Bailing Wang

Orcid: 0000-0003-2973-8036

According to our database1, Bailing Wang authored at least 59 papers between 2005 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Hyperplane projection network for few-shot relation classification.
Expert Syst. Appl., March, 2024

2023
GNN-based Advanced Feature Integration for ICS Anomaly Detection.
ACM Trans. Intell. Syst. Technol., December, 2023

AAE-DSVDD: A one-class classification model for VPN traffic identification.
Comput. Networks, November, 2023

A risk assessment model for similar attack scenarios in industrial control system.
J. Supercomput., September, 2023

Process-Oriented heterogeneous graph learning in GNN-Based ICS anomalous pattern recognition.
Pattern Recognit., September, 2023

Few-shot learning in realistic settings for text CAPTCHA recognition.
Neural Comput. Appl., May, 2023

Analysis of Recent Deep-Learning-Based Intrusion Detection Methods for In-Vehicle Network.
IEEE Trans. Intell. Transp. Syst., February, 2023

Hybrid Intrusion Detection System Based on Combination of Random Forest and Autoencoder.
Symmetry, February, 2023

LiPar: A Lightweight Parallel Learning Model for Practical In-Vehicle Network Intrusion Detection.
CoRR, 2023

Effective In-vehicle Intrusion Detection via Multi-view Statistical Graph Learning on CAN Messages.
CoRR, 2023

KERMIT: Knowledge Graph Completion of Enhanced Relation Modeling with Inverse Transformation.
CoRR, 2023

2022
Detecting Semantic Attack in SCADA System: A Behavioral Model Based on Secondary Labeling of States-Duration Evolution Graph.
IEEE Trans. Netw. Sci. Eng., 2022

Anomaly detection for industrial control operations with optimized ABC-SVM and weighted function code correlation analysis.
J. Ambient Intell. Humaniz. Comput., 2022

Contrastive graph neural network-based camouflaged fraud detector.
Inf. Sci., 2022

Mining trading patterns of pyramid schemes from financial time series data.
Future Gener. Comput. Syst., 2022

Global-local integration for GNN-based anomalous device state detection in industrial control systems.
Expert Syst. Appl., 2022

2021
Make complex CAPTCHAs simple: A fast text captcha solver based on a small number of samples.
Inf. Sci., 2021

A network representation learning method based on topology.
Inf. Sci., 2021

A novel classification model of collective user web behaviour based on network traffic contents.
IET Networks, 2021

MPLR: a novel model for multi-target learning of logical rules for knowledge graph reasoning.
CoRR, 2021

Mining frequent pyramid patterns from time series transaction data with custom constraints.
Comput. Secur., 2021

2020
Anomaly Detection for Industrial Control System Based on Autoencoder Neural Network.
Wirel. Commun. Mob. Comput., 2020

PLC-SEIFF: A programmable logic controller security incident forensics framework based on automatic construction of security constraints.
Comput. Secur., 2020

Generalized population dynamics model of aphids in wheat based on catastrophe theory.
Biosyst., 2020

Dynamic Adjusting ABC-SVM Anomaly Detection Based on Weighted Function Code Correlation.
Proceedings of the Machine Learning for Cyber Security - Third International Conference, 2020

A Deep Learning Approach to Detect Anomaly in Software-Defined Network.
Proceedings of the 12th International Conference on Advanced Infocomm Technology, 2020

2019
A novel approach for Web page modeling in personal information extraction.
World Wide Web, 2019

An algorithm for calculating coverage rate of WSNs based on geometry decomposition approach.
Peer-to-Peer Netw. Appl., 2019

Ranking the big sky: efficient top-k skyline computation on massive data.
Knowl. Inf. Syst., 2019

Dynamic skyline computation on massive data.
Knowl. Inf. Syst., 2019

PRS: efficient range skyline computation on massive data via presorting.
Knowl. Inf. Syst., 2019

Information Dissemination Model of Microblogging with Internet Marketers.
J. Inf. Process. Syst., 2019

A comprehensive analytical model of user influence in the social networks.
Int. J. Wirel. Mob. Comput., 2019

Personal Data Retrieval and Disambiguation in Web Person Search.
IEICE Trans. Inf. Syst., 2019

Verification Code Recognition Based on Active and Deep Learning.
CoRR, 2019

Active Learning for Uneven Noisy Labeled Data in Mention-Level Relation Extraction.
IEEE Access, 2019

An Interactive Traffic Replay Method in a Scaled-Down Environment.
IEEE Access, 2019

Verification Code Recognition Based on Active and Deep Learning.
Proceedings of the International Conference on Computing, Networking and Communications, 2019

Analysis of the Influence of Individual Web Behavior Pattern on Group Behavior Simulation.
Proceedings of the Fourth IEEE International Conference on Data Science in Cyberspace, 2019

2018
Efficiently processing deterministic approximate aggregation query on massive data.
Knowl. Inf. Syst., 2018

<i>Research Notes</i>: User Identification Model Based on Mouse Behaviors.
Int. J. Softw. Eng. Knowl. Eng., 2018

Massive Fishing Website URL Parallel Filtering Method.
IEEE Access, 2018

A Content Auditing Method of IPsec VPN.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018

Detecting Pyramid Scheme Accounts with Time Series Financial Transactions.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018

2017
Review on cyber-physical systems.
IEEE CAA J. Autom. Sinica, 2017

Sentiment information extraction of comparative sentences based on CRF model.
Comput. Sci. Inf. Syst., 2017

Multiple kernels learning-based biological entity relationship extraction method.
J. Biomed. Semant., 2017

Deceive Mouse-Dynamics-Based Authentication Model via Movement Simulation.
Proceedings of the 10th International Symposium on Computational Intelligence and Design, 2017

2016
A Recommendation System Based on Regression Model of Three-Tier Network Architecture.
Int. J. Distributed Sens. Networks, 2016

A Communication Supportable Generic Model for Mobile VPN on Android OS.
Proceedings of the IEEE Symposium on Computers and Communication, 2016

Biological entity relationship extraction method based on multiple kernel learning.
Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, 2016

2015
Hiding the Source Based on Limited Flooding for Sensor Networks.
Sensors, 2015

A collaborative filtering algorithm based on social network information.
Proceedings of the 2015 IEEE International Conference on Big Data (IEEE BigData 2015), Santa Clara, CA, USA, October 29, 2015

A collaborative filtering algorithm fusing user-based, item-based and social networks.
Proceedings of the 2015 IEEE International Conference on Big Data (IEEE BigData 2015), Santa Clara, CA, USA, October 29, 2015

A proactive discovery and filtering solution on phishing websites.
Proceedings of the 2015 IEEE International Conference on Big Data (IEEE BigData 2015), Santa Clara, CA, USA, October 29, 2015

2014
Research on Webpage Similarity Computing Technology Based on Visual Blocks.
Proceedings of the Social Media Processing - Third National Conference, 2014

2009
Design and Implementation of Parallelized Cholesky Factorization.
Proceedings of the High Performance Computing and Applications, 2009

2005
An Anti-worm with Balanced Tree Based Spreading Strategy.
Proceedings of the Advances in Machine Learning and Cybernetics, 2005

A Worm Behavioral Approach to Susceptible Host Detection.
Proceedings of the Grid and Cooperative Computing - GCC 2005, 4th International Conference, Beijing, China, November 30, 2005


  Loading...