Login / Signup
Wei Wang
ORCID
Publication Activity (10 Years)
Years Active: 2004-2024
Publications (10 Years): 96
Top Topics
Flow Analysis
Malware Detection
Android Application
Transportation Systems
Top Venues
CoRR
Future Gener. Comput. Syst.
IEEE Trans. Intell. Transp. Syst.
IEEE Trans. Dependable Secur. Comput.
</>
Publications
</>
Xiaoting Lyu
,
Yufei Han
,
Wei Wang
,
Hangwei Qian
,
Ivor Tsang
,
Xiangliang Zhang
Cross-Context Backdoor Attacks against Graph Prompt Learning.
KDD
(2024)
Meng Shen
,
Zhehui Tan
,
Dusit Niyato
,
Yuzhi Liu
,
Jiawen Kang
,
Zehui Xiong
,
Liehuang Zhu
,
Wei Wang
,
Xuemin (Sherman) Shen
Artificial Intelligence for Web 3.0: A Comprehensive Survey.
ACM Comput. Surv.
56 (10) (2024)
Xiaoting Lyu
,
Yufei Han
,
Wei Wang
,
Jingkai Liu
,
Yongsheng Zhu
,
Guangquan Xu
,
Jiqiang Liu
,
Xiangliang Zhang
Lurking in the shadows: Unveiling Stealthy Backdoor Attacks against Personalized Federated Learning.
USENIX Security Symposium
(2024)
Jun Wan
,
Cheng Chi
,
Haoyuan Yu
,
Yang Liu
,
Xiangrui Xu
,
Hongmei Lyu
,
Wei Wang
Fed-AttGRU Privacy-preserving Federated Interest Recommendation.
ACM TUR-C
(2024)
Xueshuo Xie
,
Haoxu Wang
,
Zhaolong Jian
,
Tao Li
,
Wei Wang
,
Zhiwei Xu
,
Guiling Wang
Memory-Efficient and Secure DNN Inference on TrustZone-enabled Consumer IoT Devices.
CoRR
(2024)
Chao Li
,
Runhua Xu
,
Balaji Palanisamy
,
Li Duan
,
Meng Shen
,
Jiqiang Liu
,
Wei Wang
Blockchain Takeovers in Web 3.0: An Empirical Study on the TRON-Steem Incident.
CoRR
(2024)
Yongzhong He
,
Yiming Wang
,
Sencun Zhu
,
Wei Wang
,
Yunjia Zhang
,
Qiang Li
,
Aimin Yu
Automatically Identifying CVE Affected Versions With Patches and Developer Logs.
IEEE Trans. Dependable Secur. Comput.
21 (2) (2024)
Xu Han
,
Qiang Li
,
Hongbo Cao
,
Lei Han
,
Bin Wang
,
Xuhua Bao
,
Yufei Han
,
Wei Wang
BFS2Adv: Black-box adversarial attack towards hard-to-attack short texts.
Comput. Secur.
141 (2024)
Bin Wang
,
Xiaohan Yuan
,
Li Duan
,
Hongliang Ma
,
Bin Wang
,
Chunhua Su
,
Wei Wang
DeFiScanner: Spotting DeFi Attacks Exploiting Logic Vulnerabilities on Blockchain.
IEEE Trans. Comput. Soc. Syst.
11 (2) (2024)
Xueshuo Xie
,
Haoxu Wang
,
Zhaolong Jian
,
Tao Li
,
Wei Wang
,
Zhiwei Xu
,
Guiling Wang
Memory-Efficient and Secure DNN Inference on TrustZone-enabled Consumer IoT Devices.
INFOCOM
(2024)
Xiaohan Yuan
,
Jiqiang Liu
,
Bin Wang
,
Wei Wang
,
Bin Wang
,
Tao Li
,
Xiaobo Ma
,
Witold Pedrycz
FedComm: A Privacy-Enhanced and Efficient Authentication Protocol for Federated Learning in Vehicular Ad-Hoc Networks.
IEEE Trans. Inf. Forensics Secur.
19 (2024)
Yaguan Qian
,
Kecheng Chen
,
Bin Wang
,
Zhaoquan Gu
,
Shouling Ji
,
Wei Wang
,
Yanchun Zhang
Enhancing Transferability of Adversarial Examples Through Mixed-Frequency Inputs.
