Wei Wang
Orcid: 0000-0002-5974-1589Affiliations:
- Beijing Jiaotong University, Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, China
- University of Luxembourg, Interdisciplinary Centre for Security, Reliability and Trust, Luxembourg (2009 - 2011)
- Norwegian University of Science and Technology (NTNU), Norway (2009 - 2011)
- INRIA Sophia Antipolis, France (2007 - 2008)
- University of Trento, Italy (2005 - 2006)
- Xi'an Jiaotong University, SKLMS / Research Center for Networked Systems and Information Security, China (PhD 2006)
According to our database1,
Wei Wang
authored at least 139 papers
between 2004 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2025
ScamGen: Unveiling psychological patterns in tele-scam through advanced template-augmented corpus generation.
Comput. Hum. Behav., 2025
2024
ACM Comput. Surv., October, 2024
Neighbor-Enhanced Representation Learning for Link Prediction in Dynamic Heterogeneous Attributed Networks.
ACM Trans. Knowl. Discov. Data, September, 2024
IEEE Trans. Comput. Soc. Syst., April, 2024
FedComm: A Privacy-Enhanced and Efficient Authentication Protocol for Federated Learning in Vehicular Ad-Hoc Networks.
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Dependable Secur. Comput., 2024
IEEE Internet Things J., 2024
CoRR, 2024
The Illusion of Anonymity: Uncovering the Impact of User Actions on Privacy in Web3 Social Ecosystems.
CoRR, 2024
Comput. Secur., 2024
Lurking in the shadows: Unveiling Stealthy Backdoor Attacks against Personalized Federated Learning.
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the 30th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2024
Proceedings of the IEEE INFOCOM 2024, 2024
TLSCG: Transfer Learning-Based Efficient Anomalous Smart Contract Generation to Empower Unknown Vulnerability Detection.
Proceedings of the IEEE International Conference on Web Services, 2024
Proceedings of the ACM Turing Award Celebration Conference 2024, 2024
2023
A New Smart Contract Anomaly Detection Method by Fusing Opcode and Source Code Features for Blockchain Services.
IEEE Trans. Netw. Serv. Manag., December, 2023
Multi-Misconfiguration Diagnosis via Identifying Correlated Configuration Parameters.
IEEE Trans. Software Eng., October, 2023
Comput. Secur., September, 2023
Improving adversarial robustness of medical imaging systems via adding global attention noise.
Comput. Biol. Medicine, September, 2023
IEEE Trans. Knowl. Data Eng., April, 2023
DNS Rebinding Threat Modeling and Security Analysis for Local Area Network of Maritime Transportation Systems.
IEEE Trans. Intell. Transp. Syst., February, 2023
DeviceWatch: A Data-Driven Network Analysis Approach to Identifying Compromised Mobile Devices with Graph-Inference.
ACM Trans. Priv. Secur., 2023
IEEE Trans. Dependable Secur. Comput., 2023
CGIR: Conditional Generative Instance Reconstruction Attacks Against Federated Learning.
IEEE Trans. Dependable Secur. Comput., 2023
Lung Cancer Subtype Diagnosis by Fusing Image-Genomics Data and Hybrid Deep Networks.
IEEE ACM Trans. Comput. Biol. Bioinform., 2023
BSAF: A blockchain-based secure access framework with privacy protection for cloud-device service collaborations.
J. Syst. Archit., 2023
IEEE CAA J. Autom. Sinica, 2023
UAF-GUARD: Defending the use-after-free exploits via fine-grained memory permission management.
Comput. Secur., 2023
LEA<sup>2</sup>: A Lightweight Ensemble Adversarial Attack via Non-overlapping Vulnerable Frequency Regions.
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023
How Hard is Takeover in DPoS Blockchains? Understanding the Security of Coin-based Voting Governance.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023
Poisoning with Cerberus: Stealthy and Colluded Backdoor Attack against Federated Learning.
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023
2022
CCUBI: A cross-chain based premium competition scheme with privacy preservation for usage-based insurance.
Int. J. Intell. Syst., December, 2022
Efficient and Secure Outsourcing of Differentially Private Data Publishing With Multiple Evaluators.
IEEE Trans. Dependable Secur. Comput., 2022
Character-Level Street View Text Spotting Based on Deep Multisegmentation Network for Smarter Autonomous Driving.
IEEE Trans. Artif. Intell., 2022
J. Netw. Comput. Appl., 2022
Transparent Aspect-Level Sentiment Analysis Based on Dependency Syntax Analysis and Its Application on COVID-19.
ACM J. Data Inf. Qual., 2022
Int. J. Intell. Syst., 2022
Toward Blockchain-Based Spoofing Defense for Controlled Optimization of Phases in Traffic Signal System.
