BibTeX records: Sheng Wen

download as .bib file

@article{DBLP:journals/connection/TangW0WZ0024,
  author       = {Lihong Tang and
                  Tingmin Wu and
                  Xiao Chen and
                  Sheng Wen and
                  Wei Zhou and
                  Xiaogang Zhu and
                  Yang Xiang},
  title        = {How {COVID-19} impacts telehealth: an empirical study of telehealth
                  services, users and the use of metaverse},
  journal      = {Connect. Sci.},
  volume       = {36},
  number       = {1},
  year         = {2024},
  url          = {https://doi.org/10.1080/09540091.2023.2282942},
  doi          = {10.1080/09540091.2023.2282942},
  timestamp    = {Fri, 08 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/connection/TangW0WZ0024.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tii/HuCAZHW24,
  author       = {Xiangyu Hu and
                  Hanpeng Cai and
                  Mamoun Alazab and
                  Wei Zhou and
                  Mohammad Sayad Haghighi and
                  Sheng Wen},
  title        = {Federated Learning in Industrial IoT: {A} Privacy-Preserving Solution
                  That Enables Sharing of Data in Hydrocarbon Explorations},
  journal      = {{IEEE} Trans. Ind. Informatics},
  volume       = {20},
  number       = {3},
  pages        = {4337--4346},
  year         = {2024},
  url          = {https://doi.org/10.1109/TII.2023.3306931},
  doi          = {10.1109/TII.2023.3306931},
  timestamp    = {Sat, 16 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tii/HuCAZHW24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cceai/YinWZZ24,
  author       = {Jianguo Yin and
                  Sheng Wen and
                  Chenhao Zhang and
                  Meng Zhao},
  editor       = {Wenqiang Zhang and
                  Yong Yue and
                  Marek R. Ogiela},
  title        = {Radar sequence {HRRP} target recognition based on {DRSN-LSTM}},
  booktitle    = {2024 8th International Conference on Control Engineering and Artificial
                  Intelligence, {CCEAI} 2024, Shanghai, China, January 26-28, 2024},
  pages        = {66--72},
  publisher    = {{ACM}},
  year         = {2024},
  url          = {https://doi.org/10.1145/3640824.3640834},
  doi          = {10.1145/3640824.3640834},
  timestamp    = {Mon, 15 Apr 2024 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/cceai/YinWZZ24.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/concurrency/PengZZWW23,
  author       = {Zhiniang Peng and
                  Wei Zhou and
                  Xiaogang Zhu and
                  Youke Wu and
                  Sheng Wen},
  title        = {On the security of fully homomorphic encryption for data privacy in
                  Internet of Things},
  journal      = {Concurr. Comput. Pract. Exp.},
  volume       = {35},
  number       = {19},
  year         = {2023},
  url          = {https://doi.org/10.1002/cpe.7330},
  doi          = {10.1002/CPE.7330},
  timestamp    = {Sat, 09 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/concurrency/PengZZWW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csur/LiXWWCX23,
  author       = {Huacheng Li and
                  Chunhe Xia and
                  Tianbo Wang and
                  Sheng Wen and
                  Chao Chen and
                  Yang Xiang},
  title        = {Capturing Dynamics of Information Diffusion in {SNS:} {A} Survey of
                  Methodology and Techniques},
  journal      = {{ACM} Comput. Surv.},
  volume       = {55},
  number       = {2},
  pages        = {22:1--22:51},
  year         = {2023},
  url          = {https://doi.org/10.1145/3485273},
  doi          = {10.1145/3485273},
  timestamp    = {Fri, 25 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/csur/LiXWWCX23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeejas/FengZHZWX23,
  author       = {Xiaotao Feng and
                  Xiaogang Zhu and
                  Qing{-}Long Han and
                  Wei Zhou and
                  Sheng Wen and
                  Yang Xiang},
  title        = {Detecting Vulnerability on IoT Device Firmware: {A} Survey},
  journal      = {{IEEE} {CAA} J. Autom. Sinica},
  volume       = {10},
  number       = {1},
  pages        = {25--41},
  year         = {2023},
  url          = {https://doi.org/10.1109/JAS.2022.105860},
  doi          = {10.1109/JAS.2022.105860},
  timestamp    = {Sat, 09 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ieeejas/FengZHZWX23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ral/YinYWZP23,
  author       = {Xuanchun Yin and
                  Jinchun Yan and
                  Sheng Wen and
                  Jiantao Zhang and
                  Muye Pang},
  title        = {Origami-Based Decoupling Clutch Achieves Energy-Efficient Legged Robots},
  journal      = {{IEEE} Robotics Autom. Lett.},
  volume       = {8},
  number       = {12},
  pages        = {8058--8065},
  year         = {2023},
  url          = {https://doi.org/10.1109/LRA.2023.3325775},
  doi          = {10.1109/LRA.2023.3325775},
  timestamp    = {Sun, 10 Dec 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ral/YinYWZP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcc/FengMWWXM23,
  author       = {Xiaoqin Feng and
                  Jianfeng Ma and
                  Huaxiong Wang and
                  Sheng Wen and
                  Yang Xiang and
                  Yinbin Miao},
  title        = {Space-Efficient Storage Structure of Blockchain Transactions Supporting
                  Secure Verification},
  journal      = {{IEEE} Trans. Cloud Comput.},
  volume       = {11},
  number       = {3},
  pages        = {2631--2645},
  year         = {2023},
  url          = {https://doi.org/10.1109/TCC.2022.3220664},
  doi          = {10.1109/TCC.2022.3220664},
  timestamp    = {Sun, 24 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcc/FengMWWXM23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcss/FeiCMCWH23,
  author       = {Gaolei Fei and
                  Yong Cheng and
                  Wanlun Ma and
                  Chao Chen and
                  Sheng Wen and
                  Guangmin Hu},
  title        = {Real-Time Detection of {COVID-19} Events From Twitter: {A} Spatial-Temporally
                  Bursty-Aware Method},
  journal      = {{IEEE} Trans. Comput. Soc. Syst.},
  volume       = {10},
  number       = {2},
  pages        = {656--672},
  year         = {2023},
  url          = {https://doi.org/10.1109/TCSS.2022.3169742},
  doi          = {10.1109/TCSS.2022.3169742},
  timestamp    = {Sat, 29 Apr 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcss/FeiCMCWH23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/TangWCWLXGX23,
  author       = {Lihong Tang and
                  Tingmin Wu and
                  Xiao Chen and
                  Sheng Wen and
                  Li Li and
                  Xin Xia and
                  Marthie Grobler and
                  Yang Xiang},
  title        = {How Does Visualisation Help App Practitioners Analyse Android Apps?},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {20},
  number       = {3},
  pages        = {2238--2255},
  year         = {2023},
  url          = {https://doi.org/10.1109/TDSC.2022.3178181},
  doi          = {10.1109/TDSC.2022.3178181},
  timestamp    = {Fri, 02 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/TangWCWLXGX23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tits/XuDCDZW23,
  author       = {Chuan Xu and
                  Yingyi Ding and
                  Chao Chen and
                  Yong Ding and
                  Wei Zhou and
                  Sheng Wen},
  title        = {Personalized Location Privacy Protection for Location-Based Services
                  in Vehicular Networks},
  journal      = {{IEEE} Trans. Intell. Transp. Syst.},
  volume       = {24},
  number       = {1},
  pages        = {1163--1177},
  year         = {2023},
  url          = {https://doi.org/10.1109/TITS.2022.3182019},
  doi          = {10.1109/TITS.2022.3182019},
  timestamp    = {Mon, 05 Feb 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tits/XuDCDZW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/toit/ZhangWWNP023,
  author       = {Rongjunchen Zhang and
                  Tingmin Wu and
                  Sheng Wen and
                  Surya Nepal and
                  C{\'{e}}cile Paris and
                  Yang Xiang},
  title        = {{SAM:} Multi-turn Response Selection Based on Semantic Awareness Matching},
  journal      = {{ACM} Trans. Internet Techn.},
  volume       = {23},
  number       = {1},
  pages        = {3:1--3:18},
  year         = {2023},
  url          = {https://doi.org/10.1145/3545570},
  doi          = {10.1145/3545570},
  timestamp    = {Fri, 21 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/toit/ZhangWWNP023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ndss/MaWSXWX23,
  author       = {Wanlun Ma and
                  Derui Wang and
                  Ruoxi Sun and
                  Minhui Xue and
                  Sheng Wen and
                  Yang Xiang},
  title        = {The "Beatrix" Resurrections: Robust Backdoor Detection via
                  Gram Matrices},
  booktitle    = {30th Annual Network and Distributed System Security Symposium, {NDSS}
                  2023, San Diego, California, USA, February 27 - March 3, 2023},
  publisher    = {The Internet Society},
  year         = {2023},
  url          = {https://www.ndss-symposium.org/ndss-paper/the-beatrix-resurrections-robust-backdoor-detection-via-gram-matrices/},
  timestamp    = {Tue, 26 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ndss/MaWSXWX23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sp/CaoXSWXW23,
  author       = {Yuxin Cao and
                  Xi Xiao and
                  Ruoxi Sun and
                  Derui Wang and
                  Minhui Xue and
                  Sheng Wen},
  title        = {StyleFool: Fooling Video Classification Systems via Style Transfer},
  booktitle    = {44th {IEEE} Symposium on Security and Privacy, {SP} 2023, San Francisco,
                  CA, USA, May 21-25, 2023},
  pages        = {1631--1648},
  publisher    = {{IEEE}},
  year         = {2023},
  url          = {https://doi.org/10.1109/SP46215.2023.10179383},
  doi          = {10.1109/SP46215.2023.10179383},
  timestamp    = {Tue, 26 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sp/CaoXSWXW23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uss/ZhangZHXJHWP23,
  author       = {Yuxing Zhang and
                  Xiaogang Zhu and
                  Daojing He and
                  Minhui Xue and
                  Shouling Ji and
                  Mohammad Sayad Haghighi and
                  Sheng Wen and
                  Zhiniang Peng},
  editor       = {Joseph A. Calandrino and
                  Carmela Troncoso},
  title        = {Detecting Union Type Confusion in Component Object Model},
  booktitle    = {32nd {USENIX} Security Symposium, {USENIX} Security 2023, Anaheim,
                  CA, USA, August 9-11, 2023},
  pages        = {4265--4281},
  publisher    = {{USENIX} Association},
  year         = {2023},
  url          = {https://www.usenix.org/conference/usenixsecurity23/presentation/zhang-yuxing},
  timestamp    = {Wed, 18 Oct 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uss/ZhangZHXJHWP23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/www/ZhangW0WNP023,
  author       = {Rongjunchen Zhang and
                  Tingmin Wu and
                  Xiao Chen and
                  Sheng Wen and
                  Surya Nepal and
                  C{\'{e}}cile Paris and
                  Yang Xiang},
  editor       = {Ying Ding and
                  Jie Tang and
                  Juan F. Sequeda and
                  Lora Aroyo and
                  Carlos Castillo and
                  Geert{-}Jan Houben},
  title        = {Dynalogue: {A} Transformer-Based Dialogue System with Dynamic Attention},
  booktitle    = {Proceedings of the {ACM} Web Conference 2023, {WWW} 2023, Austin,
                  TX, USA, 30 April 2023 - 4 May 2023},
  pages        = {1604--1615},
  publisher    = {{ACM}},
  year         = {2023},
  url          = {https://doi.org/10.1145/3543507.3583330},
  doi          = {10.1145/3543507.3583330},
  timestamp    = {Mon, 28 Aug 2023 21:17:10 +0200},
  biburl       = {https://dblp.org/rec/conf/www/ZhangW0WNP023.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2305-12747,
  author       = {Wanlun Ma and
                  Yiliao Song and
                  Minhui Xue and
                  Sheng Wen and
                  Yang Xiang},
  title        = {The "code" of Ethics: {A} Holistic Audit of {AI} Code Generators},
  journal      = {CoRR},
  volume       = {abs/2305.12747},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2305.12747},
  doi          = {10.48550/ARXIV.2305.12747},
  eprinttype    = {arXiv},
  eprint       = {2305.12747},
  timestamp    = {Fri, 26 May 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2305-12747.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2308-09239,
  author       = {Kunpeng Zhang and
                  Xiaogang Zhu and
                  Xiao Xi and
                  Minhui Xue and
                  Chao Zhang and
                  Sheng Wen},
  title        = {{SHAPFUZZ:} Efficient Fuzzing via Shapley-Guided Byte Selection},
  journal      = {CoRR},
  volume       = {abs/2308.09239},
  year         = {2023},
  url          = {https://doi.org/10.48550/arXiv.2308.09239},
  doi          = {10.48550/ARXIV.2308.09239},
  eprinttype    = {arXiv},
  eprint       = {2308.09239},
  timestamp    = {Sat, 09 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2308-09239.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/concurrency/LuGW0PW22,
  author       = {Jiadong Lu and
                  Fangming Gu and
                  Yiqi Wang and
                  Jiahui Chen and
                  Zhiniang Peng and
                  Sheng Wen},
  title        = {Static Detection of File Access Control Vulnerabilities on Windows
                  System},
  journal      = {Concurr. Comput. Pract. Exp.},
  volume       = {34},
  number       = {16},
  year         = {2022},
  url          = {https://doi.org/10.1002/cpe.6004},
  doi          = {10.1002/CPE.6004},
  timestamp    = {Mon, 25 Jul 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/concurrency/LuGW0PW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csr/HuMCWZXF22,
  author       = {Xiangyu Hu and