IEEE Trans. Inf. Forensics Secur.
19 (2024)
Bin Wang
,
Tianjian Liu
,
Wenqi Wang
,
Yuan Weng
,
Chao Li
,
Guangquan Xu
,
Meng Shen
,
Sencun Zhu
,
Wei Wang
The Illusion of Anonymity: Uncovering the Impact of User Actions on Privacy in Web3 Social Ecosystems.
CoRR
(2024)
Xiangyu Wei
,
Guorong Chen
,
Yongsheng Zhu
,
Fuqiang Hu
,
Chongzhen Zhang
,
Zhen Han
,
Wei Wang
FedHGL: Cross-Institutional Federated Heterogeneous Graph Learning for IoT.
IEEE Internet Things J.
11 (15) (2024)
Xiaoting Lyu
,
Yufei Han
,
Wei Wang
,
Jingkai Liu
,
Yongsheng Zhu
,
Guangquan Xu
,
Jiqiang Liu
,
Xiangliang Zhang
Lurking in the shadows: Unveiling Stealthy Backdoor Attacks against Personalized Federated Learning.
CoRR
(2024)
Xiaoting Lyu
,
Yufei Han
,
Wei Wang
,
Hangwei Qian
,
Ivor Tsang
,
Xiangliang Zhang
Cross-Context Backdoor Attacks against Graph Prompt Learning.
CoRR
(2024)
Xudong He
,
Jian Wang
,
Jiqiang Liu
,
Weiping Ding
,
Zhen Han
,
Bin Wang
,
Jamel Nebhen
,
Wei Wang
DNS Rebinding Threat Modeling and Security Analysis for Local Area Network of Maritime Transportation Systems.
IEEE Trans. Intell. Transp. Syst.
24 (2) (2023)
Xiangrui Xu
,
Pengrui Liu
,
Wei Wang
,
Hongliang Ma
,
Bin Wang
,
Zhen Han
,
Yufei Han
CGIR: Conditional Generative Instance Reconstruction Attacks Against Federated Learning.
IEEE Trans. Dependable Secur. Comput.
20 (6) (2023)
Guangquan Xu
,
Wenqing Lei
,
Lixiao Gong
,
Jian Liu
,
Hongpeng Bai
,
Kai Chen
,
Ran Wang
,
Wei Wang
,
Kaitai Liang
,
Weizhe Wang
,
Weizhi Meng
,
Shaoying Liu
UAF-GUARD: Defending the use-after-free exploits via fine-grained memory permission management.
Comput. Secur.
125 (2023)
Jiaoze Mao
,
Yaguan Qian
,
Jianchang Huang
,
Zejie Lian
,
Renhui Tao
,
Bin Wang
,
Wei Wang
,
Tengteng Yao
Object-free backdoor attack and defense on semantic segmentation.
Comput. Secur.
132 (2023)
Heng Ye
,
Qiang Zeng
,
Jiqiang Liu
,
Xiaojiang Du
,
Wei Wang
Easy Peasy: A New Handy Method for Pairing Multiple COTS IoT Devices.
IEEE Trans. Dependable Secur. Comput.
20 (4) (2023)
Li Duan
,
Yangyang Sun
,
Wei Ni
,
Weiping Ding
,
Jiqiang Liu
,
Wei Wang
Attacks Against Cross-Chain Systems and Defense Approaches: A Contemporary Survey.
IEEE CAA J. Autom. Sinica
10 (8) (2023)
Euijin Choo
,
Mohamed Nabeel
,
Mashael AlSabah
,
Issa Khalil
,
Ting Yu
,
Wei Wang
DeviceWatch: A Data-Driven Network Analysis Approach to Identifying Compromised Mobile Devices with Graph-Inference.
ACM Trans. Priv. Secur.
26 (1) (2023)
Chao Li
,
Balaji Palanisamy
,
Runhua Xu
,
Li Duan
,
Jiqiang Liu
,
Wei Wang
How Hard is Takeover in DPoS Blockchains? Understanding the Security of Coin-based Voting Governance.
