Sheng Wen

Orcid: 0000-0003-0655-666X

According to our database1, Sheng Wen authored at least 166 papers between 2010 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A Survey of Ethereum Smart Contract Security: Attacks and Detection.
Distributed Ledger Technol. Res. Pract., September, 2024

Federated Learning in Industrial IoT: A Privacy-Preserving Solution That Enables Sharing of Data in Hydrocarbon Explorations.
IEEE Trans. Ind. Informatics, March, 2024

Fuzzing Android Native System Libraries via Dynamic Data Dependency Graph.
IEEE Trans. Inf. Forensics Secur., 2024

Demystifying the Evolution of Android Malware Variants.
IEEE Trans. Dependable Secur. Comput., 2024

LocGuard: A Location Privacy Defender for Image Sharing.
IEEE Trans. Dependable Secur. Comput., 2024

The "Code" of Ethics: A Holistic Audit of AI Code Generators.
IEEE Trans. Dependable Secur. Comput., 2024

Online Social Network User Home Location Inference Based on Heterogeneous Networks.
IEEE Trans. Dependable Secur. Comput., 2024

Query-Efficient Video Adversarial Attack with Stylized Logo.
CoRR, 2024

Rethinking the Threat and Accessibility of Adversarial Attacks against Face Recognition Systems.
CoRR, 2024

AI Agents Under Threat: A Survey of Key Security Challenges and Future Pathways.
CoRR, 2024

Leakage-Resilient and Carbon-Neutral Aggregation Featuring the Federated AI-enabled Critical Infrastructure.
CoRR, 2024

How COVID-19 impacts telehealth: an empirical study of telehealth services, users and the use of metaverse.
Connect. Sci., 2024

Extraction of crop canopy features and decision-making for variable spraying based on unmanned aerial vehicle LiDAR data.
Comput. Electron. Agric., 2024

ShapFuzz: Efficient Fuzzing via Shapley-Guided Byte Selection.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024

A Helical Bistable Soft Gripper Enable by Pneumatic Actuation.
Proceedings of the IEEE International Conference on Robotics and Automation, 2024

Radar sequence HRRP target recognition based on DRSN-LSTM.
Proceedings of the 2024 8th International Conference on Control Engineering and Artificial Intelligence, 2024

2023
Origami-Based Decoupling Clutch Achieves Energy-Efficient Legged Robots.
IEEE Robotics Autom. Lett., December, 2023

Real-Time Detection of COVID-19 Events From Twitter: A Spatial-Temporally Bursty-Aware Method.
IEEE Trans. Comput. Soc. Syst., April, 2023

Personalized Location Privacy Protection for Location-Based Services in Vehicular Networks.
IEEE Trans. Intell. Transp. Syst., January, 2023

SAM: Multi-turn Response Selection Based on Semantic Awareness Matching.
ACM Trans. Internet Techn., 2023

How Does Visualisation Help App Practitioners Analyse Android Apps?
IEEE Trans. Dependable Secur. Comput., 2023

Space-Efficient Storage Structure of Blockchain Transactions Supporting Secure Verification.
IEEE Trans. Cloud Comput., 2023

Detecting Vulnerability on IoT Device Firmware: A Survey.
IEEE CAA J. Autom. Sinica, 2023

Capturing Dynamics of Information Diffusion in SNS: A Survey of Methodology and Techniques.
ACM Comput. Surv., 2023

On the security of fully homomorphic encryption for data privacy in Internet of Things.
Concurr. Comput. Pract. Exp., 2023

Dynalogue: A Transformer-Based Dialogue System with Dynamic Attention.
Proceedings of the ACM Web Conference 2023, 2023

Detecting Union Type Confusion in Component Object Model.
Proceedings of the 32nd USENIX Security Symposium, 2023

StyleFool: Fooling Video Classification Systems via Style Transfer.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

The "Beatrix" Resurrections: Robust Backdoor Detection via Gram Matrices.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023

2022
Explainable machine learning in cybersecurity: A survey.
Int. J. Intell. Syst., December, 2022

Fuzzing: A Survey for Roadmap.
ACM Comput. Surv., January, 2022

Addictive Incentive Mechanism in Crowdsensing From the Perspective of Behavioral Economics.
IEEE Trans. Parallel Distributed Syst., 2022