                  Wanlun Ma and
                  Chao Chen and
                  Sheng Wen and
                  Jun Zhang and
                  Yang Xiang and
                  Gaolei Fei},
  title        = {Event detection in online social network: Methodologies, state-of-art,
                  and evolution},
  journal      = {Comput. Sci. Rev.},
  volume       = {46},
  pages        = {100500},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.cosrev.2022.100500},
  doi          = {10.1016/J.COSREV.2022.100500},
  timestamp    = {Sun, 15 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/csr/HuMCWZXF22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/csur/ZhuWCX22,
  author       = {Xiaogang Zhu and
                  Sheng Wen and
                  Seyit Camtepe and
                  Yang Xiang},
  title        = {Fuzzing: {A} Survey for Roadmap},
  journal      = {{ACM} Comput. Surv.},
  volume       = {54},
  number       = {11s},
  pages        = {230:1--230:36},
  year         = {2022},
  url          = {https://doi.org/10.1145/3512345},
  doi          = {10.1145/3512345},
  timestamp    = {Sat, 09 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/csur/ZhuWCX22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ieeejas/ZhangPHCWX22,
  author       = {Jun Zhang and
                  Lei Pan and
                  Qing{-}Long Han and
                  Chao Chen and
                  Sheng Wen and
                  Yang Xiang},
  title        = {Deep Learning Based Attack Detection for Cyber-Physical System Cybersecurity:
                  {A} Survey},
  journal      = {{IEEE} {CAA} J. Autom. Sinica},
  volume       = {9},
  number       = {3},
  pages        = {377--391},
  year         = {2022},
  url          = {https://doi.org/10.1109/JAS.2021.1004261},
  doi          = {10.1109/JAS.2021.1004261},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ieeejas/ZhangPHCWX22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijis/YanWNPX22,
  author       = {Feixue Yan and
                  Sheng Wen and
                  Surya Nepal and
                  C{\'{e}}cile Paris and
                  Yang Xiang},
  title        = {Explainable machine learning in cybersecurity: {A} survey},
  journal      = {Int. J. Intell. Syst.},
  volume       = {37},
  number       = {12},
  pages        = {12305--12334},
  year         = {2022},
  url          = {https://doi.org/10.1002/int.23088},
  doi          = {10.1002/INT.23088},
  timestamp    = {Tue, 28 Feb 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijis/YanWNPX22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ral/YinYWZ22,
  author       = {Xuanchun Yin and
                  Jinchun Yan and
                  Sheng Wen and
                  Jiantao Zhang},
  title        = {Magnetorheological Fluid-Based Bending Actuator for Magnetic Sensing},
  journal      = {{IEEE} Robotics Autom. Lett.},
  volume       = {7},
  number       = {4},
  pages        = {12169--12176},
  year         = {2022},
  url          = {https://doi.org/10.1109/LRA.2022.3214082},
  doi          = {10.1109/LRA.2022.3214082},
  timestamp    = {Mon, 05 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ral/YinYWZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ras/YinYWZ22,
  author       = {Xuanchun Yin and
                  Jinchun Yan and
                  Sheng Wen and
                  Jiantao Zhang},
  title        = {Spring-linkage integrated mechanism design for jumping robots},
  journal      = {Robotics Auton. Syst.},
  volume       = {158},
  pages        = {104268},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.robot.2022.104268},
  doi          = {10.1016/J.ROBOT.2022.104268},
  timestamp    = {Sun, 13 Nov 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ras/YinYWZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcyb/WangLWHNZX22,
  author       = {Derui Wang and
                  Chaoran Li and
                  Sheng Wen and
                  Qing{-}Long Han and
                  Surya Nepal and
                  Xiangyu Zhang and
                  Yang Xiang},
  title        = {Daedalus: Breaking Nonmaximum Suppression in Object Detection via
                  Adversarial Examples},
  journal      = {{IEEE} Trans. Cybern.},
  volume       = {52},
  number       = {8},
  pages        = {7427--7440},
  year         = {2022},
  url          = {https://doi.org/10.1109/TCYB.2020.3041481},
  doi          = {10.1109/TCYB.2020.3041481},
  timestamp    = {Wed, 25 Jan 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tcyb/WangLWHNZX22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/ZhuFMWCXR22,
  author       = {Xiaogang Zhu and
                  Xiaotao Feng and
                  Xiaozhu Meng and
                  Sheng Wen and
                  Seyit Camtepe and
                  Yang Xiang and
                  Kui Ren},
  title        = {CSI-Fuzz: Full-Speed Edge Tracing Using Coverage Sensitive Instrumentation},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {19},
  number       = {2},
  pages        = {912--923},
  year         = {2022},
  url          = {https://doi.org/10.1109/TDSC.2020.3008826},
  doi          = {10.1109/TDSC.2020.3008826},
  timestamp    = {Sat, 09 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/ZhuFMWCXR22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/WangLWNX22,
  author       = {Derui Wang and
                  Chaoran Li and
                  Sheng Wen and
                  Surya Nepal and
                  Yang Xiang},
  title        = {Defending Against Adversarial Attack Towards Deep Neural Networks
                  Via Collaborative Multi-Task Training},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {19},
  number       = {2},
  pages        = {953--965},
  year         = {2022},
  url          = {https://doi.org/10.1109/TDSC.2020.3014390},
  doi          = {10.1109/TDSC.2020.3014390},
  timestamp    = {Fri, 01 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/WangLWNX22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/LiCWWACX22,
  author       = {Chaoran Li and
                  Xiao Chen and
                  Derui Wang and
                  Sheng Wen and
                  Muhammad Ejaz Ahmed and
                  Seyit Camtepe and
                  Yang Xiang},
  title        = {Backdoor Attack on Machine Learning Based Android Malware Detectors},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {19},
  number       = {5},
  pages        = {3357--3370},
  year         = {2022},
  url          = {https://doi.org/10.1109/TDSC.2021.3094824},
  doi          = {10.1109/TDSC.2021.3094824},
  timestamp    = {Sat, 10 Sep 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/LiCWWACX22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tii/WangKJWHH22,
  author       = {Tian Wang and
                  Haoxiong Ke and
                  Alireza Jolfaei and
                  Sheng Wen and
                  Mohammad Sayad Haghighi and
                  Shuqiang Huang},
  title        = {Missing Value Filling Based on the Collaboration of Cloud and Edge
                  in Artificial Intelligence of Things},
  journal      = {{IEEE} Trans. Ind. Informatics},
  volume       = {18},
  number       = {8},
  pages        = {5394--5402},
  year         = {2022},
  url          = {https://doi.org/10.1109/TII.2021.3126110},
  doi          = {10.1109/TII.2021.3126110},
  timestamp    = {Tue, 28 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tii/WangKJWHH22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tim/YinZWZ22,
  author       = {Xuanchun Yin and
                  Pengyu Zhou and
                  Sheng Wen and
                  Jiantao Zhang},
  title        = {Origami Improved Dielectric Elastomer Actuation for Tunable Lens},
  journal      = {{IEEE} Trans. Instrum. Meas.},
  volume       = {71},
  pages        = {1--9},
  year         = {2022},
  url          = {https://doi.org/10.1109/TIM.2022.3168942},
  doi          = {10.1109/TIM.2022.3168942},
  timestamp    = {Wed, 18 May 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tim/YinZWZ22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tmis/MaHCWCX22,
  author       = {Wanlun Ma and
                  Xiangyu Hu and
                  Chao Chen and
                  Sheng Wen and
                  Kim{-}Kwang Raymond Choo and
                  Yang Xiang},
  title        = {Social Media Event Prediction using {DNN} with Feedback Mechanism},
  journal      = {{ACM} Trans. Manag. Inf. Syst.},
  volume       = {13},
  number       = {3},
  pages        = {33:1--33:24},
  year         = {2022},
  url          = {https://doi.org/10.1145/3522759},
  doi          = {10.1145/3522759},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tmis/MaHCWCX22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tnse/ZhuWJHCX22,
  author       = {Xiaogang Zhu and
                  Sheng Wen and
                  Alireza Jolfaei and
                  Mohammad Sayad Haghighi and
                  Seyit Camtepe and
                  Yang Xiang},
  title        = {Vulnerability Detection in SIoT Applications: {A} Fuzzing Method on
                  their Binaries},
  journal      = {{IEEE} Trans. Netw. Sci. Eng.},
  volume       = {9},
  number       = {3},
  pages        = {970--979},
  year         = {2022},
  url          = {https://doi.org/10.1109/TNSE.2020.3038142},
  doi          = {10.1109/TNSE.2020.3038142},
  timestamp    = {Sat, 09 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tnse/ZhuWJHCX22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/toit/WangWJHNX22,
  author       = {Derui Wang and
                  Sheng Wen and
                  Alireza Jolfaei and
                  Mohammad Sayad Haghighi and
                  Surya Nepal and
                  Yang Xiang},
  title        = {On the Neural Backdoor of Federated Generative Models in Edge Computing},
  journal      = {{ACM} Trans. Internet Techn.},
  volume       = {22},
  number       = {2},
  pages        = {43:1--43:21},
  year         = {2022},
  url          = {https://doi.org/10.1145/3425662},
  doi          = {10.1145/3425662},
  timestamp    = {Mon, 26 Jun 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/toit/WangWJHNX22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/toit/WuMWXPNX22,
  author       = {Tingmin Wu and
                  Wanlun Ma and
                  Sheng Wen and
                  Xin Xia and
                  C{\'{e}}cile Paris and
                  Surya Nepal and
                  Yang Xiang},
  title        = {Analysis of Trending Topics and Text-based Channels of Information
                  Delivery in Cybersecurity},
  journal      = {{ACM} Trans. Internet Techn.},
  volume       = {22},
  number       = {2},
  pages        = {52:1--52:27},
  year         = {2022},
  url          = {https://doi.org/10.1145/3483332},
  doi          = {10.1145/3483332},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/toit/WuMWXPNX22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tpds/LiuHLWL22,
  author       = {Jiaqi Liu and
                  Shiyue Huang and
                  Deng Li and
                  Sheng Wen and
                  Hui Liu},
  title        = {Addictive Incentive Mechanism in Crowdsensing From the Perspective
                  of Behavioral Economics},
  journal      = {{IEEE} Trans. Parallel Distributed Syst.},
  volume       = {33},
  number       = {5},
  pages        = {1109--1127},
  year         = {2022},
  url          = {https://doi.org/10.1109/TPDS.2021.3104247},
  doi          = {10.1109/TPDS.2021.3104247},
  timestamp    = {Mon, 08 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tpds/LiuHLWL22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsw/ShiKW22,
  author       = {Lei Shi and
                  Shanti Krishnan and
                  Sheng Wen},
  editor       = {David Abramson and
                  Minh Ngoc Dinh},
  title        = {Study Cybersecurity of Cyber Physical System in the Virtual Environment:
                  {A} Survey and New Direction},
  booktitle    = {{ACSW} 2022: Australasian Computer Science Week 2022, Brisbane, Australia,
                  February 14 - 18, 2022},
  pages        = {46--55},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3511616.3513098},
  doi          = {10.1145/3511616.3513098},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/acsw/ShiKW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icse/ZhangXZSXW22,
  author       = {Kunpeng Zhang and
                  Xi Xiao and
                  Xiaogang Zhu and
                  Ruoxi Sun and
                  Minhui Xue and
                  Sheng Wen},
  title        = {Path Transitions Tell More: Optimizing Fuzzing Schedules via Runtime
                  Program States},
  booktitle    = {44th {IEEE/ACM} 44th International Conference on Software Engineering,
                  {ICSE} 2022, Pittsburgh, PA, USA, May 25-27, 2022},
  pages        = {1658--1668},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3510003.3510063},
  doi          = {10.1145/3510003.3510063},
  timestamp    = {Tue, 26 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icse/ZhangXZSXW22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/ShiKWX22,
  author       = {Lei Shi and
                  Shanti Krishnan and
                  Sheng Wen and
                  Yang Xiang},
  editor       = {Xingliang Yuan and
                  Guangdong Bai and
                  Cristina Alcaraz and
                  Suryadipta Majumdar},
  title        = {Supporting Cyber-Attacks and System Anomaly Detection Research with
                  an Industry 4.0 Dataset},
  booktitle    = {Network and System Security - 16th International Conference, {NSS}
                  2022, Denarau Island, Fiji, December 9-12, 2022, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {13787},
  pages        = {335--353},
  publisher    = {Springer},
  year         = {2022},
  url          = {https://doi.org/10.1007/978-3-031-23020-2\_19},
  doi          = {10.1007/978-3-031-23020-2\_19},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nss/ShiKWX22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigsoft/Li0SXWAC022,
  author       = {Chaoran Li and
                  Xiao Chen and
                  Ruoxi Sun and
                  Minhui Xue and
                  Sheng Wen and
                  Muhammad Ejaz Ahmed and
                  Seyit Camtepe and
                  Yang Xiang},
  editor       = {Abhik Roychoudhury and
                  Cristian Cadar and
                  Miryung Kim},
