Sheng Wen

According to our database1, Sheng Wen authored at least 64 papers between 2010 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Malicious Attack Propagation and Source Identification
Advances in Information Security 73, Springer, ISBN: 978-3-030-02178-8, 2019

Publicly verifiable database scheme with efficient keyword search.
Inf. Sci., 2019

2018
Malware Propagations in Wireless Ad Hoc Networks.
IEEE Trans. Dependable Sec. Comput., 2018

Rumor Source Identification in Social Networks with Time-Varying Topology.
IEEE Trans. Dependable Sec. Comput., 2018

Intersection Traffic Prediction Using Decision Tree Models.
Symmetry, 2018

A Semantic Labeling Approach for Accurate Weed Mapping of High Resolution UAV Imagery.
Sensors, 2018

Accurate Weed Mapping and Prescription Map Generation Based on Fully Convolutional Networks Using UAV Imagery.
Sensors, 2018

Pokémon GO in Melbourne CBD: A case study of the cyber-physical symbiotic social networks.
J. Comput. Science, 2018

TouchWB: Touch behavioral user authentication based on web browsing on smartphones.
J. Network and Computer Applications, 2018

Secure fine-grained spatio-temporal Top-k queries in TMWSNs.
Future Generation Comp. Syst., 2018

Twitter spam detection: Survey of new approaches and comparative study.
Computers & Security, 2018

Checking an Authentication of Person Depends on RFID with Thermal Image.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2018

Secure and Privacy Preserving RFID Based Access Control to Smart Buildings.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2018

Who Spread to Whom? Inferring Online Social Networks with User Features.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

2017
Propagation Modeling and Defending of a Mobile Sensor Worm in Wireless Sensor and Actuator Networks.
Sensors, 2017

Using epidemic betweenness to measure the influence of users in complex networks.
J. Network and Computer Applications, 2017

Traceable Threshold Proxy Signature.
J. Inf. Sci. Eng., 2017

Reliable wireless connections for fast-moving rail users based on a chained fog structure.
Inf. Sci., 2017

Bandwidth-aware energy efficient flow scheduling with SDN in data center networks.
Future Generation Comp. Syst., 2017

Investigating the deceptive information in Twitter spam.
Future Generation Comp. Syst., 2017

Detecting spamming activities in twitter based on deep-learning technique.
Concurrency and Computation: Practice and Experience, 2017

The structure of communities in scale-free networks.
Concurrency and Computation: Practice and Experience, 2017

Identifying Propagation Sources in Networks: State-of-the-Art and Comparative Studies.
IEEE Communications Surveys and Tutorials, 2017

The Chaotic Video Surveillance in Mobile Camera Sensor Networks: Improving the Efficiency and Security.
Ad Hoc & Sensor Wireless Networks, 2017

Efficient and secure attribute-based signature for monotone predicates.
Acta Inf., 2017

My Face is Mine: Fighting Unpermitted Tagging on Personal/Group Photos in Social Media.
Proceedings of the Web Information Systems Engineering - WISE 2017, 2017

On-Street Car Parking Prediction in Smart City: A Multi-source Data Analysis in Sensor-Cloud Environment.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017

How Spam Features Change in Twitter and the Impact to Machine Learning Based Detection.
Proceedings of the Information Security Practice and Experience, 2017

Catch Me If You Can: Detecting Compromised Users Through Partial Observation on Networks.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

2016
Following Targets for Mobile Tracking in Wireless Sensor Networks.
TOSN, 2016

On the Race of Worms and Patches: Modeling the Spread of Information in Wireless Sensor Networks.
IEEE Trans. Information Forensics and Security, 2016

Piezoelectric Wind Energy Harvesting from Self-Excited Vibration of Square Cylinder.
J. Sensors, 2016

Traceable Identity-Based Group Signature.
RAIRO - Theor. Inf. and Applic., 2016

An overview of Fog computing and its security issues.
Concurrency and Computation: Practice and Experience, 2016

Analysis of the Spreading Influence Variations for Online Social Users under Attacks.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

2015
K-Center: An Approach on the Multi-Source Identification of Information Diffusion.
IEEE Trans. Information Forensics and Security, 2015

A Sword with Two Edges: Propagation Studies on Both Positive and Negative Information in Online Social Networks.
IEEE Trans. Computers, 2015

Detecting stepping stones by abnormal causality probability.
Security and Communication Networks, 2015

Maximizing real-time streaming services based on a multi-servers networking framework.
Computer Networks, 2015

Mobility Increases the Risk of Malware Propagations in Wireless Networks.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

Identifying Diffusion Sources in Large Networks: A Community Structure Based Approach.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

The Relation Between Local and Global Influence of Individuals in Scale-Free Networks.
Proceedings of the International Symposium on Security and Privacy in Social Networks and Big Data, 2015

First-Priority Relation Graph-Based Malicious Users Detection in Mobile Social Networks.
Proceedings of the Network and System Security - 9th International Conference, 2015

2014
To Shut Them Up or to Clarify: Restraining the Spread of Rumors in Online Social Networks.
IEEE Trans. Parallel Distrib. Syst., 2014

Modeling and Analysis on the Propagation Dynamics of Modern Email Malware.
IEEE Trans. Dependable Sec. Comput., 2014

Are the popular users always important for information dissemination in online social networks?
IEEE Network, 2014

Detection and defense of application-layer DDoS attacks in backbone web traffic.
Future Generation Comp. Syst., 2014

Modeling the Propagation of Worms in Networks: A Survey.
IEEE Communications Surveys and Tutorials, 2014

Finite Element Study on the Cylindrical Linear Piezoelectric Motor Micro Driven.
Proceedings of the Intelligent Robotics and Applications - 7th International Conference, 2014

FEM Analysis and Parameter Optimization of a Linear Piezoelectric Motor Macro Driven.
Proceedings of the Intelligent Robotics and Applications - 7th International Conference, 2014

Cymbal Piezoelectric Micro Displacement Actuator Characteristics Analysis.
Proceedings of the Intelligent Robotics and Applications - 7th International Conference, 2014

The Fog Computing Paradigm: Scenarios and Security Issues.
Proceedings of the 2014 Federated Conference on Computer Science and Information Systems, 2014

2013
Modeling Propagation Dynamics of Social Network Worms.
IEEE Trans. Parallel Distrib. Syst., 2013

Modeling and Analysis for Thwarting Worm Propagation in Email Networks.
Proceedings of the Network and System Security - 7th International Conference, 2013

Detecting Stepping Stones by Abnormal Causality Probability.
Proceedings of the Cyberspace Safety and Security - 5th International Symposium, 2013

2012
Locating Defense Positions for Thwarting the Propagation of Topological Worms.
IEEE Communications Letters, 2012

CAFS: a novel lightweight cache-based scheme for large-scale intrusion alert fusion.
Concurrency and Computation: Practice and Experience, 2012

An Analytical Model on the Propagation of Modern Email Worms.
Proceedings of the 11th IEEE International Conference on Trust, 2012

2011
Eliminating Errors in Worm Propagation Models.
IEEE Communications Letters, 2011

The Microcosmic Model of Worm Propagation.
Comput. J., 2011

Modeling worms propagation on probability.
Proceedings of the 5th International Conference on Network and System Security, 2011

The Probability Model of Peer-to-Peer Botnet Propagation.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2011

2010
CALD: Surviving Various Application-Layer DDoS Attacks That Mimic Flash Crowd.
Proceedings of the Fourth International Conference on Network and System Security, 2010

A Lightweight Intrusion Alert Fusion System.
Proceedings of the 12th IEEE International Conference on High Performance Computing and Communications, 2010


  Loading...