Analysis of Trending Topics and Text-based Channels of Information Delivery in Cybersecurity.
ACM Trans. Internet Techn., 2022

On the Neural Backdoor of Federated Generative Models in Edge Computing.
ACM Trans. Internet Techn., 2022

Vulnerability Detection in SIoT Applications: A Fuzzing Method on their Binaries.
IEEE Trans. Netw. Sci. Eng., 2022

Social Media Event Prediction using DNN with Feedback Mechanism.
ACM Trans. Manag. Inf. Syst., 2022

Origami Improved Dielectric Elastomer Actuation for Tunable Lens.
IEEE Trans. Instrum. Meas., 2022

Missing Value Filling Based on the Collaboration of Cloud and Edge in Artificial Intelligence of Things.
IEEE Trans. Ind. Informatics, 2022

CSI-Fuzz: Full-Speed Edge Tracing Using Coverage Sensitive Instrumentation.
IEEE Trans. Dependable Secur. Comput., 2022

Defending Against Adversarial Attack Towards Deep Neural Networks Via Collaborative Multi-Task Training.
IEEE Trans. Dependable Secur. Comput., 2022

Backdoor Attack on Machine Learning Based Android Malware Detectors.
IEEE Trans. Dependable Secur. Comput., 2022

Daedalus: Breaking Nonmaximum Suppression in Object Detection via Adversarial Examples.
IEEE Trans. Cybern., 2022

Spring-linkage integrated mechanism design for jumping robots.
Robotics Auton. Syst., 2022

Magnetorheological Fluid-Based Bending Actuator for Magnetic Sensing.
IEEE Robotics Autom. Lett., 2022

Deep Learning Based Attack Detection for Cyber-Physical System Cybersecurity: A Survey.
IEEE CAA J. Autom. Sinica, 2022

Event detection in online social network: Methodologies, state-of-art, and evolution.
Comput. Sci. Rev., 2022

Static Detection of File Access Control Vulnerabilities on Windows System.
Concurr. Comput. Pract. Exp., 2022

A Comparative Study on the Security of Cryptocurrency Wallets in Android System.
Proceedings of the IEEE International Conference on Trust, 2022

Cross-language Android permission specification.
Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2022

Supporting Cyber-Attacks and System Anomaly Detection Research with an Industry 4.0 Dataset.
Proceedings of the Network and System Security - 16th International Conference, 2022

Path Transitions Tell More: Optimizing Fuzzing Schedules via Runtime Program States.
Proceedings of the 44th IEEE/ACM 44th International Conference on Software Engineering, 2022

Study Cybersecurity of Cyber Physical System in the Virtual Environment: A Survey and New Direction.
Proceedings of the ACSW 2022: Australasian Computer Science Week 2022, Brisbane, Australia, February 14, 2022

2021
On the Security of Networked Control Systems in Smart Vehicle and Its Adaptive Cruise Control.
IEEE Trans. Intell. Transp. Syst., 2021

Smart Design of Z-Width Expanded Thumb Haptic Interface Using Magnetorheological Fluids.
IEEE Trans. Instrum. Meas., 2021

Synthesized Corpora to Evaluate Fuzzing for Green Internet of Things Programs.
IEEE Trans. Green Commun. Netw., 2021

Man-in-the-Middle Attacks Against Machine Learning Classifiers Via Malicious Generative Models.
IEEE Trans. Dependable Secur. Comput., 2021

NatiDroid: Cross-Language Android Permission Specification.
CoRR, 2021

Fuzzing With Optimized Grammar-Aware Mutation Strategies.
IEEE Access, 2021

AC2M: An Automated Consent Management Model for Blockchain Financial Services Platform.
Proceedings of the IEEE International Conference on Smart Data Services, 2021

Message from the GreenCom 2021 General Chairs and Program Chairs: iThings-GreenCom-CPSCom-SmartData-Cybermatics 2021.
Proceedings of the 2021 IEEE International Conferences on Internet of Things (iThings) and IEEE Green Computing & Communications (GreenCom) and IEEE Cyber, 2021

Characterizing Sensor Leaks in Android Apps.
Proceedings of the 32nd IEEE International Symposium on Software Reliability Engineering, 2021

Snipuzz: Black-box Fuzzing of IoT Firmware via Message Snippet Inference.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

IB2P: An image-based privacy-preserving blockchain model for financial services.
Proceedings of the 2021 IEEE International Conference on Blockchain, 2021

