Yu Wang
Orcid: 0000-0002-9807-2293Affiliations:
- Guangzhou University, School of Computer Science, Guangzhou, China
- Deakin University, School of Information Technology, Geelong, VIC, Australia (PhD 2013)
- Sun Yat-Sen University, Department of Electronic and Communication Engineering, Guangzhou, China
According to our database1,
Yu Wang
authored at least 97 papers
between 2008 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on scopus.com
-
on orcid.org
On csauthors.net:
Bibliography
2024
IEEE Trans. Consumer Electron., February, 2024
Int. J. Intell. Syst., 2024
Proceedings of the ACM SIGCOMM 2024 Conference: Posters and Demos, 2024
Proceedings of the Information Security Practice and Experience, 2024
2023
J. Inf. Secur. Appl., November, 2023
A blockchain-enabled collaborative intrusion detection framework for SDN-assisted cyber-physical systems.
Int. J. Inf. Sec., October, 2023
<i>ASSBert</i>: Active and semi-supervised bert for smart contract vulnerability detection.
J. Inf. Secur. Appl., March, 2023
Int. J. Netw. Manag., 2023
Application-Layer DDoS Attack Detection Using Explicit Duration Recurrent Network-Based Application-Layer Protocol Communication Models.
Int. J. Intell. Syst., 2023
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023
2022
Mob. Networks Appl., 2022
Enhancing blockchain-based filtration mechanism via IPFS for collaborative intrusion detection in IoT networks.
J. Syst. Archit., 2022
BlockCSDN: Towards Blockchain-Based Collaborative Intrusion Detection in Software Defined Networking.
IEICE Trans. Inf. Syst., 2022
Proceedings of the Science of Cyber Security - 4th International Conference, 2022
Proceedings of the Applied Cryptography and Network Security Workshops, 2022
2021
GAN-Based Differential Private Image Privacy Protection Framework for the Internet of Multimedia Things.
Sensors, 2021
Recent Advances in Blockchain and Artificial Intelligence Integration: Feasibility Analysis, Research Issues, Applications, Challenges, and Future Work.
Secur. Commun. Networks, 2021
DRL-R: Deep reinforcement learning approach for intelligent routing in software-defined data-center networks.
J. Netw. Comput. Appl., 2021
Int. J. Netw. Manag., 2021
Toward a blockchain-based framework for challenge-based collaborative intrusion detection.
Int. J. Inf. Sec., 2021
Challenge-based collaborative intrusion detection in software-defined networking: an evaluation.
Digit. Commun. Networks, 2021
Comput. Commun., 2021
Enhancing Blackslist-Based Packet Filtration Using Blockchain in Wireless Sensor Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2021
Proceedings of the IEEE International Conference on Data Mining, 2021
2020
Fine-grained flow classification using deep learning for software defined data center networks.
J. Netw. Comput. Appl., 2020
A swipe-based unlocking mechanism with supervised learning on smartphones: Design and evaluation.
J. Netw. Comput. Appl., 2020
J. Inf. Secur. Appl., 2020
Detecting insider attacks in medical cyber-physical networks based on behavioral profiling.
Future Gener. Comput. Syst., 2020
Frontiers Comput. Sci., 2020
TruNeo: an integrated pipeline improves personalized true tumor neoantigen identification.
BMC Bioinform., 2020
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2020
A Framework of Blockchain-Based Collaborative Intrusion Detection in Software Defined Networking.
Proceedings of the Network and System Security - 14th International Conference, 2020
2019
Mix-flow scheduling using deep reinforcement learning for software-defined data-center networks.
Internet Technol. Lett., 2019
IoT-FBAC: Function-based access control scheme using identity-based encryption in IoT.
Future Gener. Comput. Syst., 2019
Designing collaborative blockchained signature-based intrusion detection in IoT environments.
Future Gener. Comput. Syst., 2019
Future Gener. Comput. Syst., 2019
Concurr. Comput. Pract. Exp., 2019
Adaptive machine learning-based alarm reduction via edge computing for distributed intrusion detection systems.
Concurr. Comput. Pract. Exp., 2019
Towards detection of juice filming charging attacks via supervised CPU usage analysis on smartphones.
Comput. Electr. Eng., 2019
Ann. des Télécommunications, 2019
Faces are Protected as Privacy: An Automatic Tagging Framework Against Unpermitted Photo Sharing in Social Media.
