Wei Peng

Affiliations:
  • Intel Corporation, Folsom, USA
  • Purdue University Indianapolis, IN, USA (PhD 2015)


According to our database1, Wei Peng authored at least 17 papers between 2011 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2019
Android Malware Detection via Graphlet Sampling.
IEEE Trans. Mob. Comput., 2019

2017
Transparent, Auditable, and Stepwise Verifiable Online E-Voting Enabling an Open and Fair Election.
Cryptogr., 2017

2016
ACTS: Extracting Android App topologiCal signature through graphleT Sampling.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016

2015
On several problems regarding the application of opportunistic proximate links in smartphone networks
PhD thesis, 2015

Temporal coverage based content distribution in heterogeneous smart device networks.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

2014
Behavioral Malware Detection in Delay Tolerant Networks.
IEEE Trans. Parallel Distributed Syst., 2014

A Two-Stage Deanonymization Attack against Anonymized Social Networks.
IEEE Trans. Computers, 2014

Assurable, transparent, and mutual restraining e-voting involving multiple conflicting parties.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

Feedback-based smartphone strategic sampling for BYOD security.
Proceedings of the 23rd International Conference on Computer Communication and Networks, 2014

A moving-target defense strategy for Cloud-based services with heterogeneous and dynamic attack surfaces.
Proceedings of the IEEE International Conference on Communications, 2014

2013
The Virtue of Patience: Offloading Topical Cellular Content through Opportunistic Links.
Proceedings of the IEEE 10th International Conference on Mobile Ad-Hoc and Sensor Systems, 2013

Smartphone strategic sampling in defending enterprise network security.
Proceedings of IEEE International Conference on Communications, 2013

T-dominance: Prioritized defense deployment for BYOD security.
Proceedings of the IEEE Conference on Communications and Network Security, 2013

A viewable e-voting scheme for environments with conflict of interest.
Proceedings of the IEEE Conference on Communications and Network Security, 2013

2012
A privacy-preserving social-aware incentive system for word-of-mouth advertisement dissemination on smart mobile devices.
Proceedings of the 9th Annual IEEE Communications Society Conference on Sensor, 2012

Seed and Grow: An attack against anonymized social networks.
Proceedings of the 9th Annual IEEE Communications Society Conference on Sensor, 2012

2011
Behavioral Detection and Containment of Proximity Malware in Delay Tolerant Networks.
Proceedings of the IEEE 8th International Conference on Mobile Adhoc and Sensor Systems, 2011


  Loading...