Wen Wang

Affiliations:
  • Chinese Academy of Sciences, State Key Laboratory of Information Security, Institute of Information Engineering, Beijing, China


According to our database1, Wen Wang authored at least 23 papers between 2013 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Stories behind decisions: Towards interpretable malware family classification with hierarchical attention.
Comput. Secur., 2024

CAFE: Robust Detection of Malicious Macro based on Cross-modal Feature Extraction.
Proceedings of the 27th International Conference on Computer Supported Cooperative Work in Design, 2024

2023
AST2Vec: A Robust Neural Code Representation for Malicious PowerShell Detection.
Proceedings of the Science of Cyber Security - 5th International Conference, 2023

Payload Level Graph Attention Network for Web Attack Traffic Detection.
Proceedings of the Computational Science - ICCS 2023, 2023

Towards Open-Set APT Malware Classification under Few-Shot Setting.
Proceedings of the IEEE Global Communications Conference, 2023

2022
Hybrid Routing for Efficient Fine-Grained Management of Specific Services in SDN.
Proceedings of the Science of Cyber Security - 4th International Conference, 2022

High-Efficient and Few-shot Adaptive Encrypted Traffic Classification with Deep Tree.
Proceedings of the IEEE Military Communications Conference, 2022

2021
Mining Trojan Detection Based on Multi-dimensional Static Features.
Proceedings of the Science of Cyber Security - Third International Conference, 2021

HSLF: HTTP Header Sequence Based LSH Fingerprints for Application Traffic Classification.
Proceedings of the Computational Science - ICCS 2021, 2021

2019
A new visual evaluation criterion of visual cryptography scheme for character secret image.
Multim. Tools Appl., 2019

2018
Visual Gambling.
Int. J. Digit. Crime Forensics, 2018

2017
On the Pixel Expansion of Visual Cryptography Scheme.
Int. J. Digit. Crime Forensics, 2017

Temporal Integration Based Visual Cryptography Scheme and Its Application.
Proceedings of the Digital Forensics and Watermarking - 16th International Workshop, 2017

2016
Information Security Display Technology with Multi-view Effect.
Proceedings of the Digital Forensics and Watermarking - 15th International Workshop, 2016

Halftone Visual Cryptography with Complementary Cover Images.
Proceedings of the Digital Forensics and Watermarking - 15th International Workshop, 2016

Collusive Attacks to Partition Authentication Visual Cryptography Scheme.
Proceedings of the Digital Forensics and Watermarking - 15th International Workshop, 2016

Privacy Monitor.
Proceedings of the Digital Forensics and Watermarking - 15th International Workshop, 2016

2015
An Improved Aspect Ratio Invariant Visual Cryptography Scheme with Flexible Pixel Expansion.
Proceedings of the Digital-Forensics and Watermarking - 14th International Workshop, 2015

A New Construction of Tagged Visual Cryptography Scheme.
Proceedings of the Digital-Forensics and Watermarking - 14th International Workshop, 2015

2013
Threshold Secret Image Sharing.
IACR Cryptol. ePrint Arch., 2013

The Security Defect of a Multi-pixel Encoding Method.
Proceedings of the Information Security, 16th International Conference, 2013

On the Randomness of Visual Cryptography Scheme.
Proceedings of the Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2013

On (k, n) Visual Cryptography Scheme with t Essential Parties.
Proceedings of the Information Theoretic Security - 7th International Conference, 2013


  Loading...