  title        = {Cross-language Android permission specification},
  booktitle    = {Proceedings of the 30th {ACM} Joint European Software Engineering
                  Conference and Symposium on the Foundations of Software Engineering,
                  {ESEC/FSE} 2022, Singapore, Singapore, November 14-18, 2022},
  pages        = {772--783},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3540250.3549142},
  doi          = {10.1145/3540250.3549142},
  timestamp    = {Tue, 26 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/sigsoft/Li0SXWAC022.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/QiXJWXN22,
  author       = {Minfeng Qi and
                  Zhiyu Xu and
                  Tengyun Jiao and
                  Sheng Wen and
                  Yang Xiang and
                  Gary Nan},
  title        = {A Comparative Study on the Security of Cryptocurrency Wallets in Android
                  System},
  booktitle    = {{IEEE} International Conference on Trust, Security and Privacy in
                  Computing and Communications, TrustCom 2022, Wuhan, China, December
                  9-11, 2022},
  pages        = {399--406},
  publisher    = {{IEEE}},
  year         = {2022},
  url          = {https://doi.org/10.1109/TrustCom56396.2022.00062},
  doi          = {10.1109/TRUSTCOM56396.2022.00062},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/QiXJWXN22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2201-04441,
  author       = {Kunpeng Zhang and
                  Xi Xiao and
                  Xiaogang Zhu and
                  Ruoxi Sun and
                  Minhui Xue and
                  Sheng Wen},
  title        = {Path Transitions Tell More: Optimizing Fuzzing Schedules via Runtime
                  Program States},
  journal      = {CoRR},
  volume       = {abs/2201.04441},
  year         = {2022},
  url          = {https://arxiv.org/abs/2201.04441},
  eprinttype    = {arXiv},
  eprint       = {2201.04441},
  timestamp    = {Tue, 26 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2201-04441.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2201-06235,
  author       = {Xiaoyu Sun and
                  Xiao Chen and
                  Kui Liu and
                  Sheng Wen and
                  Li Li and
                  John C. Grundy},
  title        = {Characterizing Sensor Leaks in Android Apps},
  journal      = {CoRR},
  volume       = {abs/2201.06235},
  year         = {2022},
  url          = {https://arxiv.org/abs/2201.06235},
  eprinttype    = {arXiv},
  eprint       = {2201.06235},
  timestamp    = {Wed, 26 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2201-06235.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2203-16000,
  author       = {Yuxin Cao and
                  Xi Xiao and
                  Ruoxi Sun and
                  Derui Wang and
                  Minhui Xue and
                  Sheng Wen},
  title        = {StyleFool: Fooling Video Classification Systems via Style Transfer},
  journal      = {CoRR},
  volume       = {abs/2203.16000},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2203.16000},
  doi          = {10.48550/ARXIV.2203.16000},
  eprinttype    = {arXiv},
  eprint       = {2203.16000},
  timestamp    = {Tue, 26 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2203-16000.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2209-11715,
  author       = {Wanlun Ma and
                  Derui Wang and
                  Ruoxi Sun and
                  Minhui Xue and
                  Sheng Wen and
                  Yang Xiang},
  title        = {The "Beatrix" Resurrections: Robust Backdoor Detection via
                  Gram Matrices},
  journal      = {CoRR},
  volume       = {abs/2209.11715},
  year         = {2022},
  url          = {https://doi.org/10.48550/arXiv.2209.11715},
  doi          = {10.48550/ARXIV.2209.11715},
  eprinttype    = {arXiv},
  eprint       = {2209.11715},
  timestamp    = {Tue, 26 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2209-11715.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/DengZXWLX21,
  author       = {Jiale Deng and
                  Xiaogang Zhu and
                  Xi Xiao and
                  Sheng Wen and
                  Qing Li and
                  Shutao Xia},
  title        = {Fuzzing With Optimized Grammar-Aware Mutation Strategies},
  journal      = {{IEEE} Access},
  volume       = {9},
  pages        = {95061--95071},
  year         = {2021},
  url          = {https://doi.org/10.1109/ACCESS.2021.3093904},
  doi          = {10.1109/ACCESS.2021.3093904},
  timestamp    = {Sat, 09 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/DengZXWLX21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/WangLWNX21,
  author       = {Derui Wang and
                  Chaoran Li and
                  Sheng Wen and
                  Surya Nepal and
                  Yang Xiang},
  title        = {Man-in-the-Middle Attacks Against Machine Learning Classifiers Via
                  Malicious Generative Models},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {18},
  number       = {5},
  pages        = {2074--2087},
  year         = {2021},
  url          = {https://doi.org/10.1109/TDSC.2020.3021008},
  doi          = {10.1109/TDSC.2020.3021008},
  timestamp    = {Tue, 05 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/WangLWNX21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tgcn/ZhuWJCX21,
  author       = {Xiaogang Zhu and
                  Sheng Wen and
                  Alireza Jolfaei and
                  Seyit Camtepe and
                  Yang Xiang},
  title        = {Synthesized Corpora to Evaluate Fuzzing for Green Internet of Things
                  Programs},
  journal      = {{IEEE} Trans. Green Commun. Netw.},
  volume       = {5},
  number       = {3},
  pages        = {1041--1050},
  year         = {2021},
  url          = {https://doi.org/10.1109/TGCN.2021.3068466},
  doi          = {10.1109/TGCN.2021.3068466},
  timestamp    = {Sat, 09 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tgcn/ZhuWJCX21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tim/YinWWZ21,
  author       = {Xuanchun Yin and
                  Chan Wu and
                  Sheng Wen and
                  Jiantao Zhang},
  title        = {Smart Design of Z-Width Expanded Thumb Haptic Interface Using Magnetorheological
                  Fluids},
  journal      = {{IEEE} Trans. Instrum. Meas.},
  volume       = {70},
  pages        = {1--11},
  year         = {2021},
  url          = {https://doi.org/10.1109/TIM.2021.3112231},
  doi          = {10.1109/TIM.2021.3112231},
  timestamp    = {Tue, 05 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tim/YinWWZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tits/FarivarHJW21,
  author       = {Faezeh Farivar and
                  Mohammad Sayad Haghighi and
                  Alireza Jolfaei and
                  Sheng Wen},
  title        = {On the Security of Networked Control Systems in Smart Vehicle and
                  Its Adaptive Cruise Control},
  journal      = {{IEEE} Trans. Intell. Transp. Syst.},
  volume       = {22},
  number       = {6},
  pages        = {3824--3831},
  year         = {2021},
  url          = {https://doi.org/10.1109/TITS.2021.3053406},
  doi          = {10.1109/TITS.2021.3053406},
  timestamp    = {Tue, 15 Jun 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tits/FarivarHJW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/blockchain2/BuiWYXHX21,
  author       = {Van Cuong Bui and
                  Sheng Wen and
                  Jiangshan Yu and
                  Xin Xia and
                  Mohammad Sayad Haghighi and
                  Yang Xiang},
  editor       = {Yang Xiang and
                  Ziyuan Wang and
                  Honggang Wang and
                  Valtteri Niemi},
  title        = {Evaluating Upgradable Smart Contract},
  booktitle    = {2021 {IEEE} International Conference on Blockchain, Blockchain 2021,
                  Melbourne, Australia, December 6-8, 2021},
  pages        = {252--256},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/Blockchain53845.2021.00041},
  doi          = {10.1109/BLOCKCHAIN53845.2021.00041},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/blockchain2/BuiWYXHX21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/blockchain2/XuQWWCX21,
  author       = {Zhiyu Xu and
                  Minfeng Qi and
                  Ziyuan Wang and
                  Sheng Wen and
                  Shiping Chen and
                  Yang Xiang},
  editor       = {Yang Xiang and
                  Ziyuan Wang and
                  Honggang Wang and
                  Valtteri Niemi},
  title        = {{IB2P:} An image-based privacy-preserving blockchain model for financial
                  services},
  booktitle    = {2021 {IEEE} International Conference on Blockchain, Blockchain 2021,
                  Melbourne, Australia, December 6-8, 2021},
  pages        = {552--558},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/Blockchain53845.2021.00083},
  doi          = {10.1109/BLOCKCHAIN53845.2021.00083},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/blockchain2/XuQWWCX21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/FengSZXWLN021,
  author       = {Xiaotao Feng and
                  Ruoxi Sun and
                  Xiaogang Zhu and
                  Minhui Xue and
                  Sheng Wen and
                  Dongxi Liu and
                  Surya Nepal and
                  Yang Xiang},
  editor       = {Yongdae Kim and
                  Jong Kim and
                  Giovanni Vigna and
                  Elaine Shi},
  title        = {Snipuzz: Black-box Fuzzing of IoT Firmware via Message Snippet Inference},
  booktitle    = {{CCS} '21: 2021 {ACM} {SIGSAC} Conference on Computer and Communications
                  Security, Virtual Event, Republic of Korea, November 15 - 19, 2021},
  pages        = {337--350},
  publisher    = {{ACM}},
  year         = {2021},
  url          = {https://doi.org/10.1145/3460120.3484543},
  doi          = {10.1145/3460120.3484543},
  timestamp    = {Tue, 26 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/FengSZXWLN021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/issre/SunCLWL021,
  author       = {Xiaoyu Sun and
                  Xiao Chen and
                  Kui Liu and
                  Sheng Wen and
                  Li Li and
                  John Grundy},
  editor       = {Zhi Jin and
                  Xuandong Li and
                  Jianwen Xiang and
                  Leonardo Mariani and
                  Ting Liu and
                  Xiao Yu and
                  Nahgmeh Ivaki},
  title        = {Characterizing Sensor Leaks in Android Apps},
  booktitle    = {32nd {IEEE} International Symposium on Software Reliability Engineering,
                  {ISSRE} 2021, Wuhan, China, October 25-28, 2021},
  pages        = {498--509},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/ISSRE52982.2021.00058},
  doi          = {10.1109/ISSRE52982.2021.00058},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/issre/SunCLWL021.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ithings/NiyatoZW21,
  author       = {Dusit Niyato and
                  Yan Zhang and
                  Sheng Wen},
  title        = {Message from the GreenCom 2021 General Chairs and Program Chairs:
                  iThings-GreenCom-CPSCom-SmartData-Cybermatics 2021},
  booktitle    = {2021 {IEEE} International Conferences on Internet of Things (iThings)
                  and {IEEE} Green Computing {\&} Communications (GreenCom) and
                  {IEEE} Cyber, Physical {\&} Social Computing (CPSCom) and {IEEE}
                  Smart Data (SmartData) and {IEEE} Congress on Cybermatics (Cybermatics),
                  Melbourne, Australia, December 6-8, 2021},
  pages        = {xxiv},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/iThings-GreenCom-CPSCom-SmartData-Cybermatics53846.2021.00014},
  doi          = {10.1109/ITHINGS-GREENCOM-CPSCOM-SMARTDATA-CYBERMATICS53846.2021.00014},
  timestamp    = {Fri, 11 Feb 2022 09:29:48 +0100},
  biburl       = {https://dblp.org/rec/conf/ithings/NiyatoZW21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/smds/XuJWWCX21,
  author       = {Zhiyu Xu and
                  Tengyun Jiao and
                  Ziyuan Wang and
                  Sheng Wen and
                  Shiping Chen and
                  Yang Xiang},
  editor       = {Nimanthi L. Atukorala and
                  Carl K. Chang and
                  Ernesto Damiani and
                  Min Fu and
                  George Spanoudakis and
                  Mudhakar Srivatsa and
                  Zhongjie Wang and
                  Jia Zhang},
  title        = {{AC2M:} An Automated Consent Management Model for Blockchain Financial
                  Services Platform},
  booktitle    = {{IEEE} International Conference on Smart Data Services, {SMDS} 2021,
                  Chicago, IL, USA, September 5-10, 2021},
  pages        = {33--41},
  publisher    = {{IEEE}},
  year         = {2021},
  url          = {https://doi.org/10.1109/SMDS53860.2021.00015},
  doi          = {10.1109/SMDS53860.2021.00015},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/smds/XuJWWCX21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2105-05445,
  author       = {Xiaotao Feng and
                  Ruoxi Sun and
                  Xiaogang Zhu and
                  Minhui Xue and
                  Sheng Wen and
                  Dongxi Liu and
                  Surya Nepal and
                  Yang Xiang},
  title        = {Snipuzz: Black-box Fuzzing of IoT Firmware via Message Snippet Inference},
  journal      = {CoRR},
  volume       = {abs/2105.05445},
  year         = {2021},
  url          = {https://arxiv.org/abs/2105.05445},
  eprinttype    = {arXiv},
  eprint       = {2105.05445},
  timestamp    = {Tue, 26 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2105-05445.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2110-14245,
  author       = {Huacheng Li and
                  Chunhe Xia and
                  Tianbo Wang and
                  Sheng Wen and
                  Chao Chen and
                  Yang Xiang},
  title        = {Capturing Dynamics of Information Diffusion in {SNS:} {A} Survey of
                  Methodology and Techniques},
  journal      = {CoRR},
  volume       = {abs/2110.14245},
  year         = {2021},
  url          = {https://arxiv.org/abs/2110.14245},
  eprinttype    = {arXiv},
