Wengjie Wang

According to our database1, Wengjie Wang authored at least 11 papers between 2012 and 2021.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2021
Using Dynamic Analysis to Automatically Detect Anti-Adblocker on the Web.
Proceedings of the 2021 IEEE Conference on Computer Communications Workshops, 2021

A system for detecting third-party tracking through the combination of dynamic analysis and static analysis.
Proceedings of the 2021 IEEE Conference on Computer Communications Workshops, 2021

Whether the sensitive information statement of the IoT privacy policy is consistent with the actual behavior.
Proceedings of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2021

A Statistical Learning Model with Deep Learning Characteristics.
Proceedings of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2021

Ant Hole: Data Poisoning Attack Breaking out the Boundary of Face Cluster.
Proceedings of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2021

2020
Vul-Mirror: A Few-Shot Learning Method for Discovering Vulnerable Code Clone.
EAI Endorsed Trans. Security Safety, 2020

IoT-APIScanner: Detecting API Unauthorized Access Vulnerabilities of IoT Platform.
Proceedings of the 29th International Conference on Computer Communications and Networks, 2020

2019
New Features of Authentication Scheme for the IoT: A Survey.
Proceedings of the 2nd International ACM Workshop on Security and Privacy for the Internet-of-Things, 2019

2013
Evaluating Query Performance Predictors Based on Brownian Distance Correlation.
Proceedings of the Pervasive Computing and the Networked World, 2013

On Evaluating Query Performance Predictors.
Proceedings of the Pervasive Computing and the Networked World, 2013

2012
A Survey of Learning to Rank for Real-Time Twitter Search.
Proceedings of the Pervasive Computing and the Networked World, 2012


  Loading...