Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Sheng Wen
@article{DBLP:journals/connection/TangW0WZ0024, author = {Lihong Tang and Tingmin Wu and Xiao Chen and Sheng Wen and Wei Zhou and Xiaogang Zhu and Yang Xiang}, title = {How {COVID-19} impacts telehealth: an empirical study of telehealth services, users and the use of metaverse}, journal = {Connect. Sci.}, volume = {36}, number = {1}, year = {2024}, url = {https://doi.org/10.1080/09540091.2023.2282942}, doi = {10.1080/09540091.2023.2282942}, timestamp = {Fri, 08 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/connection/TangW0WZ0024.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tii/HuCAZHW24, author = {Xiangyu Hu and Hanpeng Cai and Mamoun Alazab and Wei Zhou and Mohammad Sayad Haghighi and Sheng Wen}, title = {Federated Learning in Industrial IoT: {A} Privacy-Preserving Solution That Enables Sharing of Data in Hydrocarbon Explorations}, journal = {{IEEE} Trans. Ind. Informatics}, volume = {20}, number = {3}, pages = {4337--4346}, year = {2024}, url = {https://doi.org/10.1109/TII.2023.3306931}, doi = {10.1109/TII.2023.3306931}, timestamp = {Sat, 16 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tii/HuCAZHW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cceai/YinWZZ24, author = {Jianguo Yin and Sheng Wen and Chenhao Zhang and Meng Zhao}, editor = {Wenqiang Zhang and Yong Yue and Marek R. Ogiela}, title = {Radar sequence {HRRP} target recognition based on {DRSN-LSTM}}, booktitle = {2024 8th International Conference on Control Engineering and Artificial Intelligence, {CCEAI} 2024, Shanghai, China, January 26-28, 2024}, pages = {66--72}, publisher = {{ACM}}, year = {2024}, url = {https://doi.org/10.1145/3640824.3640834}, doi = {10.1145/3640824.3640834}, timestamp = {Mon, 15 Apr 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/cceai/YinWZZ24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/concurrency/PengZZWW23, author = {Zhiniang Peng and Wei Zhou and Xiaogang Zhu and Youke Wu and Sheng Wen}, title = {On the security of fully homomorphic encryption for data privacy in Internet of Things}, journal = {Concurr. Comput. Pract. Exp.}, volume = {35}, number = {19}, year = {2023}, url = {https://doi.org/10.1002/cpe.7330}, doi = {10.1002/CPE.7330}, timestamp = {Sat, 09 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/concurrency/PengZZWW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/LiXWWCX23, author = {Huacheng Li and Chunhe Xia and Tianbo Wang and Sheng Wen and Chao Chen and Yang Xiang}, title = {Capturing Dynamics of Information Diffusion in {SNS:} {A} Survey of Methodology and Techniques}, journal = {{ACM} Comput. Surv.}, volume = {55}, number = {2}, pages = {22:1--22:51}, year = {2023}, url = {https://doi.org/10.1145/3485273}, doi = {10.1145/3485273}, timestamp = {Fri, 25 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csur/LiXWWCX23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeejas/FengZHZWX23, author = {Xiaotao Feng and Xiaogang Zhu and Qing{-}Long Han and Wei Zhou and Sheng Wen and Yang Xiang}, title = {Detecting Vulnerability on IoT Device Firmware: {A} Survey}, journal = {{IEEE} {CAA} J. Autom. Sinica}, volume = {10}, number = {1}, pages = {25--41}, year = {2023}, url = {https://doi.org/10.1109/JAS.2022.105860}, doi = {10.1109/JAS.2022.105860}, timestamp = {Sat, 09 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ieeejas/FengZHZWX23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ral/YinYWZP23, author = {Xuanchun Yin and Jinchun Yan and Sheng Wen and Jiantao Zhang and Muye Pang}, title = {Origami-Based Decoupling Clutch Achieves Energy-Efficient Legged Robots}, journal = {{IEEE} Robotics Autom. Lett.}, volume = {8}, number = {12}, pages = {8058--8065}, year = {2023}, url = {https://doi.org/10.1109/LRA.2023.3325775}, doi = {10.1109/LRA.2023.3325775}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ral/YinYWZP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcc/FengMWWXM23, author = {Xiaoqin Feng and Jianfeng Ma and Huaxiong Wang and Sheng Wen and Yang Xiang and Yinbin Miao}, title = {Space-Efficient Storage Structure of Blockchain Transactions Supporting Secure Verification}, journal = {{IEEE} Trans. Cloud Comput.}, volume = {11}, number = {3}, pages = {2631--2645}, year = {2023}, url = {https://doi.org/10.1109/TCC.2022.3220664}, doi = {10.1109/TCC.2022.3220664}, timestamp = {Sun, 24 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcc/FengMWWXM23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcss/FeiCMCWH23, author = {Gaolei Fei and Yong Cheng and Wanlun Ma and Chao Chen and Sheng Wen and Guangmin Hu}, title = {Real-Time Detection of {COVID-19} Events From Twitter: {A} Spatial-Temporally Bursty-Aware Method}, journal = {{IEEE} Trans. Comput. Soc. Syst.}, volume = {10}, number = {2}, pages = {656--672}, year = {2023}, url = {https://doi.org/10.1109/TCSS.2022.3169742}, doi = {10.1109/TCSS.2022.3169742}, timestamp = {Sat, 29 Apr 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcss/FeiCMCWH23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/TangWCWLXGX23, author = {Lihong Tang and Tingmin Wu and Xiao Chen and Sheng Wen and Li Li and Xin Xia and Marthie Grobler and Yang Xiang}, title = {How Does Visualisation Help App Practitioners Analyse Android Apps?}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {20}, number = {3}, pages = {2238--2255}, year = {2023}, url = {https://doi.org/10.1109/TDSC.2022.3178181}, doi = {10.1109/TDSC.2022.3178181}, timestamp = {Fri, 02 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/TangWCWLXGX23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tits/XuDCDZW23, author = {Chuan Xu and Yingyi Ding and Chao Chen and Yong Ding and Wei Zhou and Sheng Wen}, title = {Personalized Location Privacy Protection for Location-Based Services in Vehicular Networks}, journal = {{IEEE} Trans. Intell. Transp. Syst.}, volume = {24}, number = {1}, pages = {1163--1177}, year = {2023}, url = {https://doi.org/10.1109/TITS.2022.3182019}, doi = {10.1109/TITS.2022.3182019}, timestamp = {Mon, 05 Feb 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tits/XuDCDZW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/toit/ZhangWWNP023, author = {Rongjunchen Zhang and Tingmin Wu and Sheng Wen and Surya Nepal and C{\'{e}}cile Paris and Yang Xiang}, title = {{SAM:} Multi-turn Response Selection Based on Semantic Awareness Matching}, journal = {{ACM} Trans. Internet Techn.}, volume = {23}, number = {1}, pages = {3:1--3:18}, year = {2023}, url = {https://doi.org/10.1145/3545570}, doi = {10.1145/3545570}, timestamp = {Fri, 21 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/toit/ZhangWWNP023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ndss/MaWSXWX23, author = {Wanlun Ma and Derui Wang and Ruoxi Sun and Minhui Xue and Sheng Wen and Yang Xiang}, title = {The "Beatrix" Resurrections: Robust Backdoor Detection via Gram Matrices}, booktitle = {30th Annual Network and Distributed System Security Symposium, {NDSS} 2023, San Diego, California, USA, February 27 - March 3, 2023}, publisher = {The Internet Society}, year = {2023}, url = {https://www.ndss-symposium.org/ndss-paper/the-beatrix-resurrections-robust-backdoor-detection-via-gram-matrices/}, timestamp = {Tue, 26 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ndss/MaWSXWX23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sp/CaoXSWXW23, author = {Yuxin Cao and Xi Xiao and Ruoxi Sun and Derui Wang and Minhui Xue and Sheng Wen}, title = {StyleFool: Fooling Video Classification Systems via Style Transfer}, booktitle = {44th {IEEE} Symposium on Security and Privacy, {SP} 2023, San Francisco, CA, USA, May 21-25, 2023}, pages = {1631--1648}, publisher = {{IEEE}}, year = {2023}, url = {https://doi.org/10.1109/SP46215.2023.10179383}, doi = {10.1109/SP46215.2023.10179383}, timestamp = {Tue, 26 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sp/CaoXSWXW23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uss/ZhangZHXJHWP23, author = {Yuxing Zhang and Xiaogang Zhu and Daojing He and Minhui Xue and Shouling Ji and Mohammad Sayad Haghighi and Sheng Wen and Zhiniang Peng}, editor = {Joseph A. Calandrino and Carmela Troncoso}, title = {Detecting Union Type Confusion in Component Object Model}, booktitle = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim, CA, USA, August 9-11, 2023}, pages = {4265--4281}, publisher = {{USENIX} Association}, year = {2023}, url = {https://www.usenix.org/conference/usenixsecurity23/presentation/zhang-yuxing}, timestamp = {Wed, 18 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uss/ZhangZHXJHWP23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/www/ZhangW0WNP023, author = {Rongjunchen Zhang and Tingmin Wu and Xiao Chen and Sheng Wen and Surya Nepal and C{\'{e}}cile Paris and Yang Xiang}, editor = {Ying Ding and Jie Tang and Juan F. Sequeda and Lora Aroyo and Carlos Castillo and Geert{-}Jan Houben}, title = {Dynalogue: {A} Transformer-Based Dialogue System with Dynamic Attention}, booktitle = {Proceedings of the {ACM} Web Conference 2023, {WWW} 2023, Austin, TX, USA, 30 April 2023 - 4 May 2023}, pages = {1604--1615}, publisher = {{ACM}}, year = {2023}, url = {https://doi.org/10.1145/3543507.3583330}, doi = {10.1145/3543507.3583330}, timestamp = {Mon, 28 Aug 2023 21:17:10 +0200}, biburl = {https://dblp.org/rec/conf/www/ZhangW0WNP023.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2305-12747, author = {Wanlun Ma and Yiliao Song and Minhui Xue and Sheng Wen and Yang Xiang}, title = {The "code" of Ethics: {A} Holistic Audit of {AI} Code Generators}, journal = {CoRR}, volume = {abs/2305.12747}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2305.12747}, doi = {10.48550/ARXIV.2305.12747}, eprinttype = {arXiv}, eprint = {2305.12747}, timestamp = {Fri, 26 May 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2305-12747.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2308-09239, author = {Kunpeng Zhang and Xiaogang Zhu and Xiao Xi and Minhui Xue and Chao Zhang and Sheng Wen}, title = {{SHAPFUZZ:} Efficient Fuzzing via Shapley-Guided Byte Selection}, journal = {CoRR}, volume = {abs/2308.09239}, year = {2023}, url = {https://doi.org/10.48550/arXiv.2308.09239}, doi = {10.48550/ARXIV.2308.09239}, eprinttype = {arXiv}, eprint = {2308.09239}, timestamp = {Sat, 09 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2308-09239.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/concurrency/LuGW0PW22, author = {Jiadong Lu and Fangming Gu and Yiqi Wang and Jiahui Chen and Zhiniang Peng and Sheng Wen}, title = {Static Detection of File Access Control Vulnerabilities on Windows System}, journal = {Concurr. Comput. Pract. Exp.}, volume = {34}, number = {16}, year = {2022}, url = {https://doi.org/10.1002/cpe.6004}, doi = {10.1002/CPE.6004}, timestamp = {Mon, 25 Jul 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/concurrency/LuGW0PW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csr/HuMCWZXF22, author = {Xiangyu Hu and Wanlun Ma and Chao Chen and Sheng Wen and Jun Zhang and Yang Xiang and Gaolei Fei}, title = {Event detection in online social network: Methodologies, state-of-art, and evolution}, journal = {Comput. Sci. Rev.}, volume = {46}, pages = {100500}, year = {2022}, url = {https://doi.org/10.1016/j.cosrev.2022.100500}, doi = {10.1016/J.COSREV.2022.100500}, timestamp = {Sun, 15 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/csr/HuMCWZXF22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/csur/ZhuWCX22, author = {Xiaogang Zhu and Sheng Wen and Seyit Camtepe and Yang Xiang}, title = {Fuzzing: {A} Survey for Roadmap}, journal = {{ACM} Comput. Surv.}, volume = {54}, number = {11s}, pages = {230:1--230:36}, year = {2022}, url = {https://doi.org/10.1145/3512345}, doi = {10.1145/3512345}, timestamp = {Sat, 09 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/csur/ZhuWCX22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ieeejas/ZhangPHCWX22, author = {Jun Zhang and Lei Pan and Qing{-}Long Han and Chao Chen and Sheng Wen and Yang Xiang}, title = {Deep Learning Based Attack Detection for Cyber-Physical System Cybersecurity: {A} Survey}, journal = {{IEEE} {CAA} J. Autom. Sinica}, volume = {9}, number = {3}, pages = {377--391}, year = {2022}, url = {https://doi.org/10.1109/JAS.2021.1004261}, doi = {10.1109/JAS.2021.1004261}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ieeejas/ZhangPHCWX22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijis/YanWNPX22, author = {Feixue Yan and Sheng Wen and Surya Nepal and C{\'{e}}cile Paris and Yang Xiang}, title = {Explainable machine learning in cybersecurity: {A} survey}, journal = {Int. J. Intell. Syst.