Wei Wang

Affiliations:
  • AT&T Security Research Center
  • Stevens Institute of Technology, Jersey City, NJ, USA (former)


According to our database1, Wei Wang authored at least 15 papers between 2009 and 2016.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2016
WhatApp: Modeling mobile applications by domain names.
Proceedings of the 12th IEEE International Conference on Wireless and Mobile Computing, 2016

A P2P virtual core-network architecture for next-generation mobility networks.
Proceedings of the 2016 IEEE Conference on Standards for Communications and Networking, 2016

2015
Dandelion - Revealing Malicious Groups of Interest in Large Mobile Networks.
Proceedings of the Network and System Security - 9th International Conference, 2015

Towards activity-based app search.
Proceedings of the Eighth International Conference on Mobile Computing and Ubiquitous Networking, 2015

2013
What you see predicts what you get - lightweight agent-based malware detection.
Secur. Commun. Networks, 2013

Detecting Targeted Attacks By Multilayer Deception.
J. Cyber Secur. Mobil., 2013

Discovery of emergent malicious campaigns in cellular networks.
Proceedings of the Annual Computer Security Applications Conference, 2013

2012
Catching the Wily Hacker: A multilayer deception system.
Proceedings of the 35th IEEE Sarnoff Symposium 2012, Newark, NJ, USA, May 21-22, 2012, 2012

A network coding method for channel signatures based key distribution.
Proceedings of IEEE International Conference on Communications, 2012

2011
Maximal Ratio Diversity Combining Enhanced Security.
IEEE Commun. Lett., 2011

2010
Physical layer assisted security for mobile OFDM networks.
Proceedings of the Second IEEE Vehicular Networking Conference, 2010

2009
A framework for intrusion detection systems by social network analysis methods in <i>ad hoc</i> networks.
Secur. Commun. Networks, 2009

Collaborative Anomaly Detection for Structured P2P Networks.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009

Exploring social relations for the intrusion detection in ad hoc networks.
Proceedings of the Data Mining, 2009

An Intrusion Detection System in Ad Hoc Networks: A Social Network Analysis Approach.
Proceedings of the 6th IEEE Consumer Communications and Networking Conference, 2009


  Loading...