Weina Niu
Orcid: 0000-0002-3235-3463
According to our database1,
Weina Niu
authored at least 56 papers
between 2014 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
ROPGMN: Effective ROP and variants discovery using dynamic feature and graph matching network.
Future Gener. Comput. Syst., 2025
2024
IEEE Netw. Lett., June, 2024
FSMFLog: Discovering Anomalous Logs Combining Full Semantic Information and Multifeature Fusion.
IEEE Internet Things J., February, 2024
Sensitive Behavioral Chain-Focused Android Malware Detection Fused With AST Semantics.
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Inf. Forensics Secur., 2024
Appl. Soft Comput., 2024
Appl. Intell., 2024
Proceedings of the IEEE Wireless Communications and Networking Conference, 2024
Nurgle: Exacerbating Resource Consumption in Blockchain State Storage via MPT Manipulation.
Proceedings of the IEEE Symposium on Security and Privacy, 2024
What's the Real: A Novel Design Philosophy for Robust AI-Synthesized Voice Detection.
Proceedings of the 32nd ACM International Conference on Multimedia, MM 2024, Melbourne, VIC, Australia, 28 October 2024, 2024
LiScopeLens: An Open-Source License Incompatibility Analysis Tool Based on Scope Representation of License Terms.
Proceedings of the 35th IEEE International Symposium on Software Reliability Engineering, 2024
Proceedings of the IEEE International Conference on Multimedia and Expo, 2024
Proceedings of the IEEE International Conference on Communications, 2024
Local Augmentation with Functionality-Preservation for Semi-Supervised Graph Intrusion Detection.
Proceedings of the IEEE International Conference on Communications, 2024
Gedss: A Generic Framework to Enhance Model Robustness for Intrusion Detection on Noisy Data.
Proceedings of the 27th International Conference on Computer Supported Cooperative Work in Design, 2024
SQLStateGuard: Statement-Level SQL Injection Defense Based on Learning-Driven Middleware.
Proceedings of the 2024 ACM Symposium on Cloud Computing, 2024
Springer, ISBN: 978-981-97-1458-2, 2024
2023
GCDroid: Android Malware Detection Based on Graph Compression With Reachability Relationship Extraction for IoT Devices.
IEEE Internet Things J., July, 2023
Comput. J., March, 2023
Proceedings of the Digital Forensics and Cyber Crime - 14th EAI International Conference, 2023
Proceedings of the IEEE International Conference on Communications, 2023
Black-box Word-level Textual Adversarial Attack Based On Discrete Harris Hawks Optimization.
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023
2022
A Novel Steganography Method for Character-Level Text Image Based on Adversarial Attacks.
Sensors, 2022
Secur. Commun. Networks, 2022
Uncovering APT malware traffic using deep learning combined with time sequence and association analysis.
Comput. Secur., 2022
Trine: Syslog anomaly detection with three transformer encoders in one generative adversarial network.
Appl. Intell., 2022
IDROP: Intelligently detecting Return-Oriented Programming using real-time execution flow and LSTM.
Proceedings of the IEEE International Conference on Trust, 2022
A Fine-Grained Approach for Vulnerabilities Discovery Using Augmented Vulnerability Signatures.
Proceedings of the Knowledge Science, Engineering and Management, 2022
Proceedings of the IEEE International Conference on Multimedia and Expo, 2022
LogTracer: Efficient Anomaly Tracing Combining System Log Detection and Provenance Graph.
Proceedings of the IEEE Global Communications Conference, 2022
2021
Secur. Commun. Networks, 2021
Knowl. Based Syst., 2021
J. Intell. Fuzzy Syst., 2021
J. Inf. Secur. Appl., 2021
Inf. Process. Manag., 2021
Malware on Internet of UAVs Detection Combining String Matching and Fourier Transformation.
IEEE Internet Things J., 2021
FedVANET: Efficient Federated Learning with Non-IID Data for Vehicular Ad Hoc Networks.
Proceedings of the IEEE Global Communications Conference, 2021
2020
OpCode-Level Function Call Graph Based Android Malware Classification Using Deep Learning.
Sensors, 2020
Secur. Commun. Networks, 2020
Proceedings of the Information Security and Privacy - 25th Australasian Conference, 2020
2019
IEEE Wirel. Commun., 2019
A Heuristic Statistical Testing Based Approach for Encrypted Network Traffic Identification.
IEEE Trans. Veh. Technol., 2019
Secur. Commun. Networks, 2019
Secur. Commun. Networks, 2019
Int. J. Pattern Recognit. Artif. Intell., 2019
Proceedings of the 2019 International Conference on Artificial Intelligence and Advanced Manufacturing, 2019
2018
Resetting Your Password Is Vulnerable: A Security Study of Common SMS-Based Authentication in IoT Device.
Wirel. Commun. Mob. Comput., 2018
Weighted Domain Transfer Extreme Learning Machine and Its Online Version for Gas Sensor Drift Compensation in E-Nose Systems.
Wirel. Commun. Mob. Comput., 2018
Online Sensor Drift Compensation for E-Nose Systems Using Domain Adaptation and Extreme Learning Machine.
Sensors, 2018
Peer-to-Peer Netw. Appl., 2018
具有异构感染率的僵尸网络建模与分析 (Modeling and Analysis of Botnet with Heterogeneous Infection Rate).
计算机科学, 2018
2017
IEICE Trans. Inf. Syst., 2017
Proceedings of the 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), 2017
2016
Pattern Recognit. Lett., 2016
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2016
2014
Multi-party quantum private comparison protocol based on d-dimensional entangled states.
Quantum Inf. Process., 2014