Wei Wang

Orcid: 0000-0002-5974-1589

Affiliations:
  • Beijing Jiaotong University, Beijing Key Laboratory of Security and Privacy in Intelligent Transportation, China
  • University of Luxembourg, Interdisciplinary Centre for Security, Reliability and Trust, Luxembourg (2009 - 2011)
  • Norwegian University of Science and Technology (NTNU), Norway (2009 - 2011)
  • INRIA Sophia Antipolis, France (2007 - 2008)
  • University of Trento, Italy (2005 - 2006)
  • Xi'an Jiaotong University, SKLMS / Research Center for Networked Systems and Information Security, China (PhD 2006)


According to our database1, Wei Wang authored at least 116 papers between 2004 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
FedComm: A Privacy-Enhanced and Efficient Authentication Protocol for Federated Learning in Vehicular Ad-Hoc Networks.
IEEE Trans. Inf. Forensics Secur., 2024

Automatically Identifying CVE Affected Versions With Patches and Developer Logs.
IEEE Trans. Dependable Secur. Comput., 2024

2023
A New Smart Contract Anomaly Detection Method by Fusing Opcode and Source Code Features for Blockchain Services.
IEEE Trans. Netw. Serv. Manag., December, 2023

Multi-Misconfiguration Diagnosis via Identifying Correlated Configuration Parameters.
IEEE Trans. Software Eng., October, 2023

Object-free backdoor attack and defense on semantic segmentation.
Comput. Secur., September, 2023

Improving adversarial robustness of medical imaging systems via adding global attention noise.
Comput. Biol. Medicine, September, 2023

HGATE: Heterogeneous Graph Attention Auto-Encoders.
IEEE Trans. Knowl. Data Eng., April, 2023

DNS Rebinding Threat Modeling and Security Analysis for Local Area Network of Maritime Transportation Systems.
IEEE Trans. Intell. Transp. Syst., February, 2023

DeviceWatch: A Data-Driven Network Analysis Approach to Identifying Compromised Mobile Devices with Graph-Inference.
ACM Trans. Priv. Secur., 2023

Easy Peasy: A New Handy Method for Pairing Multiple COTS IoT Devices.
IEEE Trans. Dependable Secur. Comput., 2023

CGIR: Conditional Generative Instance Reconstruction Attacks Against Federated Learning.
IEEE Trans. Dependable Secur. Comput., 2023

Lung Cancer Subtype Diagnosis by Fusing Image-Genomics Data and Hybrid Deep Networks.
IEEE ACM Trans. Comput. Biol. Bioinform., 2023

BSAF: A blockchain-based secure access framework with privacy protection for cloud-device service collaborations.
J. Syst. Archit., 2023

Attacks Against Cross-Chain Systems and Defense Approaches: A Contemporary Survey.
IEEE CAA J. Autom. Sinica, 2023

UAF-GUARD: Defending the use-after-free exploits via fine-grained memory permission management.
Comput. Secur., 2023

LEA<sup>2</sup>: A Lightweight Ensemble Adversarial Attack via Non-overlapping Vulnerable Frequency Regions.
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023

How Hard is Takeover in DPoS Blockchains? Understanding the Security of Coin-based Voting Governance.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
CCUBI: A cross-chain based premium competition scheme with privacy preservation for usage-based insurance.
Int. J. Intell. Syst., December, 2022

Efficient and Secure Outsourcing of Differentially Private Data Publishing With Multiple Evaluators.
IEEE Trans. Dependable Secur. Comput., 2022

Character-Level Street View Text Spotting Based on Deep Multisegmentation Network for Smarter Autonomous Driving.
IEEE Trans. Artif. Intell., 2022

VREFL: Verifiable and Reconnection-Efficient Federated Learning in IoT scenarios.
J. Netw. Comput. Appl., 2022

Transparent Aspect-Level Sentiment Analysis Based on Dependency Syntax Analysis and Its Application on COVID-19.
ACM J. Data Inf. Qual., 2022

Malware detection with dynamic evolving graph convolutional networks.
Int. J. Intell. Syst., 2022