IEICE Trans. Inf. Syst., 2022
Threats, attacks and defenses to federated learning: issues, taxonomy and perspectives.
Cybersecur., 2022
Concurr. Comput. Pract. Exp., 2022
AWFC: Preventing Label Flipping Attacks Towards Federated Learning for Intelligent IoT.
Comput. J., 2022
A Fine-Grained Access Control Framework for Data Sharing in IoT Based on IPFS and Cross-Blockchain Technology.
Proceedings of the Smart Computing and Communication - 7th International Conference, 2022
Proceedings of the 24th IEEE Int Conf on High Performance Computing & Communications; 8th Int Conf on Data Science & Systems; 20th Int Conf on Smart City; 8th Int Conf on Dependability in Sensor, 2022
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2022
Proceedings of the 10th IEEE Conference on Communications and Network Security, 2022
AdvCat: Domain-Agnostic Robustness Assessment for Cybersecurity-Critical Applications with Categorical Inputs.
Proceedings of the IEEE International Conference on Big Data, 2022
A Decentralized Cross-Chain Service Protocol based on Notary Schemes and Hash-Locking.
Proceedings of the IEEE International Conference on Services Computing, 2022
2021
ACM Trans. Internet Techn., 2021
IEEE Trans. Netw. Sci. Eng., 2021
IEEE Trans. Netw. Sci. Eng., 2021
Street View Text Recognition With Deep Learning for Urban Scene Understanding in Intelligent Transportation Systems.
IEEE Trans. Intell. Transp. Syst., 2021
Detecting Anomalies in Intelligent Vehicle Charging and Station Power Supply Systems With Multi-Head Attention Models.
IEEE Trans. Intell. Transp. Syst., 2021
Towards Revealing Parallel Adversarial Attack on Politician Socialnet of Graph Structure.
Secur. Commun. Networks, 2021
Accurate Range Query With Privacy Preservation for Outsourced Location-Based Service in IoT.
IEEE Internet Things J., 2021
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2021
Int. J. Netw. Manag., 2021
A hybrid intelligent service recommendation by latent semantics and explicit ratings.
Int. J. Intell. Syst., 2021
An explainable sentiment prediction model based on the portraits of users sharing representative opinions in social sensors.
Int. J. Distributed Sens. Networks, 2021
2020
Privacy Risk Analysis and Mitigation of Analytics Libraries in the Android Ecosystem.
IEEE Trans. Mob. Comput., 2020
CoEvil: A Coevolutionary Model for Crime Inference Based on Fuzzy Rough Feature Selection.
IEEE Trans. Fuzzy Syst., 2020
IEEE Trans. Comput. Soc. Syst., 2020
Identifying vulnerabilities of SSL/TLS certificate verification in Android apps with static and dynamic analysis.
J. Syst. Softw., 2020
BotMark: Automated botnet detection with hybrid analysis of flow-based and graph-based traffic behaviors.
Inf. Sci., 2020
Privacy-preserving categorization of mobile applications based on large-scale usage data.
Inf. Sci., 2020
SoProtector: Safeguard Privacy for Native SO Files in Evolving Mobile IoT Applications.
IEEE Internet Things J., 2020
Secure and efficient outsourcing differential privacy data release scheme in Cyber-physical system.
Future Gener. Comput. Syst., 2020
Hybritus: a password strength checker by ensemble learning from the query feedbacks of websites.
Frontiers Comput. Sci., 2020
"Are you home alone?" "Yes" Disclosing Security and Privacy Vulnerabilities in Alexa Skills.
CoRR, 2020
Proceedings of the Natural Language Processing and Chinese Computing, 2020
Proceedings of the Frontiers in Cyber Security - Third International Conference, 2020
Proceedings of the International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2020
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2020
2019
ACM Trans. Intell. Syst. Technol., 2019
SCTSC: A Semicentralized Traffic Signal Control Mode With Attribute-Based Blockchain in IoVs.
IEEE Trans. Comput. Soc. Syst., 2019
Effective android malware detection with a hybrid model based on deep autoencoder and convolutional neural network.
J. Ambient Intell. Humaniz. Comput., 2019
J. Inf. Secur. Appl., 2019
Future Gener. Comput. Syst., 2019
DeviceWatch: Identifying Compromised Mobile Devices through Network Traffic Analysis and Graph Inference.
CoRR, 2019
Constructing Features for Detecting Android Malicious Applications: Issues, Taxonomy and Directions.
IEEE Access, 2019
Understanding Effects of Collaborations in Developing Mobile Computing Systems: Popularity, Efficiency, and Quality.
IEEE Access, 2019
IEEE Access, 2019
Proceedings of the Security and Privacy in Social Networks and Big Data, 2019
A Novel Approach for Traffic Anomaly Detection in Power Distributed Control System and Substation System.
