Yong Wang

Orcid: 0000-0002-1572-068X

Affiliations:
  • Beijing Institute of Technology, School of Software, China (PhD 2003)


According to our database1, Yong Wang authored at least 19 papers between 2006 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
An empirical study of problems and evaluation of IoT malware classification label sources.
J. King Saud Univ. Comput. Inf. Sci., January, 2024

2023
WHGDroid: Effective android malware detection based on weighted heterogeneous graph.
J. Inf. Secur. Appl., September, 2023

A novel anomaly detection approach based on ensemble semi-supervised active learning (ADESSA).
Comput. Secur., June, 2023

Privacy-Preserving and Traceable Federated Learning for data sharing in industrial IoT applications.
Expert Syst. Appl., 2023

2022
A novel approach based on adaptive online analysis of encrypted traffic for identifying Malware in IIoT.
Inf. Sci., 2022

Blockchain-based Reputation Evaluation Using Game Theory in Social Networking.
Proceedings of the BSCI 2022: Proceedings of the 4th ACM International Symposium on Blockchain and Secure Critical Infrastructure, 2022

2021
A Survey on Adversarial Attack in the Age of Artificial Intelligence.
Wirel. Commun. Mob. Comput., 2021

APTMalInsight: Identify and cognize APT malware based on system call information and ontology knowledge framework.
Inf. Sci., 2021

2019
MalInsight: A systematic profiling based malware detection framework.
J. Netw. Comput. Appl., 2019

MalDAE: Detecting and explaining malware based on correlation and fusion of static and dynamic characteristics.
Comput. Secur., 2019

Review: Build a Roadmap for Stepping Into the Field of Anti-Malware Research Smoothly.
IEEE Access, 2019

2018
Malware Visualization for Fine-Grained Classification.
IEEE Access, 2018

2017
Machine Learning for Analyzing Malware.
Proceedings of the Network and System Security - 11th International Conference, 2017

2015
CP-ABE Based Access Control for Cloud Storage.
Proceedings of the Information Technology and Intelligent Transportation Systems, 2015

Dynamic Binary Instrumentation Based Defense Solution against Virtual Function Table Hijacking Attacks at C++ Binary Programs.
Proceedings of the 10th International Conference on P2P, 2015

2008
A Context-aware Computational Trust Model for Multi-agent Systems.
Proceedings of the IEEE International Conference on Networking, Sensing and Control, 2008

A New SPN Structure for Block Ciphers.
Proceedings of the IEEE International Conference on Networking, Sensing and Control, 2008

2007
A Context-Aware Trust Establishment and Mapping Framework for Web Applications.
Proceedings of the Computational Intelligence and Security, International Conference, 2007

2006
Bayesian Network Based Trust Management.
Proceedings of the Autonomic and Trusted Computing, Third International Conference, 2006


  Loading...