}, volume = {37}, number = {12}, pages = {12305--12334}, year = {2022}, url = {https://doi.org/10.1002/int.23088}, doi = {10.1002/INT.23088}, timestamp = {Tue, 28 Feb 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijis/YanWNPX22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ral/YinYWZ22, author = {Xuanchun Yin and Jinchun Yan and Sheng Wen and Jiantao Zhang}, title = {Magnetorheological Fluid-Based Bending Actuator for Magnetic Sensing}, journal = {{IEEE} Robotics Autom. Lett.}, volume = {7}, number = {4}, pages = {12169--12176}, year = {2022}, url = {https://doi.org/10.1109/LRA.2022.3214082}, doi = {10.1109/LRA.2022.3214082}, timestamp = {Mon, 05 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ral/YinYWZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ras/YinYWZ22, author = {Xuanchun Yin and Jinchun Yan and Sheng Wen and Jiantao Zhang}, title = {Spring-linkage integrated mechanism design for jumping robots}, journal = {Robotics Auton. Syst.}, volume = {158}, pages = {104268}, year = {2022}, url = {https://doi.org/10.1016/j.robot.2022.104268}, doi = {10.1016/J.ROBOT.2022.104268}, timestamp = {Sun, 13 Nov 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ras/YinYWZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcyb/WangLWHNZX22, author = {Derui Wang and Chaoran Li and Sheng Wen and Qing{-}Long Han and Surya Nepal and Xiangyu Zhang and Yang Xiang}, title = {Daedalus: Breaking Nonmaximum Suppression in Object Detection via Adversarial Examples}, journal = {{IEEE} Trans. Cybern.}, volume = {52}, number = {8}, pages = {7427--7440}, year = {2022}, url = {https://doi.org/10.1109/TCYB.2020.3041481}, doi = {10.1109/TCYB.2020.3041481}, timestamp = {Wed, 25 Jan 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tcyb/WangLWHNZX22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/ZhuFMWCXR22, author = {Xiaogang Zhu and Xiaotao Feng and Xiaozhu Meng and Sheng Wen and Seyit Camtepe and Yang Xiang and Kui Ren}, title = {CSI-Fuzz: Full-Speed Edge Tracing Using Coverage Sensitive Instrumentation}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {19}, number = {2}, pages = {912--923}, year = {2022}, url = {https://doi.org/10.1109/TDSC.2020.3008826}, doi = {10.1109/TDSC.2020.3008826}, timestamp = {Sat, 09 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/ZhuFMWCXR22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/WangLWNX22, author = {Derui Wang and Chaoran Li and Sheng Wen and Surya Nepal and Yang Xiang}, title = {Defending Against Adversarial Attack Towards Deep Neural Networks Via Collaborative Multi-Task Training}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {19}, number = {2}, pages = {953--965}, year = {2022}, url = {https://doi.org/10.1109/TDSC.2020.3014390}, doi = {10.1109/TDSC.2020.3014390}, timestamp = {Fri, 01 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/WangLWNX22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/LiCWWACX22, author = {Chaoran Li and Xiao Chen and Derui Wang and Sheng Wen and Muhammad Ejaz Ahmed and Seyit Camtepe and Yang Xiang}, title = {Backdoor Attack on Machine Learning Based Android Malware Detectors}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {19}, number = {5}, pages = {3357--3370}, year = {2022}, url = {https://doi.org/10.1109/TDSC.2021.3094824}, doi = {10.1109/TDSC.2021.3094824}, timestamp = {Sat, 10 Sep 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/LiCWWACX22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tii/WangKJWHH22, author = {Tian Wang and Haoxiong Ke and Alireza Jolfaei and Sheng Wen and Mohammad Sayad Haghighi and Shuqiang Huang}, title = {Missing Value Filling Based on the Collaboration of Cloud and Edge in Artificial Intelligence of Things}, journal = {{IEEE} Trans. Ind. Informatics}, volume = {18}, number = {8}, pages = {5394--5402}, year = {2022}, url = {https://doi.org/10.1109/TII.2021.3126110}, doi = {10.1109/TII.2021.3126110}, timestamp = {Tue, 28 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tii/WangKJWHH22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tim/YinZWZ22, author = {Xuanchun Yin and Pengyu Zhou and Sheng Wen and Jiantao Zhang}, title = {Origami Improved Dielectric Elastomer Actuation for Tunable Lens}, journal = {{IEEE} Trans. Instrum. Meas.}, volume = {71}, pages = {1--9}, year = {2022}, url = {https://doi.org/10.1109/TIM.2022.3168942}, doi = {10.1109/TIM.2022.3168942}, timestamp = {Wed, 18 May 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tim/YinZWZ22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tmis/MaHCWCX22, author = {Wanlun Ma and Xiangyu Hu and Chao Chen and Sheng Wen and Kim{-}Kwang Raymond Choo and Yang Xiang}, title = {Social Media Event Prediction using {DNN} with Feedback Mechanism}, journal = {{ACM} Trans. Manag. Inf. Syst.}, volume = {13}, number = {3}, pages = {33:1--33:24}, year = {2022}, url = {https://doi.org/10.1145/3522759}, doi = {10.1145/3522759}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tmis/MaHCWCX22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tnse/ZhuWJHCX22, author = {Xiaogang Zhu and Sheng Wen and Alireza Jolfaei and Mohammad Sayad Haghighi and Seyit Camtepe and Yang Xiang}, title = {Vulnerability Detection in SIoT Applications: {A} Fuzzing Method on their Binaries}, journal = {{IEEE} Trans. Netw. Sci. Eng.}, volume = {9}, number = {3}, pages = {970--979}, year = {2022}, url = {https://doi.org/10.1109/TNSE.2020.3038142}, doi = {10.1109/TNSE.2020.3038142}, timestamp = {Sat, 09 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tnse/ZhuWJHCX22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/toit/WangWJHNX22, author = {Derui Wang and Sheng Wen and Alireza Jolfaei and Mohammad Sayad Haghighi and Surya Nepal and Yang Xiang}, title = {On the Neural Backdoor of Federated Generative Models in Edge Computing}, journal = {{ACM} Trans. Internet Techn.}, volume = {22}, number = {2}, pages = {43:1--43:21}, year = {2022}, url = {https://doi.org/10.1145/3425662}, doi = {10.1145/3425662}, timestamp = {Mon, 26 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/toit/WangWJHNX22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/toit/WuMWXPNX22, author = {Tingmin Wu and Wanlun Ma and Sheng Wen and Xin Xia and C{\'{e}}cile Paris and Surya Nepal and Yang Xiang}, title = {Analysis of Trending Topics and Text-based Channels of Information Delivery in Cybersecurity}, journal = {{ACM} Trans. Internet Techn.}, volume = {22}, number = {2}, pages = {52:1--52:27}, year = {2022}, url = {https://doi.org/10.1145/3483332}, doi = {10.1145/3483332}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/toit/WuMWXPNX22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tpds/LiuHLWL22, author = {Jiaqi Liu and Shiyue Huang and Deng Li and Sheng Wen and Hui Liu}, title = {Addictive Incentive Mechanism in Crowdsensing From the Perspective of Behavioral Economics}, journal = {{IEEE} Trans. Parallel Distributed Syst.}, volume = {33}, number = {5}, pages = {1109--1127}, year = {2022}, url = {https://doi.org/10.1109/TPDS.2021.3104247}, doi = {10.1109/TPDS.2021.3104247}, timestamp = {Mon, 08 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tpds/LiuHLWL22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsw/ShiKW22, author = {Lei Shi and Shanti Krishnan and Sheng Wen}, editor = {David Abramson and Minh Ngoc Dinh}, title = {Study Cybersecurity of Cyber Physical System in the Virtual Environment: {A} Survey and New Direction}, booktitle = {{ACSW} 2022: Australasian Computer Science Week 2022, Brisbane, Australia, February 14 - 18, 2022}, pages = {46--55}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3511616.3513098}, doi = {10.1145/3511616.3513098}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/acsw/ShiKW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icse/ZhangXZSXW22, author = {Kunpeng Zhang and Xi Xiao and Xiaogang Zhu and Ruoxi Sun and Minhui Xue and Sheng Wen}, title = {Path Transitions Tell More: Optimizing Fuzzing Schedules via Runtime Program States}, booktitle = {44th {IEEE/ACM} 44th International Conference on Software Engineering, {ICSE} 2022, Pittsburgh, PA, USA, May 25-27, 2022}, pages = {1658--1668}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3510003.3510063}, doi = {10.1145/3510003.3510063}, timestamp = {Tue, 26 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icse/ZhangXZSXW22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/ShiKWX22, author = {Lei Shi and Shanti Krishnan and Sheng Wen and Yang Xiang}, editor = {Xingliang Yuan and Guangdong Bai and Cristina Alcaraz and Suryadipta Majumdar}, title = {Supporting Cyber-Attacks and System Anomaly Detection Research with an Industry 4.0 Dataset}, booktitle = {Network and System Security - 16th International Conference, {NSS} 2022, Denarau Island, Fiji, December 9-12, 2022, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {13787}, pages = {335--353}, publisher = {Springer}, year = {2022}, url = {https://doi.org/10.1007/978-3-031-23020-2\_19}, doi = {10.1007/978-3-031-23020-2\_19}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nss/ShiKWX22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sigsoft/Li0SXWAC022, author = {Chaoran Li and Xiao Chen and Ruoxi Sun and Minhui Xue and Sheng Wen and Muhammad Ejaz Ahmed and Seyit Camtepe and Yang Xiang}, editor = {Abhik Roychoudhury and Cristian Cadar and Miryung Kim}, title = {Cross-language Android permission specification}, booktitle = {Proceedings of the 30th {ACM} Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, {ESEC/FSE} 2022, Singapore, Singapore, November 14-18, 2022}, pages = {772--783}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3540250.3549142}, doi = {10.1145/3540250.3549142}, timestamp = {Tue, 26 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/sigsoft/Li0SXWAC022.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/QiXJWXN22, author = {Minfeng Qi and Zhiyu Xu and Tengyun Jiao and Sheng Wen and Yang Xiang and Gary Nan}, title = {A Comparative Study on the Security of Cryptocurrency Wallets in Android System}, booktitle = {{IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2022, Wuhan, China, December 9-11, 2022}, pages = {399--406}, publisher = {{IEEE}}, year = {2022}, url = {https://doi.org/10.1109/TrustCom56396.2022.00062}, doi = {10.1109/TRUSTCOM56396.2022.00062}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/QiXJWXN22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2201-04441, author = {Kunpeng Zhang and Xi Xiao and Xiaogang Zhu and Ruoxi Sun and Minhui Xue and Sheng Wen}, title = {Path Transitions Tell More: Optimizing Fuzzing Schedules via Runtime Program States}, journal = {CoRR}, volume = {abs/2201.04441}, year = {2022}, url = {https://arxiv.org/abs/2201.04441}, eprinttype = {arXiv}, eprint = {2201.04441}, timestamp = {Tue, 26 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2201-04441.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2201-06235, author = {Xiaoyu Sun and Xiao Chen and Kui Liu and Sheng Wen and Li Li and John C. Grundy}, title = {Characterizing Sensor Leaks in Android Apps}, journal = {CoRR}, volume = {abs/2201.06235}, year = {2022}, url = {https://arxiv.org/abs/2201.06235}, eprinttype = {arXiv}, eprint = {2201.06235}, timestamp = {Wed, 26 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2201-06235.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2203-16000, author = {Yuxin Cao and Xi Xiao and Ruoxi Sun and Derui Wang and Minhui Xue and Sheng Wen}, title = {StyleFool: Fooling Video Classification Systems via Style Transfer}, journal = {CoRR}, volume = {abs/2203.16000}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2203.16000}, doi = {10.48550/ARXIV.2203.16000}, eprinttype = {arXiv}, eprint = {2203.16000}, timestamp = {Tue, 26 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2203-16000.