Weiping Wang

Orcid: 0000-0001-5255-5639

Affiliations:
  • Central South University, School of Information Science and Engineering, Changsha, China


According to our database1, Weiping Wang authored at least 69 papers between 2008 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
RF-Siamese: Approaching Accurate RFID Gesture Recognition With One Sample.
IEEE Trans. Mob. Comput., January, 2024

UCG: A Universal Cross-Domain Generator for Transferable Adversarial Examples.
IEEE Trans. Inf. Forensics Secur., 2024

2023
Real-Time and Accurate Gesture Recognition With Commercial RFID Devices.
IEEE Trans. Mob. Comput., December, 2023

Practical periodic strategy for 40/100 Gbps Energy Efficient Ethernet.
Comput. Networks, September, 2023

LSD: Adversarial Examples Detection Based on Label Sequences Discrepancy.
IEEE Trans. Inf. Forensics Secur., 2023

Backdoor Attacks to Deep Learning Models and Countermeasures: A Survey.
IEEE Open J. Comput. Soc., 2023

Accurate IoT Device Identification based on A Few Network Traffic.
Proceedings of the 31st IEEE/ACM International Symposium on Quality of Service, 2023

TransAST: A Machine Translation-Based Approach for Obfuscated Malicious JavaScript Detection.
Proceedings of the 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Network, 2023

2022
On Some Capacity-Achieving Fractional Repetition Codes.
IEEE Trans. Veh. Technol., 2022

Detecting Adversarial Samples for Deep Learning Models: A Comparative Study.
IEEE Trans. Netw. Sci. Eng., 2022

An Improved Bound and Singleton-Optimal Constructions of Fractional Repetition Codes.
IEEE Trans. Commun., 2022

High-Rate Constructions of Exact-Repair Regenerating Codes.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2022

HashDroid:Extraction of malicious features of Android applications based on function call graph pruning.
Proceedings of the IEEE International Conference on Trust, 2022

WBA: A Warping-based Approach to Generating Imperceptible Adversarial Examples.
Proceedings of the IEEE International Conference on Trust, 2022

G-Update: A Group-based Update Scheme for Heterogenous Erasure-coded Storage Systems.
Proceedings of the 24th IEEE Int Conf on High Performance Computing & Communications; 8th Int Conf on Data Science & Systems; 20th Int Conf on Smart City; 8th Int Conf on Dependability in Sensor, 2022

2021
An Exploit Kits Detection Approach Based on HTTP Message Graph.
IEEE Trans. Inf. Forensics Secur., 2021

A Secure Scheme Based on One-Way Associated Key Management Model in Wireless Sensor Networks.
IEEE Internet Things J., 2021

NSDroid: efficient multi-classification of android malware using neighborhood signature in local function call graphs.
Int. J. Inf. Sec., 2021

Fast Application Activity Recognition with Encrypted Traffic.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2021

Expandable Fractional Repetition Codes for Distributed Storage Systems.
Proceedings of the IEEE Information Theory Workshop, 2021

Square Fractional Repetition Codes for Distributed Storage Systems.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2021

2020
LSCDroid: Malware Detection Based on Local Sensitive API Invocation Sequences.
IEEE Trans. Reliab., 2020

SuPoolVisor: a visual analytics system for mining pool surveillance.
Frontiers Inf. Technol. Electron. Eng., 2020

Towards Real-time Cooperative Deep Inference over the Cloud and Edge End Devices.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2020

Accurate human activity recognition with multi-task learning.
CCF Trans. Pervasive Comput. Interact., 2020

RPAD: An Unsupervised HTTP Request Parameter Anomaly Detection Method.
Proceedings of the 19th IEEE International Conference on Trust, 2020

WSAD: An Unsupervised Web Session Anomaly Detection Method.
Proceedings of the 16th International Conference on Mobility, Sensing and Networking, 2020

On the Optimal Minimum Distance of Fractional Repetition Codes.
Proceedings of the IEEE Global Communications Conference, 2020

2019
BridgeTaint: A Bi-Directional Dynamic Taint Tracking Method for JavaScript Bridges in Android Hybrid Applications.
IEEE Trans. Inf. Forensics Secur., 2019

PDRCNN: Precise Phishing Detection with Recurrent Convolutional Neural Networks.
Secur. Commun. Networks, 2019

An Efficient Authentication Scheme Based on Deployment Knowledge Against Mobile Sink Replication Attack in UWSNs.
IEEE Internet Things J., 2019

VDetector: Detecting Vulnerability Based on Inter-Component Data Flows in Android Applications.
Proceedings of the 15th International Conference on Mobile Ad-Hoc and Sensor Networks, 2019