  eprint       = {2110.14245},
  timestamp    = {Fri, 29 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2110-14245.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2111-08217,
  author       = {Chaoran Li and
                  Xiao Chen and
                  Ruoxi Sun and
                  Jason Xue and
                  Sheng Wen and
                  Muhammad Ejaz Ahmed and
                  Seyit Camtepe and
                  Yang Xiang},
  title        = {NatiDroid: Cross-Language Android Permission Specification},
  journal      = {CoRR},
  volume       = {abs/2111.08217},
  year         = {2021},
  url          = {https://arxiv.org/abs/2111.08217},
  eprinttype    = {arXiv},
  eprint       = {2111.08217},
  timestamp    = {Tue, 26 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2111-08217.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/FeiYWH20,
  author       = {Gaolei Fei and
                  Jian Ye and
                  Sheng Wen and
                  Guangmin Hu},
  title        = {Network Topology Inference Using Higher-Order Statistical Characteristics
                  of End-to-End Measured Delays},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {59960--59975},
  year         = {2020},
  url          = {https://doi.org/10.1109/ACCESS.2020.2982653},
  doi          = {10.1109/ACCESS.2020.2982653},
  timestamp    = {Mon, 04 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/FeiYWH20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/pieee/LinWHZX20,
  author       = {Guanjun Lin and
                  Sheng Wen and
                  Qing{-}Long Han and
                  Jun Zhang and
                  Yang Xiang},
  title        = {Software Vulnerability Detection Using Deep Neural Networks: {A} Survey},
  journal      = {Proc. {IEEE}},
  volume       = {108},
  number       = {10},
  pages        = {1825--1848},
  year         = {2020},
  url          = {https://doi.org/10.1109/JPROC.2020.2993293},
  doi          = {10.1109/JPROC.2020.2993293},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/pieee/LinWHZX20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tfs/LiuLHW0020,
  author       = {Shigang Liu and
                  Guanjun Lin and
                  Qing{-}Long Han and
                  Sheng Wen and
                  Jun Zhang and
                  Yang Xiang},
  title        = {DeepBalance: Deep-Learning and Fuzzy Oversampling for Vulnerability
                  Detection},
  journal      = {{IEEE} Trans. Fuzzy Syst.},
  volume       = {28},
  number       = {7},
  pages        = {1329--1343},
  year         = {2020},
  url          = {https://doi.org/10.1109/TFUZZ.2019.2958558},
  doi          = {10.1109/TFUZZ.2019.2958558},
  timestamp    = {Wed, 26 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tfs/LiuLHW0020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/0002LWW0N0020,
  author       = {Xiao Chen and
                  Chaoran Li and
                  Derui Wang and
                  Sheng Wen and
                  Jun Zhang and
                  Surya Nepal and
                  Yang Xiang and
                  Kui Ren},
  title        = {Android {HIV:} {A} Study of Repackaging Malware for Evading Machine-Learning
                  Detection},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {15},
  pages        = {987--1001},
  year         = {2020},
  url          = {https://doi.org/10.1109/TIFS.2019.2932228},
  doi          = {10.1109/TIFS.2019.2932228},
  timestamp    = {Sun, 02 Oct 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/0002LWW0N0020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/acsw/XuWWL0W20,
  author       = {Zhiyu Xu and
                  Qin Wang and
                  Ziyuan Wang and
                  Donghai Liu and
                  Yang Xiang and
                  Sheng Wen},
  editor       = {Prem Prakash Jayaraman and
                  Dimitrios Georgakopoulos and
                  Timos K. Sellis and
                  Abdur Forkan},
  title        = {{PPM:} {A} Provenance-Provided Data Sharing Model for Open Banking
                  via Blockchain},
  booktitle    = {Proceedings of the Australasian Computer Science Week, {ACSW} 2020,
                  Melbourne, VIC, Australia, February 3-7, 2020},
  pages        = {5:1--5:8},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3373017.3373022},
  doi          = {10.1145/3373017.3373022},
  timestamp    = {Fri, 15 Mar 2024 12:30:44 +0100},
  biburl       = {https://dblp.org/rec/conf/acsw/XuWWL0W20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/WuZMW0PN020,
  author       = {Tingmin Wu and
                  Rongjunchen Zhang and
                  Wanlun Ma and
                  Sheng Wen and
                  Xin Xia and
                  C{\'{e}}cile Paris and
                  Surya Nepal and
                  Yang Xiang},
  editor       = {Hung{-}Min Sun and
                  Shiuh{-}Pyng Shieh and
                  Guofei Gu and
                  Giuseppe Ateniese},
  title        = {What risk? {I} don't understand. An Empirical Study on Users' Understanding
                  of the Terms Used in Security Texts},
  booktitle    = {{ASIA} {CCS} '20: The 15th {ACM} Asia Conference on Computer and Communications
                  Security, Taipei, Taiwan, October 5-9, 2020},
  pages        = {248--262},
  publisher    = {{ACM}},
  year         = {2020},
  url          = {https://doi.org/10.1145/3320269.3384761},
  doi          = {10.1145/3320269.3384761},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ccs/WuZMW0PN020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fcs2/LiWW020,
  author       = {Zhenyu Li and
                  Yujue Wang and
                  Sheng Wen and
                  Yong Ding},
  editor       = {Guangquan Xu and
                  Kaitai Liang and
                  Chunhua Su},
  title        = {Evil Chaincode: {APT} Attacks Based on Smart Contract},
  booktitle    = {Frontiers in Cyber Security - Third International Conference, {FCS}
                  2020, Tianjin, China, November 15-17, 2020, Proceedings},
  series       = {Communications in Computer and Information Science},
  volume       = {1286},
  pages        = {178--196},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-981-15-9739-8\_15},
  doi          = {10.1007/978-981-15-9739-8\_15},
  timestamp    = {Sun, 25 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fcs2/LiWW020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiXZCWZ20,
  author       = {Yi Li and
                  Xi Xiao and
                  Xiaogang Zhu and
                  Xiao Chen and
                  Sheng Wen and
                  Bin Zhang},
  editor       = {Guojun Wang and
                  Ryan K. L. Ko and
                  Md. Zakirul Alam Bhuiyan and
                  Yi Pan},
  title        = {SpeedNeuzz: Speed Up Neural Program Approximation with Neighbor Edge
                  Knowledge},
  booktitle    = {19th {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2020, Guangzhou, China,
                  December 29, 2020 - January 1, 2021},
  pages        = {450--457},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00068},
  doi          = {10.1109/TRUSTCOM50675.2020.00068},
  timestamp    = {Sat, 09 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiXZCWZ20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/XuYWWH0020,
  author       = {Zhiyu Xu and
                  Lin Yang and
                  Ziyuan Wang and
                  Sheng Wen and
                  Rob Hanson and
                  Shiping Chen and
                  Yang Xiang},
  editor       = {Guojun Wang and
                  Ryan K. L. Ko and
                  Md. Zakirul Alam Bhuiyan and
                  Yi Pan},
  title        = {{BHDA} - {A} Blockchain-Based Hierarchical Data Access Model for Financial
                  Services},
  booktitle    = {19th {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2020, Guangzhou, China,
                  December 29, 2020 - January 1, 2021},
  pages        = {530--538},
  publisher    = {{IEEE}},
  year         = {2020},
  url          = {https://doi.org/10.1109/TrustCom50675.2020.00077},
  doi          = {10.1109/TRUSTCOM50675.2020.00077},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/trustcom/XuYWWH0020.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ica3pp/2019-1,
  editor       = {Sheng Wen and
                  Albert Y. Zomaya and
                  Laurence T. Yang},
  title        = {Algorithms and Architectures for Parallel Processing - 19th International
                  Conference, {ICA3PP} 2019, Melbourne, VIC, Australia, December 9-11,
                  2019, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11944},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-38991-8},
  doi          = {10.1007/978-3-030-38991-8},
  isbn         = {978-3-030-38990-1},
  timestamp    = {Tue, 28 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ica3pp/2019-1.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/ica3pp/2019-2,
  editor       = {Sheng Wen and
                  Albert Y. Zomaya and
                  Laurence T. Yang},
  title        = {Algorithms and Architectures for Parallel Processing - 19th International
                  Conference, {ICA3PP} 2019, Melbourne, VIC, Australia, December 9-11,
                  2019, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11945},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-38961-1},
  doi          = {10.1007/978-3-030-38961-1},
  isbn         = {978-3-030-38960-4},
  timestamp    = {Tue, 28 Jan 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ica3pp/2019-2.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2006-14765,
  author       = {Tingmin Wu and
                  Wanlun Ma and
                  Sheng Wen and
                  Xin Xia and
                  C{\'{e}}cile Paris and
                  Surya Nepal and
                  Yang Xiang},
  title        = {Analysis of Trending Topics and Text-based Channels of Information
                  Delivery in Cybersecurity},
  journal      = {CoRR},
  volume       = {abs/2006.14765},
  year         = {2020},
  url          = {https://arxiv.org/abs/2006.14765},
  eprinttype    = {arXiv},
  eprint       = {2006.14765},
  timestamp    = {Tue, 11 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2006-14765.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2008-00414,
  author       = {Faezeh Farivar and
                  Mohammad Sayad Haghighi and
                  Alireza Jolfaei and
                  Sheng Wen},
  title        = {On the Security of Networked Control Systems in Smart Vehicle and
                  its Adaptive Cruise Control},
  journal      = {CoRR},
  volume       = {abs/2008.00414},
  year         = {2020},
  url          = {https://arxiv.org/abs/2008.00414},
  eprinttype    = {arXiv},
  eprint       = {2008.00414},
  timestamp    = {Fri, 07 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2008-00414.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-2010-12149,
  author       = {Xiaogang Zhu and
                  Shigang Liu and
                  Xian Li and
                  Sheng Wen and
                  Jun Zhang and
                  Seyit Ahmet {\c{C}}amtepe and
                  Yang Xiang},
  title        = {DeFuzz: Deep Learning Guided Directed Fuzzing},
  journal      = {CoRR},
  volume       = {abs/2010.12149},
  year         = {2020},
  url          = {https://arxiv.org/abs/2010.12149},
  eprinttype    = {arXiv},
  eprint       = {2010.12149},
  timestamp    = {Sat, 09 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-2010-12149.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@book{DBLP:series/ais/JiangWYLXZ19,
  author       = {Jiaojiao Jiang and
                  Sheng Wen and
                  Shui Yu and
                  Bo Liu and
                  Yang Xiang and
                  Wanlei Zhou},
  title        = {Malicious Attack Propagation and Source Identification},
  series       = {Advances in Information Security},
  volume       = {73},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-02179-5},
  doi          = {10.1007/978-3-030-02179-5},
  isbn         = {978-3-030-02178-8},
  timestamp    = {Fri, 30 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/series/ais/JiangWYLXZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/TangMGMWW19,
  author       = {Lihong Tang and
                  Wanlun Ma and
                  Marthie Grobler and
                  Weizhi Meng and
                  Yu Wang and
                  Sheng Wen},
  title        = {Faces are Protected as Privacy: An Automatic Tagging Framework Against
                  Unpermitted Photo Sharing in Social Media},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {75556--75567},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2019.2921029},
  doi          = {10.1109/ACCESS.2019.2921029},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/TangMGMWW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/ZhangCWZD19,
  author       = {Rongjunchen Zhang and
                  Xiao Chen and
                  Sheng Wen and
                  Xi Zheng and
                  Yong Ding},
  title        = {Using {AI} to Attack {VA:} {A} Stealthy Spyware Against Voice Assistances
                  in Smart Phones},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {153542--153554},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2019.2945791},
  doi          = {10.1109/ACCESS.2019.2945791},
  timestamp    = {Fri, 24 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/access/ZhangCWZD19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ahswn/WangPWWWL19,
  author       = {Tian Wang and
                  Zhen Peng and
                  Sheng Wen and
                  Guojun Wang and
                  Baowei Wang and
                  Anfeng Liu},
  title        = {A Survey of Fog Computing in Wireless Sensor Networks: Concepts, Frameworks,
                  Applications and Issues},
  journal      = {Ad Hoc Sens. Wirel. Networks},
  volume       = {44},
  number       = {1-2},
  pages        = {109--130},
  year         = {2019},
  url          = {https://www.oldcitypublishing.com/journals/ahswn-home/ahswn-issue-contents/ahswn-volume-44-number-1-2-2019/18220-2/},
  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ahswn/WangPWWWL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cea/WenHNLYZG19,
  author       = {Sheng Wen and
                  Jie Han and
                  Zhihua Ning and
                  Yubin Lan and
