Wandong Cai

According to our database1, Wandong Cai authored at least 41 papers between 2005 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Collusive attack that exploits biometric similarity difference and basic countermeasures.
Wirel. Networks, July, 2024

2022
Continuous Authentication against Collusion Attacks.
Sensors, 2022

2021
Recommendation with Diversity: Mass Diffusion Model Based on Trust Network and Object Reputation.
Mob. Inf. Syst., 2021

Active Attack that Exploits Biometric Similarity Difference and Basic Countermeasures.
Proceedings of the Ad Hoc Networks and Tools for IT - 13th EAI International Conference, 2021

2020
Your Eyes Reveal Your Secrets: An Eye Movement Based Password Inference on Smartphone.
IEEE Trans. Mob. Comput., 2020

Trust circle recommended model based on different fields.
Int. J. Inf. Commun. Technol., 2020

2019
Secure Your Voice: An Oral Airflow-Based Continuous Liveness Detection for Voice Assistants.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2019

2018
A Combined Static and Dynamic Analysis Approach to Detect Malicious Browser Extensions.
Secur. Commun. Networks, 2018

GazeRevealer: Inferring Password Using Smartphone Front Camera.
Proceedings of the 15th EAI International Conference on Mobile and Ubiquitous Systems: Computing, 2018

2017
Modeling of large-scale social network services based on mechanisms of information diffusion: Sina Weibo as a case study.
Future Gener. Comput. Syst., 2017

High-performance social networking: microblog community detection based on efficient interactive characteristic clustering.
Clust. Comput., 2017

2016
The study of the dynamic model on KAD network information spreading.
Telecommun. Syst., 2016

A deep learning approach for detecting malicious JavaScript code.
Secur. Commun. Networks, 2016

Forums-Oriented Research on the Spreading and Inhibition of Rumors.
Int. J. Found. Comput. Sci., 2016

Uncovering and Characterizing Internet Water Army in Online Forums.
Proceedings of the IEEE First International Conference on Data Science in Cyberspace, 2016

2015
A sequential game-theoretic study of the retweeting behavior in Sina Weibo.
J. Supercomput., 2015

On Burst Detection and Prediction in Retweeting Sequence.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2015

Detection and Analysis of Water Army Groups on Virtual Community.
Proceedings of the Computer Engineering and Technology - 19th CCF Conference, 2015

2014
Forum-Oriented Research on Water Army Detection for Bursty Topics.
Proceedings of the 9th IEEE International Conference on Networking, 2014

Analysis of the retweetting behavior of Weibo users based on game theory.
Proceedings of the 2014 5th International Conference on Game Theory for Networks, 2014

2013
Statistical analysis technique on Ad Hoc network topology dynamic characteristics: Markov stochastic process.
Telecommun. Syst., 2013

Empirical Analysis of Human Behavior Patterns in BBS.
Proceedings of the Computer Engineering and Technology - 17th CCF Conference, 2013

2012
Examining Multi-factor Interactions in Microblogging Based on Log-linear Modeling.
Proceedings of the International Conference on Advances in Social Networks Analysis and Mining, 2012

2011
The correlation between social tie and reciprocity in social media.
Proceedings of the International Conference on Electronic and Mechanical Engineering and Information Technology, 2011

2010
Ad Hoc Network Measurement Based on Network Tomography: Theory, Technique, and Application.
J. Networks, 2010

Routing Topology Identification Based on Multiple Sources End-to-End Measurements.
Proceedings of the 2010 Asia-Pacific Conference on Wearable Computing Systems, 2010

2009
Interior Link Delay Reference of Ad Hoc Networks Based on End-to-End Measurement: Linear Analysis Model of Delay.
J. Networks, 2009

A Simple Graph-structure Network Tomography Topology Identification Method.
Proceedings of the First IITA International Joint Conference on Artificial Intelligence, 2009

Link Delay Estimation in Network with Stochastic Routing.
Proceedings of the CSIE 2009, 2009 WRI World Congress on Computer Science and Information Engineering, March 31, 2009

2008
Research on the Model of Multiple Levels for Determining Sentiment of Text.
Proceedings of the PACIIA 2008, 2008

Adaptive Safety Critical Middleware for Distributed and Embedded Safety Critical System.
Proceedings of the NCM 2008, The Fourth International Conference on Networked Computing and Advanced Information Management, Gyeongju, Korea, September 2-4, 2008, 2008

Topology variety model for mobile ad hoc networks.
Proceedings of the 1st International Conference on MOBILe Wireless MiddleWARE, 2008

A Holonic Model in Wireless Sensor Networks.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

Location Scheme in Wireless Sensor Networks.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

A RIO Approach for Modeling Wireless Sensor Network.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

2007
Survivable Embedded Mission-Critical Network Base on Fibre Channel.
Proceedings of the 2007 International Conference on Parallel Processing Workshops (ICPP Workshops 2007), 2007

An Efficient Threshold Multi-group-Secret Sharing Scheme.
Proceedings of the Fuzzy Information and Engineering, 2007

Loss Tomography in Wireless Sensor Network Using Gibbs Sampling.
Proceedings of the Wireless Sensor Networks, 2007

MPIDA: A Sensor Network Topology Inference Algorithm.
Proceedings of the Computational Intelligence and Security, International Conference, 2007

2006
Lossy Node Identification in Wireless Sensor Network.
Proceedings of the Fifth IEEE International Symposium on Network Computing and Applications, 2006

2005
Study on Security iSCSI Based on SSH.
Proceedings of the Computational Intelligence and Security, International Conference, 2005


  Loading...