Evaluating Upgradable Smart Contract.
Proceedings of the 2021 IEEE International Conference on Blockchain, 2021

2020
Android HIV: A Study of Repackaging Malware for Evading Machine-Learning Detection.
IEEE Trans. Inf. Forensics Secur., 2020

DeepBalance: Deep-Learning and Fuzzy Oversampling for Vulnerability Detection.
IEEE Trans. Fuzzy Syst., 2020

Software Vulnerability Detection Using Deep Neural Networks: A Survey.
Proc. IEEE, 2020

DeFuzz: Deep Learning Guided Directed Fuzzing.
CoRR, 2020

Network Topology Inference Using Higher-Order Statistical Characteristics of End-to-End Measured Delays.
IEEE Access, 2020

BHDA - A Blockchain-Based Hierarchical Data Access Model for Financial Services.
Proceedings of the 19th IEEE International Conference on Trust, 2020

SpeedNeuzz: Speed Up Neural Program Approximation with Neighbor Edge Knowledge.
Proceedings of the 19th IEEE International Conference on Trust, 2020

Evil Chaincode: APT Attacks Based on Smart Contract.
Proceedings of the Frontiers in Cyber Security - Third International Conference, 2020

What risk? I don't understand. An Empirical Study on Users' Understanding of the Terms Used in Security Texts.
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020

PPM: A Provenance-Provided Data Sharing Model for Open Banking via Blockchain.
Proceedings of the Australasian Computer Science Week, 2020

2019
Malicious Attack Propagation and Source Identification
Advances in Information Security 73, Springer, ISBN: 978-3-030-02178-8, 2019

STC: Exposing Hidden Compromised Devices in Networked Sustainable Green Smart Computing Platforms by Partial Observation.
IEEE Trans. Sustain. Comput., 2019

SADI: A Novel Model to Study the Propagation of Social Worms in Hierarchical Networks.
IEEE Trans. Dependable Secur. Comput., 2019

Catering to Your Concerns: Automatic Generation of Personalised Security-Centric Descriptions for Android Apps.
ACM Trans. Cyber Phys. Syst., 2019

Design of Plant Protection UAV Variable Spray System Based on Neural Networks.
Sensors, 2019

Publicly verifiable database scheme with efficient keyword search.
Inf. Sci., 2019

Crowdsensing From the Perspective of Behavioral Economics: An Incentive Mechanism Based on Mental Accounting.
IEEE Internet Things J., 2019

Edge-based stochastic network model reveals structural complexity of edges.
Future Gener. Comput. Syst., 2019

An Overview of Attacks and Defences on Intelligent Connected Vehicles.
CoRR, 2019

Bug Searching in Smart Contract.
CoRR, 2019

Daedalus: Breaking Non-Maximum Suppression in Object Detection via Adversarial Examples.
CoRR, 2019

Forward to the special issue of the 9th International Symposium on Cyberspace Safety and Security (CSS 2017).
Concurr. Comput. Pract. Exp., 2019

Every word is valuable: Studied influence of negative words that spread during election period in social media.
Concurr. Comput. Pract. Exp., 2019

Single-rotor UAV flow field simulation using generative adversarial networks.
Comput. Electron. Agric., 2019

Numerical analysis and validation of spray distributions disturbed by quad-rotor drone wake at different flight speeds.
Comput. Electron. Agric., 2019

A Survey of Fog Computing in Wireless Sensor Networks: Concepts, Frameworks, Applications and Issues.
Ad Hoc Sens. Wirel. Networks, 2019

Using AI to Attack VA: A Stealthy Spyware Against Voice Assistances in Smart Phones.
IEEE Access, 2019

Faces are Protected as Privacy: An Automatic Tagging Framework Against Unpermitted Photo Sharing in Social Media.
IEEE Access, 2019

Who Activated My Voice Assistant? A Stealthy Attack on Android Phones Without Users' Awareness.
Proceedings of the Machine Learning for Cyber Security - Second International Conference, 2019

RBAC-GL: A Role-Based Access Control Gasless Architecture of Consortium Blockchain.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2019

Main Enabling Technologies in Industry 4.0 and Cybersecurity Threats.
Proceedings of the Cyberspace Safety and Security - 11th International Symposium, 2019

A Feature-Oriented Corpus for Understanding, Evaluating and Improving Fuzz Testing.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019

