Wei Chen

Orcid: 0009-0006-8165-9334

Affiliations:
  • Nanjing University of Posts and Telecommunications, School of Computer, China
  • Wuhan University, Computer School, The State Key Laboratory of Software Engineering, China (PhD 2005)


According to our database1, Wei Chen authored at least 26 papers between 2004 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
An Adaptive DoH Encrypted Tunnel Detection Method Based on Contrastive Learning.
IEEE Internet Things J., July, 2025

Efficient and fine-grained access control with fully-hidden policies for cloud-enabled IoT.
Digit. Commun. Networks, 2025

Precision strike: Precise backdoor attack with dynamic trigger.
Comput. Secur., 2025

SACK: Enabling Environmental Situation-Aware Access Control for Vehicles in Linux Kernel.
Proceedings of the Design, Automation & Test in Europe Conference, 2025

HyperHammer: Breaking Free from KVM-Enforced Isolation.
Proceedings of the 30th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, 2025

2024
Decentralized Access Control for Privacy-Preserving Cloud-Based Personal Health Record With Verifiable Policy Update.
IEEE Internet Things J., May, 2024

An Efficient and Effective Transformer Decoder-Based Framework for Multi-Task Visual Grounding.
CoRR, 2024

Privacy Protection for Image Sharing Using Reversible Adversarial Examples.
Proceedings of the IEEE International Conference on Communications, 2024

2023
High-speed anomaly traffic detection based on staged frequency domain features.
J. Inf. Secur. Appl., September, 2023

Anomaly traffic detection in IoT security using graph neural networks.
J. Inf. Secur. Appl., August, 2023

An intrusion detection method based on stacked sparse autoencoder and improved gaussian mixture model.
Comput. Secur., May, 2023

2022
Secure, Efficient, and Weighted Access Control for Cloud-Assisted Industrial IoT.
IEEE Internet Things J., 2022

2020
Building Auto-Encoder Intrusion Detection System based on random forest feature selection.
Comput. Secur., 2020

2019
DangerNeighbor attack: Information leakage via postMessage mechanism in HTML5.
Comput. Secur., 2019

2018
Enhanced Keystroke Recognition Based on Moving Distance of Keystrokes Through WiFi.
Proceedings of the Network and System Security - 12th International Conference, 2018

2017
CloudBot: Advanced mobile botnets using ubiquitous cloud technologies.
Pervasive Mob. Comput., 2017

2016
MUSE: Towards Robust and Stealthy Mobile Botnets via Multiple Message Push Services.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2008
An autonomous defense against SYN flooding attacks: Detect and throttle attacks at the victim side independently.
J. Parallel Distributed Comput., 2008

2007
Defending Against Jamming Attacks in Wireless Local Area Networks.
Proceedings of the Autonomic and Trusted Computing, 4th International Conference, 2007

2006
A novel approach to detecting DDoS Attacks at an Early Stage.
J. Supercomput., 2006

2005
Detecting SYN Flooding Attacks Near Innocent Side.
Proceedings of the Mobile Ad-hoc and Sensor Networks, First International Conference, 2005

Efficient and Beneficial Defense Against DDoS Direct Attack and Reflector Attack.
Proceedings of the Parallel and Distributed Processing and Applications, 2005

An Active Detecting Method Against SYN Flooding Attack.
Proceedings of the 11th International Conference on Parallel and Distributed Systems, 2005

An Efficient and Practical Defense Method Against DDoS Attack at the Source-End.
Proceedings of the 11th International Conference on Parallel and Distributed Systems, 2005

2004
Ontology Based Cooperative Intrusion Detection System.
Proceedings of the Network and Parallel Computing, IFIP International Conference, 2004

A Novel Technique for Detecting DDoS Attacks at Its Early Stage.
Proceedings of the Parallel and Distributed Processing and Applications, 2004


  Loading...