He Wang

Affiliations:
  • Xidian University, School of Cyber Engineering, Xian, China (PhD 2016)


According to our database1, He Wang authored at least 18 papers between 2016 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Catch the Butterfly: Peeking into the Terms and Conflicts Among SPDX Licenses.
Proceedings of the IEEE International Conference on Software Analysis, 2024

Research on SSL/TLS Security Differences Based on RFC Documents.
Proceedings of the International Conference on Computing, Networking and Communications, 2024

Prompt Fix: Vulnerability Automatic Repair Technology Based on Prompt Engineering.
Proceedings of the International Conference on Computing, Networking and Communications, 2024

NMT vs MLM: Which is the Best Paradigm for APR?
Proceedings of the IEEE Congress on Evolutionary Computation, 2024

2023
Inconsistent measurement and incorrect detection of software names in security vulnerability reports.
Comput. Secur., December, 2023

FISHFUZZ: Catch Deeper Bugs by Throwing Larger Nets.
Proceedings of the 32nd USENIX Security Symposium, 2023

2022
FishFuzz: Throwing Larger Nets to Catch Deeper Bugs.
CoRR, 2022

A traffic anomaly detection scheme for non-directional denial of service attacks in software-defined optical network.
Comput. Secur., 2022

2021
Survey of 3D Printer Security Offensive and Defensive.
Proceedings of the Frontiers in Cyber Security - 4th International Conference, 2021

A Review of Data Representation Methods for Vulnerability Mining Using Deep Learning.
Proceedings of the Frontiers in Cyber Security - 4th International Conference, 2021

Sensitive Instruction Detection Based on the Context of IoT Sensors.
Proceedings of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2021

2020
Secure IoT Data Outsourcing With Aggregate Statistics and Fine-Grained Access Control.
IEEE Access, 2020

An Improved Shapley Value Benefit Distribution Mechanism in Cooperative Game of Cyber Threat Intelligence Sharing.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

Efficient Vulnerability Detection based on abstract syntax tree and Deep Learning.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

2019
FIoT: Detecting the Memory Corruption in Lightweight IoT Device Firmware.
Proceedings of the 18th IEEE International Conference On Trust, 2019

A Blackboard Sharing Mechanism for Community Cyber Threat Intelligence Based on Multi-Agent System.
Proceedings of the Machine Learning for Cyber Security - Second International Conference, 2019

2018
Real-time Detection of Passive Backdoor Behaviors on Android System.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

2016
Efficient quantum dialogue using entangled states and entanglement swapping without information leakage.
Quantum Inf. Process., 2016


  Loading...