An Efficient Supply Chain Architecture Based on Blockchain for High-value Commodities.
Proceedings of the 2019 ACM International Symposium on Blockchain and Secure Critical Infrastructure, 2019

Session details: Keynote & Invited Talks.
Proceedings of the 2019 ACM International Symposium on Blockchain and Secure Critical Infrastructure, 2019

2018
Malware Propagations in Wireless Ad Hoc Networks.
IEEE Trans. Dependable Secur. Comput., 2018

Rumor Source Identification in Social Networks with Time-Varying Topology.
IEEE Trans. Dependable Secur. Comput., 2018

Intersection Traffic Prediction Using Decision Tree Models.
Symmetry, 2018

A Semantic Labeling Approach for Accurate Weed Mapping of High Resolution UAV Imagery.
Sensors, 2018

Accurate Weed Mapping and Prescription Map Generation Based on Fully Convolutional Networks Using UAV Imagery.
Sensors, 2018

Pokémon GO in Melbourne CBD: A case study of the cyber-physical symbiotic social networks.
J. Comput. Sci., 2018

<i>TouchWB</i>: Touch behavioral user authentication based on web browsing on smartphones.
J. Netw. Comput. Appl., 2018

Secure fine-grained spatio-temporal Top-k queries in TMWSNs.
Future Gener. Comput. Syst., 2018

Catering to Your Concerns: Automatic Generation of Personalised Security-Centric Descriptions for Android Apps.
CoRR, 2018

Using AI to Hack IA: A New Stealthy Spyware Against Voice Assistance Functions in Smart Phones.
CoRR, 2018

Defensive Collaborative Multi-task Training - Defending against Adversarial Attack towards Deep Neural Networks.
CoRR, 2018

Twitter spam detection: Survey of new approaches and comparative study.
Comput. Secur., 2018

Traffic Flow Prediction for Road Intersection Safety.
Proceedings of the 2018 IEEE SmartWorld, 2018

Hiding RFID in the Image Matching Based Access Control to a Smart Building.
Proceedings of the 2018 IEEE SmartWorld, 2018

Checking an Authentication of Person Depends on RFID with Thermal Image.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2018

Secure and Privacy Preserving RFID Based Access Control to Smart Buildings.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2018

SCARA: A Framework for Secure Cloud-Assisted RFID Authentication for Smart Building Access Control.
Proceedings of the Network and System Security - 12th International Conference, 2018

Who Spread to Whom? Inferring Online Social Networks with User Features.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

2017
Propagation Modeling and Defending of a Mobile Sensor Worm in Wireless Sensor and Actuator Networks.
Sensors, 2017

Using epidemic betweenness to measure the influence of users in complex networks.
J. Netw. Comput. Appl., 2017

Traceable Threshold Proxy Signature.
J. Inf. Sci. Eng., 2017

Reliable wireless connections for fast-moving rail users based on a chained fog structure.
Inf. Sci., 2017

Bandwidth-aware energy efficient flow scheduling with SDN in data center networks.
Future Gener. Comput. Syst., 2017

Investigating the deceptive information in Twitter spam.
Future Gener. Comput. Syst., 2017

Detecting spamming activities in twitter based on deep-learning technique.
Concurr. Comput. Pract. Exp., 2017

The structure of communities in scale-free networks.
Concurr. Comput. Pract. Exp., 2017

Identifying Propagation Sources in Networks: State-of-the-Art and Comparative Studies.
IEEE Commun. Surv. Tutorials, 2017

The Chaotic Video Surveillance in Mobile Camera Sensor Networks: Improving the Efficiency and Security.
Ad Hoc Sens. Wirel. Networks, 2017

Efficient and secure attribute-based signature for monotone predicates.
Acta Informatica, 2017

My Face is Mine: Fighting Unpermitted Tagging on Personal/Group Photos in Social Media.
Proceedings of the Web Information Systems Engineering - WISE 2017, 2017

On-Street Car Parking Prediction in Smart City: A Multi-source Data Analysis in Sensor-Cloud Environment.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017

How Spam Features Change in Twitter and the Impact to Machine Learning Based Detection.
Proceedings of the Information Security Practice and Experience, 2017

Catch Me If You Can: Detecting Compromised Users Through Partial Observation on Networks.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