Proceedings of the Network and System Security - 13th International Conference, 2019
Proceedings of the Network and System Security - 13th International Conference, 2019
DCDroid: automated detection of SSL/TLS certificate verification vulnerabilities in Android apps.
Proceedings of the ACM Turing Celebration Conference - China, 2019
2018
Discovering and understanding android sensor usage behaviors with data flow analysis.
World Wide Web, 2018
CreditCoin: A Privacy-Preserving Blockchain-Based Incentive Announcement Network for Communications of Smart Vehicles.
IEEE Trans. Intell. Transp. Syst., 2018
IEEE Trans. Cloud Comput., 2018
Inf. Sci., 2018
Detecting Android malicious apps and categorizing benign apps with ensemble of classifiers.
Future Gener. Comput. Syst., 2018
Future Gener. Comput. Syst., 2018
Ad Hoc Networks, 2018
DroidEnsemble: Detecting Android Malicious Applications With Ensemble of String and Structural Static Features.
IEEE Access, 2018
Proceedings of the Parallel and Distributed Computing, 2018
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2018
Proceedings of the 1st International Conference on Data Intelligence and Security, 2018
Botnet Detection with Hybrid Analysis on Flow Based and Graph Based Features of Network Traffic.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018
Proceedings of the Computer Security, 2018
2017
IEEE Trans. Inf. Forensics Secur., 2017
Characterizing Android apps' behavior for effective detection of malapps at large scale.
Future Gener. Comput. Syst., 2017
Gracob: a novel graph-based constant-column biclustering method for mining growth phenotype data.
Bioinform., 2017
2016
Anomadroid: Profiling Android Applications' Behaviors for Identifying Unknown Malapps.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
Proceedings of the Security and Privacy in Communication Networks, 2016
A Novel Load Balancing Algorithm Based on Improved Particle Swarm Optimization in Cloud Computing Environment.
Proceedings of the Human Centered Computing - Second International Conference, 2016
Fast, Private and Verifiable: Server-aided Approximate Similarity Computation over Large-Scale Datasets.
Proceedings of the 4th ACM International Workshop on Security in Cloud Computing, 2016
2015
Constructing important features from massive network traffic for lightweight intrusion detection.
IET Inf. Secur., 2015
Comput. Hum. Behav., 2015
Exploring sensor usage behaviors of Android applications based on data flow analysis.
Proceedings of the 34th IEEE International Performance Computing and Communications Conference, 2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
2014
Exploring Permission-Induced Risk in Android Applications for Malicious Application Detection.
IEEE Trans. Inf. Forensics Secur., 2014
Autonomic intrusion detection: Adaptively detecting anomalies over unlabeled audit data streams in computer networks.
Knowl. Based Syst., 2014
2012
2011
IEEE Netw., 2011
Proceedings of the 2011 ACM Symposium on Applied Computing (SAC), TaiChung, Taiwan, March 21, 2011
Proceedings of the Trust Management V, 5th IFIP WG 11.11 International Conference, 2011
2010
Proceedings of the Information Systems Security - 6th International Conference, 2010
Proceedings of the ICDM 2010, 2010
Proceedings of the Advanced Data Mining and Applications - 6th International Conference, 2010
2009
Constructing attribute weights from computer audit data for effective intrusion detection.
J. Syst. Softw., 2009
J. Netw. Comput. Appl., 2009
Proceedings of the 18th International Conference on World Wide Web, 2009
Proceedings of the Recent Advances in Intrusion Detection, 12th International Symposium, 2009
Proceedings of the 10th International Symposium on Pervasive Systems, 2009
Online and adaptive anomaly Detection: detecting intrusions in unlabelled audit data streams.
Proceedings of the Extraction et gestion des connaissances (EGC'2009), 2009
Diagnostic multi-sources adaptatif. Application à la détection d'intrusion dans des serveurs Web.
Proceedings of the Extraction et gestion des connaissances (EGC'2009), 2009
2008
Comput. Commun., 2008
Proceedings of the CRiSIS '08, 2008
2007
Distance Measures for Anomaly Intrusion Detection.
Proceedings of the 2007 International Conference on Security & Management, 2007
2006
Profiling program behavior for anomaly intrusion detection based on the transition and frequency property of computer audit data.
Comput. Secur., 2006
Proceedings of the The First International Conference on Availability, 2006
2004
A Novel Intrusion Detection Method Based on Principle Component Analysis in Computer Security.
Proceedings of the Advances in Neural Networks, 2004
Profiling program and user behaviors for anomaly intrusion detection based on non-negative matrix factorization.
Proceedings of the 43rd IEEE Conference on Decision and Control, 2004