                  Xuanchun Yin and
                  Jiantao Zhang and
                  Yufeng Ge},
  title        = {Numerical analysis and validation of spray distributions disturbed
                  by quad-rotor drone wake at different flight speeds},
  journal      = {Comput. Electron. Agric.},
  volume       = {166},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.compag.2019.105036},
  doi          = {10.1016/J.COMPAG.2019.105036},
  timestamp    = {Sat, 22 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cea/WenHNLYZG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cea/WenSZLHYZG19,
  author       = {Sheng Wen and
                  Ningwen Shen and
                  Jiantao Zhang and
                  Yubin Lan and
                  Jie Han and
                  Xuanchun Yin and
                  Quanyong Zhang and
                  Yufeng Ge},
  title        = {Single-rotor {UAV} flow field simulation using generative adversarial
                  networks},
  journal      = {Comput. Electron. Agric.},
  volume       = {167},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.compag.2019.105004},
  doi          = {10.1016/J.COMPAG.2019.105004},
  timestamp    = {Sat, 22 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cea/WenSZLHYZG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/concurrency/HuLWAGW19,
  author       = {Xiangyu Hu and
                  Lemin Li and
                  Tingmin Wu and
                  Xiaoxiang Ai and
                  Jie Gu and
                  Sheng Wen},
  title        = {Every word is valuable: Studied influence of negative words that spread
                  during election period in social media},
  journal      = {Concurr. Comput. Pract. Exp.},
  volume       = {31},
  number       = {21},
  year         = {2019},
  url          = {https://doi.org/10.1002/cpe.4525},
  doi          = {10.1002/CPE.4525},
  timestamp    = {Mon, 02 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/concurrency/HuLWAGW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/concurrency/WenCWB19,
  author       = {Sheng Wen and
                  Aniello Castiglione and
                  Tian Wang and
                  Md. Zakirul Alam Bhuiyan},
  title        = {Forward to the special issue of the 9th International Symposium on
                  Cyberspace Safety and Security {(CSS} 2017)},
  journal      = {Concurr. Comput. Pract. Exp.},
  volume       = {31},
  number       = {22},
  year         = {2019},
  url          = {https://doi.org/10.1002/cpe.5535},
  doi          = {10.1002/CPE.5535},
  timestamp    = {Mon, 02 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/concurrency/WenCWB19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/ZhaiZFLWH19,
  author       = {Xuemeng Zhai and
                  Wanlei Zhou and
                  Gaolei Fei and
                  Cai Lu and
                  Sheng Wen and
                  Guangmin Hu},
  title        = {Edge-based stochastic network model reveals structural complexity
                  of edges},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {100},
  pages        = {1073--1087},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.future.2019.05.047},
  doi          = {10.1016/J.FUTURE.2019.05.047},
  timestamp    = {Thu, 21 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fgcs/ZhaiZFLWH19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/iotj/LiWLLW19,
  author       = {Deng Li and
                  Sihui Wang and
                  Jiaqi Liu and
                  Hui Liu and
                  Sheng Wen},
  title        = {Crowdsensing From the Perspective of Behavioral Economics: An Incentive
                  Mechanism Based on Mental Accounting},
  journal      = {{IEEE} Internet Things J.},
  volume       = {6},
  number       = {5},
  pages        = {9123--9139},
  year         = {2019},
  url          = {https://doi.org/10.1109/JIOT.2019.2928035},
  doi          = {10.1109/JIOT.2019.2928035},
  timestamp    = {Mon, 08 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/iotj/LiWLLW19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/MiaoWWM19,
  author       = {Meixia Miao and
                  Jianfeng Wang and
                  Sheng Wen and
                  Jianfeng Ma},
  title        = {Publicly verifiable database scheme with efficient keyword search},
  journal      = {Inf. Sci.},
  volume       = {475},
  pages        = {18--28},
  year         = {2019},
  url          = {https://doi.org/10.1016/j.ins.2018.09.067},
  doi          = {10.1016/J.INS.2018.09.067},
  timestamp    = {Sat, 29 Aug 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isci/MiaoWWM19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/WenZYLZG19,
  author       = {Sheng Wen and
                  Quanyong Zhang and
                  Xuanchun Yin and
                  Yubin Lan and
                  Jiantao Zhang and
                  Yufeng Ge},
  title        = {Design of Plant Protection {UAV} Variable Spray System Based on Neural
                  Networks},
  journal      = {Sensors},
  volume       = {19},
  number       = {5},
  pages        = {1112},
  year         = {2019},
  url          = {https://doi.org/10.3390/s19051112},
  doi          = {10.3390/S19051112},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/WenZYLZG19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tcps/WuTZWPNGX19,
  author       = {Tingmin Wu and
                  Lihong Tang and
                  Rongjunchen Zhang and
                  Sheng Wen and
                  C{\'{e}}cile Paris and
                  Surya Nepal and
                  Marthie Grobler and
                  Yang Xiang},
  title        = {Catering to Your Concerns: Automatic Generation of Personalised Security-Centric
                  Descriptions for Android Apps},
  journal      = {{ACM} Trans. Cyber Phys. Syst.},
  volume       = {3},
  number       = {4},
  pages        = {36:1--36:21},
  year         = {2019},
  url          = {https://doi.org/10.1145/3317699},
  doi          = {10.1145/3317699},
  timestamp    = {Fri, 11 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tcps/WuTZWPNGX19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/WangXWXXT19,
  author       = {Tianbo Wang and
                  Chunhe Xia and
                  Sheng Wen and
                  Hui Xue and
                  Yang Xiang and
                  Shouzhong Tu},
  title        = {{SADI:} {A} Novel Model to Study the Propagation of Social Worms in
                  Hierarchical Networks},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {16},
  number       = {1},
  pages        = {142--155},
  year         = {2019},
  url          = {https://doi.org/10.1109/TDSC.2017.2651826},
  doi          = {10.1109/TDSC.2017.2651826},
  timestamp    = {Thu, 09 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/WangXWXXT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsusc/WangWWCXZ19,
  author       = {Derek Wang and
                  Tingmin Wu and
                  Sheng Wen and
                  Xiaofeng Chen and
                  Yang Xiang and
                  Wanlei Zhou},
  title        = {{STC:} Exposing Hidden Compromised Devices in Networked Sustainable
                  Green Smart Computing Platforms by Partial Observation},
  journal      = {{IEEE} Trans. Sustain. Comput.},
  volume       = {4},
  number       = {2},
  pages        = {178--190},
  year         = {2019},
  url          = {https://doi.org/10.1109/TSUSC.2017.2707563},
  doi          = {10.1109/TSUSC.2017.2707563},
  timestamp    = {Thu, 21 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tsusc/WangWWCXZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bsci/Wen19,
  author       = {Sheng Wen},
  editor       = {Keke Gai and
                  Kim{-}Kwang Raymond Choo and
                  Debiao He and
                  Sheng Wen},
  title        = {Session details: Keynote {\&} Invited Talks},
  booktitle    = {Proceedings of the 2019 {ACM} International Symposium on Blockchain
                  and Secure Critical Infrastructure, {BSCI} 2019, Auckland, New Zealand,
                  July 8, 2019},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3344280},
  doi          = {10.1145/3344280},
  timestamp    = {Thu, 08 Aug 2019 14:16:11 +0200},
  biburl       = {https://dblp.org/rec/conf/bsci/Wen19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/bsci/XuJWVW019,
  author       = {Zhiyu Xu and
                  Tengyun Jiao and
                  Qin Wang and
                  Cuong Bui Van and
                  Sheng Wen and
                  Yang Xiang},
  editor       = {Keke Gai and
                  Kim{-}Kwang Raymond Choo and
                  Debiao He and
                  Sheng Wen},
  title        = {An Efficient Supply Chain Architecture Based on Blockchain for High-value
                  Commodities},
  booktitle    = {Proceedings of the 2019 {ACM} International Symposium on Blockchain
                  and Secure Critical Infrastructure, {BSCI} 2019, Auckland, New Zealand,
                  July 8, 2019},
  pages        = {81--88},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3327960.3332384},
  doi          = {10.1145/3327960.3332384},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/bsci/XuJWVW019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ccs/ZhuFJW0CX19,
  author       = {Xiaogang Zhu and
                  Xiaotao Feng and
                  Tengyun Jiao and
                  Sheng Wen and
                  Yang Xiang and
                  Seyit Camtepe and
                  Jingling Xue},
  editor       = {Steven D. Galbraith and
                  Giovanni Russello and
                  Willy Susilo and
                  Dieter Gollmann and
                  Engin Kirda and
                  Zhenkai Liang},
  title        = {A Feature-Oriented Corpus for Understanding, Evaluating and Improving
                  Fuzz Testing},
  booktitle    = {Proceedings of the 2019 {ACM} Asia Conference on Computer and Communications
                  Security, AsiaCCS 2019, Auckland, New Zealand, July 09-12, 2019},
  pages        = {658--663},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3321705.3329845},
  doi          = {10.1145/3321705.3329845},
  timestamp    = {Sat, 09 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ccs/ZhuFJW0CX19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/css/ShiCWX19,
  author       = {Lei Shi and
                  Xiao Chen and
                  Sheng Wen and
                  Yang Xiang},
  editor       = {Jaideep Vaidya and
                  Xiao Zhang and
                  Jin Li},
  title        = {Main Enabling Technologies in Industry 4.0 and Cybersecurity Threats},
  booktitle    = {Cyberspace Safety and Security - 11th International Symposium, {CSS}
                  2019, Guangzhou, China, December 1-3, 2019, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11983},
  pages        = {588--597},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-37352-8\_53},
  doi          = {10.1007/978-3-030-37352-8\_53},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/css/ShiCWX19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ica3pp/XuJYLW019,
  author       = {Zhiyu Xu and
                  Tengyun Jiao and
                  Lin Yang and
                  Donghai Liu and
                  Sheng Wen and
                  Yang Xiang},
  editor       = {Sheng Wen and
                  Albert Y. Zomaya and
                  Laurence T. Yang},
  title        = {{RBAC-GL:} {A} Role-Based Access Control Gasless Architecture of Consortium
                  Blockchain},
  booktitle    = {Algorithms and Architectures for Parallel Processing - 19th International
                  Conference, {ICA3PP} 2019, Melbourne, VIC, Australia, December 9-11,
                  2019, Proceedings, Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {11944},
  pages        = {439--453},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-38991-8\_29},
  doi          = {10.1007/978-3-030-38991-8\_29},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/ica3pp/XuJYLW019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ml4cs/Zhang0WZ19,
  author       = {Rongjunchen Zhang and
                  Xiao Chen and
                  Sheng Wen and
                  James Zheng},
  editor       = {Xiaofeng Chen and
                  Xinyi Huang and
                  Jun Zhang},
  title        = {Who Activated My Voice Assistant? {A} Stealthy Attack on Android Phones
                  Without Users' Awareness},
  booktitle    = {Machine Learning for Cyber Security - Second International Conference,
                  {ML4CS} 2019, Xi'an, China, September 19-21, 2019, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11806},
  pages        = {378--396},
  publisher    = {Springer},
  year         = {2019},
  url          = {https://doi.org/10.1007/978-3-030-30619-9\_27},
  doi          = {10.1007/978-3-030-30619-9\_27},
  timestamp    = {Tue, 27 Sep 2022 14:19:43 +0200},
  biburl       = {https://dblp.org/rec/conf/ml4cs/Zhang0WZ19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/bsci/2019,
  editor       = {Keke Gai and
                  Kim{-}Kwang Raymond Choo and
                  Debiao He and
                  Sheng Wen},
  title        = {Proceedings of the 2019 {ACM} International Symposium on Blockchain
                  and Secure Critical Infrastructure, {BSCI} 2019, Auckland, New Zealand,
                  July 8, 2019},
  publisher    = {{ACM}},
  year         = {2019},
  url          = {https://doi.org/10.1145/3327960},
  doi          = {10.1145/3327960},
  isbn         = {978-1-4503-6786-8},
  timestamp    = {Thu, 08 Aug 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/bsci/2019.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1902-02067,
  author       = {Derui Wang and
                  Chaoran Li and
                  Sheng Wen and
                  Surya Nepal and
                  Yang Xiang},
  title        = {Daedalus: Breaking Non-Maximum Suppression in Object Detection via
                  Adversarial Examples},
  journal      = {CoRR},
  volume       = {abs/1902.02067},
  year         = {2019},
  url          = {http://arxiv.org/abs/1902.02067},
  eprinttype    = {arXiv},
  eprint       = {1902.02067},
  timestamp    = {Sat, 23 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1902-02067.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1905-00799,
  author       = {Xiaotao Feng and
                  Qin Wang and