On the Optimal Reconstruction Degree of Fractional Repetition Codes.
Proceedings of the IEEE International Symposium on Information Theory, 2019

ADS-SA: System for Automatically Detecting Sensitive Path of Android Applications Based on Static Analysis.
Proceedings of the Smart City and Informatization - 7th International Conference, 2019

Project-driven information talents training mode in opening environment.
Proceedings of the 14th International Conference on Computer Science & Education, 2019

2018
A (M, m) Authentication Scheme Against Mobile Sink Replicated Attack in Unattended Sensor Networks.
IEEE Wirel. Commun. Lett., 2018

A fine-grained rule partition algorithm in cloud data centers.
J. Netw. Comput. Appl., 2018

2017
A Secure Scheme for Heterogeneous Sensor Networks.
IEEE Wirel. Commun. Lett., 2017

2016
Fair coding for inter-session network coding in wireless mesh networks.
Wirel. Commun. Mob. Comput., 2016

Code pruning in opportunistic routing through bidirectional coding traffic comparison.
Wirel. Commun. Mob. Comput., 2016

TD-WS: a threat detection tool of WebSocket and Web Storage in HTML5 websites.
Secur. Commun. Networks, 2016

A Secure Scheme Based on Layer Model in Multi-Phase Sensor Networks.
IEEE Commun. Lett., 2016

2015
Mobility Similarity-Based Routing in Buffer-Limited Delay Tolerant Networks.
Int. J. Distributed Sens. Networks, 2015

A new approach to designing firewall based on multidimensional matrix.
Concurr. Comput. Pract. Exp., 2015

EPAMP: An Anonymous Multicast Protocol in Mobile Ad Hoc Networks.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

2014
A New Key Predistribution Scheme for Multiphase Sensor Networks Using a New Deployment Model.
J. Sensors, 2014

Lossy links diagnosis for wireless sensor networks by utilising the existing traffic information.
Int. J. Embed. Syst., 2014

2013
QSA: Query Splitting-Based Anticollision for Mobile RFID-Based Internet-of-Things.
Int. J. Distributed Sens. Networks, 2013

Adaptive explicit congestion control based on bandwidth estimation for high bandwidth-delay product networks.
Comput. Commun., 2013

Adaptive Relay Selection Algorithm Based on Network Coding in 802.16m Network.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, 2013

A Cross-Layer Optimization Mechanism for Inter-session Network Coding in Wireless Mesh Network.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, 2013

ARSM: A Lightweight Packet Reception Notification Mechanism for Wireless Localized Network Coding.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, 2013

Energy-Efficient Multicast Protocol for Real-Time Wireless Sensor Networks.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, 2013

Design of Lightweight Web Page Tamper-Resistant Mechanism for Linux.
Proceedings of the Cyberspace Safety and Security - 5th International Symposium, 2013

2012
A Virtual-Ring-Based Data Storage and Retrieval Scheme in Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2012

Iteration method for predicting essential proteins based on orthology and protein-protein interaction networks.
BMC Syst. Biol., 2012

Minimizing Movement for Target Coverage in Mobile Sensor Networks.
Proceedings of the 32nd International Conference on Distributed Computing Systems Workshops (ICDCS 2012 Workshops), 2012

2011
DENNC: A Wireless Malicious Detection Approach Based on Network Coding.
Proceedings of the IEEE 10th International Conference on Trust, 2011

An Explicit Congestion Control Protocol Based on Bandwidth Estimation.
Proceedings of the Global Communications Conference, 2011

2010
Design and Implementation of Collaboration Support in Virtual Experiment Environment.
Proceedings of the Advances in Web-Based Learning - ICWL 2010, 2010

2009
An analytical model for end-to-end communication channel over PLCN based on QBDs.
Inf. Process. Lett., 2009

Detection and location of malicious nodes based on source coding and multi-path transmission in WSN.
Proceedings of the 11th IEEE International Conference on High Performance Computing and Communications, 2009

An Anonymous Communication Mechanism without Key Infrastructure Based on Multi-Paths Network Coding.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009

2008
A Broadcasting Retransmission Approach Based on Random Linear Network Coding.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

A Novel Anonymous Communication Strategy with Respect to Payment Mechanism.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

Design and Implementation of Compression Algorithm Comparator for Digital Image Processing Based on Component.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

A Virtual Laboratory Platform Based on Integration of Java and Matlab.
Proceedings of the Advances in Web Based Learning, 2008

A Source-Location Privacy Protocol in WSN Based on Locational Angle.
Proceedings of IEEE International Conference on Communications, 2008

A New Anonymity Measure Based on Partial Entropy.
Proceedings of IEEE International Conference on Communications, 2008


  Loading...