CCS
(2023)
Chao Li
,
Balaji Palanisamy
,
Runhua Xu
,
Li Duan
,
Jiqiang Liu
,
Wei Wang
How Hard is Takeover in DPoS Blockchains? Understanding the Security of Coin-based Voting Governance.
CoRR
(2023)
Wei Wang
,
Xiaoyang Suo
,
Xiangyu Wei
,
Bin Wang
,
Hao Wang
,
Hong-Ning Dai
,
Xiangliang Zhang
HGATE: Heterogeneous Graph Attention Auto-Encoders.
IEEE Trans. Knowl. Data Eng.
35 (4) (2023)
Yingnan Zhou
,
Xue Hu
,
Sihan Xu
,
Yan Jia
,
Yuhao Liu
,
Junyong Wang
,
Guangquan Xu
,
Wei Wang
,
Shaoying Liu
,
Thar Baker
Multi-Misconfiguration Diagnosis via Identifying Correlated Configuration Parameters.
IEEE Trans. Software Eng.
49 (10) (2023)
Yaguan Qian
,
Shuke He
,
Chenyu Zhao
,
Jiaqiang Sha
,
Wei Wang
,
Bin Wang
: A Lightweight Ensemble Adversarial Attack via Non-overlapping Vulnerable Frequency Regions.
ICCV
(2023)
Yinyao Dai
,
Yaguan Qian
,
Fang Lu
,
Bin Wang
,
Zhaoquan Gu
,
Wei Wang
,
Jian Wan
,
Yanchun Zhang
Improving adversarial robustness of medical imaging systems via adding global attention noise.
Comput. Biol. Medicine
164 (2023)
Li Duan
,
Wenyao Xu
,
Wei Ni
,
Wei Wang
BSAF: A blockchain-based secure access framework with privacy protection for cloud-device service collaborations.
J. Syst. Archit.
140 (2023)
Li Duan
,
Liu Yang
,
Chunhong Liu
,
Wei Ni
,
Wei Wang
A New Smart Contract Anomaly Detection Method by Fusing Opcode and Source Code Features for Blockchain Services.
IEEE Trans. Netw. Serv. Manag.
20 (4) (2023)
Xingze Wang
,
Guoxian Yu
,
Zhongmin Yan
,
Lin Wan
,
Wei Wang
,
Lizhen Cui
Lung Cancer Subtype Diagnosis by Fusing Image-Genomics Data and Hybrid Deep Networks.
IEEE ACM Trans. Comput. Biol. Bioinform.
20 (1) (2023)
Dan Su
,
Jiqiang Liu
,
Sencun Zhu
,
Xiaoyang Wang
,
Wei Wang
Alexa Skills: Security Vulnerabilities and Countermeasures.
CNS
(2022)
Zikai Zhang
,
Yidong Li
,
Wei Wang
,
Haifeng Song
,
Hairong Dong
Malware detection with dynamic evolving graph convolutional networks.
Int. J. Intell. Syst.
37 (10) (2022)
Bin Wang
,
Pengfei Guo
,
Xing Wang
,
Yongzhong He
,
Wei Wang
Transparent Aspect-Level Sentiment Analysis Based on Dependency Syntax Analysis and Its Application on COVID-19.
ACM J. Data Inf. Qual.
14 (2) (2022)
Yingxiao Xiang
,
Chao Li
,
Tong Chen
,
Yike Li
,
Endong Tong
,
Wenjia Niu
,
Qiong Li
,
Jiqiang Liu
,
Wei Wang
Toward Blockchain-Based Spoofing Defense for Controlled Optimization of Phases in Traffic Signal System.
IEICE Trans. Inf. Syst.
(2) (2022)
Jin Li
,
Heng Ye
,
Tong Li
,
Wei Wang
,
Wenjing Lou
,
Y. Thomas Hou
,
Jiqiang Liu
,
Rongxing Lu
Efficient and Secure Outsourcing of Differentially Private Data Publishing With Multiple Evaluators.
IEEE Trans. Dependable Secur. Comput.
19 (1) (2022)
Longyang Yi
,
Yangyang Sun
,
Bin Wang
,
Li Duan
,
Hongliang Ma
,
Bin Wang
,
Zhen Han
,
Wei Wang
CCUBI: A cross-chain based premium competition scheme with privacy preservation for usage-based insurance.