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2209-11715, author = {Wanlun Ma and Derui Wang and Ruoxi Sun and Minhui Xue and Sheng Wen and Yang Xiang}, title = {The "Beatrix" Resurrections: Robust Backdoor Detection via Gram Matrices}, journal = {CoRR}, volume = {abs/2209.11715}, year = {2022}, url = {https://doi.org/10.48550/arXiv.2209.11715}, doi = {10.48550/ARXIV.2209.11715}, eprinttype = {arXiv}, eprint = {2209.11715}, timestamp = {Tue, 26 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2209-11715.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/DengZXWLX21, author = {Jiale Deng and Xiaogang Zhu and Xi Xiao and Sheng Wen and Qing Li and Shutao Xia}, title = {Fuzzing With Optimized Grammar-Aware Mutation Strategies}, journal = {{IEEE} Access}, volume = {9}, pages = {95061--95071}, year = {2021}, url = {https://doi.org/10.1109/ACCESS.2021.3093904}, doi = {10.1109/ACCESS.2021.3093904}, timestamp = {Sat, 09 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/DengZXWLX21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/WangLWNX21, author = {Derui Wang and Chaoran Li and Sheng Wen and Surya Nepal and Yang Xiang}, title = {Man-in-the-Middle Attacks Against Machine Learning Classifiers Via Malicious Generative Models}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {18}, number = {5}, pages = {2074--2087}, year = {2021}, url = {https://doi.org/10.1109/TDSC.2020.3021008}, doi = {10.1109/TDSC.2020.3021008}, timestamp = {Tue, 05 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/WangLWNX21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tgcn/ZhuWJCX21, author = {Xiaogang Zhu and Sheng Wen and Alireza Jolfaei and Seyit Camtepe and Yang Xiang}, title = {Synthesized Corpora to Evaluate Fuzzing for Green Internet of Things Programs}, journal = {{IEEE} Trans. Green Commun. Netw.}, volume = {5}, number = {3}, pages = {1041--1050}, year = {2021}, url = {https://doi.org/10.1109/TGCN.2021.3068466}, doi = {10.1109/TGCN.2021.3068466}, timestamp = {Sat, 09 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tgcn/ZhuWJCX21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tim/YinWWZ21, author = {Xuanchun Yin and Chan Wu and Sheng Wen and Jiantao Zhang}, title = {Smart Design of Z-Width Expanded Thumb Haptic Interface Using Magnetorheological Fluids}, journal = {{IEEE} Trans. Instrum. Meas.}, volume = {70}, pages = {1--11}, year = {2021}, url = {https://doi.org/10.1109/TIM.2021.3112231}, doi = {10.1109/TIM.2021.3112231}, timestamp = {Tue, 05 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tim/YinWWZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tits/FarivarHJW21, author = {Faezeh Farivar and Mohammad Sayad Haghighi and Alireza Jolfaei and Sheng Wen}, title = {On the Security of Networked Control Systems in Smart Vehicle and Its Adaptive Cruise Control}, journal = {{IEEE} Trans. Intell. Transp. Syst.}, volume = {22}, number = {6}, pages = {3824--3831}, year = {2021}, url = {https://doi.org/10.1109/TITS.2021.3053406}, doi = {10.1109/TITS.2021.3053406}, timestamp = {Tue, 15 Jun 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tits/FarivarHJW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/blockchain2/BuiWYXHX21, author = {Van Cuong Bui and Sheng Wen and Jiangshan Yu and Xin Xia and Mohammad Sayad Haghighi and Yang Xiang}, editor = {Yang Xiang and Ziyuan Wang and Honggang Wang and Valtteri Niemi}, title = {Evaluating Upgradable Smart Contract}, booktitle = {2021 {IEEE} International Conference on Blockchain, Blockchain 2021, Melbourne, Australia, December 6-8, 2021}, pages = {252--256}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/Blockchain53845.2021.00041}, doi = {10.1109/BLOCKCHAIN53845.2021.00041}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/blockchain2/BuiWYXHX21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/blockchain2/XuQWWCX21, author = {Zhiyu Xu and Minfeng Qi and Ziyuan Wang and Sheng Wen and Shiping Chen and Yang Xiang}, editor = {Yang Xiang and Ziyuan Wang and Honggang Wang and Valtteri Niemi}, title = {{IB2P:} An image-based privacy-preserving blockchain model for financial services}, booktitle = {2021 {IEEE} International Conference on Blockchain, Blockchain 2021, Melbourne, Australia, December 6-8, 2021}, pages = {552--558}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/Blockchain53845.2021.00083}, doi = {10.1109/BLOCKCHAIN53845.2021.00083}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/blockchain2/XuQWWCX21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/FengSZXWLN021, author = {Xiaotao Feng and Ruoxi Sun and Xiaogang Zhu and Minhui Xue and Sheng Wen and Dongxi Liu and Surya Nepal and Yang Xiang}, editor = {Yongdae Kim and Jong Kim and Giovanni Vigna and Elaine Shi}, title = {Snipuzz: Black-box Fuzzing of IoT Firmware via Message Snippet Inference}, booktitle = {{CCS} '21: 2021 {ACM} {SIGSAC} Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15 - 19, 2021}, pages = {337--350}, publisher = {{ACM}}, year = {2021}, url = {https://doi.org/10.1145/3460120.3484543}, doi = {10.1145/3460120.3484543}, timestamp = {Tue, 26 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/FengSZXWLN021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/issre/SunCLWL021, author = {Xiaoyu Sun and Xiao Chen and Kui Liu and Sheng Wen and Li Li and John Grundy}, editor = {Zhi Jin and Xuandong Li and Jianwen Xiang and Leonardo Mariani and Ting Liu and Xiao Yu and Nahgmeh Ivaki}, title = {Characterizing Sensor Leaks in Android Apps}, booktitle = {32nd {IEEE} International Symposium on Software Reliability Engineering, {ISSRE} 2021, Wuhan, China, October 25-28, 2021}, pages = {498--509}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/ISSRE52982.2021.00058}, doi = {10.1109/ISSRE52982.2021.00058}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/issre/SunCLWL021.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ithings/NiyatoZW21, author = {Dusit Niyato and Yan Zhang and Sheng Wen}, title = {Message from the GreenCom 2021 General Chairs and Program Chairs: iThings-GreenCom-CPSCom-SmartData-Cybermatics 2021}, booktitle = {2021 {IEEE} International Conferences on Internet of Things (iThings) and {IEEE} Green Computing {\&} Communications (GreenCom) and {IEEE} Cyber, Physical {\&} Social Computing (CPSCom) and {IEEE} Smart Data (SmartData) and {IEEE} Congress on Cybermatics (Cybermatics), Melbourne, Australia, December 6-8, 2021}, pages = {xxiv}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/iThings-GreenCom-CPSCom-SmartData-Cybermatics53846.2021.00014}, doi = {10.1109/ITHINGS-GREENCOM-CPSCOM-SMARTDATA-CYBERMATICS53846.2021.00014}, timestamp = {Fri, 11 Feb 2022 09:29:48 +0100}, biburl = {https://dblp.org/rec/conf/ithings/NiyatoZW21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/smds/XuJWWCX21, author = {Zhiyu Xu and Tengyun Jiao and Ziyuan Wang and Sheng Wen and Shiping Chen and Yang Xiang}, editor = {Nimanthi L. Atukorala and Carl K. Chang and Ernesto Damiani and Min Fu and George Spanoudakis and Mudhakar Srivatsa and Zhongjie Wang and Jia Zhang}, title = {{AC2M:} An Automated Consent Management Model for Blockchain Financial Services Platform}, booktitle = {{IEEE} International Conference on Smart Data Services, {SMDS} 2021, Chicago, IL, USA, September 5-10, 2021}, pages = {33--41}, publisher = {{IEEE}}, year = {2021}, url = {https://doi.org/10.1109/SMDS53860.2021.00015}, doi = {10.1109/SMDS53860.2021.00015}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/smds/XuJWWCX21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2105-05445, author = {Xiaotao Feng and Ruoxi Sun and Xiaogang Zhu and Minhui Xue and Sheng Wen and Dongxi Liu and Surya Nepal and Yang Xiang}, title = {Snipuzz: Black-box Fuzzing of IoT Firmware via Message Snippet Inference}, journal = {CoRR}, volume = {abs/2105.05445}, year = {2021}, url = {https://arxiv.org/abs/2105.05445}, eprinttype = {arXiv}, eprint = {2105.05445}, timestamp = {Tue, 26 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2105-05445.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2110-14245, author = {Huacheng Li and Chunhe Xia and Tianbo Wang and Sheng Wen and Chao Chen and Yang Xiang}, title = {Capturing Dynamics of Information Diffusion in {SNS:} {A} Survey of Methodology and Techniques}, journal = {CoRR}, volume = {abs/2110.14245}, year = {2021}, url = {https://arxiv.org/abs/2110.14245}, eprinttype = {arXiv}, eprint = {2110.14245}, timestamp = {Fri, 29 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2110-14245.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2111-08217, author = {Chaoran Li and Xiao Chen and Ruoxi Sun and Jason Xue and Sheng Wen and Muhammad Ejaz Ahmed and Seyit Camtepe and Yang Xiang}, title = {NatiDroid: Cross-Language Android Permission Specification}, journal = {CoRR}, volume = {abs/2111.08217}, year = {2021}, url = {https://arxiv.org/abs/2111.08217}, eprinttype = {arXiv}, eprint = {2111.08217}, timestamp = {Tue, 26 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-2111-08217.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/FeiYWH20, author = {Gaolei Fei and Jian Ye and Sheng Wen and Guangmin Hu}, title = {Network Topology Inference Using Higher-Order Statistical Characteristics of End-to-End Measured Delays}, journal = {{IEEE} Access}, volume = {8}, pages = {59960--59975}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2020.2982653}, doi = {10.1109/ACCESS.2020.2982653}, timestamp = {Mon, 04 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/FeiYWH20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/pieee/LinWHZX20, author = {Guanjun Lin and Sheng Wen and Qing{-}Long Han and Jun Zhang and Yang Xiang}, title = {Software Vulnerability Detection Using Deep Neural Networks: {A} Survey}, journal = {Proc. {IEEE}}, volume = {108}, number = {10}, pages = {1825--1848}, year = {2020}, url = {https://doi.org/10.1109/JPROC.2020.2993293}, doi = {10.1109/JPROC.2020.2993293}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/pieee/LinWHZX20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tfs/LiuLHW0020, author = {Shigang Liu and Guanjun Lin and Qing{-}Long Han and Sheng Wen and Jun Zhang and Yang Xiang}, title = {DeepBalance: Deep-Learning and Fuzzy Oversampling for Vulnerability Detection}, journal = {{IEEE} Trans. Fuzzy Syst.}, volume = {28}, number = {7}, pages = {1329--1343}, year = {2020}, url = {https://doi.org/10.1109/TFUZZ.2019.2958558}, doi = {10.1109/TFUZZ.2019.2958558}, timestamp = {Wed, 26 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tfs/LiuLHW0020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/0002LWW0N0020, author = {Xiao Chen and Chaoran Li and Derui Wang and Sheng Wen and Jun Zhang and Surya Nepal and Yang Xiang and Kui Ren}, title = {Android {HIV:} {A} Study of Repackaging Malware for Evading Machine-Learning Detection}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {15}, pages = {987--1001}, year = {2020}, url = {https://doi.org/10.1109/TIFS.2019.2932228}, doi = {10.1109/TIFS.2019.2932228}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/0002LWW0N0020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/acsw/XuWWL0W20, author = {Zhiyu Xu and Qin Wang and Ziyuan Wang and Donghai Liu and Yang Xiang and Sheng Wen}, editor = {Prem Prakash Jayaraman and Dimitrios Georgakopoulos and Timos K. Sellis and Abdur Forkan}, title = {{PPM:} {A} Provenance-Provided Data Sharing Model for Open Banking via Blockchain}, booktitle = {Proceedings of the Australasian Computer Science Week, {ACSW} 2020, Melbourne, VIC, Australia, February 3-7, 2020}, pages = {5:1--5:8}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3373017.3373022}, doi = {10.1145/3373017.3373022}, timestamp = {Fri, 15 Mar 2024 12:30:44 +0100}, biburl = {https://dblp.org/rec/conf/acsw/XuWWL0W20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/WuZMW0PN020, author = {Tingmin Wu and Rongjunchen Zhang and Wanlun Ma and Sheng Wen and Xin Xia and C{\'{e}}cile Paris and Surya Nepal and Yang Xiang}, editor = {Hung{-}Min Sun and Shiuh{-}Pyng Shieh and Guofei Gu and Giuseppe Ateniese}, title = {What risk? {I} don't understand. An Empirical Study on Users' Understanding of the Terms Used in Security Texts}, booktitle = {{ASIA} {CCS} '20: The 15th {ACM} Asia Conference on Computer and Communications Security, Taipei, Taiwan, October 5-9, 2020}, pages = {248--262}, publisher = {{ACM}}, year = {2020}, url = {https://doi.org/10.1145/3320269.3384761}, doi = {10.1145/3320269.3384761}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ccs/WuZMW0PN020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fcs2/LiWW020, author = {Zhenyu Li and Yujue Wang and Sheng Wen and Yong Ding}, editor = {Guangquan Xu and Kaitai Liang and Chunhua Su}, title = {Evil Chaincode: {APT} Attacks Based on Smart Contract}, booktitle = {Frontiers in Cyber Security - Third International Conference, {FCS} 2020, Tianjin, China, November 15-17, 2020, Proceedings}, series = {Communications in Computer and Information Science}, volume = {1286}, pages = {178--196}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-981-15-9739-8\_15}, doi = {10.1007/978-981-15-9739-8\_15}, timestamp = {Sun, 25 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fcs2/LiWW020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiXZCWZ20, author = {Yi Li and Xi Xiao and Xiaogang Zhu and Xiao Chen and Sheng Wen and Bin Zhang}, editor = {Guojun Wang and Ryan K. L. Ko and Md. Zakirul Alam Bhuiyan and Yi Pan}, title = {SpeedNeuzz: Speed Up Neural Program Approximation with Neighbor Edge Knowledge}, booktitle = {19th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2020, Guangzhou, China, December 29, 2020 - January 1, 2021}, pages = {450--457}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00068}, doi = {10.1109/TRUSTCOM50675.2020.00068}, timestamp = {Sat, 09 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/LiXZCWZ20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/XuYWWH0020, author = {Zhiyu Xu and Lin Yang and Ziyuan Wang and Sheng Wen and Rob Hanson and Shiping Chen and Yang Xiang}, editor = {Guojun Wang and Ryan K. L. Ko and Md. Zakirul Alam Bhuiyan and Yi Pan}, title = {{BHDA} - {A} Blockchain-Based Hierarchical Data Access Model for Financial Services}, booktitle = {19th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2020, Guangzhou, China, December 29, 2020 - January 1, 2021}, pages = {530--538}, publisher = {{IEEE}}, year = {2020}, url = {https://doi.org/10.1109/TrustCom50675.2020.00077}, doi = {10.1109/TRUSTCOM50675.2020.00077}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/trustcom/XuYWWH0020.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ica3pp/2019-1, editor = {Sheng Wen and Albert Y. Zomaya and Laurence T. Yang}, title = {Algorithms and Architectures for Parallel Processing - 19th International Conference, {ICA3PP} 2019, Melbourne, VIC, Australia, December 9-11, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11944}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-38991-8}, doi = {10.1007/978-3-030-38991-8}, isbn = {978-3-030-38990-1}, timestamp = {Tue, 28 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ica3pp/2019-1.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/ica3pp/2019-2, editor = {Sheng Wen and Albert Y. Zomaya and Laurence T. Yang}, title = {Algorithms and Architectures for Parallel Processing - 19th International Conference, {ICA3PP} 2019, Melbourne, VIC, Australia, December 9-11, 2019, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11945}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-38961-1}, doi = {10.1007/978-3-030-38961-1}, isbn = {978-3-030-38960-4}, timestamp = {Tue, 28 Jan 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ica3pp/2019-2.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2006-14765, author = {Tingmin Wu and Wanlun Ma and Sheng Wen and Xin Xia and C{\'{e}}cile Paris and Surya Nepal and Yang Xiang}, title = {Analysis of Trending Topics and Text-based Channels of Information Delivery in Cybersecurity}, journal = {CoRR}, volume = {abs/2006.14765}, year = {2020}, url = {https://arxiv.org/abs/2006.14765}, eprinttype = {arXiv}, eprint = {2006.14765}, timestamp = {Tue, 11 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2006-14765.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2008-00414, author = {Faezeh Farivar and Mohammad Sayad Haghighi and Alireza Jolfaei and Sheng Wen}, title = {On the Security of Networked Control Systems in Smart Vehicle and its Adaptive Cruise Control}, journal = {CoRR}, volume = {abs/2008.00414}, year = {2020}, url = {https://arxiv.org/abs/2008.00414}, eprinttype = {arXiv}, eprint = {2008.00414}, timestamp = {Fri, 07 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2008-00414.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-2010-12149, author = {Xiaogang Zhu and Shigang Liu and Xian Li and Sheng Wen and Jun Zhang and Seyit Ahmet {\c{C}}amtepe and Yang Xiang}, title = {DeFuzz: Deep Learning Guided Directed Fuzzing}, journal = {CoRR}, volume = {abs/2010.12149}, year = {2020}, url = {https://arxiv.org/abs/2010.12149}, eprinttype = {arXiv}, eprint = {2010.12149}, timestamp = {Sat, 09 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-2010-12149.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@book{DBLP:series/ais/JiangWYLXZ19, author = {Jiaojiao Jiang and Sheng Wen and Shui Yu and Bo Liu and Yang Xiang and Wanlei Zhou}, title = {Malicious Attack Propagation and Source Identification}, series = {Advances in Information Security}, volume = {73}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-02179-5}, doi = {10.1007/978-3-030-02179-5}, isbn = {978-3-030-02178-8}, timestamp = {Fri, 30 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/series/ais/JiangWYLXZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/TangMGMWW19, author = {Lihong Tang and Wanlun Ma and Marthie Grobler and Weizhi Meng and Yu Wang and Sheng Wen}, title = {Faces are Protected as Privacy: An Automatic Tagging Framework Against Unpermitted Photo Sharing in Social Media}, journal = {{IEEE} Access}, volume = {7}, pages = {75556--75567}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2921029}, doi = {10.1109/ACCESS.2019.2921029}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/TangMGMWW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/ZhangCWZD19, author = {Rongjunchen Zhang and Xiao Chen and Sheng Wen and Xi Zheng and Yong Ding}, title = {Using {AI} to Attack {VA:} {A} Stealthy Spyware Against Voice Assistances in Smart Phones}, journal = {{IEEE} Access}, volume = {7}, pages = {153542--153554}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2945791}, doi = {10.1109/ACCESS.2019.2945791}, timestamp = {Fri, 24 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/ZhangCWZD19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ahswn/WangPWWWL19, author = {Tian Wang and Zhen Peng and Sheng Wen and Guojun Wang and Baowei Wang and Anfeng Liu}, title = {A Survey of Fog Computing in Wireless Sensor Networks: Concepts, Frameworks, Applications and Issues}, journal = {Ad Hoc Sens. Wirel. Networks}, volume = {44}, number = {1-2}, pages = {109--130}, year = {2019}, url = {https://www.oldcitypublishing.com/journals/ahswn-home/ahswn-issue-contents/ahswn-volume-44-number-1-2-2019/18220-2/}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ahswn/WangPWWWL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cea/WenHNLYZG19, author = {Sheng Wen and Jie Han and Zhihua Ning and Yubin Lan and Xuanchun Yin and Jiantao Zhang and Yufeng Ge}, title = {Numerical analysis and validation of spray distributions disturbed by quad-rotor drone wake at different flight speeds}, journal = {Comput. Electron. Agric.}, volume = {166}, year = {2019}, url = {https://doi.org/10.1016/j.compag.2019.105036}, doi = {10.1016/J.COMPAG.2019.105036}, timestamp = {Sat, 22 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cea/WenHNLYZG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cea/WenSZLHYZG19, author = {Sheng Wen and Ningwen Shen and Jiantao Zhang and Yubin Lan and Jie Han and Xuanchun Yin and Quanyong Zhang and Yufeng Ge}, title = {Single-rotor {UAV} flow field simulation using generative adversarial networks}, journal = {Comput. Electron. Agric.}, volume = {167}, year = {2019}, url = {https://doi.org/10.1016/j.compag.2019.105004}, doi = {10.1016/J.COMPAG.2019.105004}, timestamp = {Sat, 22 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cea/WenSZLHYZG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/concurrency/HuLWAGW19, author = {Xiangyu Hu and Lemin Li and Tingmin Wu and Xiaoxiang Ai and Jie Gu and Sheng Wen}, title = {Every word is valuable: Studied influence of negative words that spread during election period in social media}, journal = {Concurr. Comput. Pract. Exp.}, volume = {31}, number = {21}, year = {2019}, url = {https://doi.org/10.1002/cpe.4525}, doi = {10.1002/CPE.4525}, timestamp = {Mon, 02 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/concurrency/HuLWAGW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/concurrency/WenCWB19, author = {Sheng Wen and Aniello Castiglione and Tian Wang and Md. Zakirul Alam Bhuiyan}, title = {Forward to the special issue of the 9th International Symposium on Cyberspace Safety and Security {(CSS} 2017)}, journal = {Concurr. Comput. Pract. Exp.}, volume = {31}, number = {22}, year = {2019}, url = {https://doi.org/10.1002/cpe.5535}, doi = {10.1002/CPE.5535}, timestamp = {Mon, 02 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/concurrency/WenCWB19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/ZhaiZFLWH19, author = {Xuemeng Zhai and Wanlei Zhou and Gaolei Fei and Cai Lu and Sheng Wen and Guangmin Hu}, title = {Edge-based stochastic network model reveals structural complexity of edges}, journal = {Future Gener. Comput. Syst.}, volume = {100}, pages = {1073--1087}, year = {2019}, url = {https://doi.org/10.1016/j.future.2019.05.047}, doi = {10.1016/J.FUTURE.2019.05.047}, timestamp = {Thu, 21 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fgcs/ZhaiZFLWH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/LiWLLW19, author = {Deng Li and Sihui Wang and Jiaqi Liu and Hui Liu and Sheng Wen}, title = {Crowdsensing From the Perspective of Behavioral Economics: An Incentive Mechanism Based on Mental Accounting}, journal = {{IEEE} Internet Things J.}, volume = {6}, number = {5}, pages = {9123--9139}, year = {2019}, url = {https://doi.org/10.1109/JIOT.2019.2928035}, doi = {10.1109/JIOT.2019.2928035}, timestamp = {Mon, 08 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/iotj/LiWLLW19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/MiaoWWM19, author = {Meixia Miao and Jianfeng Wang and Sheng Wen and Jianfeng Ma}, title = {Publicly verifiable database scheme with efficient keyword search}, journal = {Inf. Sci.}, volume = {475}, pages = {18--28}, year = {2019}, url = {https://doi.org/10.1016/j.ins.2018.09.067}, doi = {10.1016/J.INS.2018.09.067}, timestamp = {Sat, 29 Aug 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/MiaoWWM19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/WenZYLZG19, author = {Sheng Wen and Quanyong Zhang and Xuanchun Yin and Yubin Lan and Jiantao Zhang and Yufeng Ge}, title = {Design of Plant Protection {UAV} Variable Spray System Based on Neural Networks}, journal = {Sensors}, volume = {19}, number = {5}, pages = {1112}, year = {2019}, url = {https://doi.org/10.3390/s19051112}, doi = {10.3390/S19051112}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/WenZYLZG19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tcps/WuTZWPNGX19, author = {Tingmin Wu and Lihong Tang and Rongjunchen Zhang and Sheng Wen and C{\'{e}}cile Paris and Surya Nepal and Marthie Grobler and Yang Xiang}, title = {Catering to Your Concerns: Automatic Generation of Personalised Security-Centric Descriptions for Android Apps}, journal = {{ACM} Trans. Cyber Phys. Syst.}, volume = {3}, number = {4}, pages = {36:1--36:21}, year = {2019}, url = {https://doi.org/10.1145/3317699}, doi = {10.1145/3317699}, timestamp = {Fri, 11 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tcps/WuTZWPNGX19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/WangXWXXT19, author = {Tianbo Wang and Chunhe Xia and Sheng Wen and Hui Xue and Yang Xiang and Shouzhong Tu}, title = {{SADI:} {A} Novel Model to Study the Propagation of Social Worms in Hierarchical Networks}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {16}, number = {1}, pages = {142--155}, year = {2019}, url = {https://doi.org/10.1109/TDSC.2017.2651826}, doi = {10.1109/TDSC.2017.2651826}, timestamp = {Thu, 09 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/WangXWXXT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsusc/WangWWCXZ19, author = {Derek Wang and Tingmin Wu and Sheng Wen and Xiaofeng Chen and Yang Xiang and Wanlei Zhou}, title = {{STC:} Exposing Hidden Compromised Devices in Networked Sustainable Green Smart Computing Platforms by Partial Observation}, journal = {{IEEE} Trans. Sustain. Comput.