Xiaolei Wang

Orcid: 0000-0002-5342-4275

Affiliations:
  • National University of Defense Technology, College of Computer, Changsha, China


According to our database1, Xiaolei Wang authored at least 17 papers between 2014 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Robust Anomaly-Based Insider Threat Detection Using Graph Neural Network.
IEEE Trans. Netw. Serv. Manag., September, 2023

2022
MADDC: Multi-Scale Anomaly Detection, Diagnosis and Correction for Discrete Event Logs.
Proceedings of the Annual Computer Security Applications Conference, 2022

2021
Image-Based Insider Threat Detection via Geometric Transformation.
Secur. Commun. Networks, 2021

Toward Hybrid Static-Dynamic Detection of Vulnerabilities in IoT Firmware.
IEEE Netw., 2021

2019
Automated Hybrid Analysis of Android Malware through Augmenting Fuzzing with Forced Execution.
IEEE Trans. Mob. Comput., 2019

LeakDoctor: Toward Automatically Diagnosing Privacy Leaks in Mobile Applications.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2019

PrivacyContext: identifying malicious mobile privacy leak using program context.
Int. J. Inf. Comput. Secur., 2019

2018
A Novel Android Malware Detection Approach Based on Convolutional Neural Network.
Proceedings of the 2nd International Conference on Cryptography, Security and Privacy, 2018

2017
Adaptive traffic sampling for P2P botnet detection.
Int. J. Netw. Manag., 2017

Droid-AntiRM: Taming Control Flow Anti-analysis to Support Automated Dynamic Analysis of Android Malware.
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017

2016
DroidContext: Identifying Malicious Mobile Privacy Leak Using Context.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

2015
A Novel Hybrid Mobile Malware Detection System Integrating Anomaly Detection With Misuse Detection.
Proceedings of the 6th International Workshop on Mobile Cloud Computing and Services, 2015

SPEMS: A Stealthy and Practical Execution Monitoring System Based on VMI.
Proceedings of the Cloud Computing and Security - First International Conference, 2015

2014
Identifying P2P Network Activities on Encrypted Traffic.
Proceedings of the 13th IEEE International Conference on Trust, 2014

A Collaborative Traceback against P2P Botnet Using Information Sharing and Correlation Analysis.
Proceedings of the 2014 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2014

PeerSorter: Classifying Generic P2P Traffic in Real-Time.
Proceedings of the 17th IEEE International Conference on Computational Science and Engineering, 2014

PeerDigger: Digging Stealthy P2P Hosts through Traffic Analysis in Real-Time.
Proceedings of the 17th IEEE International Conference on Computational Science and Engineering, 2014


  Loading...