Weiping Wang
Orcid: 0000-0001-5255-5639Affiliations:
- Central South University, School of Information Science and Engineering, Changsha, China
According to our database1,
Weiping Wang
authored at least 75 papers
between 2008 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
IEEE Trans. Mob. Comput., January, 2024
Foolmix: Strengthen the Transferability of Adversarial Examples by Dual-Blending and Direction Update Strategy.
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Inf. Forensics Secur., 2024
2023
IEEE Trans. Mob. Comput., December, 2023
Comput. Networks, September, 2023
IEEE Trans. Inf. Forensics Secur., 2023
IEEE Open J. Comput. Soc., 2023
Proceedings of the 22nd IEEE International Conference on Trust, 2023
Proceedings of the 31st IEEE/ACM International Symposium on Quality of Service, 2023
ISAA: Boost Repair Process by Constructing the Degree Constrained Optimal Repair Tree for Erasure-coded Systems.
Proceedings of the 29th IEEE International Conference on Parallel and Distributed Systems, 2023
Exploration and Research on Ideological and Political Education in Course Operating Systems and Security.
Proceedings of the Computer Science and Education. Teaching and Curriculum, 2023
CMMR: A Composite Multidimensional Models Robustness Evaluation Framework for Deep Learning.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2023
Proceedings of the IEEE Global Communications Conference, 2023
TransAST: A Machine Translation-Based Approach for Obfuscated Malicious JavaScript Detection.
Proceedings of the 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Network, 2023
2022
IEEE Trans. Veh. Technol., 2022
IEEE Trans. Netw. Sci. Eng., 2022
An Improved Bound and Singleton-Optimal Constructions of Fractional Repetition Codes.
IEEE Trans. Commun., 2022
Proceedings of the IEEE Wireless Communications and Networking Conference, 2022
HashDroid:Extraction of malicious features of Android applications based on function call graph pruning.
Proceedings of the IEEE International Conference on Trust, 2022
Proceedings of the IEEE International Conference on Trust, 2022
G-Update: A Group-based Update Scheme for Heterogenous Erasure-coded Storage Systems.
Proceedings of the 24th IEEE Int Conf on High Performance Computing & Communications; 8th Int Conf on Data Science & Systems; 20th Int Conf on Smart City; 8th Int Conf on Dependability in Sensor, 2022
2021
IEEE Trans. Inf. Forensics Secur., 2021
A Secure Scheme Based on One-Way Associated Key Management Model in Wireless Sensor Networks.
IEEE Internet Things J., 2021
NSDroid: efficient multi-classification of android malware using neighborhood signature in local function call graphs.
Int. J. Inf. Sec., 2021
Proceedings of the Wireless Algorithms, Systems, and Applications, 2021
Proceedings of the IEEE Information Theory Workshop, 2021
Proceedings of the Algorithms and Architectures for Parallel Processing, 2021
2020
IEEE Trans. Reliab., 2020
Frontiers Inf. Technol. Electron. Eng., 2020
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2020
CCF Trans. Pervasive Comput. Interact., 2020
Proceedings of the 19th IEEE International Conference on Trust, 2020
Proceedings of the 16th International Conference on Mobility, Sensing and Networking, 2020
Proceedings of the IEEE Global Communications Conference, 2020
2019
BridgeTaint: A Bi-Directional Dynamic Taint Tracking Method for JavaScript Bridges in Android Hybrid Applications.
IEEE Trans. Inf. Forensics Secur., 2019
Secur. Commun. Networks, 2019
An Efficient Authentication Scheme Based on Deployment Knowledge Against Mobile Sink Replication Attack in UWSNs.
IEEE Internet Things J., 2019
VDetector: Detecting Vulnerability Based on Inter-Component Data Flows in Android Applications.
Proceedings of the 15th International Conference on Mobile Ad-Hoc and Sensor Networks, 2019
Proceedings of the IEEE International Symposium on Information Theory, 2019
ADS-SA: System for Automatically Detecting Sensitive Path of Android Applications Based on Static Analysis.
Proceedings of the Smart City and Informatization - 7th International Conference, 2019
Proceedings of the 14th International Conference on Computer Science & Education, 2019
2018
A (M, m) Authentication Scheme Against Mobile Sink Replicated Attack in Unattended Sensor Networks.
IEEE Wirel. Commun. Lett., 2018
J. Netw. Comput. Appl., 2018
2017
2016
Wirel. Commun. Mob. Comput., 2016
Code pruning in opportunistic routing through bidirectional coding traffic comparison.
Wirel. Commun. Mob. Comput., 2016
Secur. Commun. Networks, 2016
IEEE Commun. Lett., 2016
2015
Int. J. Distributed Sens. Networks, 2015
Concurr. Comput. Pract. Exp., 2015
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015
2014
A New Key Predistribution Scheme for Multiphase Sensor Networks Using a New Deployment Model.
J. Sensors, 2014
Lossy links diagnosis for wireless sensor networks by utilising the existing traffic information.
Int. J. Embed. Syst., 2014
2013
Int. J. Distributed Sens. Networks, 2013
Adaptive explicit congestion control based on bandwidth estimation for high bandwidth-delay product networks.
Comput. Commun., 2013
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, 2013
A Cross-Layer Optimization Mechanism for Inter-session Network Coding in Wireless Mesh Network.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, 2013
ARSM: A Lightweight Packet Reception Notification Mechanism for Wireless Localized Network Coding.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, 2013
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, 2013
Proceedings of the Cyberspace Safety and Security - 5th International Symposium, 2013
2012
Int. J. Distributed Sens. Networks, 2012
Iteration method for predicting essential proteins based on orthology and protein-protein interaction networks.
BMC Syst. Biol., 2012
Proceedings of the 32nd International Conference on Distributed Computing Systems Workshops (ICDCS 2012 Workshops), 2012
2011
Proceedings of the IEEE 10th International Conference on Trust, 2011
Proceedings of the Global Communications Conference, 2011
2010
Design and Implementation of Collaboration Support in Virtual Experiment Environment.
Proceedings of the Advances in Web-Based Learning - ICWL 2010, 2010
2009
Inf. Process. Lett., 2009
Detection and location of malicious nodes based on source coding and multi-path transmission in WSN.
Proceedings of the 11th IEEE International Conference on High Performance Computing and Communications, 2009
An Anonymous Communication Mechanism without Key Infrastructure Based on Multi-Paths Network Coding.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009
2008
Proceedings of the 9th International Conference for Young Computer Scientists, 2008
Proceedings of the 9th International Conference for Young Computer Scientists, 2008
Design and Implementation of Compression Algorithm Comparator for Digital Image Processing Based on Component.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008
Proceedings of the Advances in Web Based Learning, 2008
Proceedings of IEEE International Conference on Communications, 2008
Proceedings of IEEE International Conference on Communications, 2008