}, volume = {4}, number = {2}, pages = {178--190}, year = {2019}, url = {https://doi.org/10.1109/TSUSC.2017.2707563}, doi = {10.1109/TSUSC.2017.2707563}, timestamp = {Thu, 21 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tsusc/WangWWCXZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bsci/Wen19, author = {Sheng Wen}, editor = {Keke Gai and Kim{-}Kwang Raymond Choo and Debiao He and Sheng Wen}, title = {Session details: Keynote {\&} Invited Talks}, booktitle = {Proceedings of the 2019 {ACM} International Symposium on Blockchain and Secure Critical Infrastructure, {BSCI} 2019, Auckland, New Zealand, July 8, 2019}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3344280}, doi = {10.1145/3344280}, timestamp = {Thu, 08 Aug 2019 14:16:11 +0200}, biburl = {https://dblp.org/rec/conf/bsci/Wen19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/bsci/XuJWVW019, author = {Zhiyu Xu and Tengyun Jiao and Qin Wang and Cuong Bui Van and Sheng Wen and Yang Xiang}, editor = {Keke Gai and Kim{-}Kwang Raymond Choo and Debiao He and Sheng Wen}, title = {An Efficient Supply Chain Architecture Based on Blockchain for High-value Commodities}, booktitle = {Proceedings of the 2019 {ACM} International Symposium on Blockchain and Secure Critical Infrastructure, {BSCI} 2019, Auckland, New Zealand, July 8, 2019}, pages = {81--88}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3327960.3332384}, doi = {10.1145/3327960.3332384}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/bsci/XuJWVW019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ccs/ZhuFJW0CX19, author = {Xiaogang Zhu and Xiaotao Feng and Tengyun Jiao and Sheng Wen and Yang Xiang and Seyit Camtepe and Jingling Xue}, editor = {Steven D. Galbraith and Giovanni Russello and Willy Susilo and Dieter Gollmann and Engin Kirda and Zhenkai Liang}, title = {A Feature-Oriented Corpus for Understanding, Evaluating and Improving Fuzz Testing}, booktitle = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019}, pages = {658--663}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3321705.3329845}, doi = {10.1145/3321705.3329845}, timestamp = {Sat, 09 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ccs/ZhuFJW0CX19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/css/ShiCWX19, author = {Lei Shi and Xiao Chen and Sheng Wen and Yang Xiang}, editor = {Jaideep Vaidya and Xiao Zhang and Jin Li}, title = {Main Enabling Technologies in Industry 4.0 and Cybersecurity Threats}, booktitle = {Cyberspace Safety and Security - 11th International Symposium, {CSS} 2019, Guangzhou, China, December 1-3, 2019, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {11983}, pages = {588--597}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-37352-8\_53}, doi = {10.1007/978-3-030-37352-8\_53}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/css/ShiCWX19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ica3pp/XuJYLW019, author = {Zhiyu Xu and Tengyun Jiao and Lin Yang and Donghai Liu and Sheng Wen and Yang Xiang}, editor = {Sheng Wen and Albert Y. Zomaya and Laurence T. Yang}, title = {{RBAC-GL:} {A} Role-Based Access Control Gasless Architecture of Consortium Blockchain}, booktitle = {Algorithms and Architectures for Parallel Processing - 19th International Conference, {ICA3PP} 2019, Melbourne, VIC, Australia, December 9-11, 2019, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {11944}, pages = {439--453}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-38991-8\_29}, doi = {10.1007/978-3-030-38991-8\_29}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/ica3pp/XuJYLW019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ml4cs/Zhang0WZ19, author = {Rongjunchen Zhang and Xiao Chen and Sheng Wen and James Zheng}, editor = {Xiaofeng Chen and Xinyi Huang and Jun Zhang}, title = {Who Activated My Voice Assistant? {A} Stealthy Attack on Android Phones Without Users' Awareness}, booktitle = {Machine Learning for Cyber Security - Second International Conference, {ML4CS} 2019, Xi'an, China, September 19-21, 2019, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11806}, pages = {378--396}, publisher = {Springer}, year = {2019}, url = {https://doi.org/10.1007/978-3-030-30619-9\_27}, doi = {10.1007/978-3-030-30619-9\_27}, timestamp = {Tue, 27 Sep 2022 14:19:43 +0200}, biburl = {https://dblp.org/rec/conf/ml4cs/Zhang0WZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/bsci/2019, editor = {Keke Gai and Kim{-}Kwang Raymond Choo and Debiao He and Sheng Wen}, title = {Proceedings of the 2019 {ACM} International Symposium on Blockchain and Secure Critical Infrastructure, {BSCI} 2019, Auckland, New Zealand, July 8, 2019}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3327960}, doi = {10.1145/3327960}, isbn = {978-1-4503-6786-8}, timestamp = {Thu, 08 Aug 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/bsci/2019.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1902-02067, author = {Derui Wang and Chaoran Li and Sheng Wen and Surya Nepal and Yang Xiang}, title = {Daedalus: Breaking Non-Maximum Suppression in Object Detection via Adversarial Examples}, journal = {CoRR}, volume = {abs/1902.02067}, year = {2019}, url = {http://arxiv.org/abs/1902.02067}, eprinttype = {arXiv}, eprint = {1902.02067}, timestamp = {Sat, 23 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1902-02067.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1905-00799, author = {Xiaotao Feng and Qin Wang and Xiaogang Zhu and Sheng Wen}, title = {Bug Searching in Smart Contract}, journal = {CoRR}, volume = {abs/1905.00799}, year = {2019}, url = {http://arxiv.org/abs/1905.00799}, eprinttype = {arXiv}, eprint = {1905.00799}, timestamp = {Sat, 09 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1905-00799.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1905-01405, author = {Xiaogang Zhu and Xiaotao Feng and Tengyun Jiao and Sheng Wen and Yang Xiang and Seyit Camtepe and Jingling Xue}, title = {A Feature-Oriented Corpus for Understanding, Evaluating and Improving Fuzz Testing}, journal = {CoRR}, volume = {abs/1905.01405}, year = {2019}, url = {http://arxiv.org/abs/1905.01405}, eprinttype = {arXiv}, eprint = {1905.01405}, timestamp = {Sat, 09 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1905-01405.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1907-07455, author = {Mahdi Dibaei and Xi Zheng and Kun Jiang and Sasa Maric and Robert Abbas and Shigang Liu and Yuexin Zhang and Yao Deng and Sheng Wen and Jun Zhang and Yang Xiang and Shui Yu}, title = {An Overview of Attacks and Defences on Intelligent Connected Vehicles}, journal = {CoRR}, volume = {abs/1907.07455}, year = {2019}, url = {http://arxiv.org/abs/1907.07455}, eprinttype = {arXiv}, eprint = {1907.07455}, timestamp = {Tue, 26 Mar 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1907-07455.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1910-06838, author = {Derui Wang and Chaoran Li and Sheng Wen and Surya Nepal and Yang Xiang}, title = {Man-in-the-Middle Attacks against Machine Learning Classifiers via Malicious Generative Models}, journal = {CoRR}, volume = {abs/1910.06838}, year = {2019}, url = {http://arxiv.org/abs/1910.06838}, eprinttype = {arXiv}, eprint = {1910.06838}, timestamp = {Sat, 23 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/corr/abs-1910-06838.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/compsec/WuWXZ18, author = {Tingmin Wu and Sheng Wen and Yang Xiang and Wanlei Zhou}, title = {Twitter spam detection: Survey of new approaches and comparative study}, journal = {Comput. Secur.}, volume = {76}, pages = {265--284}, year = {2018}, url = {https://doi.org/10.1016/j.cose.2017.11.013}, doi = {10.1016/J.COSE.2017.11.013}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/compsec/WuWXZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/MaLWWWLMQ18, author = {Xingpo Ma and Junbin Liang and Jianxin Wang and Sheng Wen and Tian Wang and Yin Li and Wenpeng Ma and Chuanda Qi}, title = {Secure fine-grained spatio-temporal Top-k queries in TMWSNs}, journal = {Future Gener. Comput. Syst.}, volume = {86}, pages = {174--184}, year = {2018}, url = {https://doi.org/10.1016/j.future.2018.04.010}, doi = {10.1016/J.FUTURE.2018.04.010}, timestamp = {Thu, 23 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fgcs/MaLWWWLMQ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/MengWWWX18, author = {Weizhi Meng and Yu Wang and Duncan S. Wong and Sheng Wen and Yang Xiang}, title = {\emph{TouchWB}: Touch behavioral user authentication based on web browsing on smartphones}, journal = {J. Netw. Comput. Appl.}, volume = {117}, pages = {1--9}, year = {2018}, url = {https://doi.org/10.1016/j.jnca.2018.05.010}, doi = {10.1016/J.JNCA.2018.05.010}, timestamp = {Sat, 30 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/MengWWWX18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jocs/WangWWLXZHA18, author = {Derek Wang and Tingmin Wu and Sheng Wen and Donghai Liu and Yang Xiang and Wanlei Zhou and Houcine Hassan and Abdulhameed Alelaiwi}, title = {Pok{\'{e}}mon {GO} in Melbourne {CBD:} {A} case study of the cyber-physical symbiotic social networks}, journal = {J. Comput. Sci.}, volume = {26}, pages = {456--467}, year = {2018}, url = {https://doi.org/10.1016/j.jocs.2017.06.009}, doi = {10.1016/J.JOCS.2017.06.009}, timestamp = {Thu, 21 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jocs/WangWWLXZHA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/HuangLDYDZW18, author = {Huasheng Huang and Yubin Lan and Jizhong Deng and Aqing Yang and Xiaoling Deng and Lei Zhang and Sheng Wen}, title = {A Semantic Labeling Approach for Accurate Weed Mapping of High Resolution {UAV} Imagery}, journal = {Sensors}, volume = {18}, number = {7}, pages = {2113}, year = {2018}, url = {https://doi.org/10.3390/s18072113}, doi = {10.3390/S18072113}, timestamp = {Fri, 21 Jan 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sensors/HuangLDYDZW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/HuangDLYDWZZ18, author = {Huasheng Huang and Jizhong Deng and Yubin Lan and Aqing Yang and Xiaoling Deng and Sheng Wen and Huihui Zhang and Yali Zhang}, title = {Accurate Weed Mapping and Prescription Map Generation Based on Fully Convolutional Networks Using {UAV} Imagery}, journal = {Sensors}, volume = {18}, number = {10}, pages = {3299}, year = {2018}, url = {https://doi.org/10.3390/s18103299}, doi = {10.3390/S18103299}, timestamp = {Sat, 30 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sensors/HuangDLYDWZZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/symmetry/AlajaliZWW18, author = {Walaa Alajali and Wei Zhou and Sheng Wen and Yu Wang}, title = {Intersection Traffic Prediction Using Decision Tree Models}, journal = {Symmetry}, volume = {10}, number = {9}, pages = {386}, year = {2018}, url = {https://doi.org/10.3390/sym10090386}, doi = {10.3390/SYM10090386}, timestamp = {Fri, 02 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/symmetry/AlajaliZWW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/JiangWYXZ18, author = {Jiao Jiao Jiang and Sheng Wen and Shui Yu and Yang Xiang and Wanlei Zhou}, title = {Rumor Source Identification in Social Networks with Time-Varying Topology}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {15}, number = {1}, pages = {166--179}, year = {2018}, url = {https://doi.org/10.1109/TDSC.2016.2522436}, doi = {10.1109/TDSC.2016.2522436}, timestamp = {Fri, 30 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tdsc/JiangWYXZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/LiuZGZLW18, author = {Bo Liu and Wanlei Zhou and Longxiang Gao and Haibo Zhou and Tom H. Luan and Sheng Wen}, title = {Malware Propagations in Wireless Ad Hoc Networks}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {15}, number = {6}, pages = {1016--1026}, year = {2018}, url = {https://doi.org/10.1109/TDSC.2016.2642191}, doi = {10.1109/TDSC.2016.2642191}, timestamp = {Thu, 21 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/LiuZGZLW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icc/WangZZW0X18, author = {Derek Wang and Wanlei Zhou and James Xi Zheng and Sheng Wen and Jun Zhang and Yang Xiang}, title = {Who Spread to Whom? Inferring Online Social Networks with User Features}, booktitle = {2018 {IEEE} International Conference on Communications, {ICC} 