Yong Wang
Orcid: 0000-0002-1572-068XAffiliations:
- Beijing Institute of Technology, School of Software, China (PhD 2003)
According to our database1,
Yong Wang
authored at least 23 papers
between 2006 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
An empirical study of problems and evaluation of IoT malware classification label sources.
J. King Saud Univ. Comput. Inf. Sci., January, 2024
Strengthening LLM ecosystem security: Preventing mobile malware from manipulating LLM-based applications.
Inf. Sci., 2024
Internet Things, 2024
Classifier Clustering and Feature Alignment for Federated Learning under Distributed Concept Drift.
CoRR, 2024
LM-cAPI:A Lite Model Based on API Core Semantic Information for Malware Classification.
Proceedings of the Applied Cryptography and Network Security Workshops, 2024
2023
J. Inf. Secur. Appl., September, 2023
A novel anomaly detection approach based on ensemble semi-supervised active learning (ADESSA).
Comput. Secur., June, 2023
Privacy-Preserving and Traceable Federated Learning for data sharing in industrial IoT applications.
Expert Syst. Appl., 2023
2022
A novel approach based on adaptive online analysis of encrypted traffic for identifying Malware in IIoT.
Inf. Sci., 2022
Proceedings of the BSCI 2022: Proceedings of the 4th ACM International Symposium on Blockchain and Secure Critical Infrastructure, 2022
2021
Wirel. Commun. Mob. Comput., 2021
APTMalInsight: Identify and cognize APT malware based on system call information and ontology knowledge framework.
Inf. Sci., 2021
2019
J. Netw. Comput. Appl., 2019
MalDAE: Detecting and explaining malware based on correlation and fusion of static and dynamic characteristics.
Comput. Secur., 2019
Review: Build a Roadmap for Stepping Into the Field of Anti-Malware Research Smoothly.
IEEE Access, 2019
2018
2017
Proceedings of the Network and System Security - 11th International Conference, 2017
2015
Proceedings of the Information Technology and Intelligent Transportation Systems, 2015
Dynamic Binary Instrumentation Based Defense Solution against Virtual Function Table Hijacking Attacks at C++ Binary Programs.
Proceedings of the 10th International Conference on P2P, 2015
2008
Proceedings of the IEEE International Conference on Networking, Sensing and Control, 2008
Proceedings of the IEEE International Conference on Networking, Sensing and Control, 2008
2007
Proceedings of the Computational Intelligence and Security, International Conference, 2007
2006
Proceedings of the Autonomic and Trusted Computing, Third International Conference, 2006