Sheng Wen

According to our database1, Sheng Wen
  • authored at least 47 papers between 2010 and 2017.
  • has a "Dijkstra number"2 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2017
Propagation Modeling and Defending of a Mobile Sensor Worm in Wireless Sensor and Actuator Networks.
Sensors, 2017

Using epidemic betweenness to measure the influence of users in complex networks.
J. Network and Computer Applications, 2017

Traceable Threshold Proxy Signature.
J. Inf. Sci. Eng., 2017

Reliable wireless connections for fast-moving rail users based on a chained fog structure.
Inf. Sci., 2017

Bandwidth-aware energy efficient flow scheduling with SDN in data center networks.
Future Generation Comp. Syst., 2017

Investigating the deceptive information in Twitter spam.
Future Generation Comp. Syst., 2017

Detecting spamming activities in twitter based on deep-learning technique.
Concurrency and Computation: Practice and Experience, 2017

The structure of communities in scale-free networks.
Concurrency and Computation: Practice and Experience, 2017

Identifying Propagation Sources in Networks: State-of-the-Art and Comparative Studies.
IEEE Communications Surveys and Tutorials, 2017

The Chaotic Video Surveillance in Mobile Camera Sensor Networks: Improving the Efficiency and Security.
Ad Hoc & Sensor Wireless Networks, 2017

Efficient and secure attribute-based signature for monotone predicates.
Acta Inf., 2017

My Face is Mine: Fighting Unpermitted Tagging on Personal/Group Photos in Social Media.
Proceedings of the Web Information Systems Engineering - WISE 2017, 2017

Catch Me If You Can: Detecting Compromised Users Through Partial Observation on Networks.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

2016
Following Targets for Mobile Tracking in Wireless Sensor Networks.
TOSN, 2016

On the Race of Worms and Patches: Modeling the Spread of Information in Wireless Sensor Networks.
IEEE Trans. Information Forensics and Security, 2016

Piezoelectric Wind Energy Harvesting from Self-Excited Vibration of Square Cylinder.
J. Sensors, 2016

Traceable Identity-Based Group Signature.
RAIRO - Theor. Inf. and Applic., 2016

An overview of Fog computing and its security issues.
Concurrency and Computation: Practice and Experience, 2016

Analysis of the Spreading Influence Variations for Online Social Users under Attacks.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

2015
K-Center: An Approach on the Multi-Source Identification of Information Diffusion.
IEEE Trans. Information Forensics and Security, 2015

A Sword with Two Edges: Propagation Studies on Both Positive and Negative Information in Online Social Networks.
IEEE Trans. Computers, 2015

Detecting stepping stones by abnormal causality probability.
Security and Communication Networks, 2015

Maximizing real-time streaming services based on a multi-servers networking framework.
Computer Networks, 2015

Mobility Increases the Risk of Malware Propagations in Wireless Networks.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

Identifying Diffusion Sources in Large Networks: A Community Structure Based Approach.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

First-Priority Relation Graph-Based Malicious Users Detection in Mobile Social Networks.
Proceedings of the Network and System Security - 9th International Conference, 2015

2014
To Shut Them Up or to Clarify: Restraining the Spread of Rumors in Online Social Networks.
IEEE Trans. Parallel Distrib. Syst., 2014

Modeling and Analysis on the Propagation Dynamics of Modern Email Malware.
IEEE Trans. Dependable Sec. Comput., 2014

Are the popular users always important for information dissemination in online social networks?
IEEE Network, 2014

Detection and defense of application-layer DDoS attacks in backbone web traffic.
Future Generation Comp. Syst., 2014

Modeling the Propagation of Worms in Networks: A Survey.
IEEE Communications Surveys and Tutorials, 2014

Finite Element Study on the Cylindrical Linear Piezoelectric Motor Micro Driven.
Proceedings of the Intelligent Robotics and Applications - 7th International Conference, 2014

FEM Analysis and Parameter Optimization of a Linear Piezoelectric Motor Macro Driven.
Proceedings of the Intelligent Robotics and Applications - 7th International Conference, 2014

Cymbal Piezoelectric Micro Displacement Actuator Characteristics Analysis.
Proceedings of the Intelligent Robotics and Applications - 7th International Conference, 2014

The Fog Computing Paradigm: Scenarios and Security Issues.
Proceedings of the 2014 Federated Conference on Computer Science and Information Systems, 2014

2013
Modeling Propagation Dynamics of Social Network Worms.
IEEE Trans. Parallel Distrib. Syst., 2013

Modeling and Analysis for Thwarting Worm Propagation in Email Networks.
Proceedings of the Network and System Security - 7th International Conference, 2013

Detecting Stepping Stones by Abnormal Causality Probability.
Proceedings of the Cyberspace Safety and Security - 5th International Symposium, 2013

2012
Locating Defense Positions for Thwarting the Propagation of Topological Worms.
IEEE Communications Letters, 2012

CAFS: a novel lightweight cache-based scheme for large-scale intrusion alert fusion.
Concurrency and Computation: Practice and Experience, 2012

An Analytical Model on the Propagation of Modern Email Worms.
Proceedings of the 11th IEEE International Conference on Trust, 2012

2011
Eliminating Errors in Worm Propagation Models.
IEEE Communications Letters, 2011

The Microcosmic Model of Worm Propagation.
Comput. J., 2011

Modeling worms propagation on probability.
Proceedings of the 5th International Conference on Network and System Security, 2011

The Probability Model of Peer-to-Peer Botnet Propagation.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2011

2010
CALD: Surviving Various Application-Layer DDoS Attacks That Mimic Flash Crowd.
Proceedings of the Fourth International Conference on Network and System Security, 2010

A Lightweight Intrusion Alert Fusion System.
Proceedings of the 12th IEEE International Conference on High Performance Computing and Communications, 2010


  Loading...