2018, Kansas City, MO, USA, May 20-24, 2018}, pages = {1--6}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/ICC.2018.8422246}, doi = {10.1109/ICC.2018.8422246}, timestamp = {Thu, 21 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icc/WangZZW0X18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/Al-SudaniZWA18, author = {Ahmed Raad Al{-}Sudani and Wanlei Zhou and Sheng Wen and Ahmed Al{-}Mansoori}, editor = {Man Ho Au and Siu{-}Ming Yiu and Jin Li and Xiapu Luo and Cong Wang and Aniello Castiglione and Kamil Kluczniak}, title = {{SCARA:} {A} Framework for Secure Cloud-Assisted {RFID} Authentication for Smart Building Access Control}, booktitle = {Network and System Security - 12th International Conference, {NSS} 2018, Hong Kong, China, August 27-29, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11058}, pages = {202--211}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-02744-5\_15}, doi = {10.1007/978-3-030-02744-5\_15}, timestamp = {Thu, 21 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nss/Al-SudaniZWA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spaccs/Al-SudaniGWA18, author = {Ahmed Raad Al{-}Sudani and Shang Gao and Sheng Wen and Muhmmad Al{-}Khiza'ay}, editor = {Guojun Wang and Jinjun Chen and Laurence T. Yang}, title = {Secure and Privacy Preserving {RFID} Based Access Control to Smart Buildings}, booktitle = {Security, Privacy, and Anonymity in Computation, Communication, and Storage - 11th International Conference and Satellite Workshops, SpaCCS 2018, Melbourne, NSW, Australia, December 11-13, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11342}, pages = {146--155}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-05345-1\_12}, doi = {10.1007/978-3-030-05345-1\_12}, timestamp = {Tue, 14 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/spaccs/Al-SudaniGWA18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spaccs/Al-SudaniGWA18a, author = {Ahmed Raad Al{-}Sudani and Shang Gao and Sheng Wen and Muhmmad Al{-}Khiza'ay}, editor = {Guojun Wang and Jinjun Chen and Laurence T. Yang}, title = {Checking an Authentication of Person Depends on {RFID} with Thermal Image}, booktitle = {Security, Privacy, and Anonymity in Computation, Communication, and Storage - 11th International Conference and Satellite Workshops, SpaCCS 2018, Melbourne, NSW, Australia, December 11-13, 2018, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {11342}, pages = {371--380}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-05345-1\_32}, doi = {10.1007/978-3-030-05345-1\_32}, timestamp = {Tue, 14 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/spaccs/Al-SudaniGWA18a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uic/AlajaliZW18, author = {Walaa Alajali and Wanlei Zhou and Sheng Wen}, editor = {Guojun Wang and Qi Han and Md. Zakirul Alam Bhuiyan and Xiaoxing Ma and Fr{\'{e}}d{\'{e}}ric Loulergue and Peng Li and Manuel Roveri and Lei Chen}, title = {Traffic Flow Prediction for Road Intersection Safety}, booktitle = {2018 {IEEE} SmartWorld, Ubiquitous Intelligence {\&} Computing, Advanced {\&} Trusted Computing, Scalable Computing {\&} Communications, Cloud {\&} Big Data Computing, Internet of People and Smart City Innovation, SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2018, Guangzhou, China, October 8-12, 2018}, pages = {812--820}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/SmartWorld.2018.00151}, doi = {10.1109/SMARTWORLD.2018.00151}, timestamp = {Thu, 21 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uic/AlajaliZW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/uic/Al-SudaniZWK18, author = {Ahmed Raad Al{-}Sudani and Wanlei Zhou and Sheng Wen and Haider Adeeb Kassem}, editor = {Guojun Wang and Qi Han and Md. Zakirul Alam Bhuiyan and Xiaoxing Ma and Fr{\'{e}}d{\'{e}}ric Loulergue and Peng Li and Manuel Roveri and Lei Chen}, title = {Hiding {RFID} in the Image Matching Based Access Control to a Smart Building}, booktitle = {2018 {IEEE} SmartWorld, Ubiquitous Intelligence {\&} Computing, Advanced {\&} Trusted Computing, Scalable Computing {\&} Communications, Cloud {\&} Big Data Computing, Internet of People and Smart City Innovation, SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2018, Guangzhou, China, October 8-12, 2018}, pages = {1988--1993}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/SmartWorld.2018.00332}, doi = {10.1109/SMARTWORLD.2018.00332}, timestamp = {Thu, 21 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/uic/Al-SudaniZWK18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/monami/2017, editor = {Jiankun Hu and Ibrahim Khalil and Zahir Tari and Sheng Wen}, title = {Mobile Networks and Management - 9th International Conference, {MONAMI} 2017, Melbourne, Australia, December 13-15, 2017, Proceedings}, series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering}, volume = {235}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-319-90775-8}, doi = {10.1007/978-3-319-90775-8}, isbn = {978-3-319-90774-1}, timestamp = {Thu, 14 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/monami/2017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1803-05123, author = {Derek Wang and Chaoran Li and Sheng Wen and Yang Xiang and Wanlei Zhou and Surya Nepal}, title = {Defensive Collaborative Multi-task Training - Defending against Adversarial Attack towards Deep Neural Networks}, journal = {CoRR}, volume = {abs/1803.05123}, year = {2018}, url = {http://arxiv.org/abs/1803.05123}, eprinttype = {arXiv}, eprint = {1803.05123}, timestamp = {Fri, 22 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1803-05123.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1805-06187, author = {Rongjunchen Zhang and Xiao Chen and Jianchao Lu and Sheng Wen and Surya Nepal and Yang Xiang}, title = {Using {AI} to Hack {IA:} {A} New Stealthy Spyware Against Voice Assistance Functions in Smart Phones}, journal = {CoRR}, volume = {abs/1805.06187}, year = {2018}, url = {http://arxiv.org/abs/1805.06187}, eprinttype = {arXiv}, eprint = {1805.06187}, timestamp = {Sun, 02 Sep 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1805-06187.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1805-07070, author = {Tingmin Wu and Lihong Tang and Zhiyu Xu and Sheng Wen and C{\'{e}}cile Paris and Surya Nepal and Marthie Grobler and Yang Xiang}, title = {Catering to Your Concerns: Automatic Generation of Personalised Security-Centric Descriptions for Android Apps}, journal = {CoRR}, volume = {abs/1805.07070}, year = {2018}, url = {http://arxiv.org/abs/1805.07070}, eprinttype = {arXiv}, eprint = {1805.07070}, timestamp = {Mon, 13 Aug 2018 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1805-07070.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/corr/abs-1808-04218, author = {Xiao Chen and Chaoran Li and Derui Wang and Sheng Wen and Jun Zhang and Surya Nepal and Yang Xiang and Kui Ren}, title = {Android {HIV:} {A} Study of Repackaging Malware for Evading Machine-Learning Detection}, journal = {CoRR}, volume = {abs/1808.04218}, year = {2018}, url = {http://arxiv.org/abs/1808.04218}, eprinttype = {arXiv}, eprint = {1808.04218}, timestamp = {Mon, 14 Oct 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/corr/abs-1808-04218.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/acta/GuJWW17, author = {Ke Gu and Weijia Jia and Guojun Wang and Sheng Wen}, title = {Efficient and secure attribute-based signature for monotone predicates}, journal = {Acta Informatica}, volume = {54}, number = {5}, pages = {521--541}, year = {2017}, url = {https://doi.org/10.1007/s00236-016-0270-5}, doi = {10.1007/S00236-016-0270-5}, timestamp = {Fri, 14 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/acta/GuJWW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ahswn/WangWLWTCCW17, author = {Tian Wang and Wenhua Wang and Yongxuan Lai and Sheng Wen and Hui Tian and Yiqiao Cai and Yonghong Chen and Baowei Wang}, title = {The Chaotic Video Surveillance in Mobile Camera Sensor Networks: Improving the Efficiency and Security}, journal = {Ad Hoc Sens. Wirel. Networks}, volume = {37}, number = {1-4}, pages = {95--115}, year = {2017}, url = {http://www.oldcitypublishing.com/journals/ahswn-home/ahswn-issue-contents/ahswn-volume-37-number-1-4-2017/ahswn-37-1-4-p-95-115/}, timestamp = {Sat, 25 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ahswn/WangWLWTCCW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comsur/JiangWYXZ17, author = {Jiaojiao Jiang and Sheng Wen and Shui Yu and Yang Xiang and Wanlei Zhou}, title = {Identifying Propagation Sources in Networks: State-of-the-Art and Comparative Studies}, journal = {{IEEE} Commun. Surv. Tutorials}, volume = {19}, number = {1}, pages = {465--481}, year = {2017}, url = {https://doi.org/10.1109/COMST.2016.2615098}, doi = {10.1109/COMST.2016.2615098}, timestamp = {Fri, 30 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/comsur/JiangWYXZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/concurrency/JiangWYXZH17, author = {Jiao Jiao Jiang and Sheng Wen and Shui Yu and Yang Xiang and Wanlei Zhou and Houcine Hassan}, title = {The structure of communities in scale-free networks}, journal = {Concurr. Comput. Pract. Exp.}, volume = {29}, number = {14}, year = {2017}, url = {https://doi.org/10.1002/cpe.4040}, doi = {10.1002/CPE.4040}, timestamp = {Fri, 30 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/concurrency/JiangWYXZH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/concurrency/WuWLZXAH17, author = {Tingmin Wu and Sheng Wen and Shigang Liu and Jun Zhang and Yang Xiang and Majed A. AlRubaian and Mohammad Mehedi Hassan}, title = {Detecting spamming activities in twitter based on deep-learning technique}, journal = {Concurr. Comput. Pract. Exp.}, volume = {29}, number = {19}, year = {2017}, url = {https://doi.org/10.1002/cpe.4209}, doi = {10.1002/CPE.4209}, timestamp = {Mon, 02 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/concurrency/WuWLZXAH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/XuDHYW17, author = {Guan Xu and Bin Dai and Benxiong Huang and Jun Yang and Sheng Wen}, title = {Bandwidth-aware energy efficient flow scheduling with {SDN} in data center networks}, journal = {Future Gener. Comput. Syst.}, volume = {68}, pages = {163--174}, year = {2017}, url = {https://doi.org/10.1016/j.future.2016.08.024}, doi = {10.1016/J.FUTURE.2016.08.024}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fgcs/XuDHYW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/ChenW0XOAH17, author = {Chao Chen and Sheng Wen and Jun Zhang and Yang Xiang and Jonathan J. Oliver and Abdulhameed Alelaiwi and Mohammad Mehedi Hassan}, title = {Investigating the deceptive information in Twitter spam}, journal = {Future Gener. Comput. Syst.}, volume = {72}, pages = {319--326}, year = {2017}, url = {https://doi.org/10.1016/j.future.2016.05.036}, doi = {10.1016/J.FUTURE.2016.05.036}, timestamp = {Wed, 19 Feb 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/fgcs/ChenW0XOAH17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/WangPWLJCTC17, author = {Tian Wang and Zhen Peng and Sheng Wen and Yongxuan Lai and Weijia Jia and Yiqiao Cai and Hui Tian and Yonghong Chen}, title = {Reliable wireless connections for fast-moving rail users based on a chained fog structure}, journal = {Inf. Sci.}, volume = {379}, pages = {160--176}, year = {2017}, url = {https://doi.org/10.1016/j.ins.2016.06.031}, doi = {10.1016/J.INS.2016.06.031}, timestamp = {Fri, 20 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/isci/WangPWLJCTC17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jise/GuWW17, author = {Ke Gu and Yong Wang and Sheng Wen}, title = {Traceable Threshold Proxy Signature}, journal = {J. Inf. Sci. Eng.}, volume = {33}, number = {1}, pages = {63--79}, year = {2017}, url = {https://jise.iis.sinica.edu.tw/JISESearch/pages/View/PaperView.jsf?keyId=154\_1995}, timestamp = {Fri, 17 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jise/GuWW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/WenJLXZ17, author = {Sheng Wen and Jiao Jiao Jiang and Bo Liu and Yang Xiang and Wanlei Zhou}, title = {Using epidemic betweenness to measure the influence of users in complex networks}, journal = {J. Netw. Comput. Appl.