Shanshan Wang

Affiliations:
  • University of Jinan, Jinan, China


According to our database1, Shanshan Wang authored at least 30 papers between 2015 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
KGhish: A Phishing Website Detection Method Based on Knowledge Graph.
Proceedings of the Advanced Intelligent Computing Technology and Applications, 2024

Encrypted Malicious Traffic Detection Based on Graph Convolutional Network and Temporal Dissection.
Proceedings of the 27th International Conference on Computer Supported Cooperative Work in Design, 2024

2023
Safety or Not? A Comparative Study for Deep Learning Apps on Smartphones.
Proceedings of the 22nd IEEE International Conference on Trust, 2023

Low-Frequency Aware Unsupervised Detection of Dark Jargon Phrases on Social Platforms.
Proceedings of the PRICAI 2023: Trends in Artificial Intelligence, 2023

Exploring Wi-Fi Privacy Disclosure: A Novel Approach to User Identity Prediction Based on Traffic Multi-level Information.
Proceedings of the 29th IEEE International Conference on Parallel and Distributed Systems, 2023

Devils in the Clouds: An Evolutionary Study of Telnet Bot Loaders.
Proceedings of the IEEE International Conference on Communications, 2023

Adversarial Attack with Genetic Algorithm against IoT Malware Detectors.
Proceedings of the IEEE International Conference on Communications, 2023

Measurement of Illegal Android Gambling App Ecosystem From Joint Promotion Perspective.
Proceedings of the 10th IEEE International Conference on Data Science and Advanced Analytics, 2023

Decentralized Reinforced Anonymous FLchain: a Secure Federated Learning Architecture for the Medical Industry.
Proceedings of the 47th IEEE Annual Computers, Software, and Applications Conference, 2023

Overcoming Noisy Labels in Federated Learning Through Local Self-Guiding.
Proceedings of the 23rd IEEE/ACM International Symposium on Cluster, 2023

The Secondary Isolated Data Island: Isolated Data Island Caused by Blockchain in Federated Learning.
Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, 2023

CSLog: Anomaly Detection for Syslog Based on Contrastive Self-Supervised Representation Learning.
Proceedings of the 24st Asia-Pacific Network Operations and Management Symposium, 2023

2022
Mining Function Homology of Bot Loaders from Honeypot Logs.
CoRR, 2022

SFMD: A Semi-Supervised Federated Malicious Traffic Detection Approach in IoT.
Proceedings of the IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2022

Decision-based adversarial attack for speaker recognition models.
Proceedings of the 6th International Conference on Computer Science and Artificial Intelligence, 2022

2021
Chinese NER Using ALBERT and Multi-word Information.
Proceedings of the ACM TURC 2021: ACM Turing Award Celebration Conference - Hefei, China, 30 July 2021, 2021

2020
Deep and broad URL feature mining for android malware detection.
Inf. Sci., 2020

2019
A mobile malware detection method using behavior features in network traffic.
J. Netw. Comput. Appl., 2019

2018
Detecting Android Malware Leveraging Text Semantics of Network Flows.
IEEE Trans. Inf. Forensics Secur., 2018

Machine learning based mobile malware detection using highly imbalanced network traffic.
Inf. Sci., 2018

Lexical Mining of Malicious URLs for Classifying Android Malware.
Proceedings of the Security and Privacy in Communication Networks, 2018

Deep and Broad Learning Based Detection of Android Malware via Network Traffic.
Proceedings of the 26th IEEE/ACM International Symposium on Quality of Service, 2018

A Fast and Effective Detection of Mobile Malware Behavior Using Network Traffic.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018

MulAV: Multilevel and Explainable Detection of Android Malware with Data Fusion.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018

2017
TextDroid: Semantics-based detection of mobile malware using network flows.
Proceedings of the 2017 IEEE Conference on Computer Communications Workshops, 2017

Android Malware Clustering Analysis on Network-Level Behavior.
Proceedings of the Intelligent Computing Theories and Application, 2017

Finding Android Malware Trace from Highly Imbalanced Network Traffic.
Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering, 2017

2016
DroidCollector: A High Performance Framework for High Quality Android Traffic Collection.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

TrafficAV: An effective and explainable detection of mobile malware behavior using network traffic.
Proceedings of the 24th IEEE/ACM International Symposium on Quality of Service, 2016

2015
Android Malware Network Behavior Analysis at HTTP Protocol Packet Level.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015


  Loading...