Weina Niu

According to our database1, Weina Niu authored at least 40 papers between 2014 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
FSMFLog: Discovering Anomalous Logs Combining Full Semantic Information and Multifeature Fusion.
IEEE Internet Things J., February, 2024

2023
GCDroid: Android Malware Detection Based on Graph Compression With Reachability Relationship Extraction for IoT Devices.
IEEE Internet Things J., July, 2023

A Novel Generation Method for Diverse Privacy Image Based on Machine Learning.
Comput. J., March, 2023

Portfolio-Based Incentive Mechanism Design for Cross-Device Federated Learning.
CoRR, 2023

Fuzzing Logical Bugs in eBPF Verifier with Bound-Violation Indicator.
Proceedings of the IEEE International Conference on Communications, 2023

Black-box Word-level Textual Adversarial Attack Based On Discrete Harris Hawks Optimization.
Proceedings of the 26th International Conference on Computer Supported Cooperative Work in Design, 2023

2022
A Novel Steganography Method for Character-Level Text Image Based on Adversarial Attacks.
Sensors, 2022

Attacker Traceability on Ethereum through Graph Analysis.
Secur. Commun. Networks, 2022

Uncovering APT malware traffic using deep learning combined with time sequence and association analysis.
Comput. Secur., 2022

Trine: Syslog anomaly detection with three transformer encoders in one generative adversarial network.
Appl. Intell., 2022

IDROP: Intelligently detecting Return-Oriented Programming using real-time execution flow and LSTM.
Proceedings of the IEEE International Conference on Trust, 2022

A Fine-Grained Approach for Vulnerabilities Discovery Using Augmented Vulnerability Signatures.
Proceedings of the Knowledge Science, Engineering and Management, 2022

Targeted Anonymization: A Face Image Anonymization Method for Unauthorized Models.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2022

LogTracer: Efficient Anomaly Tracing Combining System Log Detection and Provenance Graph.
Proceedings of the IEEE Global Communications Conference, 2022

2021
HTTP-Based APT Malware Infection Detection Using URL Correlation Analysis.
Secur. Commun. Networks, 2021

A low-query black-box adversarial attack based on transferability.
Knowl. Based Syst., 2021

Intelligent mining vulnerabilities in python code snippets.
J. Intell. Fuzzy Syst., 2021

NEDetector: Automatically extracting cybersecurity neologisms from hacker forums.
J. Inf. Secur. Appl., 2021

Transaction-based classification and detection approach for Ethereum smart contract.
Inf. Process. Manag., 2021

Malware on Internet of UAVs Detection Combining String Matching and Fourier Transformation.
IEEE Internet Things J., 2021

FedVANET: Efficient Federated Learning with Non-IID Data for Vehicular Ad Hoc Networks.
Proceedings of the IEEE Global Communications Conference, 2021

2020
OpCode-Level Function Call Graph Based Android Malware Classification Using Deep Learning.
Sensors, 2020

Preprocessing Method for Encrypted Traffic Based on Semisupervised Clustering.
Secur. Commun. Networks, 2020

A Black-Box Attack on Neural Networks Based on Swarm Evolutionary Algorithm.
Proceedings of the Information Security and Privacy - 25th Australasian Conference, 2020

2019
Detecting Malware on X86-Based IoT Devices in Autonomous Driving.
IEEE Wirel. Commun., 2019

A Heuristic Statistical Testing Based Approach for Encrypted Network Traffic Identification.
IEEE Trans. Veh. Technol., 2019

Using XGBoost to Discover Infected Hosts Based on HTTP Traffic.
Secur. Commun. Networks, 2019

An Insider Threat Detection Approach Based on Mouse Dynamics and Deep Learning.
Secur. Commun. Networks, 2019

A Lockable Abnormal Electromagnetic Signal Joint Detection Algorithm.
Int. J. Pattern Recognit. Artif. Intell., 2019

Co-Clustering Host-Domain Graphs to Discover Malware Infection.
Proceedings of the 2019 International Conference on Artificial Intelligence and Advanced Manufacturing, 2019

2018
Resetting Your Password Is Vulnerable: A Security Study of Common SMS-Based Authentication in IoT Device.
Wirel. Commun. Mob. Comput., 2018

Weighted Domain Transfer Extreme Learning Machine and Its Online Version for Gas Sensor Drift Compensation in E-Nose Systems.
Wirel. Commun. Mob. Comput., 2018

Online Sensor Drift Compensation for E-Nose Systems Using Domain Adaptation and Extreme Learning Machine.
Sensors, 2018

Tor anonymous traffic identification based on gravitational clustering.
Peer-to-Peer Netw. Appl., 2018

具有异构感染率的僵尸网络建模与分析 (Modeling and Analysis of Botnet with Heterogeneous Infection Rate).
计算机科学, 2018

2017
Modeling Attack Process of Advanced Persistent Threat Using Network Evolution.
IEICE Trans. Inf. Syst., 2017

Phishing Emails Detection Using CS-SVM.
Proceedings of the 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), 2017

2016
Improving data field hierarchical clustering using Barnes-Hut algorithm.
Pattern Recognit. Lett., 2016

Modeling Attack Process of Advanced Persistent Threat.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2016

2014
Multi-party quantum private comparison protocol based on d-dimensional entangled states.
Quantum Inf. Process., 2014


  Loading...