IEEE Access, 2019
Proceedings of the Security and Privacy in Social Networks and Big Data, 2019
Proceedings of the Network and System Security - 13th International Conference, 2019
Proceedings of the Machine Learning for Cyber Security - Second International Conference, 2019
Proceedings of the Applied Cryptography and Network Security Workshops, 2019
2018
Sensors, 2018
A fog-based privacy-preserving approach for distributed signature-based intrusion detection.
J. Parallel Distributed Comput., 2018
<i>TouchWB</i>: Touch behavioral user authentication based on web browsing on smartphones.
J. Netw. Comput. Appl., 2018
Future Gener. Comput. Syst., 2018
Concurr. Comput. Pract. Exp., 2018
JFCGuard: Detecting juice filming charging attack via processor usage analysis on smartphones.
Comput. Secur., 2018
Identifying Passive Message Fingerprint Attacks via Honey Challenge in Collaborative Intrusion Detection Networks.
Proceedings of the 17th IEEE International Conference On Trust, 2018
Proceedings of the 2018 International Symposium on Security and Privacy in Social Networks and Big Data, 2018
PrivacySearch: An End-User and Query Generalization Tool for Privacy Enhancement in Web Search.
Proceedings of the Network and System Security - 12th International Conference, 2018
Proceedings of the IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2018
Towards Securing Challenge-Based Collaborative Intrusion Detection Networks via Message Verification.
Proceedings of the Information Security Practice and Experience, 2018
Evaluating the Impact of Intrusion Sensitivity on Securing Collaborative Intrusion Detection Networks Against SOOA.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018
Analyzing Use of High Privileges on Android: An Empirical Case Study of Screenshot and Screen Recording Applications.
Proceedings of the Information Security and Cryptology - 14th International Conference, 2018
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018
Enhancing Intelligent Alarm Reduction for Distributed Intrusion Detection Systems via Edge Computing.
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018
2017
IEEE Trans. Inf. Forensics Secur., 2017
Addressing the class imbalance problem in Twitter spam detection using ensemble learning.
Comput. Secur., 2017
Exploring Energy Consumption of Juice Filming Charging Attack on Smartphones: A Pilot Study.
Proceedings of the Network and System Security - 11th International Conference, 2017
Home Location Protection in Mobile Social Networks: A Community Based Method (Short Paper).
Proceedings of the Information Security Practice and Experience, 2017
A Privacy-Preserving Framework for Collaborative Intrusion Detection Networks Through Fog Computing.
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017
Detecting Malicious Nodes in Medical Smartphone Networks Through Euclidean Distance-Based Behavioral Profiling.
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017
2016
A General Collaborative Framework for Modeling and Perceiving Distributed Network Behavior.
IEEE/ACM Trans. Netw., 2016
Detection and classification of anomaly intrusion using hierarchy clustering and SVM.
Secur. Commun. Networks, 2016
计算机科学, 2016
Proceedings of the Network and System Security - 10th International Conference, 2016
An Ensemble Learning Approach for Addressing the Class Imbalance Problem in Twitter Spam Detection.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016
Proceedings of the Intelligent Information and Database Systems - 8th Asian Conference, 2016
Proceedings of the 2016 IEEE International Conference on Computer and Information Technology, 2016
2015
Proceedings of the 40th IEEE Conference on Local Computer Networks, 2015
2014
IEEE Trans. Parallel Distributed Syst., 2014
Proceedings of the Advances in Digital Forensics X, 2014
2013
IEEE Trans. Parallel Distributed Syst., 2013
Modeling Oscillation Behavior of Network Traffic by Nested Hidden Markov Model with Variable State-Duration.
IEEE Trans. Parallel Distributed Syst., 2013
Unsupervised traffic classification using flow statistical properties and IP packet payload.
J. Comput. Syst. Sci., 2013
Proceedings of IEEE International Conference on Communications, 2013
2012
J. Networks, 2012
Generating regular expression signatures for network traffic classification in trusted network management.
J. Netw. Comput. Appl., 2012
Proceedings of the 8th International Wireless Communications and Mobile Computing Conference, 2012
2011
Proceedings of the 5th International Conference on Network and System Security, 2011
Proceedings of the 14th IEEE International Conference on Computational Science and Engineering, 2011
2010
Concurr. Comput. Pract. Exp., 2010
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications, 2010
2009
Proceedings of the Third International Conference on Network and System Security, 2009
2008
Proceedings of the International Conference on Computer Science and Software Engineering, 2008