Weiyu Dong
Orcid: 0000-0001-6137-7782
According to our database1,
Weiyu Dong authored at least 32 papers
between 2015 and 2026.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2026
Rator: detecting fine-grained semantic code clones using tree encoding based on node degrees of freedom.
Cybersecur., December, 2026
PMF-UAV:A lightweight and robust PUF-enabled multi-factor authentication and key agreement protocol for UAV-assisted secure communication.
Veh. Commun., 2026
Inf. Softw. Technol., 2026
2025
Cybersecur., December, 2025
ADHS-EL: Dynamic ensemble learning with adversarial augmentation for accurate and robust network intrusion detection.
J. King Saud Univ. Comput. Inf. Sci., 2025
J. Inf. Secur. Appl., 2025
Devmp: A Virtual Instruction Extraction Method for Commercial Code Virtualization Obfuscators.
Proceedings of the 16th International Conference on Internetware, 2025
SyzForge: An Automated System Call Specification Generation Process for Efficient Kernel Fuzzing.
Proceedings of the Detection of Intrusions and Malware, and Vulnerability Assessment, 2025
Proceedings of the 2025 4th International Conference on Big Data, 2025
Proceedings of the Information Security and Privacy - 30th Australasian Conference, 2025
2024
J. King Saud Univ. Comput. Inf. Sci., February, 2024
FA-Fuzz: A Novel Scheduling Scheme Using Firefly Algorithm for Mutation-Based Fuzzing.
IEEE Trans. Software Eng., January, 2024
2023
Expert Syst. Appl., November, 2023
Comput. Secur., September, 2023
Comput. Secur., May, 2023
Dynamic Resampling Based Boosting Random Forest for Network Anomaly Traffic Detection.
Proceedings of the Advances and Trends in Artificial Intelligence. Theory and Applications, 2023
2022
Concurr. Comput. Pract. Exp., 2022
Proceedings of the Internetware 2022: 13th Asia-Pacific Symposium on Internetware, Hohhot, China, June 11, 2022
2021
ZeroDVS: Trace-Ability and Security Detection of Container Image Based on Inheritance Graph.
Proceedings of the 5th IEEE International Conference on Cryptography, Security and Privacy, 2021
Proceedings of the 5th IEEE International Conference on Cryptography, Security and Privacy, 2021
Proceedings of the 6th IEEE International Conference on Computer and Communication Systems, 2021
Proceedings of the 6th IEEE International Conference on Computer and Communication Systems, 2021
2020
Proceedings of the ICCSP 2020: 4th International Conference on Cryptography, 2020
2019
A Value Set Analysis Refinement Approach Based on Conditional Merging and Lazy Constraint Solving.
IEEE Access, 2019
2018
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018
2017
Proceedings of the Information Security Practice and Experience, 2017
Proceedings of the 13th International Conference on Computational Intelligence and Security, 2017
2016
计算机科学, 2016
Proceedings of the Advanced Computer Architecture - 11th Conference, 2016
2015
计算机科学, 2015