Int. J. Intell. Syst.
37 (12) (2022)
Helene Orsini
,
Hongyan Bao
,
Yujun Zhou
,
Xiangrui Xu
,
Yufei Han
,
Longyang Yi
,
Wei Wang
,
Xin Gao
,
Xiangliang Zhang
AdvCat: Domain-Agnostic Robustness Assessment for Cybersecurity-Critical Applications with Categorical Inputs.
Big Data
(2022)
Zhuo Lv
,
Hongbo Cao
,
Feng Zhang
,
Yuange Ren
,
Bin Wang
,
Cen Chen
,
Nuannuan Li
,
Hao Chang
,
Wei Wang
AWFC: Preventing Label Flipping Attacks Towards Federated Learning for Intelligent IoT.
Comput. J.
65 (11) (2022)
Chongsheng Zhang
,
Yuefeng Tao
,
Kai Du
,
Weiping Ding
,
Bin Wang
,
Ji Liu
,
Wei Wang
Character-Level Street View Text Spotting Based on Deep Multisegmentation Network for Smarter Autonomous Driving.
IEEE Trans. Artif. Intell.
3 (2) (2022)
Heng Ye
,
Jiqiang Liu
,
Hao Zhen
,
Wenbin Jiang
,
Bin Wang
,
Wei Wang
VREFL: Verifiable and Reconnection-Efficient Federated Learning in IoT scenarios.
J. Netw. Comput. Appl.
207 (2022)
Li Duan
,
Tieliang Gao
,
Wei Ni
,
Wei Wang
A hybrid intelligent service recommendation by latent semantics and explicit ratings.
Int. J. Intell. Syst.
36 (12) (2021)
Zikai Zhang
,
Yidong Li
,
Hairong Dong
,
Honghao Gao
,
Yi Jin
,
Wei Wang
Spectral-Based Directed Graph Network for Malware Detection.
IEEE Trans. Netw. Sci. Eng.
8 (2) (2021)
Chongsheng Zhang
,
Weiping Ding
,
Guowen Peng
,
Feifei Fu
,
Wei Wang
Street View Text Recognition With Deep Learning for Urban Scene Understanding in Intelligent Transportation Systems.
IEEE Trans. Intell. Transp. Syst.
22 (7) (2021)
Lichen Cheng
,
Jiqiang Liu
,
Yi Jin
,
Yidong Li
,
Wei Wang
Account Guarantee Scheme: Making Anonymous Accounts Supervised in Blockchain.
ACM Trans. Internet Techn.
21 (1) (2021)
Dawei Wang
,
Kai Chen
,
Wei Wang
Demystifying the Vetting Process of Voice-controlled Skills on Markets.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol.
5 (3) (2021)
Dan Su
,
Jiqiang Liu
,
Sencun Zhu
,
Xiaoyang Wang
,
Wei Wang
,
Xiangliang Zhang
AppQ: Warm-starting App Recommendation Based on View Graphs.
CoRR
(2021)
Wei Wang
,
Jingjing Song
,
Guangquan Xu
,
Yidong Li
,
Hao Wang
,
Chunhua Su
ContractWard: Automated Vulnerability Detection Models for Ethereum Smart Contracts.
IEEE Trans. Netw. Sci. Eng.
8 (2) (2021)
Yidong Li
,
Li Zhang
,
Zhuo Lv
,
Wei Wang
Detecting Anomalies in Intelligent Vehicle Charging and Station Power Supply Systems With Multi-Head Attention Models.
IEEE Trans. Intell. Transp. Syst.
22 (1) (2021)
Yunzhe Tian
,
Jiqiang Liu
,
Endong Tong
,
Wenjia Niu
,
Liang Chang
,
Qi Alfred Chen
,
Gang Li
,
Wei Wang
Towards Revealing Parallel Adversarial Attack on Politician Socialnet of Graph Structure.
Secur. Commun. Networks
2021 (2021)
Xiangyu Wei
,
Guangquan Xu
,
Hao Wang
,
Yongzhong He
,
Zhen Han
,
Wei Wang
Sensing Users' Emotional Intelligence in Social Networks.
IEEE Trans. Comput. Soc. Syst.