                  Xiaogang Zhu and
                  Sheng Wen},
  title        = {Bug Searching in Smart Contract},
  journal      = {CoRR},
  volume       = {abs/1905.00799},
  year         = {2019},
  url          = {http://arxiv.org/abs/1905.00799},
  eprinttype    = {arXiv},
  eprint       = {1905.00799},
  timestamp    = {Sat, 09 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1905-00799.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1905-01405,
  author       = {Xiaogang Zhu and
                  Xiaotao Feng and
                  Tengyun Jiao and
                  Sheng Wen and
                  Yang Xiang and
                  Seyit Camtepe and
                  Jingling Xue},
  title        = {A Feature-Oriented Corpus for Understanding, Evaluating and Improving
                  Fuzz Testing},
  journal      = {CoRR},
  volume       = {abs/1905.01405},
  year         = {2019},
  url          = {http://arxiv.org/abs/1905.01405},
  eprinttype    = {arXiv},
  eprint       = {1905.01405},
  timestamp    = {Sat, 09 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1905-01405.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1907-07455,
  author       = {Mahdi Dibaei and
                  Xi Zheng and
                  Kun Jiang and
                  Sasa Maric and
                  Robert Abbas and
                  Shigang Liu and
                  Yuexin Zhang and
                  Yao Deng and
                  Sheng Wen and
                  Jun Zhang and
                  Yang Xiang and
                  Shui Yu},
  title        = {An Overview of Attacks and Defences on Intelligent Connected Vehicles},
  journal      = {CoRR},
  volume       = {abs/1907.07455},
  year         = {2019},
  url          = {http://arxiv.org/abs/1907.07455},
  eprinttype    = {arXiv},
  eprint       = {1907.07455},
  timestamp    = {Tue, 26 Mar 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1907-07455.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1910-06838,
  author       = {Derui Wang and
                  Chaoran Li and
                  Sheng Wen and
                  Surya Nepal and
                  Yang Xiang},
  title        = {Man-in-the-Middle Attacks against Machine Learning Classifiers via
                  Malicious Generative Models},
  journal      = {CoRR},
  volume       = {abs/1910.06838},
  year         = {2019},
  url          = {http://arxiv.org/abs/1910.06838},
  eprinttype    = {arXiv},
  eprint       = {1910.06838},
  timestamp    = {Sat, 23 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1910-06838.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/compsec/WuWXZ18,
  author       = {Tingmin Wu and
                  Sheng Wen and
                  Yang Xiang and
                  Wanlei Zhou},
  title        = {Twitter spam detection: Survey of new approaches and comparative study},
  journal      = {Comput. Secur.},
  volume       = {76},
  pages        = {265--284},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.cose.2017.11.013},
  doi          = {10.1016/J.COSE.2017.11.013},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/compsec/WuWXZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/MaLWWWLMQ18,
  author       = {Xingpo Ma and
                  Junbin Liang and
                  Jianxin Wang and
                  Sheng Wen and
                  Tian Wang and
                  Yin Li and
                  Wenpeng Ma and
                  Chuanda Qi},
  title        = {Secure fine-grained spatio-temporal Top-k queries in TMWSNs},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {86},
  pages        = {174--184},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.future.2018.04.010},
  doi          = {10.1016/J.FUTURE.2018.04.010},
  timestamp    = {Thu, 23 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fgcs/MaLWWWLMQ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/MengWWWX18,
  author       = {Weizhi Meng and
                  Yu Wang and
                  Duncan S. Wong and
                  Sheng Wen and
                  Yang Xiang},
  title        = {\emph{TouchWB}: Touch behavioral user authentication based on web
                  browsing on smartphones},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {117},
  pages        = {1--9},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.jnca.2018.05.010},
  doi          = {10.1016/J.JNCA.2018.05.010},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnca/MengWWWX18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jocs/WangWWLXZHA18,
  author       = {Derek Wang and
                  Tingmin Wu and
                  Sheng Wen and
                  Donghai Liu and
                  Yang Xiang and
                  Wanlei Zhou and
                  Houcine Hassan and
                  Abdulhameed Alelaiwi},
  title        = {Pok{\'{e}}mon {GO} in Melbourne {CBD:} {A} case study of the
                  cyber-physical symbiotic social networks},
  journal      = {J. Comput. Sci.},
  volume       = {26},
  pages        = {456--467},
  year         = {2018},
  url          = {https://doi.org/10.1016/j.jocs.2017.06.009},
  doi          = {10.1016/J.JOCS.2017.06.009},
  timestamp    = {Thu, 21 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jocs/WangWWLXZHA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/HuangLDYDZW18,
  author       = {Huasheng Huang and
                  Yubin Lan and
                  Jizhong Deng and
                  Aqing Yang and
                  Xiaoling Deng and
                  Lei Zhang and
                  Sheng Wen},
  title        = {A Semantic Labeling Approach for Accurate Weed Mapping of High Resolution
                  {UAV} Imagery},
  journal      = {Sensors},
  volume       = {18},
  number       = {7},
  pages        = {2113},
  year         = {2018},
  url          = {https://doi.org/10.3390/s18072113},
  doi          = {10.3390/S18072113},
  timestamp    = {Fri, 21 Jan 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sensors/HuangLDYDZW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/HuangDLYDWZZ18,
  author       = {Huasheng Huang and
                  Jizhong Deng and
                  Yubin Lan and
                  Aqing Yang and
                  Xiaoling Deng and
                  Sheng Wen and
                  Huihui Zhang and
                  Yali Zhang},
  title        = {Accurate Weed Mapping and Prescription Map Generation Based on Fully
                  Convolutional Networks Using {UAV} Imagery},
  journal      = {Sensors},
  volume       = {18},
  number       = {10},
  pages        = {3299},
  year         = {2018},
  url          = {https://doi.org/10.3390/s18103299},
  doi          = {10.3390/S18103299},
  timestamp    = {Sat, 30 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/sensors/HuangDLYDWZZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/symmetry/AlajaliZWW18,
  author       = {Walaa Alajali and
                  Wei Zhou and
                  Sheng Wen and
                  Yu Wang},
  title        = {Intersection Traffic Prediction Using Decision Tree Models},
  journal      = {Symmetry},
  volume       = {10},
  number       = {9},
  pages        = {386},
  year         = {2018},
  url          = {https://doi.org/10.3390/sym10090386},
  doi          = {10.3390/SYM10090386},
  timestamp    = {Fri, 02 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/symmetry/AlajaliZWW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/JiangWYXZ18,
  author       = {Jiao Jiao Jiang and
                  Sheng Wen and
                  Shui Yu and
                  Yang Xiang and
                  Wanlei Zhou},
  title        = {Rumor Source Identification in Social Networks with Time-Varying Topology},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {15},
  number       = {1},
  pages        = {166--179},
  year         = {2018},
  url          = {https://doi.org/10.1109/TDSC.2016.2522436},
  doi          = {10.1109/TDSC.2016.2522436},
  timestamp    = {Fri, 30 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tdsc/JiangWYXZ18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/LiuZGZLW18,
  author       = {Bo Liu and
                  Wanlei Zhou and
                  Longxiang Gao and
                  Haibo Zhou and
                  Tom H. Luan and
                  Sheng Wen},
  title        = {Malware Propagations in Wireless Ad Hoc Networks},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {15},
  number       = {6},
  pages        = {1016--1026},
  year         = {2018},
  url          = {https://doi.org/10.1109/TDSC.2016.2642191},
  doi          = {10.1109/TDSC.2016.2642191},
  timestamp    = {Thu, 21 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/LiuZGZLW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/WangZZW0X18,
  author       = {Derek Wang and
                  Wanlei Zhou and
                  James Xi Zheng and
                  Sheng Wen and
                  Jun Zhang and
                  Yang Xiang},
  title        = {Who Spread to Whom? Inferring Online Social Networks with User Features},
  booktitle    = {2018 {IEEE} International Conference on Communications, {ICC} 2018,
                  Kansas City, MO, USA, May 20-24, 2018},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/ICC.2018.8422246},
  doi          = {10.1109/ICC.2018.8422246},
  timestamp    = {Thu, 21 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icc/WangZZW0X18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/Al-SudaniZWA18,
  author       = {Ahmed Raad Al{-}Sudani and
                  Wanlei Zhou and
                  Sheng Wen and
                  Ahmed Al{-}Mansoori},
  editor       = {Man Ho Au and
                  Siu{-}Ming Yiu and
                  Jin Li and
                  Xiapu Luo and
                  Cong Wang and
                  Aniello Castiglione and
                  Kamil Kluczniak},
  title        = {{SCARA:} {A} Framework for Secure Cloud-Assisted {RFID} Authentication
                  for Smart Building Access Control},
  booktitle    = {Network and System Security - 12th International Conference, {NSS}
                  2018, Hong Kong, China, August 27-29, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11058},
  pages        = {202--211},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-02744-5\_15},
  doi          = {10.1007/978-3-030-02744-5\_15},
  timestamp    = {Thu, 21 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nss/Al-SudaniZWA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spaccs/Al-SudaniGWA18,
  author       = {Ahmed Raad Al{-}Sudani and
                  Shang Gao and
                  Sheng Wen and
                  Muhmmad Al{-}Khiza'ay},
  editor       = {Guojun Wang and
                  Jinjun Chen and
                  Laurence T. Yang},
  title        = {Secure and Privacy Preserving {RFID} Based Access Control to Smart
                  Buildings},
  booktitle    = {Security, Privacy, and Anonymity in Computation, Communication, and
                  Storage - 11th International Conference and Satellite Workshops, SpaCCS
                  2018, Melbourne, NSW, Australia, December 11-13, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11342},
  pages        = {146--155},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-05345-1\_12},
  doi          = {10.1007/978-3-030-05345-1\_12},
  timestamp    = {Tue, 14 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/spaccs/Al-SudaniGWA18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spaccs/Al-SudaniGWA18a,
  author       = {Ahmed Raad Al{-}Sudani and
                  Shang Gao and
                  Sheng Wen and
                  Muhmmad Al{-}Khiza'ay},
  editor       = {Guojun Wang and
                  Jinjun Chen and
                  Laurence T. Yang},
  title        = {Checking an Authentication of Person Depends on {RFID} with Thermal
                  Image},
  booktitle    = {Security, Privacy, and Anonymity in Computation, Communication, and
                  Storage - 11th International Conference and Satellite Workshops, SpaCCS
                  2018, Melbourne, NSW, Australia, December 11-13, 2018, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {11342},
  pages        = {371--380},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-030-05345-1\_32},
  doi          = {10.1007/978-3-030-05345-1\_32},
  timestamp    = {Tue, 14 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/spaccs/Al-SudaniGWA18a.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uic/AlajaliZW18,
  author       = {Walaa Alajali and
                  Wanlei Zhou and
                  Sheng Wen},
  editor       = {Guojun Wang and
                  Qi Han and
                  Md. Zakirul Alam Bhuiyan and
                  Xiaoxing Ma and
                  Fr{\'{e}}d{\'{e}}ric Loulergue and
                  Peng Li and
                  Manuel Roveri and
                  Lei Chen},
  title        = {Traffic Flow Prediction for Road Intersection Safety},
  booktitle    = {2018 {IEEE} SmartWorld, Ubiquitous Intelligence {\&} Computing,
                  Advanced {\&} Trusted Computing, Scalable Computing {\&} Communications,
                  Cloud {\&} Big Data Computing, Internet of People and Smart City
                  Innovation, SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2018, Guangzhou,
                  China, October 8-12, 2018},
  pages        = {812--820},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/SmartWorld.2018.00151},
  doi          = {10.1109/SMARTWORLD.2018.00151},
  timestamp    = {Thu, 21 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uic/AlajaliZW18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/uic/Al-SudaniZWK18,
  author       = {Ahmed Raad Al{-}Sudani and
                  Wanlei Zhou and
                  Sheng Wen and
                  Haider Adeeb Kassem},
  editor       = {Guojun Wang and
                  Qi Han and
                  Md. Zakirul Alam Bhuiyan and
                  Xiaoxing Ma and
                  Fr{\'{e}}d{\'{e}}ric Loulergue and
                  Peng Li and
                  Manuel Roveri and
                  Lei Chen},
  title        = {Hiding {RFID} in the Image Matching Based Access Control to a Smart
                  Building},
  booktitle    = {2018 {IEEE} SmartWorld, Ubiquitous Intelligence {\&} Computing,
                  Advanced {\&} Trusted Computing, Scalable Computing {\&} Communications,
                  Cloud {\&} Big Data Computing, Internet of People and Smart City
