Changguang Wang

Orcid: 0000-0002-2054-9215

According to our database1, Changguang Wang authored at least 36 papers between 2005 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Preserving Differential Privacy in Deep Learning Based on Feature Relevance Region Segmentation.
IEEE Trans. Emerg. Top. Comput., 2024

2023
A Probability Mapping-Based Privacy Preservation Method for Social Networks.
Proceedings of the Ubiquitous Security, 2023

A Multivariate Time Series Anomaly Detection Model Based on Spatio-Temporal Dual Features.
Proceedings of the International Conference on Networking and Network Applications, 2023

Efficient Black-Box Adversarial Attacks with Training Surrogate Models Towards Speaker Recognition Systems.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2023

An Android Malware Detection Method Based on Metapath Aggregated Graph Neural Network.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2023

2022
An Efficient Deep Unsupervised Domain Adaptation for Unknown Malware Detection.
Symmetry, 2022

Toward machine intelligence that learns to fingerprint polymorphic worms in IoT.
Int. J. Intell. Syst., 2022

A Label Flipping Attack on Machine Learning Model and Its Defense Mechanism.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2022

A Co-evolutionary Algorithm-Based Malware Adversarial Sample Generation Method.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2022

2021
An Improved K -Means Clustering Intrusion Detection Algorithm for Wireless Networks Based on Federated Learning.
Wirel. Commun. Mob. Comput., 2021

Binary Black-Box Adversarial Attacks with Evolutionary Learning against IoT Malware Detection.
Wirel. Commun. Mob. Comput., 2021

A Novel Malware Detection and Family Classification Scheme for IoT Based on DEAM and DenseNet.
Secur. Commun. Networks, 2021

An internet of things malware classification method based on mixture of experts neural network.
Trans. Emerg. Telecommun. Technol., 2021

2020
A Novel Identity-based Authentication Scheme for IoV Security.
Int. J. Netw. Secur., 2020

Non-pre-trained Mine Pedestrian Detection Based on Automatic Generation of Anchor Box.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2020

MagNet with Randomization Defense against Adversarial Examples.
Proceedings of the International Conference on Networking and Network Applications, 2020

A Novel Intrusion Detection System for Malware Based on Time-Series Meta-learning.
Proceedings of the Machine Learning for Cyber Security - Third International Conference, 2020

A Feature-Based Detection System of Adversarial Sample Attack.
Proceedings of the Machine Learning for Cyber Security - Third International Conference, 2020

Class-unbalanced domain adaptation for object detection via dynamic weighting mechanism.
Proceedings of the 8th International Conference on 3D Vision, 2020

2019
An Automatic Signature-Based Approach for Polymorphic Worms in Big Data Environment.
Proceedings of the 2019 International Conference on Networking and Network Applications, 2019

2017
An SVEIR Defending Model with Partial Immunization for Worms.
Int. J. Netw. Secur., 2017

2016
Analysis of SVEIR worm attack model with saturated incidence and partial immunization.
J. Commun. Inf. Networks, 2016

Stability Analysis of a Worm Propagation Model with Quarantine and Vaccination.
Int. J. Netw. Secur., 2016

Analysis of an SEIVR Epidemic Model with Partial Immunization and Nonlinear Infection Rate.
Proceedings of the International Conference on Networking and Network Applications, 2016

An Improved Algorithm of Node Credibility Management for Lightweight WSN.
Proceedings of the International Conference on Networking and Network Applications, 2016

2015
Stability analysis of an <i>e</i>-<i>SEIAR</i> model with point-to-group worm propagation.
Commun. Nonlinear Sci. Numer. Simul., 2015

2013
Combating Good Point Set Scanning-based Self-learning Worms by Using Predators.
Int. J. Netw. Secur., 2013

Energy-Balanced Separating Algorithm for Cluster-Based Data Aggregation in Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2013

2011
The Research of Security Technology in the Internet of Things.
Proceedings of the Advances in Computer Science, 2011

2010
Stability analysis of a SEIQV epidemic model for rapid spreading worms.
Comput. Secur., 2010

Combating self-learning worms by using predators.
Proceedings of the IEEE International Conference on Wireless Communications, 2010

2009
Image Watermarking Based on an Improved Subsampling Framework.
Proceedings of the CSIE 2009, 2009 WRI World Congress on Computer Science and Information Engineering, March 31, 2009

Risk Perception in Modeling Malware Propagation in Networks.
Proceedings of the CSIE 2009, 2009 WRI World Congress on Computer Science and Information Engineering, March 31, 2009

Predators Combat Good Point Set Scanning-Based Self-Learning Worms.
Proceedings of the 2009 International Conference on Computational Intelligence and Security, 2009

2008
Modeling Malicious Code Spread in Scale-Free Networks of Moving Agents.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008

2005
Worm Propagation Modeling and Analysis on Network.
Proceedings of the Computational Intelligence and Security, International Conference, 2005


  Loading...