Songjie Wei

Orcid: 0000-0003-4086-1334

According to our database1, Songjie Wei authored at least 33 papers between 2005 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Interactive Learning for Network Anomaly Monitoring and Detection with Human Guidance in the Loop.
Sensors, September, 2023

DTFA: Adversarial attack with discrete cosine transform noise and target features on deep neural networks.
IET Image Process., April, 2023

A Light-Weighted Model of GRU + CNN Hybrid for Network Intrusion Detection.
Proceedings of the Advanced Intelligent Computing Technology and Applications, 2023

2022
Network Anomaly Detection based on Traffic Clustering with Group-Entropy Similarity.
Proceedings of the International Symposium on Networks, Computers and Communications, 2022

2021
An intelligent and blind image watermarking scheme based on hybrid SVD transforms using human visual system characteristics.
Vis. Comput., 2021

Calibrating Network Traffic with One-Dimensional Convolutional Neural Network with Autoencoder and Independent Recurrent Neural Network for Mobile Malware Detection.
Secur. Commun. Networks, 2021

Blockchain-based Crowdsourcing Task Management and Solution Verification Method.
Proceedings of the 24th IEEE International Conference on Computational Science and Engineering, 2021

2020
Robust and hybrid SVD-based image watermarking schemes.
Multim. Tools Appl., 2020

基于深度森林与CWGAN-GP的移动应用网络行为分类与评估 (Classification and Evaluation of Mobile Application Network Behavior Based on Deep Forest and CWGAN-GP).
计算机科学, 2020

Side-Channel Leakage Detection Based on Constant Parameter Channel Model.
Proceedings of the 38th IEEE International Conference on Computer Design, 2020

Verifiable Blockchain Redacting Method for a Trusted Consortium with Distributed Chameleon Hash Authority.
Proceedings of the Computational Data and Social Networks - 9th International Conference, 2020

2019
An Efficient Privacy-Preserving Attribute-Based Encryption with Hidden Policy for Cloud Storage.
J. Circuits Syst. Comput., 2019

'The ZNSL Network': A Novel Approach to Virtual Networking.
Proceedings of the 2019 International Symposium on Networks, Computers and Communications, 2019

Decentralized Identity Authentication with Trust Distributed in Blockchain Backbone.
Proceedings of the Blockchain - ICBC 2019, 2019

2018
BAVP: Blockchain-Based Access Verification Protocol in LEO Constellation Using IBE Keys.
Secur. Commun. Networks, 2018

Mobile Application Network Behavior Detection and Evaluation with WGAN and Bi-LSTM.
Proceedings of the TENCON 2018, 2018

A Solution for Internet of Things based on Blockchain Technology.
Proceedings of the 2018 IEEE International Conference on Service Operations and Logistics, and Informatics (SOLI), Singpapore, Singapore, July 31, 2018

A Privacy-Preserving Attribute-Based Authentication Scheme for Cloud Computing.
Proceedings of the Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2018

2017
Cluster Based VDTN Routing Algorithm with Multi-attribute Decision Making.
Proceedings of the Recent Advances in Information Systems and Technologies, 2017

Relacha: Using Associative Meaning for Image Captcha Understandability.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017

A Distributed Authentication Protocol Using Identity-Based Encryption and Blockchain for LEO Network.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2017

Optimal Strategy Routing in LEO Satellite Network Based on Cooperative Game Theory.
Proceedings of the Space Information Networks - Second International Conference, 2017

A cooperative framework for region crowdedness sensing in VANETs.
Proceedings of the 2017 IEEE/CIC International Conference on Communications in China, 2017

2016
A Distributed Algorithm for Self-adaptive Routing in LEO Satellite Network.
Proceedings of the Space Information Networks - First International Conference, 2016

2015
基于分层API调用的Android恶意代码静态描述方法 (Android Malware Characterization Based on Static Analysis of Hierarchical API Usage).
计算机科学, 2015

2010
Tools for worm experimentation on the DETER testbed.
Int. J. Commun. Networks Distributed Syst., 2010

2009
Web-based administration of grid credentials for identity and authority delegation.
Proceedings of the Integrated Network Management, 2009

2008
Correcting congestion-based error in network telescope's observations of worm dynamics.
Proceedings of the 8th ACM SIGCOMM Internet Measurement Conference, 2008

2007
DDoS Benchmarks and Experimenter's Workbench for the DETER Testbed.
Proceedings of the 3rd International ICST Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities, 2007

2006
Building Reputations for Internet Clients.
Proceedings of the Second International Workshop on Security and Trust Management, 2006

A realistic simulation of internet-scale events.
Proceedings of the 1st International Conference on Performance Evaluation Methodolgies and Tools, 2006

Profiling and Clustering Internet Hosts.
Proceedings of the 2006 International Conference on Data Mining, 2006

2005
Distributed Worm Simulation with a Realistic Internet Model.
Proceedings of the 19th Workshop on Parallel and Distributed Simulation, 2005


  Loading...