Toward Blockchain-Based Spoofing Defense for Controlled Optimization of Phases in Traffic Signal System.
IEICE Trans. Inf. Syst., 2022

Threats, attacks and defenses to federated learning: issues, taxonomy and perspectives.
Cybersecur., 2022

AWFC: Preventing Label Flipping Attacks Towards Federated Learning for Intelligent IoT.
Comput. J., 2022

A Fine-Grained Access Control Framework for Data Sharing in IoT Based on IPFS and Cross-Blockchain Technology.
Proceedings of the Smart Computing and Communication - 7th International Conference, 2022

Prevention of GAN-Based Privacy Inferring Attacks Towards Federated Learning.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2022

Alexa Skills: Security Vulnerabilities and Countermeasures.
Proceedings of the 10th IEEE Conference on Communications and Network Security, 2022

AdvCat: Domain-Agnostic Robustness Assessment for Cybersecurity-Critical Applications with Categorical Inputs.
Proceedings of the IEEE International Conference on Big Data, 2022

A Decentralized Cross-Chain Service Protocol based on Notary Schemes and Hash-Locking.
Proceedings of the IEEE International Conference on Services Computing, 2022

2021
Account Guarantee Scheme: Making Anonymous Accounts Supervised in Blockchain.
ACM Trans. Internet Techn., 2021

Spectral-Based Directed Graph Network for Malware Detection.
IEEE Trans. Netw. Sci. Eng., 2021

ContractWard: Automated Vulnerability Detection Models for Ethereum Smart Contracts.
IEEE Trans. Netw. Sci. Eng., 2021

Street View Text Recognition With Deep Learning for Urban Scene Understanding in Intelligent Transportation Systems.
IEEE Trans. Intell. Transp. Syst., 2021

Detecting Anomalies in Intelligent Vehicle Charging and Station Power Supply Systems With Multi-Head Attention Models.
IEEE Trans. Intell. Transp. Syst., 2021

Towards Revealing Parallel Adversarial Attack on Politician Socialnet of Graph Structure.
Secur. Commun. Networks, 2021

Demystifying the Vetting Process of Voice-controlled Skills on Markets.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2021

A hybrid intelligent service recommendation by latent semantics and explicit ratings.
Int. J. Intell. Syst., 2021

An explainable sentiment prediction model based on the portraits of users sharing representative opinions in social sensors.
Int. J. Distributed Sens. Networks, 2021

AppQ: Warm-starting App Recommendation Based on View Graphs.
CoRR, 2021

2020
Privacy Risk Analysis and Mitigation of Analytics Libraries in the Android Ecosystem.
IEEE Trans. Mob. Comput., 2020

CoEvil: A Coevolutionary Model for Crime Inference Based on Fuzzy Rough Feature Selection.
IEEE Trans. Fuzzy Syst., 2020

Sensing Users' Emotional Intelligence in Social Networks.
IEEE Trans. Comput. Soc. Syst., 2020

Identifying vulnerabilities of SSL/TLS certificate verification in Android apps with static and dynamic analysis.
J. Syst. Softw., 2020

BotMark: Automated botnet detection with hybrid analysis of flow-based and graph-based traffic behaviors.
Inf. Sci., 2020

Privacy-preserving categorization of mobile applications based on large-scale usage data.
Inf. Sci., 2020

SoProtector: Safeguard Privacy for Native SO Files in Evolving Mobile IoT Applications.
IEEE Internet Things J., 2020

Secure and efficient outsourcing differential privacy data release scheme in Cyber-physical system.
Future Gener. Comput. Syst., 2020

Hybritus: a password strength checker by ensemble learning from the query feedbacks of websites.
Frontiers Comput. Sci., 2020

"Are you home alone?" "Yes" Disclosing Security and Privacy Vulnerabilities in Alexa Skills.
CoRR, 2020

SenWave: Monitoring the Global Sentiments under the COVID-19 Pandemic.
CoRR, 2020

DNS Rebinding Detection for Local Internet of Things Devices.
Proceedings of the Frontiers in Cyber Security - Third International Conference, 2020