2016
Following Targets for Mobile Tracking in Wireless Sensor Networks.
ACM Trans. Sens. Networks, 2016

On the Race of Worms and Patches: Modeling the Spread of Information in Wireless Sensor Networks.
IEEE Trans. Inf. Forensics Secur., 2016

Piezoelectric Wind Energy Harvesting from Self-Excited Vibration of Square Cylinder.
J. Sensors, 2016

Traceable Identity-Based Group Signature.
RAIRO Theor. Informatics Appl., 2016

An overview of Fog computing and its security issues.
Concurr. Comput. Pract. Exp., 2016

Analysis of the Spreading Influence Variations for Online Social Users under Attacks.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

2015
K-Center: An Approach on the Multi-Source Identification of Information Diffusion.
IEEE Trans. Inf. Forensics Secur., 2015

A Sword with Two Edges: Propagation Studies on Both Positive and Negative Information in Online Social Networks.
IEEE Trans. Computers, 2015

Detecting stepping stones by abnormal causality probability.
Secur. Commun. Networks, 2015

Maximizing real-time streaming services based on a multi-servers networking framework.
Comput. Networks, 2015

Mobility Increases the Risk of Malware Propagations in Wireless Networks.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

Identifying Diffusion Sources in Large Networks: A Community Structure Based Approach.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

The Relation Between Local and Global Influence of Individuals in Scale-Free Networks.
Proceedings of the International Symposium on Security and Privacy in Social Networks and Big Data, 2015

First-Priority Relation Graph-Based Malicious Users Detection in Mobile Social Networks.
Proceedings of the Network and System Security - 9th International Conference, 2015

2014
To Shut Them Up or to Clarify: Restraining the Spread of Rumors in Online Social Networks.
IEEE Trans. Parallel Distributed Syst., 2014

Modeling and Analysis on the Propagation Dynamics of Modern Email Malware.
IEEE Trans. Dependable Secur. Comput., 2014

Are the popular users always important for information dissemination in online social networks?
IEEE Netw., 2014

Detection and defense of application-layer DDoS attacks in backbone web traffic.
Future Gener. Comput. Syst., 2014

Modeling the Propagation of Worms in Networks: A Survey.
IEEE Commun. Surv. Tutorials, 2014

Finite Element Study on the Cylindrical Linear Piezoelectric Motor Micro Driven.
Proceedings of the Intelligent Robotics and Applications - 7th International Conference, 2014

FEM Analysis and Parameter Optimization of a Linear Piezoelectric Motor Macro Driven.
Proceedings of the Intelligent Robotics and Applications - 7th International Conference, 2014

Cymbal Piezoelectric Micro Displacement Actuator Characteristics Analysis.
Proceedings of the Intelligent Robotics and Applications - 7th International Conference, 2014

The Fog Computing Paradigm: Scenarios and Security Issues.
Proceedings of the 2014 Federated Conference on Computer Science and Information Systems, 2014

2013
Modeling Propagation Dynamics of Social Network Worms.
IEEE Trans. Parallel Distributed Syst., 2013

Modeling and Analysis for Thwarting Worm Propagation in Email Networks.
Proceedings of the Network and System Security - 7th International Conference, 2013

Detecting Stepping Stones by Abnormal Causality Probability.
Proceedings of the Cyberspace Safety and Security - 5th International Symposium, 2013

2012
Locating Defense Positions for Thwarting the Propagation of Topological Worms.
IEEE Commun. Lett., 2012

CAFS: a novel lightweight cache-based scheme for large-scale intrusion alert fusion.
Concurr. Comput. Pract. Exp., 2012

An Analytical Model on the Propagation of Modern Email Worms.
Proceedings of the 11th IEEE International Conference on Trust, 2012

2011
Eliminating Errors in Worm Propagation Models.
IEEE Commun. Lett., 2011

The Microcosmic Model of Worm Propagation.
Comput. J., 2011

Modeling worms propagation on probability.
Proceedings of the 5th International Conference on Network and System Security, 2011

The Probability Model of Peer-to-Peer Botnet Propagation.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2011

2010
CALD: Surviving Various Application-Layer DDoS Attacks That Mimic Flash Crowd.
Proceedings of the Fourth International Conference on Network and System Security, 2010

A Lightweight Intrusion Alert Fusion System.
Proceedings of the 12th IEEE International Conference on High Performance Computing and Communications, 2010


  Loading...