Weina Niu

Orcid: 0000-0002-3235-3463

According to our database1, Weina Niu authored at least 56 papers between 2014 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
ROPGMN: Effective ROP and variants discovery using dynamic feature and graph matching network.
Future Gener. Comput. Syst., 2025

2024
Malicious Traffic Detection With Noise Labels Based on Cross-Modal Consistency.
IEEE Netw. Lett., June, 2024

FSMFLog: Discovering Anomalous Logs Combining Full Semantic Information and Multifeature Fusion.
IEEE Internet Things J., February, 2024

Sensitive Behavioral Chain-Focused Android Malware Detection Fused With AST Semantics.
IEEE Trans. Inf. Forensics Secur., 2024

GraphTunnel: Robust DNS Tunnel Detection Based on DNS Recursive Resolution Graph.
IEEE Trans. Inf. Forensics Secur., 2024

A robust Wide & Deep learning framework for log-based anomaly detection.
Appl. Soft Comput., 2024

Model-agnostic generation-enhanced technology for few-shot intrusion detection.
Appl. Intell., 2024

Portfolio-Based Incentive Mechanism Design for Cross-Device Federated Learning.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2024

Nurgle: Exacerbating Resource Consumption in Blockchain State Storage via MPT Manipulation.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

What's the Real: A Novel Design Philosophy for Robust AI-Synthesized Voice Detection.
Proceedings of the 32nd ACM International Conference on Multimedia, MM 2024, Melbourne, VIC, Australia, 28 October 2024, 2024

LiScopeLens: An Open-Source License Incompatibility Analysis Tool Based on Scope Representation of License Terms.
Proceedings of the 35th IEEE International Symposium on Software Reliability Engineering, 2024

Ghost-in-Wave: How Speaker-Irrelative Features Interfere DeepFake Voice Detectors.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2024

A Robust Malicious Traffic Detection Framework with Low-quality Labeled Data.
Proceedings of the IEEE International Conference on Communications, 2024

Local Augmentation with Functionality-Preservation for Semi-Supervised Graph Intrusion Detection.
Proceedings of the IEEE International Conference on Communications, 2024

Gedss: A Generic Framework to Enhance Model Robustness for Intrusion Detection on Noisy Data.
Proceedings of the 27th International Conference on Computer Supported Cooperative Work in Design, 2024

SQLStateGuard: Statement-Level SQL Injection Defense Based on Learning-Driven Middleware.
Proceedings of the 2024 ACM Symposium on Cloud Computing, 2024

Android Malware Detection and Adversarial Methods
Springer, ISBN: 978-981-97-1458-2, 2024

2023
GCDroid: Android Malware Detection Based on Graph Compression With Reachability Relationship Extraction for IoT Devices.
IEEE Internet Things J., July, 2023

A Novel Generation Method for Diverse Privacy Image Based on Machine Learning.
Comput. J., March, 2023

DEML: Data-Enhanced Meta-Learning Method for IoT APT Traffic Detection.
Proceedings of the Digital Forensics and Cyber Crime - 14th EAI International Conference, 2023

Fuzzing Logical Bugs in eBPF Verifier with Bound-Violation Indicator.
Proceedings of the IEEE International Conference on Communications, 2023

Black-box Word-level Textual Adversarial Attack Based On Discrete Harris Hawks Optimization.
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023

2022
A Novel Steganography Method for Character-Level Text Image Based on Adversarial Attacks.
Sensors, 2022

Attacker Traceability on Ethereum through Graph Analysis.
Secur. Commun. Networks, 2022

Uncovering APT malware traffic using deep learning combined with time sequence and association analysis.
Comput. Secur., 2022

Trine: Syslog anomaly detection with three transformer encoders in one generative adversarial network.
Appl. Intell., 2022

IDROP: Intelligently detecting Return-Oriented Programming using real-time execution flow and LSTM.
Proceedings of the IEEE International Conference on Trust, 2022

A Fine-Grained Approach for Vulnerabilities Discovery Using Augmented Vulnerability Signatures.
Proceedings of the Knowledge Science, Engineering and Management, 2022

Targeted Anonymization: A Face Image Anonymization Method for Unauthorized Models.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2022

LogTracer: Efficient Anomaly Tracing Combining System Log Detection and Provenance Graph.
Proceedings of the IEEE Global Communications Conference, 2022

2021
HTTP-Based APT Malware Infection Detection Using URL Correlation Analysis.
Secur. Commun. Networks, 2021

A low-query black-box adversarial attack based on transferability.
Knowl. Based Syst., 2021

Intelligent mining vulnerabilities in python code snippets.
J. Intell. Fuzzy Syst., 2021

NEDetector: Automatically extracting cybersecurity neologisms from hacker forums.
J. Inf. Secur. Appl., 2021

Transaction-based classification and detection approach for Ethereum smart contract.
Inf. Process. Manag., 2021

Malware on Internet of UAVs Detection Combining String Matching and Fourier Transformation.
IEEE Internet Things J., 2021

FedVANET: Efficient Federated Learning with Non-IID Data for Vehicular Ad Hoc Networks.
Proceedings of the IEEE Global Communications Conference, 2021

2020
OpCode-Level Function Call Graph Based Android Malware Classification Using Deep Learning.
Sensors, 2020

Preprocessing Method for Encrypted Traffic Based on Semisupervised Clustering.
Secur. Commun. Networks, 2020

A Black-Box Attack on Neural Networks Based on Swarm Evolutionary Algorithm.
Proceedings of the Information Security and Privacy - 25th Australasian Conference, 2020

2019
Detecting Malware on X86-Based IoT Devices in Autonomous Driving.
IEEE Wirel. Commun., 2019

A Heuristic Statistical Testing Based Approach for Encrypted Network Traffic Identification.
IEEE Trans. Veh. Technol., 2019

Using XGBoost to Discover Infected Hosts Based on HTTP Traffic.
Secur. Commun. Networks, 2019

An Insider Threat Detection Approach Based on Mouse Dynamics and Deep Learning.
Secur. Commun. Networks, 2019

A Lockable Abnormal Electromagnetic Signal Joint Detection Algorithm.
Int. J. Pattern Recognit. Artif. Intell., 2019

Co-Clustering Host-Domain Graphs to Discover Malware Infection.
Proceedings of the 2019 International Conference on Artificial Intelligence and Advanced Manufacturing, 2019

2018
Resetting Your Password Is Vulnerable: A Security Study of Common SMS-Based Authentication in IoT Device.
Wirel. Commun. Mob. Comput., 2018

Weighted Domain Transfer Extreme Learning Machine and Its Online Version for Gas Sensor Drift Compensation in E-Nose Systems.
Wirel. Commun. Mob. Comput., 2018

Online Sensor Drift Compensation for E-Nose Systems Using Domain Adaptation and Extreme Learning Machine.
Sensors, 2018

Tor anonymous traffic identification based on gravitational clustering.
Peer-to-Peer Netw. Appl., 2018

具有异构感染率的僵尸网络建模与分析 (Modeling and Analysis of Botnet with Heterogeneous Infection Rate).
计算机科学, 2018

2017
Modeling Attack Process of Advanced Persistent Threat Using Network Evolution.
IEICE Trans. Inf. Syst., 2017

Phishing Emails Detection Using CS-SVM.
Proceedings of the 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), 2017

2016
Improving data field hierarchical clustering using Barnes-Hut algorithm.
Pattern Recognit. Lett., 2016

Modeling Attack Process of Advanced Persistent Threat.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2016

2014
Multi-party quantum private comparison protocol based on d-dimensional entangled states.
Quantum Inf. Process., 2014


  Loading...