7 (1) (2020)
Yongzhong He
,
Chao Wang
,
Guangquan Xu
,
Wenjuan Lian
,
Hequn Xian
,
Wei Wang
Privacy-preserving categorization of mobile applications based on large-scale usage data.
Inf. Sci.
514 (2020)
Xiaoming Liu
,
Chao Shen
,
Wei Wang
,
Xiaohong Guan
CoEvil: A Coevolutionary Model for Crime Inference Based on Fuzzy Rough Feature Selection.
IEEE Trans. Fuzzy Syst.
28 (5) (2020)
Dan Su
,
Jiqiang Liu
,
Sencun Zhu
,
Xiaoyang Wang
,
Wei Wang
"Are you home alone?" "Yes" Disclosing Security and Privacy Vulnerabilities in Alexa Skills.
CoRR
(2020)
Wei Wang
,
Yaoyao Shang
,
Yongzhong He
,
Yidong Li
,
Jiqiang Liu
BotMark: Automated botnet detection with hybrid analysis of flow-based and graph-based traffic behaviors.
Inf. Sci.
511 (2020)
Guangquan Xu
,
Miao Li
,
Xiaotong Li
,
Kai Chen
,
Ran Wang
,
Wei Wang
,
Kaitai Liang
,
Qiang Tang
,
Shaoying Liu
Defending Use-After-Free via Relationship Between Memory and Pointer.
CollaborateCom (1)
(2020)
Guangquan Xu
,
Wei Wang
,
Litao Jiao
,
Xiaotong Li
,
Kaitai Liang
,
James Xi Zheng
,
Wenjuan Lian
,
Hequn Xian
,
Honghao Gao
SoProtector: Safeguard Privacy for Native SO Files in Evolving Mobile IoT Applications.
IEEE Internet Things J.
7 (4) (2020)
Heng Ye
,
Jiqiang Liu
,
Wei Wang
,
Ping Li
,
Tong Li
,
Jin Li
Secure and efficient outsourcing differential privacy data release scheme in Cyber-physical system.
Future Gener. Comput. Syst.
108 (2020)
Qiang Yang
,
Hind Alamro
,
Somayah Albaradei
,
Adil Salhi
,
Xiaoting Lv
,
Changsheng Ma
,
Manal Alshehri
,
Inji Jaber
,
Faroug Tifratene
,
Wei Wang
,
Takashi Gojobori
,
Carlos M. Duarte
,
Xin Gao
,
Xiangliang Zhang
SenWave: Monitoring the Global Sentiments under the COVID-19 Pandemic.
CoRR
(2020)
Yingjie Wang
,
Guangquan Xu
,
Xing Liu
,
Weixuan Mao
,
Chengxiang Si
,
Witold Pedrycz
,
Wei Wang
Identifying vulnerabilities of SSL/TLS certificate verification in Android apps with static and dynamic analysis.
J. Syst. Softw.
167 (2020)
Xing Liu
,
Jiqiang Liu
,
Sencun Zhu
,
Wei Wang
,
Xiangliang Zhang
Privacy Risk Analysis and Mitigation of Analytics Libraries in the Android Ecosystem.
IEEE Trans. Mob. Comput.
19 (5) (2020)
Xudong He
,
Jian Wang
,
Jiqiang Liu
,
Zhen Han
,
Zhuo Lv
,
Wei Wang
DNS Rebinding Detection for Local Internet of Things Devices.
FCS
(2020)
Wei Wang
,
Mengxue Zhao
,
Jigang Wang
Effective android malware detection with a hybrid model based on deep autoencoder and convolutional neural network.
J. Ambient Intell. Humaniz. Comput.
10 (8) (2019)
Jingjing Song
,
Haiwu He
,
Zhuo Lv
,
Chunhua Su
,
Guangquan Xu
,
Wei Wang
An Efficient Vulnerability Detection Model for Ethereum Smart Contracts.
NSS
(2019)
Dan Su
,
Jiqiang Liu
,
Xiaoyang Wang
,
Wei Wang
Detecting Android Locker-Ransomware on Chinese Social Networks.
IEEE Access
7 (2019)
Yingjie Wang
,
Xing Liu
,
Weixuan Mao
,
Wei Wang
DCDroid: automated detection of SSL/TLS certificate verification vulnerabilities in Android apps.
