Weiping Wang

According to our database1, Weiping Wang authored at least 42 papers between 2008 and 2020.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

Homepage:

On csauthors.net:

Bibliography

2020
LSCDroid: Malware Detection Based on Local Sensitive API Invocation Sequences.
IEEE Trans. Reliability, 2020

On the Optimal Minimum Distance of Fractional Repetition Codes.
CoRR, 2020

2019
BridgeTaint: A Bi-Directional Dynamic Taint Tracking Method for JavaScript Bridges in Android Hybrid Applications.
IEEE Trans. Information Forensics and Security, 2019

PDRCNN: Precise Phishing Detection with Recurrent Convolutional Neural Networks.
Security and Communication Networks, 2019

An Efficient Authentication Scheme Based on Deployment Knowledge Against Mobile Sink Replication Attack in UWSNs.
IEEE Internet Things J., 2019

VDetector: Detecting Vulnerability Based on Inter-Component Data Flows in Android Applications.
Proceedings of the 15th International Conference on Mobile Ad-Hoc and Sensor Networks, 2019

ADS-SA: System for Automatically Detecting Sensitive Path of Android Applications Based on Static Analysis.
Proceedings of the Smart City and Informatization - 7th International Conference, 2019

Project-driven information talents training mode in opening environment.
Proceedings of the 14th International Conference on Computer Science & Education, 2019

2018
A (M, m) Authentication Scheme Against Mobile Sink Replicated Attack in Unattended Sensor Networks.
IEEE Wirel. Commun. Lett., 2018

A fine-grained rule partition algorithm in cloud data centers.
J. Netw. Comput. Appl., 2018

2017
A Secure Scheme for Heterogeneous Sensor Networks.
IEEE Wirel. Commun. Lett., 2017

2016
Fair coding for inter-session network coding in wireless mesh networks.
Wireless Communications and Mobile Computing, 2016

Code pruning in opportunistic routing through bidirectional coding traffic comparison.
Wireless Communications and Mobile Computing, 2016

TD-WS: a threat detection tool of WebSocket and Web Storage in HTML5 websites.
Security and Communication Networks, 2016

A Secure Scheme Based on Layer Model in Multi-Phase Sensor Networks.
IEEE Communications Letters, 2016

2015
Mobility Similarity-Based Routing in Buffer-Limited Delay Tolerant Networks.
Int. J. Distributed Sens. Networks, 2015

A new approach to designing firewall based on multidimensional matrix.
Concurr. Comput. Pract. Exp., 2015

EPAMP: An Anonymous Multicast Protocol in Mobile Ad Hoc Networks.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

2014
A New Key Predistribution Scheme for Multiphase Sensor Networks Using a New Deployment Model.
J. Sensors, 2014

Lossy links diagnosis for wireless sensor networks by utilising the existing traffic information.
IJES, 2014

2013
QSA: Query Splitting-Based Anticollision for Mobile RFID-Based Internet-of-Things.
Int. J. Distributed Sens. Networks, 2013

Adaptive explicit congestion control based on bandwidth estimation for high bandwidth-delay product networks.
Comput. Commun., 2013

Adaptive Relay Selection Algorithm Based on Network Coding in 802.16m Network.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, 2013

A Cross-Layer Optimization Mechanism for Inter-session Network Coding in Wireless Mesh Network.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, 2013

ARSM: A Lightweight Packet Reception Notification Mechanism for Wireless Localized Network Coding.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, 2013

Energy-Efficient Multicast Protocol for Real-Time Wireless Sensor Networks.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, 2013

Design of Lightweight Web Page Tamper-Resistant Mechanism for Linux.
Proceedings of the Cyberspace Safety and Security - 5th International Symposium, 2013

2012
A Virtual-Ring-Based Data Storage and Retrieval Scheme in Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2012

Iteration method for predicting essential proteins based on orthology and protein-protein interaction networks.
BMC Syst. Biol., 2012

Minimizing Movement for Target Coverage in Mobile Sensor Networks.
Proceedings of the 32nd International Conference on Distributed Computing Systems Workshops (ICDCS 2012 Workshops), 2012

2011
DENNC: A Wireless Malicious Detection Approach Based on Network Coding.
Proceedings of the IEEE 10th International Conference on Trust, 2011

An Explicit Congestion Control Protocol Based on Bandwidth Estimation.
Proceedings of the Global Communications Conference, 2011

2010
Design and Implementation of Collaboration Support in Virtual Experiment Environment.
Proceedings of the Advances in Web-Based Learning - ICWL 2010, 2010

2009
An analytical model for end-to-end communication channel over PLCN based on QBDs.
Inf. Process. Lett., 2009

Detection and location of malicious nodes based on source coding and multi-path transmission in WSN.
Proceedings of the 11th IEEE International Conference on High Performance Computing and Communications, 2009

An Anonymous Communication Mechanism without Key Infrastructure Based on Multi-Paths Network Coding.
Proceedings of the Global Communications Conference, 2009. GLOBECOM 2009, Honolulu, Hawaii, USA, 30 November, 2009

2008
A Broadcasting Retransmission Approach Based on Random Linear Network Coding.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

A Novel Anonymous Communication Strategy with Respect to Payment Mechanism.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

Design and Implementation of Compression Algorithm Comparator for Digital Image Processing Based on Component.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

A Virtual Laboratory Platform Based on Integration of Java and Matlab.
Proceedings of the Advances in Web Based Learning, 2008

A Source-Location Privacy Protocol in WSN Based on Locational Angle.
Proceedings of IEEE International Conference on Communications, 2008

A New Anonymity Measure Based on Partial Entropy.
Proceedings of IEEE International Conference on Communications, 2008


  Loading...