                  Innovation, SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2018, Guangzhou,
                  China, October 8-12, 2018},
  pages        = {1988--1993},
  publisher    = {{IEEE}},
  year         = {2018},
  url          = {https://doi.org/10.1109/SmartWorld.2018.00332},
  doi          = {10.1109/SMARTWORLD.2018.00332},
  timestamp    = {Thu, 21 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/uic/Al-SudaniZWK18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/monami/2017,
  editor       = {Jiankun Hu and
                  Ibrahim Khalil and
                  Zahir Tari and
                  Sheng Wen},
  title        = {Mobile Networks and Management - 9th International Conference, {MONAMI}
                  2017, Melbourne, Australia, December 13-15, 2017, Proceedings},
  series       = {Lecture Notes of the Institute for Computer Sciences, Social Informatics
                  and Telecommunications Engineering},
  volume       = {235},
  publisher    = {Springer},
  year         = {2018},
  url          = {https://doi.org/10.1007/978-3-319-90775-8},
  doi          = {10.1007/978-3-319-90775-8},
  isbn         = {978-3-319-90774-1},
  timestamp    = {Thu, 14 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/monami/2017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1803-05123,
  author       = {Derek Wang and
                  Chaoran Li and
                  Sheng Wen and
                  Yang Xiang and
                  Wanlei Zhou and
                  Surya Nepal},
  title        = {Defensive Collaborative Multi-task Training - Defending against Adversarial
                  Attack towards Deep Neural Networks},
  journal      = {CoRR},
  volume       = {abs/1803.05123},
  year         = {2018},
  url          = {http://arxiv.org/abs/1803.05123},
  eprinttype    = {arXiv},
  eprint       = {1803.05123},
  timestamp    = {Fri, 22 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1803-05123.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1805-06187,
  author       = {Rongjunchen Zhang and
                  Xiao Chen and
                  Jianchao Lu and
                  Sheng Wen and
                  Surya Nepal and
                  Yang Xiang},
  title        = {Using {AI} to Hack {IA:} {A} New Stealthy Spyware Against Voice Assistance
                  Functions in Smart Phones},
  journal      = {CoRR},
  volume       = {abs/1805.06187},
  year         = {2018},
  url          = {http://arxiv.org/abs/1805.06187},
  eprinttype    = {arXiv},
  eprint       = {1805.06187},
  timestamp    = {Sun, 02 Sep 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1805-06187.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1805-07070,
  author       = {Tingmin Wu and
                  Lihong Tang and
                  Zhiyu Xu and
                  Sheng Wen and
                  C{\'{e}}cile Paris and
                  Surya Nepal and
                  Marthie Grobler and
                  Yang Xiang},
  title        = {Catering to Your Concerns: Automatic Generation of Personalised Security-Centric
                  Descriptions for Android Apps},
  journal      = {CoRR},
  volume       = {abs/1805.07070},
  year         = {2018},
  url          = {http://arxiv.org/abs/1805.07070},
  eprinttype    = {arXiv},
  eprint       = {1805.07070},
  timestamp    = {Mon, 13 Aug 2018 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1805-07070.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/corr/abs-1808-04218,
  author       = {Xiao Chen and
                  Chaoran Li and
                  Derui Wang and
                  Sheng Wen and
                  Jun Zhang and
                  Surya Nepal and
                  Yang Xiang and
                  Kui Ren},
  title        = {Android {HIV:} {A} Study of Repackaging Malware for Evading Machine-Learning
                  Detection},
  journal      = {CoRR},
  volume       = {abs/1808.04218},
  year         = {2018},
  url          = {http://arxiv.org/abs/1808.04218},
  eprinttype    = {arXiv},
  eprint       = {1808.04218},
  timestamp    = {Mon, 14 Oct 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/corr/abs-1808-04218.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/acta/GuJWW17,
  author       = {Ke Gu and
                  Weijia Jia and
                  Guojun Wang and
                  Sheng Wen},
  title        = {Efficient and secure attribute-based signature for monotone predicates},
  journal      = {Acta Informatica},
  volume       = {54},
  number       = {5},
  pages        = {521--541},
  year         = {2017},
  url          = {https://doi.org/10.1007/s00236-016-0270-5},
  doi          = {10.1007/S00236-016-0270-5},
  timestamp    = {Fri, 14 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/acta/GuJWW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ahswn/WangWLWTCCW17,
  author       = {Tian Wang and
                  Wenhua Wang and
                  Yongxuan Lai and
                  Sheng Wen and
                  Hui Tian and
                  Yiqiao Cai and
                  Yonghong Chen and
                  Baowei Wang},
  title        = {The Chaotic Video Surveillance in Mobile Camera Sensor Networks: Improving
                  the Efficiency and Security},
  journal      = {Ad Hoc Sens. Wirel. Networks},
  volume       = {37},
  number       = {1-4},
  pages        = {95--115},
  year         = {2017},
  url          = {http://www.oldcitypublishing.com/journals/ahswn-home/ahswn-issue-contents/ahswn-volume-37-number-1-4-2017/ahswn-37-1-4-p-95-115/},
  timestamp    = {Sat, 25 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ahswn/WangWLWTCCW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comsur/JiangWYXZ17,
  author       = {Jiaojiao Jiang and
                  Sheng Wen and
                  Shui Yu and
                  Yang Xiang and
                  Wanlei Zhou},
  title        = {Identifying Propagation Sources in Networks: State-of-the-Art and
                  Comparative Studies},
  journal      = {{IEEE} Commun. Surv. Tutorials},
  volume       = {19},
  number       = {1},
  pages        = {465--481},
  year         = {2017},
  url          = {https://doi.org/10.1109/COMST.2016.2615098},
  doi          = {10.1109/COMST.2016.2615098},
  timestamp    = {Fri, 30 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/comsur/JiangWYXZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/concurrency/JiangWYXZH17,
  author       = {Jiao Jiao Jiang and
                  Sheng Wen and
                  Shui Yu and
                  Yang Xiang and
                  Wanlei Zhou and
                  Houcine Hassan},
  title        = {The structure of communities in scale-free networks},
  journal      = {Concurr. Comput. Pract. Exp.},
  volume       = {29},
  number       = {14},
  year         = {2017},
  url          = {https://doi.org/10.1002/cpe.4040},
  doi          = {10.1002/CPE.4040},
  timestamp    = {Fri, 30 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/concurrency/JiangWYXZH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/concurrency/WuWLZXAH17,
  author       = {Tingmin Wu and
                  Sheng Wen and
                  Shigang Liu and
                  Jun Zhang and
                  Yang Xiang and
                  Majed A. AlRubaian and
                  Mohammad Mehedi Hassan},
  title        = {Detecting spamming activities in twitter based on deep-learning technique},
  journal      = {Concurr. Comput. Pract. Exp.},
  volume       = {29},
  number       = {19},
  year         = {2017},
  url          = {https://doi.org/10.1002/cpe.4209},
  doi          = {10.1002/CPE.4209},
  timestamp    = {Mon, 02 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/concurrency/WuWLZXAH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/XuDHYW17,
  author       = {Guan Xu and
                  Bin Dai and
                  Benxiong Huang and
                  Jun Yang and
                  Sheng Wen},
  title        = {Bandwidth-aware energy efficient flow scheduling with {SDN} in data
                  center networks},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {68},
  pages        = {163--174},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.future.2016.08.024},
  doi          = {10.1016/J.FUTURE.2016.08.024},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fgcs/XuDHYW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/ChenW0XOAH17,
  author       = {Chao Chen and
                  Sheng Wen and
                  Jun Zhang and
                  Yang Xiang and
                  Jonathan J. Oliver and
                  Abdulhameed Alelaiwi and
                  Mohammad Mehedi Hassan},
  title        = {Investigating the deceptive information in Twitter spam},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {72},
  pages        = {319--326},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.future.2016.05.036},
  doi          = {10.1016/J.FUTURE.2016.05.036},
  timestamp    = {Wed, 19 Feb 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/fgcs/ChenW0XOAH17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isci/WangPWLJCTC17,
  author       = {Tian Wang and
                  Zhen Peng and
                  Sheng Wen and
                  Yongxuan Lai and
                  Weijia Jia and
                  Yiqiao Cai and
                  Hui Tian and
                  Yonghong Chen},
  title        = {Reliable wireless connections for fast-moving rail users based on
                  a chained fog structure},
  journal      = {Inf. Sci.},
  volume       = {379},
  pages        = {160--176},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.ins.2016.06.031},
  doi          = {10.1016/J.INS.2016.06.031},
  timestamp    = {Fri, 20 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/isci/WangPWLJCTC17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jise/GuWW17,
  author       = {Ke Gu and
                  Yong Wang and
                  Sheng Wen},
  title        = {Traceable Threshold Proxy Signature},
  journal      = {J. Inf. Sci. Eng.},
  volume       = {33},
  number       = {1},
  pages        = {63--79},
  year         = {2017},
  url          = {https://jise.iis.sinica.edu.tw/JISESearch/pages/View/PaperView.jsf?keyId=154\_1995},
  timestamp    = {Fri, 17 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jise/GuWW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/WenJLXZ17,
  author       = {Sheng Wen and
                  Jiao Jiao Jiang and
                  Bo Liu and
                  Yang Xiang and
                  Wanlei Zhou},
  title        = {Using epidemic betweenness to measure the influence of users in complex
                  networks},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {78},
  pages        = {288--299},
  year         = {2017},
  url          = {https://doi.org/10.1016/j.jnca.2016.10.018},
  doi          = {10.1016/J.JNCA.2016.10.018},
  timestamp    = {Thu, 21 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnca/WenJLXZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/WangWWCTCW17,
  author       = {Tian Wang and
                  Qun Wu and
                  Sheng Wen and
                  Yiqiao Cai and
                  Hui Tian and
                  Yonghong Chen and
                  Baowei Wang},
  title        = {Propagation Modeling and Defending of a Mobile Sensor Worm in Wireless
                  Sensor and Actuator Networks},
  journal      = {Sensors},
  volume       = {17},
  number       = {1},
  pages        = {139},
  year         = {2017},
  url          = {https://doi.org/10.3390/s17010139},
  doi          = {10.3390/S17010139},
  timestamp    = {Fri, 30 Nov 2018 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sensors/WangWWCTCW17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icdcs/WangWXZZN17,
  author       = {Derek Wang and
                  Sheng Wen and
                  Yang Xiang and
                  Wanlei Zhou and
                  Jun Zhang and
                  Surya Nepal},
  editor       = {Kisung Lee and
                  Ling Liu},
  title        = {Catch Me If You Can: Detecting Compromised Users Through Partial Observation
                  on Networks},
  booktitle    = {37th {IEEE} International Conference on Distributed Computing Systems,
                  {ICDCS} 2017, Atlanta, GA, USA, June 5-8, 2017},
  pages        = {2417--2422},
  publisher    = {{IEEE} Computer Society},
  year         = {2017},
  url          = {https://doi.org/10.1109/ICDCS.2017.47},
  doi          = {10.1109/ICDCS.2017.47},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icdcs/WangWXZZN17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ispec/WuWWX17,
  author       = {Tingmin Wu and
                  Derek Wang and
                  Sheng Wen and
                  Yang Xiang},
  editor       = {Joseph K. Liu and
                  Pierangela Samarati},
  title        = {How Spam Features Change in Twitter and the Impact to Machine Learning
                  Based Detection},
  booktitle    = {Information Security Practice and Experience - 13th International
                  Conference, {ISPEC} 2017, Melbourne, VIC, Australia, December 13-15,
                  2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10701},
  pages        = {898--904},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-72359-4\_57},
  doi          = {10.1007/978-3-319-72359-4\_57},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/ispec/WuWWX17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spaccs/AlajaliWZ17,
  author       = {Walaa Alajali and
                  Sheng Wen and
                  Wanlei Zhou},
  editor       = {Guojun Wang and
                  Mohammed Atiquzzaman and
                  Zheng Yan and
                  Kim{-}Kwang Raymond Choo},
  title        = {On-Street Car Parking Prediction in Smart City: {A} Multi-source Data
                  Analysis in Sensor-Cloud Environment},
  booktitle    = {Security, Privacy, and Anonymity in Computation, Communication, and
                  Storage - SpaCCS 2017 International Workshops, Guangzhou, China, December
                  12-15, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10658},
  pages        = {641--652},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-72395-2\_58},
  doi          = {10.1007/978-3-319-72395-2\_58},
  timestamp    = {Thu, 21 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/spaccs/AlajaliWZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/wise/TangMWGXZ17,
  author       = {Lihong Tang and
                  Wanlun Ma and
