Yu Wang

Orcid: 0000-0002-9807-2293

Affiliations:
  • Guangzhou University, School of Computer Science, Guangzhou, China
  • Deakin University, School of Information Technology, Geelong, VIC, Australia (PhD 2013)
  • Sun Yat-Sen University, Department of Electronic and Communication Engineering, Guangzhou, China


According to our database1, Yu Wang authored at least 89 papers between 2008 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Analysis of hybrid attack and defense based on block withholding strategy.
J. Inf. Secur. Appl., November, 2023

<i>ASSBert</i>: Active and semi-supervised bert for smart contract vulnerability detection.
J. Inf. Secur. Appl., March, 2023

A federated semi-supervised learning approach for network traffic classification.
Int. J. Netw. Manag., 2023

Application-Layer DDoS Attack Detection Using Explicit Duration Recurrent Network-Based Application-Layer Protocol Communication Models.
Int. J. Intell. Syst., 2023

2022
DCUS: Evaluating Double-Click-Based Unlocking Scheme on Smartphones.
Mob. Networks Appl., 2022

Enhancing blockchain-based filtration mechanism via IPFS for collaborative intrusion detection in IoT networks.
J. Syst. Archit., 2022

BlockCSDN: Towards Blockchain-Based Collaborative Intrusion Detection in Software Defined Networking.
IEICE Trans. Inf. Syst., 2022

ZoomPass: A Zoom-Based Android Unlock Scheme on Smart Devices.
Proceedings of the Science of Cyber Security - 4th International Conference, 2022

2021
GAN-Based Differential Private Image Privacy Protection Framework for the Internet of Multimedia Things.
Sensors, 2021

Recent Advances in Blockchain and Artificial Intelligence Integration: Feasibility Analysis, Research Issues, Applications, Challenges, and Future Work.
Secur. Commun. Networks, 2021

DRL-R: Deep reinforcement learning approach for intelligent routing in software-defined data-center networks.
J. Netw. Comput. Appl., 2021

A fog-based collaborative intrusion detection framework for smart grid.
Int. J. Netw. Manag., 2021

Toward a blockchain-based framework for challenge-based collaborative intrusion detection.
Int. J. Inf. Sec., 2021

Challenge-based collaborative intrusion detection in software-defined networking: an evaluation.
Digit. Commun. Networks, 2021

Mobile network traffic pattern classification with incomplete a priori information.
Comput. Commun., 2021

Enhancing Blackslist-Based Packet Filtration Using Blockchain in Wireless Sensor Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2021

Online Learning in Variable Feature Spaces with Mixed Data.
Proceedings of the IEEE International Conference on Data Mining, 2021

2020
Fine-grained flow classification using deep learning for software defined data center networks.
J. Netw. Comput. Appl., 2020

A swipe-based unlocking mechanism with supervised learning on smartphones: Design and evaluation.
J. Netw. Comput. Appl., 2020

Toward supervised shape-based behavioral authentication on smartphones.
J. Inf. Secur. Appl., 2020

Detecting insider attacks in medical cyber-physical networks based on behavioral profiling.
Future Gener. Comput. Syst., 2020

AAMcon: an adaptively distributed SDN controller in data center networks.
Frontiers Comput. Sci., 2020

TruNeo: an integrated pipeline improves personalized true tumor neoantigen identification.
BMC Bioinform., 2020

Designing Double-Click-Based Unlocking Mechanism on Smartphones.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2020

A Framework of Blockchain-Based Collaborative Intrusion Detection in Software Defined Networking.
Proceedings of the Network and System Security - 14th International Conference, 2020

2019
Mix-flow scheduling using deep reinforcement learning for software-defined data-center networks.
Internet Technol. Lett., 2019

IoT-FBAC: Function-based access control scheme using identity-based encryption in IoT.
Future Gener. Comput. Syst., 2019

Designing collaborative blockchained signature-based intrusion detection in IoT environments.
Future Gener. Comput. Syst., 2019

Protecting VNF services with smart online behavior anomaly detection method.
Future Gener. Comput. Syst., 2019

Foreword to the special issue on security, privacy, and social networks.
Concurr. Comput. Pract. Exp., 2019

Adaptive machine learning-based alarm reduction via edge computing for distributed intrusion detection systems.
Concurr. Comput. Pract. Exp., 2019

Towards detection of juice filming charging attacks via supervised CPU usage analysis on smartphones.
Comput. Electr. Eng., 2019

Statistical network protocol identification with unknown pattern extraction.
Ann. des Télécommunications, 2019

Faces are Protected as Privacy: An Automatic Tagging Framework Against Unpermitted Photo Sharing in Social Media.
IEEE Access, 2019

A3CM: Automatic Capability Annotation for Android Malware.
IEEE Access, 2019

Exploit in Smart Devices: A Case Study.
Proceedings of the Security and Privacy in Social Networks and Big Data, 2019

A Comparative Study on Network Traffic Clustering.
Proceedings of the Network and System Security - 13th International Conference, 2019

SwipeVLock: A Supervised Unlocking Mechanism Based on Swipe Behavior on Smartphones.
Proceedings of the Machine Learning for Cyber Security - Second International Conference, 2019

Towards Blockchained Challenge-Based Collaborative Intrusion Detection.
Proceedings of the Applied Cryptography and Network Security Workshops, 2019

2018
COD: caching on demand in information-centric networking.
Telecommun. Syst., 2018

Intersection Traffic Prediction Using Decision Tree Models.
Symmetry, 2018

Centralized Duplicate Removal Video Storage System with Privacy Preservation in IoT.
Sensors, 2018

A fog-based privacy-preserving approach for distributed signature-based intrusion detection.
J. Parallel Distributed Comput., 2018

