Weixuan Mao

Orcid: 0000-0002-6123-616X

According to our database1, Weixuan Mao authored at least 16 papers between 2014 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Linking User Identities Across Social Networks via Frequency Domain Analysis.
Proceedings of the IFIP Networking Conference, 2023

A Location Recommendation Model Based on User Behavior and Sequence Influence.
Proceedings of the Internet of Things, 2023

DNS Tunnel Detection for Low Throughput Data Exfiltration via Time-Frequency Domain Analysis.
Proceedings of the IEEE International Conference on Communications, 2023

Secure and Fast Query Approach for High-Precision Multi-dimensional Satellite Remote Sensing Data.
Proceedings of the Edge Computing - EDGE 2023, 2023

HMGR: A Hybrid Model for Geolocation Recommendation.
Proceedings of the Big Data - BigData 2023, 2023

2022
Spatial Density-based User Identity Linkage across Social Networks.
Proceedings of the IEEE International Conference on Big Data, 2022

2020
Identifying vulnerabilities of SSL/TLS certificate verification in Android apps with static and dynamic analysis.
J. Syst. Softw., 2020

2019
Learning edge weights in file co-occurrence graphs for malware detection.
Data Min. Knowl. Discov., 2019

Understanding Effects of Collaborations in Developing Mobile Computing Systems: Popularity, Efficiency, and Quality.
IEEE Access, 2019

Open-Source License Violations of Binary Software at Large Scale.
Proceedings of the 26th IEEE International Conference on Software Analysis, 2019

DCDroid: automated detection of SSL/TLS certificate verification vulnerabilities in Android apps.
Proceedings of the ACM Turing Celebration Conference - China, 2019

2018
From big data to knowledge: A spatio-temporal approach to malware detection.
Comput. Secur., 2018

2017
Security importance assessment for system objects and malware detection.
Comput. Secur., 2017

2015
Probabilistic Inference on Integrity for Access Behavior Based Malware Detection.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2015

Identifying Intrusion Infections via Probabilistic Inference on Bayesian Network.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2015

2014
Centrality metrics of importance in access behaviors and malware detections.
Proceedings of the 30th Annual Computer Security Applications Conference, 2014


  Loading...