Hui Wen

Orcid: 0000-0002-4904-5002

According to our database1, Hui Wen authored at least 61 papers between 2009 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
CapMax: A Framework for Dynamic Network Representation Learning From the View of Multiuser Communication.
IEEE Trans. Neural Networks Learn. Syst., April, 2024

The pricing strategies under the online platform selling mode with information sharing.
Kybernetes, 2024

Tactics, Techniques, and Procedures (TTPs) in Interpreted Malware: A Zero-Shot Generation with Large Language Models.
CoRR, 2024

TimeTravel: Real-time Timing Drift Attack on System Time Using Acoustic Waves.
CoRR, 2024

When LLMs Meet Cybersecurity: A Systematic Literature Review.
CoRR, 2024

NFCEraser: A Security Threat of NFC Message Modification Caused by Quartz Crystal Oscillator.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

2023
Communication-Efficient Federated Learning on Non-IID Data Using Two-Step Knowledge Distillation.
IEEE Internet Things J., October, 2023

Enimanal: Augmented cross-architecture IoT malware analysis using graph neural networks.
Comput. Secur., September, 2023

A multi-scale reconstruction method for the anomaly detection in stochastic dynamic networks.
Neurocomputing, 2023

Key Student Nodes Mining in the In-Class Social Network Based on Combined Weighted GRA-TOPSIS Method.
Int. J. Inf. Commun. Technol. Educ., 2023

HackMentor: Fine-Tuning Large Language Models for Cybersecurity.
Proceedings of the 22nd IEEE International Conference on Trust, 2023

Research and analysis of big data based on decision model.
Proceedings of the 2023 7th International Conference on Electronic Information Technology and Computer Engineering, 2023

MalAder: Decision-Based Black-Box Attack Against API Sequence Based Malware Detectors.
Proceedings of the 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Network, 2023

2022
ShadowPLCs: A Novel Scheme for Remote Detection of Industrial Process Control Attacks.
IEEE Trans. Dependable Secur. Comput., 2022

Transferring Inter-Class Correlation for Teacher-Student frameworks with flexible models.
Knowl. Based Syst., 2022

Optimal SVM learning method based on adaptive sparse sampling and granularity shift factor.
KSII Trans. Internet Inf. Syst., 2022

Data-driven generative design for mass customization: A case study.
Adv. Eng. Informatics, 2022

Communication-Efficient Federated Data Augmentation on Non-IID Data.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops, 2022

2021
Data Set and Evaluation of Automated Construction of Financial Knowledge Graph.
Data Intell., 2021

Firmware Re-hosting Through Static Binary-level Porting.
CoRR, 2021

HoneyVP: A Cost-Effective Hybrid Honeypot Architecture for Industrial Control Systems.
Proceedings of the ICC 2021, 2021

DSS: Discrepancy-Aware Seed Selection Method for ICS Protocol Fuzzing.
Proceedings of the Applied Cryptography and Network Security, 2021

2020
Managing new and remanufactured products with remanufacturing degree under patent protection.
Kybernetes, 2020

Transferring Inter-Class Correlation.
CoRR, 2020

H-VGRAE: A Hierarchical Stochastic Spatial-Temporal Embedding Method for Robust Anomaly Detection in Dynamic Networks.
CoRR, 2020

Decision-Making of Closed-Loop Supply Chain Strategic Alliance Considering the Quality Level of Remanufactured Products and Patent Protection.
Asia Pac. J. Oper. Res., 2020

Harmonic Analysis of Airgap Magnetic Fields in Doubly-Fed Flux Reversal Permanent Magnet Machines.
IEEE Access, 2020

Corrections to "CTU Layer Rate Control Algorithm in Scene Change Video for Free-Viewpoint Video".
IEEE Access, 2020

CTU Layer Rate Control Algorithm in Scene Change Video for Free-Viewpoint Video.
IEEE Access, 2020

Detecting Internet-Scale NATs for IoT Devices Based on Tri-Net.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2020

Malware Classification Using Attention-Based Transductive Learning Network.
Proceedings of the Security and Privacy in Communication Networks, 2020

