Fangwei Wang

Orcid: 0000-0003-3888-8167

According to our database1, Fangwei Wang authored at least 35 papers between 2005 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Preserving Differential Privacy in Deep Learning Based on Feature Relevance Region Segmentation.
IEEE Trans. Emerg. Top. Comput., 2024

2023
A Probability Mapping-Based Privacy Preservation Method for Social Networks.
Proceedings of the Ubiquitous Security, 2023

A Multivariate Time Series Anomaly Detection Model Based on Spatio-Temporal Dual Features.
Proceedings of the International Conference on Networking and Network Applications, 2023

Efficient Black-Box Adversarial Attacks with Training Surrogate Models Towards Speaker Recognition Systems.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2023

An Android Malware Detection Method Based on Metapath Aggregated Graph Neural Network.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2023

2022
An Efficient Deep Unsupervised Domain Adaptation for Unknown Malware Detection.
Symmetry, 2022

Toward machine intelligence that learns to fingerprint polymorphic worms in IoT.
Int. J. Intell. Syst., 2022

A Label Flipping Attack on Machine Learning Model and Its Defense Mechanism.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2022

A Co-evolutionary Algorithm-Based Malware Adversarial Sample Generation Method.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2022

2021
Binary Black-Box Adversarial Attacks with Evolutionary Learning against IoT Malware Detection.
Wirel. Commun. Mob. Comput., 2021

A Novel Malware Detection and Family Classification Scheme for IoT Based on DEAM and DenseNet.
Secur. Commun. Networks, 2021

An internet of things malware classification method based on mixture of experts neural network.
Trans. Emerg. Telecommun. Technol., 2021

2020
A Novel Identity-based Authentication Scheme for IoV Security.
Int. J. Netw. Secur., 2020

MagNet with Randomization Defense against Adversarial Examples.
Proceedings of the International Conference on Networking and Network Applications, 2020

A Novel Intrusion Detection System for Malware Based on Time-Series Meta-learning.
Proceedings of the Machine Learning for Cyber Security - Third International Conference, 2020

A Feature-Based Detection System of Adversarial Sample Attack.
Proceedings of the Machine Learning for Cyber Security - Third International Conference, 2020

2019
An Automatic Signature-Based Approach for Polymorphic Worms in Big Data Environment.
Proceedings of the 2019 International Conference on Networking and Network Applications, 2019

2017
An SVEIR Defending Model with Partial Immunization for Worms.
Int. J. Netw. Secur., 2017

2016
Analysis of SVEIR worm attack model with saturated incidence and partial immunization.
J. Commun. Inf. Networks, 2016

Stability Analysis of a Worm Propagation Model with Quarantine and Vaccination.
Int. J. Netw. Secur., 2016

Analysis of an SEIVR Epidemic Model with Partial Immunization and Nonlinear Infection Rate.
Proceedings of the International Conference on Networking and Network Applications, 2016

An Improved Algorithm of Node Credibility Management for Lightweight WSN.
Proceedings of the International Conference on Networking and Network Applications, 2016

2015
A Worm Defending Model with Partial Immunization and Its Stability Analysis.
J. Commun., 2015

Global Analysis of a SEIQV Epidemic Model for Scanning Worms with Quarantine Strategy.
Int. J. Netw. Secur., 2015

Stability analysis of an <i>e</i>-<i>SEIAR</i> model with point-to-group worm propagation.
Commun. Nonlinear Sci. Numer. Simul., 2015

Incorporating Big Data Analytics into Enterprise Information Systems.
Proceedings of the Information and Communication Technology, 2015

2014
Stability Analysis of a SEIQRS Model with Graded Infection Rates for Internet Worms.
J. Comput., 2014

2013
Combating Good Point Set Scanning-based Self-learning Worms by Using Predators.
Int. J. Netw. Secur., 2013

2010
Modelling and Analyzing Passive Worms over Unstructured Peer-to-Peer Networks.
Int. J. Netw. Secur., 2010

Stability analysis of a SEIQV epidemic model for rapid spreading worms.
Comput. Secur., 2010

Combating self-learning worms by using predators.
Proceedings of the IEEE International Conference on Wireless Communications, 2010

2009
Modeling and analysis of a self-learning worm based on good point set scanning.
Wirel. Commun. Mob. Comput., 2009

Defending passive worms in unstructured P2P networks based on healthy file dissemination.
Comput. Secur., 2009

Predators Combat Good Point Set Scanning-Based Self-Learning Worms.
Proceedings of the 2009 International Conference on Computational Intelligence and Security, 2009

2005
Worm Propagation Modeling and Analysis on Network.
Proceedings of the Computational Intelligence and Security, International Conference, 2005


  Loading...