Παρακολούθηση
Vincent Wen
Vincent Wen
Η διεύθυνση ηλεκτρονικού ταχυδρομείου έχει επαληθευτεί στον τομέα swin.edu.au
Τίτλος
Παρατίθεται από
Παρατίθεται από
Έτος
The fog computing paradigm: Scenarios and security issues
I Stojmenovic, S Wen
2014 federated conference on computer science and information systems, 1-8, 2014
14062014
An overview of fog computing and its security issues
I Stojmenovic, S Wen, X Huang, H Luan
Concurrency and Computation: Practice and Experience 28 (10), 2991-3005, 2016
5122016
Software vulnerability detection using deep neural networks: a survey
G Lin, S Wen, QL Han, J Zhang, Y Xiang
Proceedings of the IEEE 108 (10), 1825-1848, 2020
4722020
Deep learning based attack detection for cyber-physical system cybersecurity: A survey
J Zhang, L Pan, QL Han, C Chen, S Wen, Y Xiang
IEEE/CAA Journal of Automatica Sinica 9 (3), 377-391, 2021
3392021
Android HIV: A study of repackaging malware for evading machine-learning detection
X Chen, C Li, D Wang, S Wen, J Zhang, S Nepal, Y Xiang, K Ren
IEEE Transactions on Information Forensics and Security 15, 987-1001, 2019
3282019
Identifying propagation sources in networks: State-of-the-art and comparative studies
J Jiang, S Wen, S Yu, Y Xiang, W Zhou
IEEE Communications Surveys & Tutorials 19 (1), 465-481, 2016
2602016
Fuzzing: a survey for roadmap
X Zhu, S Wen, S Camtepe, Y Xiang
ACM Computing Surveys (CSUR) 54 (11s), 1-36, 2022
2492022
Twitter spam detection: Survey of new approaches and comparative study
T Wu, S Wen, Y Xiang, W Zhou
Computers & Security 76, 265-284, 2018
2272018
Modeling the propagation of worms in networks: A survey
Y Wang, S Wen, Y Xiang, W Zhou
IEEE Communications Surveys & Tutorials 16 (2), 942-960, 2013
2072013
A sword with two edges: Propagation studies on both positive and negative information in online social networks
S Wen, MS Haghighi, C Chen, Y Xiang, W Zhou, W Jia
IEEE Transactions on Computers 64 (3), 640-653, 2014
2022014
Detection and defense of application-layer DDoS attacks in backbone web traffic
W Zhou, W Jia, S Wen, Y Xiang, W Zhou
Future Generation Computer Systems 38, 36-46, 2014
1622014
To shut them up or to clarify: Restraining the spread of rumors in online social networks
S Wen, J Jiang, Y Xiang, S Yu, W Zhou, W Jia
IEEE Transactions on Parallel and Distributed Systems 25 (12), 3306-3316, 2014
1482014
Modeling propagation dynamics of social network worms
S Wen, W Zhou, J Zhang, Y Xiang, W Zhou, W Jia
IEEE Transactions on parallel and distributed systems 24 (8), 1633-1643, 2012
1412012
Snipuzz: Black-box fuzzing of iot firmware via message snippet inference
X Feng, R Sun, X Zhu, M Xue, S Wen, D Liu, S Nepal, Y Xiang
(CCS' 21) Proceedings of the 2021 ACM SIGSAC conference on computer and …, 2021
1322021
Daedalus: Breaking nonmaximum suppression in object detection via adversarial examples
D Wang, C Li, S Wen, QL Han, S Nepal, X Zhang, Y Xiang
IEEE Transactions on Cybernetics 52 (8), 7427-7440, 2021
1252021
DeepBalance: Deep-learning and fuzzy oversampling for vulnerability detection
S Liu, G Lin, QL Han, S Wen, J Zhang, Y Xiang
IEEE Transactions on Fuzzy Systems 28 (7), 1329-1343, 2019
1222019
Rumor source identification in social networks with time-varying topology
J Jiang, S Wen, S Yu, Y Xiang, W Zhou
IEEE Transactions on Dependable and Secure Computing 15 (1), 166-179, 2016
1112016
Intersection traffic prediction using decision tree models
W Alajali, W Zhou, S Wen, Y Wang
Symmetry 10 (9), 386, 2018
982018
Detecting vulnerability on IoT device firmware: A survey
X Feng, X Zhu, QL Han, W Zhou, S Wen, Y Xiang
IEEE/CAA Journal of Automatica Sinica 10 (1), 25-41, 2022
952022
Modeling and analysis on the propagation dynamics of modern email malware
S Wen, W Zhou, J Zhang, Y Xiang, W Zhou, W Jia, CC Zou
IEEE transactions on dependable and secure computing 11 (4), 361-374, 2013
802013
Δεν είναι δυνατή η εκτέλεση της ενέργειας από το σύστημα αυτή τη στιγμή. Προσπαθήστε ξανά αργότερα.
Άρθρα 1–20