg. Telecommun. Technol., 2021
2020
Int. J. Netw. Secur., 2020
Non-pre-trained Mine Pedestrian Detection Based on Automatic Generation of Anchor Box.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2020
Proceedings of the International Conference on Networking and Network Applications, 2020
Proceedings of the Machine Learning for Cyber Security - Third International Conference, 2020
Proceedings of the Machine Learning for Cyber Security - Third International Conference, 2020
Class-unbalanced domain adaptation for object detection via dynamic weighting mechanism.
Proceedings of the 8th International Conference on 3D Vision, 2020
2019
Proceedings of the 2019 International Conference on Networking and Network Applications, 2019
2017
Int. J. Netw. Secur., 2017
2016
Analysis of SVEIR worm attack model with saturated incidence and partial immunization.
J. Commun. Inf. Networks, 2016
Int. J. Netw. Secur., 2016
Analysis of an SEIVR Epidemic Model with Partial Immunization and Nonlinear Infection Rate.
Proceedings of the International Conference on Networking and Network Applications, 2016
Proceedings of the International Conference on Networking and Network Applications, 2016
2015
Stability analysis of an <i>e</i>-<i>SEIAR</i> model with point-to-group worm propagation.
Commun. Nonlinear Sci. Numer. Simul., 2015
2013
Int. J. Netw. Secur., 2013
Energy-Balanced Separating Algorithm for Cluster-Based Data Aggregation in Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2013
2011
Proceedings of the Advances in Computer Science, 2011
2010
Comput. Secur., 2010
Proceedings of the IEEE International Conference on Wireless Communications, 2010
2009
Proceedings of the CSIE 2009, 2009 WRI World Congress on Computer Science and Information Engineering, March 31, 2009
Proceedings of the CSIE 2009, 2009 WRI World Congress on Computer Science and Information Engineering, March 31, 2009
Proceedings of the 2009 International Conference on Computational Intelligence and Security, 2009
2008
Proceedings of the International Conference on Computer Science and Software Engineering, 2008
2005
Proceedings of the Computational Intelligence and Security, International Conference, 2005