}, volume = {78}, pages = {288--299}, year = {2017}, url = {https://doi.org/10.1016/j.jnca.2016.10.018}, doi = {10.1016/J.JNCA.2016.10.018}, timestamp = {Thu, 21 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jnca/WenJLXZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/WangWWCTCW17, author = {Tian Wang and Qun Wu and Sheng Wen and Yiqiao Cai and Hui Tian and Yonghong Chen and Baowei Wang}, title = {Propagation Modeling and Defending of a Mobile Sensor Worm in Wireless Sensor and Actuator Networks}, journal = {Sensors}, volume = {17}, number = {1}, pages = {139}, year = {2017}, url = {https://doi.org/10.3390/s17010139}, doi = {10.3390/S17010139}, timestamp = {Fri, 30 Nov 2018 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sensors/WangWWCTCW17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icdcs/WangWXZZN17, author = {Derek Wang and Sheng Wen and Yang Xiang and Wanlei Zhou and Jun Zhang and Surya Nepal}, editor = {Kisung Lee and Ling Liu}, title = {Catch Me If You Can: Detecting Compromised Users Through Partial Observation on Networks}, booktitle = {37th {IEEE} International Conference on Distributed Computing Systems, {ICDCS} 2017, Atlanta, GA, USA, June 5-8, 2017}, pages = {2417--2422}, publisher = {{IEEE} Computer Society}, year = {2017}, url = {https://doi.org/10.1109/ICDCS.2017.47}, doi = {10.1109/ICDCS.2017.47}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icdcs/WangWXZZN17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ispec/WuWWX17, author = {Tingmin Wu and Derek Wang and Sheng Wen and Yang Xiang}, editor = {Joseph K. Liu and Pierangela Samarati}, title = {How Spam Features Change in Twitter and the Impact to Machine Learning Based Detection}, booktitle = {Information Security Practice and Experience - 13th International Conference, {ISPEC} 2017, Melbourne, VIC, Australia, December 13-15, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10701}, pages = {898--904}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-72359-4\_57}, doi = {10.1007/978-3-319-72359-4\_57}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/ispec/WuWWX17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spaccs/AlajaliWZ17, author = {Walaa Alajali and Sheng Wen and Wanlei Zhou}, editor = {Guojun Wang and Mohammed Atiquzzaman and Zheng Yan and Kim{-}Kwang Raymond Choo}, title = {On-Street Car Parking Prediction in Smart City: {A} Multi-source Data Analysis in Sensor-Cloud Environment}, booktitle = {Security, Privacy, and Anonymity in Computation, Communication, and Storage - SpaCCS 2017 International Workshops, Guangzhou, China, December 12-15, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10658}, pages = {641--652}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-72395-2\_58}, doi = {10.1007/978-3-319-72395-2\_58}, timestamp = {Thu, 21 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/spaccs/AlajaliWZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wise/TangMWGXZ17, author = {Lihong Tang and Wanlun Ma and Sheng Wen and Marthie Grobler and Yang Xiang and Wanlei Zhou}, editor = {Athman Bouguettaya and Yunjun Gao and Andrey Klimenko and Lu Chen and Xiangliang Zhang and Fedor Dzerzhinskiy and Weijia Jia and Stanislav V. Klimenko and Qing Li}, title = {My Face is Mine: Fighting Unpermitted Tagging on Personal/Group Photos in Social Media}, booktitle = {Web Information Systems Engineering - {WISE} 2017 - 18th International Conference, Puschino, Russia, October 7-11, 2017, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {10570}, pages = {528--539}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-68786-5\_42}, doi = {10.1007/978-3-319-68786-5\_42}, timestamp = {Thu, 21 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wise/TangMWGXZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@proceedings{DBLP:conf/css/2017, editor = {Sheng Wen and Wei Wu and Aniello Castiglione}, title = {Cyberspace Safety and Security - 9th International Symposium, {CSS} 2017, Xi'an, China, October 23-25, 2017, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {10581}, publisher = {Springer}, year = {2017}, url = {https://doi.org/10.1007/978-3-319-69471-9}, doi = {10.1007/978-3-319-69471-9}, isbn = {978-3-319-69470-2}, timestamp = {Tue, 14 May 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/css/2017.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/concurrency/StojmenovicWHL16, author = {Ivan Stojmenovic and Sheng Wen and Xinyi Huang and Hao Luan}, title = {An overview of Fog computing and its security issues}, journal = {Concurr. Comput. Pract. Exp.}, volume = {28}, number = {10}, pages = {2991--3005}, year = {2016}, url = {https://doi.org/10.1002/cpe.3485}, doi = {10.1002/CPE.3485}, timestamp = {Mon, 02 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/concurrency/StojmenovicWHL16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ita/GuYWW16, author = {Ke Gu and Lihao Yang and Yong Wang and Sheng Wen}, title = {Traceable Identity-Based Group Signature}, journal = {{RAIRO} Theor. Informatics Appl.}, volume = {50}, number = {3}, pages = {193--226}, year = {2016}, url = {https://doi.org/10.1051/ita/2016021}, doi = {10.1051/ITA/2016021}, timestamp = {Fri, 14 Jul 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ita/GuYWW16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/js/WangWZZR16, author = {Junlei Wang and Sheng Wen and Xingqiang Zhao and Min Zhang and Jingyu Ran}, title = {Piezoelectric Wind Energy Harvesting from Self-Excited Vibration of Square Cylinder}, journal = {J. Sensors}, volume = {2016}, pages = {2353517:1--2353517:12}, year = {2016}, url = {https://doi.org/10.1155/2016/2353517}, doi = {10.1155/2016/2353517}, timestamp = {Sun, 02 Jun 2019 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/js/WangWZZR16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/HaghighiWXQZ16, author = {Mohammad Sayad Haghighi and Sheng Wen and Yang Xiang and Barry G. Quinn and Wanlei Zhou}, title = {On the Race of Worms and Patches: Modeling the Spread of Information in Wireless Sensor Networks}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {11}, number = {12}, pages = {2854--2865}, year = {2016}, url = {https://doi.org/10.1109/TIFS.2016.2594130}, doi = {10.1109/TIFS.2016.2594130}, timestamp = {Thu, 21 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/HaghighiWXQZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tosn/WangPLWBCC16, author = {Tian Wang and Zhen Peng and Junbin Liang and Sheng Wen and Md. Zakirul Alam Bhuiyan and Yiqiao Cai and Jiannong Cao}, title = {Following Targets for Mobile Tracking in Wireless Sensor Networks}, journal = {{ACM} Trans. Sens. Networks}, volume = {12}, number = {4}, pages = {31:1--31:24}, year = {2016}, url = {https://doi.org/10.1145/2968450}, doi = {10.1145/2968450}, timestamp = {Tue, 12 May 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tosn/WangPLWBCC16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/globecom/JiangWYZQ16, author = {Jiao Jiao Jiang and Sheng Wen and Shui Yu and Wanlei Zhou and Yi Qian}, title = {Analysis of the Spreading Influence Variations for Online Social Users under Attacks}, booktitle = {2016 {IEEE} Global Communications Conference, {GLOBECOM} 2016, Washington, DC, USA, December 4-8, 2016}, pages = {1--6}, publisher = {{IEEE}}, year = {2016}, url = {https://doi.org/10.1109/GLOCOM.2016.7841605}, doi = {10.1109/GLOCOM.2016.7841605}, timestamp = {Fri, 30 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/globecom/JiangWYZQ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cn/WangCJWWTCZ15, author = {Tian Wang and Yiqiao Cai and Weijia Jia and Sheng Wen and Guojun Wang and Hui Tian and Yonghong Chen and Bineng Zhong}, title = {Maximizing real-time streaming services based on a multi-servers networking framework}, journal = {Comput. Networks}, volume = {93}, pages = {199--212}, year = {2015}, url = {https://doi.org/10.1016/j.comnet.2015.10.019}, doi = {10.1016/J.COMNET.2015.10.019}, timestamp = {Fri, 20 Nov 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/cn/WangCJWWTCZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/WenWLXZW15, author = {Sheng Wen and Di Wu and Ping Li and Yang Xiang and Wanlei Zhou and Guiyi Wei}, title = {Detecting stepping stones by abnormal causality probability}, journal = {Secur. Commun. Networks}, volume = {8}, number = {10}, pages = {1831--1844}, year = {2015}, url = {https://doi.org/10.1002/sec.1037}, doi = {10.1002/SEC.1037}, timestamp = {Thu, 21 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/WenWLXZW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tc/WenHCXZJ15, author = {Sheng Wen and Mohammad Sayad Haghighi and Chao Chen and Yang Xiang and Wanlei Zhou and Weijia Jia}, title = {A Sword with Two Edges: Propagation Studies on Both Positive and Negative Information in Online Social Networks}, journal = {{IEEE} Trans. Computers}, volume = {64}, number = {3}, pages = {640--653}, year = {2015}, url = {https://doi.org/10.1109/TC.2013.2295802}, doi = {10.1109/TC.2013.2295802}, timestamp = {Thu, 21 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tc/WenHCXZJ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/JiangWYXZ15, author = {Jiao Jiao Jiang and Sheng Wen and Shui Yu and Yang Xiang and Wanlei Zhou}, title = {K-Center: An Approach on the Multi-Source Identification of Information Diffusion}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {10}, number = {12}, pages = {2616--2626}, year = {2015}, url = {https://doi.org/10.1109/TIFS.2015.2469256}, doi = {10.1109/TIFS.2015.2469256}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/JiangWYXZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/XuLW15, author = {Li Xu and Limei Lin and Sheng Wen}, editor = {Meikang Qiu and Shouhuai Xu and Moti Yung and Haibo Zhang}, title = {First-Priority Relation Graph-Based Malicious Users Detection in Mobile Social Networks}, booktitle = {Network and System Security - 9th International Conference, {NSS} 2015, New York, NY, USA, November 3-5, 2015, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {9408}, pages = {459--466}, publisher = {Springer}, year = {2015}, url = {https://doi.org/10.1007/978-3-319-25645-0\_34}, doi = {10.1007/978-3-319-25645-0\_34}, timestamp = {Tue, 14 May 2019 10:00:41 +0200}, biburl = {https://dblp.org/rec/conf/nss/XuLW15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/socialsec/WenJY0Z15, author = {Sheng Wen and Jiaojiao Jiang and Kasra Majbouri Yazdi and Yang Xiang and Wanlei Zhou}, title = {The Relation Between Local and Global Influence of Individuals in Scale-Free Networks}, booktitle = {International Symposium on Security and Privacy in Social Networks and Big Data, SocialSec 2015, Hangzhou, China, November 16-18, 2015}, pages = {80--84}, publisher = {{IEEE} Computer Society}, year = {2015}, url = {https://doi.org/10.1109/SocialSec2015.20}, doi = {10.1109/SOCIALSEC2015.20}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/socialsec/WenJY0Z15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/LiuZGWL15, author = {Bo Liu and Wanlei Zhou and Longxiang Gao and Sheng Wen and Tom H. Luan}, title = {Mobility Increases the Risk of Malware Propagations in Wireless Networks}, booktitle = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22, 2015, Volume 1}, pages = {90--95}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/Trustcom.2015.361}, doi = {10.1109/TRUSTCOM.2015.361}, timestamp = {Wed, 07 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/LiuZGWL15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/JiangZYWYX15, author = {Jiao Jiao Jiang and Andi Zhou and Kasra Majbouri Yazdi and Sheng Wen and Shui Yu and Yang Xiang}, title = {Identifying Diffusion Sources in Large Networks: {A} Community Structure Based Approach}, booktitle = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22, 2015, Volume 1}, pages = {302--309}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/Trustcom.2015.388}, doi = {10.1109/TRUSTCOM.2015.388}, timestamp = {Fri, 30 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/JiangZYWYX15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/comsur/WangWXZ14, author = {Yini Wang and Sheng Wen and Yang Xiang and Wanlei Zhou}, title = {Modeling the Propagation of Worms in Networks: {A} Survey}, journal = {{IEEE} Commun. Surv. Tutorials}, volume = {16}, number = {2}, pages = {942--960}, year = {2014}, url = {https://doi.org/10.1109/SURV.2013.100913.00195}, doi = {10.1109/SURV.2013.100913.00195}, timestamp = {Thu, 21 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/comsur/WangWXZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/fgcs/ZhouJWXZ14, author = {Wei Zhou and Weijia Jia and Sheng Wen and Yang Xiang and Wanlei Zhou}, title = {Detection and defense of application-layer DDoS attacks in backbone web traffic}, journal = {Future Gener. Comput. Syst.