Wei Wang

According to our database1, Wei Wang authored at least 47 papers between 2004 and 2019.

Collaborative distances:



In proceedings 
PhD thesis 



On csauthors.net:


Effective android malware detection with a hybrid model based on deep autoencoder and convolutional neural network.
J. Ambient Intelligence and Humanized Computing, 2019

Dynamic privacy leakage analysis of Android third-party libraries.
J. Inf. Sec. Appl., 2019

Fingerprinting Android malware families.
Frontiers Comput. Sci., 2019

Detecting Android Locker-Ransomware on Chinese Social Networks.
IEEE Access, 2019

Understanding Effects of Collaborations in Developing Mobile Computing Systems: Popularity, Efficiency, and Quality.
IEEE Access, 2019

DCDroid: automated detection of SSL/TLS certificate verification vulnerabilities in Android apps.
Proceedings of the ACM Turing Celebration Conference - China, 2019

Discovering and understanding android sensor usage behaviors with data flow analysis.
World Wide Web, 2018

CreditCoin: A Privacy-Preserving Blockchain-Based Incentive Announcement Network for Communications of Smart Vehicles.
IEEE Trans. Intelligent Transportation Systems, 2018

Identity-Based Private Matching over Outsourced Encrypted Datasets.
IEEE Trans. Cloud Computing, 2018

Abstracting massive data for lightweight intrusion detection in computer networks.
Inf. Sci., 2018

Detecting Android malicious apps and categorizing benign apps with ensemble of classifiers.
Future Generation Comp. Syst., 2018

Android single sign-on security: Issues, taxonomy and directions.
Future Generation Comp. Syst., 2018

Discovering communities of malapps on Android-based mobile cyber-physical systems.
Ad Hoc Networks, 2018

DroidEnsemble: Detecting Android Malicious Applications With Ensemble of String and Structural Static Features.
IEEE Access, 2018

Randomizing SVM Against Adversarial Attacks Under Uncertainty.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2018

Designing Mutual Authentication Protocols in Industrial Wireless Network.
Proceedings of the 1st International Conference on Data Intelligence and Security, 2018

Efficient and Secure Outsourcing of Differentially Private Data Publication.
Proceedings of the Computer Security, 2018

Characterizing Android apps' behavior for effective detection of malapps at large scale.
Future Generation Comp. Syst., 2017

Anomadroid: Profiling Android Applications' Behaviors for Identifying Unknown Malapps.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Alde: Privacy Risk Analysis of Analytics Libraries in the Android Ecosystem.
Proceedings of the Security and Privacy in Communication Networks, 2016

Fast, Private and Verifiable: Server-aided Approximate Similarity Computation over Large-Scale Datasets.
Proceedings of the 4th ACM International Workshop on Security in Cloud Computing, 2016

Constructing important features from massive network traffic for lightweight intrusion detection.
IET Information Security, 2015

Harnessing the power of social bookmarking for improving tag-based recommendations.
Computers in Human Behavior, 2015

Exploring sensor usage behaviors of Android applications based on data flow analysis.
Proceedings of the 34th IEEE International Performance Computing and Communications Conference, 2015

POSTER: The Popular Apps in Your Pocket Are Leaking Your Privacy.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

Exploring Permission-Induced Risk in Android Applications for Malicious Application Detection.
IEEE Trans. Information Forensics and Security, 2014

Autonomic intrusion detection: Adaptively detecting anomalies over unlabeled audit data streams in computer networks.
Knowl.-Based Syst., 2014

Understanding and analyzing network traffic.
IEEE Network, 2012

Network traffic monitoring, analysis and anomaly detection [Guest Editorial].
IEEE Network, 2011

High-speed web attack detection through extracting exemplars from HTTP traffic.
Proceedings of the 2011 ACM Symposium on Applied Computing (SAC), TaiChung, Taiwan, March 21, 2011

Clustering Recommenders in Collaborative Filtering Using Explicit Trust Information.
Proceedings of the Trust Management V, 5th IFIP WG 11.11 International Conference, 2011

Abstracting Audit Data for Lightweight Intrusion Detection.
Proceedings of the Information Systems Security - 6th International Conference, 2010

K-AP: Generating Specified K Clusters by Efficient Affinity Propagation.
Proceedings of the ICDM 2010, 2010

Self-adaptive Change Detection in Streaming Data with Non-stationary Distribution.
Proceedings of the Advanced Data Mining and Applications - 6th International Conference, 2010

Constructing attribute weights from computer audit data for effective intrusion detection.
Journal of Systems and Software, 2009

Fast intrusion detection based on a non-negative matrix factorization model.
J. Network and Computer Applications, 2009

A general framework for adaptive and online detection of web attacks.
Proceedings of the 18th International Conference on World Wide Web, 2009

Autonomic Intrusion Detection System.
Proceedings of the Recent Advances in Intrusion Detection, 12th International Symposium, 2009

Attribute Normalization in Network Intrusion Detection.
Proceedings of the 10th International Symposium on Pervasive Systems, 2009

Online and adaptive anomaly Detection: detecting intrusions in unlabelled audit data streams.
Proceedings of the Extraction et gestion des connaissances (EGC'2009), 2009

Diagnostic multi-sources adaptatif. Application à la détection d'intrusion dans des serveurs Web.
Proceedings of the Extraction et gestion des connaissances (EGC'2009), 2009

Processing of massive audit data streams for real-time anomaly intrusion detection.
Computer Communications, 2008

Efficient detection of DDoS attacks with important attributes.
Proceedings of the CRiSIS '08, 2008

Distance Measures for Anomaly Intrusion Detection.
Proceedings of the 2007 International Conference on Security & Management, 2007

Profiling program behavior for anomaly intrusion detection based on the transition and frequency property of computer audit data.
Computers & Security, 2006

Identifying Intrusions in Computer Networks with Principal Component Analysis.
Proceedings of the The First International Conference on Availability, 2006

A Novel Intrusion Detection Method Based on Principle Component Analysis in Computer Security.
Proceedings of the Advances in Neural Networks, 2004