ACM TUR-C
(2019)
Xiaoming Li
,
Guangquan Xu
,
Xi Zheng
,
Kaitai Liang
,
Emmanouil Panaousis
,
Tao Li
,
Wei Wang
,
Chao Shen
Using Sparse Representation to Detect Anomalies in Complex WSNs.
ACM Trans. Intell. Syst. Technol.
10 (6) (2019)
Wei Wang
,
Meichen Zhao
,
Zhenzhen Gao
,
Guangquan Xu
,
Hequn Xian
,
Yuanyuan Li
,
Xiangliang Zhang
Constructing Features for Detecting Android Malicious Applications: Issues, Taxonomy and Directions.
IEEE Access
7 (2019)
Weixuan Mao
,
Bo Sun
,
Guangquan Xu
,
Cheng Liu
,
Chengxiang Si
,
Wei Wang
Understanding Effects of Collaborations in Developing Mobile Computing Systems: Popularity, Efficiency, and Quality.
IEEE Access
7 (2019)
Li Zhang
,
Zhuo Lv
,
Xuesong Zhang
,
Cen Chen
,
Nuannuan Li
,
Yidong Li
,
Wei Wang
A Novel Approach for Traffic Anomaly Detection in Power Distributed Control System and Substation System.
NSS
(2019)
Yongzhong He
,
Xuejun Yang
,
Binghui Hu
,
Wei Wang
Dynamic privacy leakage analysis of Android third-party libraries.
J. Inf. Secur. Appl.
46 (2019)
Lichen Cheng
,
Jiqiang Liu
,
Guangquan Xu
,
Zonghua Zhang
,
Hao Wang
,
Hong-Ning Dai
,
Yulei Wu
,
Wei Wang
SCTSC: A Semicentralized Traffic Signal Control Mode With Attribute-Based Blockchain in IoVs.
IEEE Trans. Comput. Soc. Syst.
6 (6) (2019)
Lichen Cheng
,
Jiqiang Liu
,
Chunhua Su
,
Kaitai Liang
,
Guangquan Xu
,
Wei Wang
Polynomial-based modifiable blockchain structure for removing fraud transactions.
Future Gener. Comput. Syst.
99 (2019)
Xiangyu Wei
,
Jin Li
,
Zhen Han
,
Wei Wang
Predicting Users' Emotional Intelligence with Social Networking Data.
SocialSec
(2019)
Nannan Xie
,
Xing Wang
,
Wei Wang
,
Jiqiang Liu
Fingerprinting Android malware families.
Frontiers Comput. Sci.
13 (3) (2019)
Wei Wang
,
Jiqiang Liu
,
Georgios Pitsilis
,
Xiangliang Zhang
Abstracting massive data for lightweight intrusion detection in computer networks.
Inf. Sci.
(2018)
Dan Su
,
Jiqiang Liu
,
Wei Wang
,
Xiaoyang Wang
,
Xiaojiang Du
,
Mohsen Guizani
Discovering Communities of Malapps on Android-based Mobile Cyber-physical Systems.
CoRR
(2018)
Wei Wang
,
Yuanyuan Li
,
Xing Wang
,
Jiqiang Liu
,
Xiangliang Zhang
Detecting Android malicious apps and categorizing benign apps with ensemble of classifiers.
Future Gener. Comput. Syst.
78 (2018)
Yaoyao Shang
,
Shuangmao Yang
,
Wei Wang
Botnet Detection with Hybrid Analysis on Flow Based and Graph Based Features of Network Traffic.
ICCCS (2)
(2018)
Xing Liu
,
Jiqiang Liu
,
Wei Wang
,
Sencun Zhu
Android single sign-on security: Issues, taxonomy and directions.
Future Gener. Comput. Syst.
89 (2018)
Wei Wang
,
Zhenzhen Gao
,
Meichen Zhao
,
Yidong Li
,
Jiqiang Liu
,
Xiangliang Zhang
DroidEnsemble: Detecting Android Malicious Applications With Ensemble of String and Structural Static Features.
IEEE Access
6 (2018)
Xing Liu
,
Jiqiang Liu
,
Wei Wang
,
Yongzhong He
,
Xiangliang Zhang
Discovering and understanding android sensor usage behaviors with data flow analysis.