U-ASG: A Universal Method to Perform Adversarial Attack on Autoencoder based Network Anomaly Detection Systems.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

A Unified Federated Learning Framework for Wireless Communications: towards Privacy, Efficiency, and Security.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

Research on a Digital Control of Inverter Power.
Proceedings of the 20th IEEE International Conference on Communication Technology, 2020

MSTNN: A Graph Learning Based Method for the Origin-Destination Traffic Prediction.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

Influence of Design Parameters on Output Torque of Novel Doubly-Fed Flux-Switching Permanent Magnet Machines.
Proceedings of the Fifteenth International Conference on Ecological Vehicles and Renewable Energies, 2020

2019
Applications of single-cell technology on bacterial analysis.
Quant. Biol., 2019

Lightweight IoT Malware Visualization Analysis via Two-Bits Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2019

Research on Radar Echo Signal Noise Processing and Adaptive RLS Noise Reduction Algorithm.
Proceedings of the 12th International Symposium on Computational Intelligence and Design, 2019

Side-Channel Information Leakage of Traffic Data in Instant Messaging.
Proceedings of the 38th IEEE International Performance Computing and Communications Conference, 2019

2018
Context-aware personalized path inference from large-scale GPS snippets.
Expert Syst. Appl., 2018

Analysis of time-frequency-space dispersion and nonstationarity in narrow-strip-shaped networks.
Proceedings of the 2018 IEEE Wireless Communications and Networking Conference, 2018

Security OSIF: Toward Automatic Discovery and Analysis of Event Based Cyber Threat Intelligence.
Proceedings of the 2018 IEEE SmartWorld, 2018

Mining Human Periodic Behaviors Using Mobility Intention and Relative Entropy.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2018

A graph neural network based efficient firmware information extraction method for IoT devices.
Proceedings of the 37th IEEE International Performance Computing and Communications Conference, 2018

2017
Road Traffic Anomaly Detection via Collaborative Path Inference from GPS Snippets.
Sensors, 2017

Hybrid Structure-Adaptive RBF-ELM Network Classifier.
IEEE Access, 2017

Mobility Intention-Based Relationship Inference from Spatiotemporal Data.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2017

Virtual SIMO Measurement-Based Angular Characterization in High-Speed Railway Scenarios.
Proceedings of the 85th IEEE Vehicular Technology Conference, 2017

Discovering Routers as Secondary Landmarks for Accurate IP Geolocation.
Proceedings of the 86th IEEE Vehicular Technology Conference, 2017

Joint RNN model for argument component boundary detection.
Proceedings of the 2017 IEEE International Conference on Systems, Man, and Cybernetics, 2017

Neural Architecture for Negative Opinion Expressions Extraction.
Proceedings of the Web and Big Data - First International Joint Conference, 2017

2016
An incremental learning algorithm for the hybrid RBF-BP network classifier.
EURASIP J. Adv. Signal Process., 2016

Tensor Filter: Collaborative Path Inference from GPS Snippets of Vehicles.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2016

2015
Abnormal event detection via adaptive cascade dictionary learning.
Proceedings of the 2015 IEEE International Conference on Image Processing, 2015

2014
Study of Cl<sup>-</sup>(H<sub>2</sub>O)<sub><i>n</i></sub> (<i>n</i> = 1-4) using basin-hopping method coupled with density functional theory.
J. Comput. Chem., 2014

Poster: Crowdsourcing for video traffic surveillance.
Proceedings of the 12th Annual International Conference on Mobile Systems, 2014

Eye localization based on correlation filter bank.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2014

2012
Analysis and Design of Internet Monitoring System on Public Opinion Based on Cloud Computing and NLP.
Proceedings of the Web Information Systems and Mining - International Conference, 2012

2010
Adaptive Fuzzy Control of Nonlinear Systems in Pure Feedback Form Based on Input-to-State Stability.
IEEE Trans. Fuzzy Syst., 2010

2009
A P2P Service Management Model for Emergency Response Using Virtual Service Pool.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2009


  Loading...