​
Login / Signup
Wei Peng
Publication Activity (10 Years)
Years Active: 2011-2019
Publications (10 Years): 3
Top Topics
Social Networking
Privacy Preserving
Malware Detection
Malicious Executables
Top Venues
CNS
ICC
SECON
IEEE Trans. Mob. Comput.
</>
Publications
</>
Tianchong Gao
,
Wei Peng
,
Devkishen Sisodia
,
Tanay Kumar Saha
,
Feng Li
,
Mohammad Al Hasan
Android Malware Detection via Graphlet Sampling.
IEEE Trans. Mob. Comput.
18 (12) (2019)
Xukai Zou
,
Huian Li
,
Feng Li
,
Wei Peng
,
Yan Sui
Transparent, Auditable, and Stepwise Verifiable Online E-Voting Enabling an Open and Fair Election.
Cryptogr.
1 (2) (2017)
Wei Peng
,
Tianchong Gao
,
Devkishen Sisodia
,
Tanay Kumar Saha
,
Feng Li
,
Mohammad Al Hasan
ACTS: Extracting Android App topologiCal signature through graphleT Sampling.
CNS
(2016)
Wei Peng
,
Feng Li
,
Xukai Zou
Temporal coverage based content distribution in heterogeneous smart device networks.
ICC
(2015)
Wei Peng
,
Feng Li
,
Xukai Zou
,
Jie Wu
A Two-Stage Deanonymization Attack against Anonymized Social Networks.
IEEE Trans. Computers
63 (2) (2014)
Wei Peng
,
Feng Li
,
Chin-Tser Huang
,
Xukai Zou
A moving-target defense strategy for Cloud-based services with heterogeneous and dynamic attack surfaces.
ICC
(2014)
Xukai Zou
,
Huian Li
,
Yan Sui
,
Wei Peng
,
Feng Li
Assurable, transparent, and mutual restraining e-voting involving multiple conflicting parties.
INFOCOM
(2014)
Wei Peng
,
Feng Li
,
Xukai Zou
,
Jie Wu
Behavioral Malware Detection in Delay Tolerant Networks.
IEEE Trans. Parallel Distributed Syst.
25 (1) (2014)
Feng Li
,
Chin-Tser Huang
,
Jie Huang
,
Wei Peng
Feedback-based smartphone strategic sampling for BYOD security.
ICCCN
(2014)
Wei Peng
,
Feng Li
,
Xukai Zou
,
Jie Wu
The Virtue of Patience: Offloading Topical Cellular Content through Opportunistic Links.
MASS
(2013)
Huian Li
,
Yan Sui
,
Wei Peng
,
Xukai Zou
,
Feng Li
A viewable e-voting scheme for environments with conflict of interest.
CNS
(2013)
Wei Peng
,
Feng Li
,
Keesook J. Han
,
Xukai Zou
,
Jie Wu
T-dominance: Prioritized defense deployment for BYOD security.
CNS
(2013)
Feng Li
,
Wei Peng
,
Chin-Tser Huang
,
Xukai Zou
Smartphone strategic sampling in defending enterprise network security.
ICC
(2013)
Wei Peng
,
Feng Li
,
Xukai Zou
,
Jie Wu
A privacy-preserving social-aware incentive system for word-of-mouth advertisement dissemination on smart mobile devices.
SECON
(2012)
Wei Peng
,
Feng Li
,
Xukai Zou
,
Jie Wu
Seed and Grow: An attack against anonymized social networks.
SECON
(2012)
Wei Peng
,
Feng Li
,
Xukai Zou
,
Jie Wu
Behavioral Detection and Containment of Proximity Malware in Delay Tolerant Networks.
MASS
(2011)