<i>TouchWB</i>: Touch behavioral user authentication based on web browsing on smartphones.
J. Netw. Comput. Appl., 2018

Enhancing network capacity by weakening community structure in scale-free network.
Future Gener. Comput. Syst., 2018

Automated Big Traffic Analytics for Cyber Security.
CoRR, 2018

Special issue on social network security and privacy.
Concurr. Comput. Pract. Exp., 2018

JFCGuard: Detecting juice filming charging attack via processor usage analysis on smartphones.
Comput. Secur., 2018

When Intrusion Detection Meets Blockchain Technology: A Review.
IEEE Access, 2018

Identifying Passive Message Fingerprint Attacks via Honey Challenge in Collaborative Intrusion Detection Networks.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Deep-learnt features for Twitter spam detection.
Proceedings of the 2018 International Symposium on Security and Privacy in Social Networks and Big Data, 2018

PrivacySearch: An End-User and Query Generalization Tool for Privacy Enhancement in Web Search.
Proceedings of the Network and System Security - 12th International Conference, 2018

CBSigIDS: Towards Collaborative Blockchained Signature-Based Intrusion Detection.
Proceedings of the IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2018

Towards Securing Challenge-Based Collaborative Intrusion Detection Networks via Message Verification.
Proceedings of the Information Security Practice and Experience, 2018

Evaluating the Impact of Intrusion Sensitivity on Securing Collaborative Intrusion Detection Networks Against SOOA.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018

Analyzing Use of High Privileges on Android: An Empirical Case Study of Screenshot and Screen Recording Applications.
Proceedings of the Information Security and Cryptology - 14th International Conference, 2018

A Data-driven Attack against Support Vectors of SVM.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018

Enhancing Intelligent Alarm Reduction for Distributed Intrusion Detection Systems via Edge Computing.
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018

2017
Statistical Features-Based Real-Time Detection of Drifted Twitter Spam.
IEEE Trans. Inf. Forensics Secur., 2017

Addressing the class imbalance problem in Twitter spam detection using ensemble learning.
Comput. Secur., 2017

Exploring Energy Consumption of Juice Filming Charging Attack on Smartphones: A Pilot Study.
Proceedings of the Network and System Security - 11th International Conference, 2017

Home Location Protection in Mobile Social Networks: A Community Based Method (Short Paper).
Proceedings of the Information Security Practice and Experience, 2017

A Privacy-Preserving Framework for Collaborative Intrusion Detection Networks Through Fog Computing.
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017

Detecting Malicious Nodes in Medical Smartphone Networks Through Euclidean Distance-Based Behavioral Profiling.
Proceedings of the Cyberspace Safety and Security - 9th International Symposium, 2017

2016
A General Collaborative Framework for Modeling and Perceiving Distributed Network Behavior.
IEEE/ACM Trans. Netw., 2016

Detection and classification of anomaly intrusion using hierarchy clustering and SVM.
Secur. Commun. Networks, 2016

一种跨域网络资源的安全互操作模型 (Security Interoperation Model of Cross-domain Network Resources).
计算机科学, 2016

Gatekeeping Behavior Analysis for Information Credibility Assessment on Weibo.
Proceedings of the Network and System Security - 10th International Conference, 2016

An Ensemble Learning Approach for Addressing the Class Imbalance Problem in Twitter Spam Detection.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

Fuzzy-Based Feature and Instance Recovery.
Proceedings of the Intelligent Information and Database Systems - 8th Asian Conference, 2016

Comprehensive Analysis of Network Traffic Data.
Proceedings of the 2016 IEEE International Conference on Computer and Information Technology, 2016

2015
Unknown pattern extraction for statistical network protocol identification.
Proceedings of the 40th IEEE Conference on Local Computer Networks, 2015

2014
Internet Traffic Classification Using Constrained Clustering.
IEEE Trans. Parallel Distributed Syst., 2014

Internet traffic clustering with side information.
J. Comput. Syst. Sci., 2014

2013
Network Traffic Classification Using Correlation Information.
IEEE Trans. Parallel Distributed Syst., 2013

Modeling Oscillation Behavior of Network Traffic by Nested Hidden Markov Model with Variable State-Duration.
IEEE Trans. Parallel Distributed Syst., 2013

Unsupervised traffic classification using flow statistical properties and IP packet payload.
J. Comput. Syst. Sci., 2013

Network traffic clustering using Random Forest proximities.
Proceedings of IEEE International Conference on Communications, 2013

2012
Semi-supervised Encrypted Traffic Classification Using Composite Features Set.
J. Networks, 2012

Generating regular expression signatures for network traffic classification in trusted network management.
J. Netw. Comput. Appl., 2012

Internet traffic clustering with constraints.
Proceedings of the 8th International Wireless Communications and Mobile Computing Conference, 2012

2011
The community Analysis of User Behaviors Network for Web Traffic.
J. Softw., 2011

A novel semi-supervised approach for network traffic clustering.
Proceedings of the 5th International Conference on Network and System Security, 2011

Internet Traffic Classification Using Machine Learning: A Token-based Approach.
Proceedings of the 14th IEEE International Conference on Computational Science and Engineering, 2011

2010
An automatic application signature construction system for unknown traffic.
Concurr. Comput. Pract. Exp., 2010

Automatic Application Signature Construction from Unknown Traffic.
Proceedings of the 24th IEEE International Conference on Advanced Information Networking and Applications, 2010

2009
Supervised Learning Real-time Traffic Classifiers.
J. Networks, 2009

Automatic Network Protocol Automaton Extraction.
Proceedings of the Third International Conference on Network and System Security, 2009

2008
Move Statistics-Based Traffic Classifiers Online.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008


  Loading...