Defending Use-After-Free via Relationship Between Memory and Pointer.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2020

2019
Using Sparse Representation to Detect Anomalies in Complex WSNs.
ACM Trans. Intell. Syst. Technol., 2019

SCTSC: A Semicentralized Traffic Signal Control Mode With Attribute-Based Blockchain in IoVs.
IEEE Trans. Comput. Soc. Syst., 2019

Effective android malware detection with a hybrid model based on deep autoencoder and convolutional neural network.
J. Ambient Intell. Humaniz. Comput., 2019

Dynamic privacy leakage analysis of Android third-party libraries.
J. Inf. Secur. Appl., 2019

Polynomial-based modifiable blockchain structure for removing fraud transactions.
Future Gener. Comput. Syst., 2019

Fingerprinting Android malware families.
Frontiers Comput. Sci., 2019

DeviceWatch: Identifying Compromised Mobile Devices through Network Traffic Analysis and Graph Inference.
CoRR, 2019

Constructing Features for Detecting Android Malicious Applications: Issues, Taxonomy and Directions.
IEEE Access, 2019

Detecting Android Locker-Ransomware on Chinese Social Networks.
IEEE Access, 2019

Understanding Effects of Collaborations in Developing Mobile Computing Systems: Popularity, Efficiency, and Quality.
IEEE Access, 2019

Predicting Users' Emotional Intelligence with Social Networking Data.
Proceedings of the Security and Privacy in Social Networks and Big Data, 2019

A Novel Approach for Traffic Anomaly Detection in Power Distributed Control System and Substation System.
Proceedings of the Network and System Security - 13th International Conference, 2019

An Efficient Vulnerability Detection Model for Ethereum Smart Contracts.
Proceedings of the Network and System Security - 13th International Conference, 2019

DCDroid: automated detection of SSL/TLS certificate verification vulnerabilities in Android apps.
Proceedings of the ACM Turing Celebration Conference - China, 2019

2018
Discovering and understanding android sensor usage behaviors with data flow analysis.
World Wide Web, 2018

CreditCoin: A Privacy-Preserving Blockchain-Based Incentive Announcement Network for Communications of Smart Vehicles.
IEEE Trans. Intell. Transp. Syst., 2018

Identity-Based Private Matching over Outsourced Encrypted Datasets.
IEEE Trans. Cloud Comput., 2018

Abstracting massive data for lightweight intrusion detection in computer networks.
Inf. Sci., 2018

Detecting Android malicious apps and categorizing benign apps with ensemble of classifiers.
Future Gener. Comput. Syst., 2018

Android single sign-on security: Issues, taxonomy and directions.
Future Gener. Comput. Syst., 2018

Discovering communities of malapps on Android-based mobile cyber-physical systems.
Ad Hoc Networks, 2018

DroidEnsemble: Detecting Android Malicious Applications With Ensemble of String and Structural Static Features.
IEEE Access, 2018

Spectrum-Centric Differential Privacy for Hypergraph Spectral Clustering.
Proceedings of the Parallel and Distributed Computing, 2018

Randomizing SVM Against Adversarial Attacks Under Uncertainty.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2018

Designing Mutual Authentication Protocols in Industrial Wireless Network.
Proceedings of the 1st International Conference on Data Intelligence and Security, 2018

Botnet Detection with Hybrid Analysis on Flow Based and Graph Based Features of Network Traffic.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

Efficient and Secure Outsourcing of Differentially Private Data Publication.
Proceedings of the Computer Security, 2018

2017
DAPASA: Detecting Android Piggybacked Apps Through Sensitive Subgraph Analysis.
IEEE Trans. Inf. Forensics Secur., 2017

Characterizing Android apps' behavior for effective detection of malapps at large scale.
Future Gener. Comput. Syst., 2017

Gracob: a novel graph-based constant-column biclustering method for mining growth phenotype data.
Bioinform., 2017

2016
Anomadroid: Profiling Android Applications' Behaviors for Identifying Unknown Malapps.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Alde: Privacy Risk Analysis of Analytics Libraries in the Android Ecosystem.
Proceedings of the Security and Privacy in Communication Networks, 2016