}, volume = {38}, pages = {36--46}, year = {2014}, url = {https://doi.org/10.1016/j.future.2013.08.002}, doi = {10.1016/J.FUTURE.2013.08.002}, timestamp = {Fri, 22 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/fgcs/ZhouJWXZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/network/WenJXYZ14, author = {Sheng Wen and Jiao Jiao Jiang and Yang Xiang and Shui Yu and Wanlei Zhou}, title = {Are the popular users always important for information dissemination in online social networks?}, journal = {{IEEE} Netw.}, volume = {28}, number = {5}, pages = {64--67}, year = {2014}, url = {https://doi.org/10.1109/MNET.2014.6915441}, doi = {10.1109/MNET.2014.6915441}, timestamp = {Fri, 30 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/network/WenJXYZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tdsc/WenZZXZJZ14, author = {Sheng Wen and Wei Zhou and Jun Zhang and Yang Xiang and Wanlei Zhou and Weijia Jia and Cliff C. Zou}, title = {Modeling and Analysis on the Propagation Dynamics of Modern Email Malware}, journal = {{IEEE} Trans. Dependable Secur. Comput.}, volume = {11}, number = {4}, pages = {361--374}, year = {2014}, url = {https://doi.org/10.1109/TDSC.2013.49}, doi = {10.1109/TDSC.2013.49}, timestamp = {Fri, 22 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tdsc/WenZZXZJZ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tpds/WenJXYZJ14, author = {Sheng Wen and Jiao Jiao Jiang and Yang Xiang and Shui Yu and Wanlei Zhou and Weijia Jia}, title = {To Shut Them Up or to Clarify: Restraining the Spread of Rumors in Online Social Networks}, journal = {{IEEE} Trans. Parallel Distributed Syst.}, volume = {25}, number = {12}, pages = {3306--3316}, year = {2014}, url = {https://doi.org/10.1109/TPDS.2013.2297115}, doi = {10.1109/TPDS.2013.2297115}, timestamp = {Fri, 30 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tpds/WenJXYZJ14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fedcsis/StojmenovicW14, author = {Ivan Stojmenovic and Sheng Wen}, editor = {Maria Ganzha and Leszek A. Maciaszek and Marcin Paprzycki}, title = {The Fog Computing Paradigm: Scenarios and Security Issues}, booktitle = {Proceedings of the 2014 Federated Conference on Computer Science and Information Systems, Warsaw, Poland, September 7-10, 2014}, series = {Annals of Computer Science and Information Systems}, volume = {2}, pages = {1--8}, year = {2014}, url = {https://doi.org/10.15439/2014F503}, doi = {10.15439/2014F503}, timestamp = {Tue, 23 Apr 2024 09:55:03 +0200}, biburl = {https://dblp.org/rec/conf/fedcsis/StojmenovicW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icira/XingZWYXC14, author = {Hang Xing and Tiemin Zhang and Sheng Wen and Xiuli Yang and Zhilin Xu and Fei Cao}, editor = {Xianmin Zhang and Honghai Liu and Zhong Chen and Nianfeng F. Wang}, title = {Cymbal Piezoelectric Micro Displacement Actuator Characteristics Analysis}, booktitle = {Intelligent Robotics and Applications - 7th International Conference, {ICIRA} 2014, Guangzhou, China, December 17-20, 2014, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8917}, pages = {161--170}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-13966-1\_16}, doi = {10.1007/978-3-319-13966-1\_16}, timestamp = {Thu, 04 Mar 2021 17:06:03 +0100}, biburl = {https://dblp.org/rec/conf/icira/XingZWYXC14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icira/ZhangCLLW14, author = {Tiemin Zhang and Fei Cao and Shenghua Li and Li Liang and Sheng Wen}, editor = {Xianmin Zhang and Honghai Liu and Zhong Chen and Nianfeng F. Wang}, title = {{FEM} Analysis and Parameter Optimization of a Linear Piezoelectric Motor Macro Driven}, booktitle = {Intelligent Robotics and Applications - 7th International Conference, {ICIRA} 2014, Guangzhou, China, December 17-20, 2014, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8917}, pages = {171--178}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-13966-1\_17}, doi = {10.1007/978-3-319-13966-1\_17}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icira/ZhangCLLW14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icira/ZhangCLWL14, author = {Tiemin Zhang and Fei Cao and Shenghua Li and Sheng Wen and Li Liang}, editor = {Xianmin Zhang and Honghai Liu and Zhong Chen and Nianfeng F. Wang}, title = {Finite Element Study on the Cylindrical Linear Piezoelectric Motor Micro Driven}, booktitle = {Intelligent Robotics and Applications - 7th International Conference, {ICIRA} 2014, Guangzhou, China, December 17-20, 2014, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {8917}, pages = {179--186}, publisher = {Springer}, year = {2014}, url = {https://doi.org/10.1007/978-3-319-13966-1\_18}, doi = {10.1007/978-3-319-13966-1\_18}, timestamp = {Wed, 24 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/icira/ZhangCLWL14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tpds/WenZZXZJ13, author = {Sheng Wen and Wei Zhou and Jun Zhang and Yang Xiang and Wanlei Zhou and Weijia Jia}, title = {Modeling Propagation Dynamics of Social Network Worms}, journal = {{IEEE} Trans. Parallel Distributed Syst.}, volume = {24}, number = {8}, pages = {1633--1643}, year = {2013}, url = {https://doi.org/10.1109/TPDS.2012.250}, doi = {10.1109/TPDS.2012.250}, timestamp = {Fri, 22 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tpds/WenZZXZJ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/css/WenLWXZ13, author = {Sheng Wen and Ping Li and Di Wu and Yang Xiang and Wanlei Zhou}, editor = {Guojun Wang and Indrakshi Ray and Dengguo Feng and Muttukrishnan Rajarajan}, title = {Detecting Stepping Stones by Abnormal Causality Probability}, booktitle = {Cyberspace Safety and Security - 5th International Symposium, {CSS} 2013, Zhangjiajie, China, November 13-15, 2013, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {8300}, pages = {308--322}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-319-03584-0\_23}, doi = {10.1007/978-3-319-03584-0\_23}, timestamp = {Fri, 05 Aug 2022 08:50:55 +0200}, biburl = {https://dblp.org/rec/conf/css/WenLWXZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/WenXZ13, author = {Sheng Wen and Yang Xiang and Wanlei Zhou}, editor = {Javier L{\'{o}}pez and Xinyi Huang and Ravi S. Sandhu}, title = {Modeling and Analysis for Thwarting Worm Propagation in Email Networks}, booktitle = {Network and System Security - 7th International Conference, {NSS} 2013, Madrid, Spain, June 3-4, 2013. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {7873}, pages = {763--769}, publisher = {Springer}, year = {2013}, url = {https://doi.org/10.1007/978-3-642-38631-2\_68}, doi = {10.1007/978-3-642-38631-2\_68}, timestamp = {Thu, 21 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/nss/WenXZ13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/concurrency/WenZXZ12, author = {Sheng Wen and Wei Zhou and Yang Xiang and Wanlei Zhou}, title = {{CAFS:} a novel lightweight cache-based scheme for large-scale intrusion alert fusion}, journal = {Concurr. Comput. Pract. Exp.}, volume = {24}, number = {10}, pages = {1137--1153}, year = {2012}, url = {https://doi.org/10.1002/cpe.1747}, doi = {10.1002/CPE.1747}, timestamp = {Fri, 22 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/concurrency/WenZXZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/icl/WenZWZX12, author = {Sheng Wen and Wei Zhou and Yini Wang and Wanlei Zhou and Yang Xiang}, title = {Locating Defense Positions for Thwarting the Propagation of Topological Worms}, journal = {{IEEE} Commun. Lett.}, volume = {16}, number = {4}, pages = {560--563}, year = {2012}, url = {https://doi.org/10.1109/LCOMM.2012.030512.112452}, doi = {10.1109/LCOMM.2012.030512.112452}, timestamp = {Fri, 22 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/icl/WenZWZX12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ZhouWWXZ12, author = {Wei Zhou and Sheng Wen and Yini Wang and Yang Xiang and Wanlei Zhou}, editor = {Geyong Min and Yulei Wu and Lei (Chris) Liu and Xiaolong Jin and Stephen A. Jarvis and Ahmed Yassin Al{-}Dubai}, title = {An Analytical Model on the Propagation of Modern Email Worms}, booktitle = {11th {IEEE} International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2012, Liverpool, United Kingdom, June 25-27, 2012}, pages = {533--540}, publisher = {{IEEE} Computer Society}, year = {2012}, url = {https://doi.org/10.1109/TrustCom.2012.70}, doi = {10.1109/TRUSTCOM.2012.70}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ZhouWWXZ12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cj/WangWCZX11, author = {Yini Wang and Sheng Wen and Silvio Cesare and Wanlei Zhou and Yang Xiang}, title = {The Microcosmic Model of Worm Propagation}, journal = {Comput. J.}, volume = {54}, number = {10}, pages = {1700--1720}, year = {2011}, url = {https://doi.org/10.1093/comjnl/bxr082}, doi = {10.1093/COMJNL/BXR082}, timestamp = {Thu, 21 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cj/WangWCZX11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/icl/WangWCZX11, author = {Yini Wang and Sheng Wen and Silvio Cesare and Wanlei Zhou and Yang Xiang}, title = {Eliminating Errors in Worm Propagation Models}, journal = {{IEEE} Commun. Lett.}, volume = {15}, number = {9}, pages = {1022--1024}, year = {2011}, url = {https://doi.org/10.1109/LCOMM.2011.070711.110254}, doi = {10.1109/LCOMM.2011.070711.110254}, timestamp = {Thu, 21 Apr 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/icl/WangWCZX11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ica3pp/WangWZZX11, author = {Yini Wang and Sheng Wen and Wei Zhou and Wanlei Zhou and Yang Xiang}, editor = {Yang Xiang and Alfredo Cuzzocrea and Michael Hobbs and Wanlei Zhou}, title = {The Probability Model of Peer-to-Peer Botnet Propagation}, booktitle = {Algorithms and Architectures for Parallel Processing - 11th International Conference, ICA3PP, Melbourne, Australia, October 24-26, 2011, Proceedings, Part {I}}, series = {Lecture Notes in Computer Science}, volume = {7016}, pages = {470--480}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-24650-0\_41}, doi = {10.1007/978-3-642-24650-0\_41}, timestamp = {Fri, 22 Apr 2022 17:07:03 +0200}, biburl = {https://dblp.org/rec/conf/ica3pp/WangWZZX11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/WangWX11, author = {Yini Wang and Sheng Wen and Yang Xiang}, editor = {Pierangela Samarati and Sara Foresti and Jiankun Hu and Giovanni Livraga}, title = {Modeling worms propagation on probability}, booktitle = {5th International Conference on Network and System Security, {NSS} 2011, Milan, Italy, September 6-8, 2011}, pages = {49--56}, publisher = {{IEEE}}, year = {2011}, url = {https://doi.org/10.1109/ICNSS.2011.6059959}, doi = {10.1109/ICNSS.2011.6059959}, timestamp = {Wed, 16 Oct 2019 14:14:50 +0200}, biburl = {https://dblp.org/rec/conf/nss/WangWX11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hpcc/WenXZ10, author = {Sheng Wen and Yang Xiang and Wanlei Zhou}, title = {A Lightweight Intrusion Alert Fusion System}, booktitle = {12th {IEEE} International Conference on High Performance Computing and Communications, {HPCC} 2010, 1-3 September 2010, Melbourne, Australia}, pages = {695--700}, publisher = {{IEEE}}, year = {2010}, url = {https://doi.org/10.1109/HPCC.2010.120}, doi = {10.1109/HPCC.2010.120}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hpcc/WenXZ10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/nss/WenJZZX10, author = {Sheng Wen and Weijia Jia and Wei Zhou and Wanlei Zhou and Chuan Xu}, editor = {Yang Xiang and Pierangela Samarati and Jiankun Hu and Wanlei Zhou and Ahmad{-}Reza Sadeghi}, title = {{CALD:} Surviving Various Application-Layer DDoS Attacks That Mimic Flash Crowd}, booktitle = {Fourth International Conference on Network and System Security, {NSS} 2010, Melbourne, Victoria, Australia, September 1-3, 2010}, pages = {247--254}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/NSS.2010.69}, doi = {10.1109/NSS.2010.69}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/nss/WenJZZX10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.