Wei Chen

Orcid: 0000-0002-6248-1298

Affiliations:
  • Nanjing University of Posts and Telecommunications, School of Computer, China
  • Wuhan University, Computer School, The State Key Laboratory of Software Engineering, China (PhD 2005)


According to our database1, Wei Chen authored at least 18 papers between 2004 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
High-speed anomaly traffic detection based on staged frequency domain features.
J. Inf. Secur. Appl., September, 2023

Anomaly traffic detection in IoT security using graph neural networks.
J. Inf. Secur. Appl., August, 2023

An intrusion detection method based on stacked sparse autoencoder and improved gaussian mixture model.
Comput. Secur., May, 2023

2022
Secure, Efficient, and Weighted Access Control for Cloud-Assisted Industrial IoT.
IEEE Internet Things J., 2022

2020
Building Auto-Encoder Intrusion Detection System based on random forest feature selection.
Comput. Secur., 2020

2019
DangerNeighbor attack: Information leakage via postMessage mechanism in HTML5.
Comput. Secur., 2019

2018
Enhanced Keystroke Recognition Based on Moving Distance of Keystrokes Through WiFi.
Proceedings of the Network and System Security - 12th International Conference, 2018

2017
CloudBot: Advanced mobile botnets using ubiquitous cloud technologies.
Pervasive Mob. Comput., 2017

2016
MUSE: Towards Robust and Stealthy Mobile Botnets via Multiple Message Push Services.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2008
An autonomous defense against SYN flooding attacks: Detect and throttle attacks at the victim side independently.
J. Parallel Distributed Comput., 2008

2007
Defending Against Jamming Attacks in Wireless Local Area Networks.
Proceedings of the Autonomic and Trusted Computing, 4th International Conference, 2007

2006
A novel approach to detecting DDoS Attacks at an Early Stage.
J. Supercomput., 2006

2005
Detecting SYN Flooding Attacks Near Innocent Side.
Proceedings of the Mobile Ad-hoc and Sensor Networks, First International Conference, 2005

Efficient and Beneficial Defense Against DDoS Direct Attack and Reflector Attack.
Proceedings of the Parallel and Distributed Processing and Applications, 2005

An Active Detecting Method Against SYN Flooding Attack.
Proceedings of the 11th International Conference on Parallel and Distributed Systems, 2005

An Efficient and Practical Defense Method Against DDoS Attack at the Source-End.
Proceedings of the 11th International Conference on Parallel and Distributed Systems, 2005

2004
Ontology Based Cooperative Intrusion Detection System.
Proceedings of the Network and Parallel Computing, IFIP International Conference, 2004

A Novel Technique for Detecting DDoS Attacks at Its Early Stage.
Proceedings of the Parallel and Distributed Processing and Applications, 2004


  Loading...