World Wide Web
21 (1) (2018)
Dan Su
,
Jiqiang Liu
,
Wei Wang
,
Xiaoyang Wang
,
Xiaojiang Du
,
Mohsen Guizani
Discovering communities of malapps on Android-based mobile cyber-physical systems.
Ad Hoc Networks
80 (2018)
Jin Li
,
Heng Ye
,
Wei Wang
,
Wenjing Lou
,
Y. Thomas Hou
,
Jiqiang Liu
,
Rongxing Lu
Efficient and Secure Outsourcing of Differentially Private Data Publication.
ESORICS (2)
(2018)
Lun Li
,
Jiqiang Liu
,
Lichen Cheng
,
Shuo Qiu
,
Wei Wang
,
Xiangliang Zhang
,
Zonghua Zhang
CreditCoin: A Privacy-Preserving Blockchain-Based Incentive Announcement Network for Communications of Smart Vehicles.
IEEE Trans. Intell. Transp. Syst.
19 (7) (2018)
Shuo Qiu
,
Jiqiang Liu
,
Yanfeng Shi
,
Ming Li
,
Wei Wang
Identity-Based Private Matching over Outsourced Encrypted Datasets.
IEEE Trans. Cloud Comput.
6 (3) (2018)
Yan Chen
,
Wei Wang
,
Xiangliang Zhang
Randomizing SVM Against Adversarial Attacks Under Uncertainty.
PAKDD (3)
(2018)
Xiaochun Wang
,
Yidong Li
,
Yi Jin
,
Wei Wang
Spectrum-Centric Differential Privacy for Hypergraph Spectral Clustering.
PDCAT
(2018)
Jiaping Men
,
Wei Wang
,
Jiqiang Liu
,
Zhen Han
Designing Mutual Authentication Protocols in Industrial Wireless Network.
ICDIS
(2018)
Ming Fan
,
Jun Liu
,
Wei Wang
,
Haifei Li
,
Zhenzhou Tian
,
Ting Liu
DAPASA: Detecting Android Piggybacked Apps Through Sensitive Subgraph Analysis.
IEEE Trans. Inf. Forensics Secur.
12 (8) (2017)
Xing Wang
,
Wei Wang
,
Yongzhong He
,
Jiqiang Liu
,
Zhen Han
,
Xiangliang Zhang
Characterizing Android apps' behavior for effective detection of malapps at large scale.
Future Gener. Comput. Syst.
75 (2017)
Yongfei Zhu
,
Di Zhao
,
Wei Wang
,
Haiwu He
A Novel Load Balancing Algorithm Based on Improved Particle Swarm Optimization in Cloud Computing Environment.
HCC
(2016)
Xing Liu
,
Sencun Zhu
,
Wei Wang
,
Jiqiang Liu
Alde: Privacy Risk Analysis of Analytics Libraries in the Android Ecosystem.
SecureComm
(2016)
Dan Su
,
Wei Wang
,
Xing Wang
,
Jiqiang Liu
Anomadroid: Profiling Android Applications' Behaviors for Identifying Unknown Malapps.
Trustcom/BigDataSE/ISPA
(2016)
Shuo Qiu
,
Boyang Wang
,
Ming Li
,
Jesse Victors
,
Jiqiang Liu
,
Yanfeng Shi
,
Wei Wang
Fast, Private and Verifiable: Server-aided Approximate Similarity Computation over Large-Scale Datasets.
SCC@AsiaCCS
(2016)
Xing Liu
,
Wei Wang
,
Jiqiang Liu
POSTER: The Popular Apps in Your Pocket Are Leaking Your Privacy.
CCS
(2015)
Wei Wang
,
Yongzhong He
,
Jiqiang Liu
,
Sylvain Gombault
Constructing important features from massive network traffic for lightweight intrusion detection.
IET Inf. Secur.
9 (6) (2015)
Xing Liu
,
Jiqiang Liu
,
Wei Wang
Exploring sensor usage behaviors of Android applications based on data flow analysis.
IPCCC
(2015)
Georgios Pitsilis
,
Wei Wang
Harnessing the power of social bookmarking for improving tag-based recommendations.
Comput. Hum. Behav.
50 (2015)