A Novel Load Balancing Algorithm Based on Improved Particle Swarm Optimization in Cloud Computing Environment.
Proceedings of the Human Centered Computing - Second International Conference, 2016

Fast, Private and Verifiable: Server-aided Approximate Similarity Computation over Large-Scale Datasets.
Proceedings of the 4th ACM International Workshop on Security in Cloud Computing, 2016

2015
Constructing important features from massive network traffic for lightweight intrusion detection.
IET Inf. Secur., 2015

Harnessing the power of social bookmarking for improving tag-based recommendations.
Comput. Hum. Behav., 2015

Exploring sensor usage behaviors of Android applications based on data flow analysis.
Proceedings of the 34th IEEE International Performance Computing and Communications Conference, 2015

POSTER: The Popular Apps in Your Pocket Are Leaking Your Privacy.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
Exploring Permission-Induced Risk in Android Applications for Malicious Application Detection.
IEEE Trans. Inf. Forensics Secur., 2014

Autonomic intrusion detection: Adaptively detecting anomalies over unlabeled audit data streams in computer networks.
Knowl. Based Syst., 2014

2012
Understanding and analyzing network traffic.
IEEE Netw., 2012

2011
Network traffic monitoring, analysis and anomaly detection [Guest Editorial].
IEEE Netw., 2011

High-speed web attack detection through extracting exemplars from HTTP traffic.
Proceedings of the 2011 ACM Symposium on Applied Computing (SAC), TaiChung, Taiwan, March 21, 2011

Clustering Recommenders in Collaborative Filtering Using Explicit Trust Information.
Proceedings of the Trust Management V, 5th IFIP WG 11.11 International Conference, 2011

2010
Abstracting Audit Data for Lightweight Intrusion Detection.
Proceedings of the Information Systems Security - 6th International Conference, 2010

K-AP: Generating Specified K Clusters by Efficient Affinity Propagation.
Proceedings of the ICDM 2010, 2010

Self-adaptive Change Detection in Streaming Data with Non-stationary Distribution.
Proceedings of the Advanced Data Mining and Applications - 6th International Conference, 2010

2009
Constructing attribute weights from computer audit data for effective intrusion detection.
J. Syst. Softw., 2009

Fast intrusion detection based on a non-negative matrix factorization model.
J. Netw. Comput. Appl., 2009

Self-adaptive web intrusion detection system
CoRR, 2009

A general framework for adaptive and online detection of web attacks.
Proceedings of the 18th International Conference on World Wide Web, 2009

Autonomic Intrusion Detection System.
Proceedings of the Recent Advances in Intrusion Detection, 12th International Symposium, 2009

Attribute Normalization in Network Intrusion Detection.
Proceedings of the 10th International Symposium on Pervasive Systems, 2009

Online and adaptive anomaly Detection: detecting intrusions in unlabelled audit data streams.
Proceedings of the Extraction et gestion des connaissances (EGC'2009), 2009

Diagnostic multi-sources adaptatif. Application à la détection d'intrusion dans des serveurs Web.
Proceedings of the Extraction et gestion des connaissances (EGC'2009), 2009

2008
Processing of massive audit data streams for real-time anomaly intrusion detection.
Comput. Commun., 2008

Efficient detection of DDoS attacks with important attributes.
Proceedings of the CRiSIS '08, 2008

2007
Distance Measures for Anomaly Intrusion Detection.
Proceedings of the 2007 International Conference on Security & Management, 2007

2006
Profiling program behavior for anomaly intrusion detection based on the transition and frequency property of computer audit data.
Comput. Secur., 2006

Identifying Intrusions in Computer Networks with Principal Component Analysis.
Proceedings of the The First International Conference on Availability, 2006

2004
A Novel Intrusion Detection Method Based on Principle Component Analysis in Computer Security.
Proceedings of the Advances in Neural Networks, 2004

Profiling program and user behaviors for anomaly intrusion detection based on non-negative matrix factorization.
Proceedings of the 43rd IEEE Conference on Decision and Control, 2004


  Loading...