                  Sheng Wen and
                  Marthie Grobler and
                  Yang Xiang and
                  Wanlei Zhou},
  editor       = {Athman Bouguettaya and
                  Yunjun Gao and
                  Andrey Klimenko and
                  Lu Chen and
                  Xiangliang Zhang and
                  Fedor Dzerzhinskiy and
                  Weijia Jia and
                  Stanislav V. Klimenko and
                  Qing Li},
  title        = {My Face is Mine: Fighting Unpermitted Tagging on Personal/Group Photos
                  in Social Media},
  booktitle    = {Web Information Systems Engineering - {WISE} 2017 - 18th International
                  Conference, Puschino, Russia, October 7-11, 2017, Proceedings, Part
                  {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {10570},
  pages        = {528--539},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-68786-5\_42},
  doi          = {10.1007/978-3-319-68786-5\_42},
  timestamp    = {Thu, 21 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/wise/TangMWGXZ17.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/css/2017,
  editor       = {Sheng Wen and
                  Wei Wu and
                  Aniello Castiglione},
  title        = {Cyberspace Safety and Security - 9th International Symposium, {CSS}
                  2017, Xi'an, China, October 23-25, 2017, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {10581},
  publisher    = {Springer},
  year         = {2017},
  url          = {https://doi.org/10.1007/978-3-319-69471-9},
  doi          = {10.1007/978-3-319-69471-9},
  isbn         = {978-3-319-69470-2},
  timestamp    = {Tue, 14 May 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/css/2017.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/concurrency/StojmenovicWHL16,
  author       = {Ivan Stojmenovic and
                  Sheng Wen and
                  Xinyi Huang and
                  Hao Luan},
  title        = {An overview of Fog computing and its security issues},
  journal      = {Concurr. Comput. Pract. Exp.},
  volume       = {28},
  number       = {10},
  pages        = {2991--3005},
  year         = {2016},
  url          = {https://doi.org/10.1002/cpe.3485},
  doi          = {10.1002/CPE.3485},
  timestamp    = {Mon, 02 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/concurrency/StojmenovicWHL16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ita/GuYWW16,
  author       = {Ke Gu and
                  Lihao Yang and
                  Yong Wang and
                  Sheng Wen},
  title        = {Traceable Identity-Based Group Signature},
  journal      = {{RAIRO} Theor. Informatics Appl.},
  volume       = {50},
  number       = {3},
  pages        = {193--226},
  year         = {2016},
  url          = {https://doi.org/10.1051/ita/2016021},
  doi          = {10.1051/ITA/2016021},
  timestamp    = {Fri, 14 Jul 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ita/GuYWW16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/js/WangWZZR16,
  author       = {Junlei Wang and
                  Sheng Wen and
                  Xingqiang Zhao and
                  Min Zhang and
                  Jingyu Ran},
  title        = {Piezoelectric Wind Energy Harvesting from Self-Excited Vibration of
                  Square Cylinder},
  journal      = {J. Sensors},
  volume       = {2016},
  pages        = {2353517:1--2353517:12},
  year         = {2016},
  url          = {https://doi.org/10.1155/2016/2353517},
  doi          = {10.1155/2016/2353517},
  timestamp    = {Sun, 02 Jun 2019 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/js/WangWZZR16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/HaghighiWXQZ16,
  author       = {Mohammad Sayad Haghighi and
                  Sheng Wen and
                  Yang Xiang and
                  Barry G. Quinn and
                  Wanlei Zhou},
  title        = {On the Race of Worms and Patches: Modeling the Spread of Information
                  in Wireless Sensor Networks},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {11},
  number       = {12},
  pages        = {2854--2865},
  year         = {2016},
  url          = {https://doi.org/10.1109/TIFS.2016.2594130},
  doi          = {10.1109/TIFS.2016.2594130},
  timestamp    = {Thu, 21 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/HaghighiWXQZ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tosn/WangPLWBCC16,
  author       = {Tian Wang and
                  Zhen Peng and
                  Junbin Liang and
                  Sheng Wen and
                  Md. Zakirul Alam Bhuiyan and
                  Yiqiao Cai and
                  Jiannong Cao},
  title        = {Following Targets for Mobile Tracking in Wireless Sensor Networks},
  journal      = {{ACM} Trans. Sens. Networks},
  volume       = {12},
  number       = {4},
  pages        = {31:1--31:24},
  year         = {2016},
  url          = {https://doi.org/10.1145/2968450},
  doi          = {10.1145/2968450},
  timestamp    = {Tue, 12 May 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tosn/WangPLWBCC16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/globecom/JiangWYZQ16,
  author       = {Jiao Jiao Jiang and
                  Sheng Wen and
                  Shui Yu and
                  Wanlei Zhou and
                  Yi Qian},
  title        = {Analysis of the Spreading Influence Variations for Online Social Users
                  under Attacks},
  booktitle    = {2016 {IEEE} Global Communications Conference, {GLOBECOM} 2016, Washington,
                  DC, USA, December 4-8, 2016},
  pages        = {1--6},
  publisher    = {{IEEE}},
  year         = {2016},
  url          = {https://doi.org/10.1109/GLOCOM.2016.7841605},
  doi          = {10.1109/GLOCOM.2016.7841605},
  timestamp    = {Fri, 30 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/globecom/JiangWYZQ16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cn/WangCJWWTCZ15,
  author       = {Tian Wang and
                  Yiqiao Cai and
                  Weijia Jia and
                  Sheng Wen and
                  Guojun Wang and
                  Hui Tian and
                  Yonghong Chen and
                  Bineng Zhong},
  title        = {Maximizing real-time streaming services based on a multi-servers networking
                  framework},
  journal      = {Comput. Networks},
  volume       = {93},
  pages        = {199--212},
  year         = {2015},
  url          = {https://doi.org/10.1016/j.comnet.2015.10.019},
  doi          = {10.1016/J.COMNET.2015.10.019},
  timestamp    = {Fri, 20 Nov 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/cn/WangCJWWTCZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/scn/WenWLXZW15,
  author       = {Sheng Wen and
                  Di Wu and
                  Ping Li and
                  Yang Xiang and
                  Wanlei Zhou and
                  Guiyi Wei},
  title        = {Detecting stepping stones by abnormal causality probability},
  journal      = {Secur. Commun. Networks},
  volume       = {8},
  number       = {10},
  pages        = {1831--1844},
  year         = {2015},
  url          = {https://doi.org/10.1002/sec.1037},
  doi          = {10.1002/SEC.1037},
  timestamp    = {Thu, 21 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/scn/WenWLXZW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tc/WenHCXZJ15,
  author       = {Sheng Wen and
                  Mohammad Sayad Haghighi and
                  Chao Chen and
                  Yang Xiang and
                  Wanlei Zhou and
                  Weijia Jia},
  title        = {A Sword with Two Edges: Propagation Studies on Both Positive and Negative
                  Information in Online Social Networks},
  journal      = {{IEEE} Trans. Computers},
  volume       = {64},
  number       = {3},
  pages        = {640--653},
  year         = {2015},
  url          = {https://doi.org/10.1109/TC.2013.2295802},
  doi          = {10.1109/TC.2013.2295802},
  timestamp    = {Thu, 21 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tc/WenHCXZJ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tifs/JiangWYXZ15,
  author       = {Jiao Jiao Jiang and
                  Sheng Wen and
                  Shui Yu and
                  Yang Xiang and
                  Wanlei Zhou},
  title        = {K-Center: An Approach on the Multi-Source Identification of Information
                  Diffusion},
  journal      = {{IEEE} Trans. Inf. Forensics Secur.},
  volume       = {10},
  number       = {12},
  pages        = {2616--2626},
  year         = {2015},
  url          = {https://doi.org/10.1109/TIFS.2015.2469256},
  doi          = {10.1109/TIFS.2015.2469256},
  timestamp    = {Mon, 28 Aug 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tifs/JiangWYXZ15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/XuLW15,
  author       = {Li Xu and
                  Limei Lin and
                  Sheng Wen},
  editor       = {Meikang Qiu and
                  Shouhuai Xu and
                  Moti Yung and
                  Haibo Zhang},
  title        = {First-Priority Relation Graph-Based Malicious Users Detection in Mobile
                  Social Networks},
  booktitle    = {Network and System Security - 9th International Conference, {NSS}
                  2015, New York, NY, USA, November 3-5, 2015, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {9408},
  pages        = {459--466},
  publisher    = {Springer},
  year         = {2015},
  url          = {https://doi.org/10.1007/978-3-319-25645-0\_34},
  doi          = {10.1007/978-3-319-25645-0\_34},
  timestamp    = {Tue, 14 May 2019 10:00:41 +0200},
  biburl       = {https://dblp.org/rec/conf/nss/XuLW15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/socialsec/WenJY0Z15,
  author       = {Sheng Wen and
                  Jiaojiao Jiang and
                  Kasra Majbouri Yazdi and
                  Yang Xiang and
                  Wanlei Zhou},
  title        = {The Relation Between Local and Global Influence of Individuals in
                  Scale-Free Networks},
  booktitle    = {International Symposium on Security and Privacy in Social Networks
                  and Big Data, SocialSec 2015, Hangzhou, China, November 16-18, 2015},
  pages        = {80--84},
  publisher    = {{IEEE} Computer Society},
  year         = {2015},
  url          = {https://doi.org/10.1109/SocialSec2015.20},
  doi          = {10.1109/SOCIALSEC2015.20},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/socialsec/WenJY0Z15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/LiuZGWL15,
  author       = {Bo Liu and
                  Wanlei Zhou and
                  Longxiang Gao and
                  Sheng Wen and
                  Tom H. Luan},
  title        = {Mobility Increases the Risk of Malware Propagations in Wireless Networks},
  booktitle    = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22,
                  2015, Volume 1},
  pages        = {90--95},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/Trustcom.2015.361},
  doi          = {10.1109/TRUSTCOM.2015.361},
  timestamp    = {Wed, 07 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/LiuZGWL15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/JiangZYWYX15,
  author       = {Jiao Jiao Jiang and
                  Andi Zhou and
                  Kasra Majbouri Yazdi and
                  Sheng Wen and
                  Shui Yu and
                  Yang Xiang},
  title        = {Identifying Diffusion Sources in Large Networks: {A} Community Structure
                  Based Approach},
  booktitle    = {2015 {IEEE} TrustCom/BigDataSE/ISPA, Helsinki, Finland, August 20-22,
                  2015, Volume 1},
  pages        = {302--309},
  publisher    = {{IEEE}},
  year         = {2015},
  url          = {https://doi.org/10.1109/Trustcom.2015.388},
  doi          = {10.1109/TRUSTCOM.2015.388},
  timestamp    = {Fri, 30 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/JiangZYWYX15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/comsur/WangWXZ14,
  author       = {Yini Wang and
                  Sheng Wen and
                  Yang Xiang and
                  Wanlei Zhou},
  title        = {Modeling the Propagation of Worms in Networks: {A} Survey},
  journal      = {{IEEE} Commun. Surv. Tutorials},
  volume       = {16},
  number       = {2},
  pages        = {942--960},
  year         = {2014},
  url          = {https://doi.org/10.1109/SURV.2013.100913.00195},
  doi          = {10.1109/SURV.2013.100913.00195},
  timestamp    = {Thu, 21 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/comsur/WangWXZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/fgcs/ZhouJWXZ14,
  author       = {Wei Zhou and
                  Weijia Jia and
                  Sheng Wen and
                  Yang Xiang and
                  Wanlei Zhou},
  title        = {Detection and defense of application-layer DDoS attacks in backbone
                  web traffic},
  journal      = {Future Gener. Comput. Syst.},
  volume       = {38},
  pages        = {36--46},
  year         = {2014},
  url          = {https://doi.org/10.1016/j.future.2013.08.002},
  doi          = {10.1016/J.FUTURE.2013.08.002},
  timestamp    = {Fri, 22 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/fgcs/ZhouJWXZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/network/WenJXYZ14,
  author       = {Sheng Wen and
                  Jiao Jiao Jiang and
                  Yang Xiang and
                  Shui Yu and
                  Wanlei Zhou},
  title        = {Are the popular users always important for information dissemination
                  in online social networks?},
  journal      = {{IEEE} Netw.},
  volume       = {28},
  number       = {5},
  pages        = {64--67},
  year         = {2014},
  url          = {https://doi.org/10.1109/MNET.2014.6915441},
  doi          = {10.1109/MNET.2014.6915441},
  timestamp    = {Fri, 30 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/network/WenJXYZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tdsc/WenZZXZJZ14,
  author       = {Sheng Wen and
                  Wei Zhou and
                  Jun Zhang and
                  Yang Xiang and
                  Wanlei Zhou and
                  Weijia Jia and
                  Cliff C. Zou},
  title        = {Modeling and Analysis on the Propagation Dynamics of Modern Email
                  Malware},
  journal      = {{IEEE} Trans. Dependable Secur. Comput.},
  volume       = {11},
  number       = {4},
  pages        = {361--374},
  year         = {2014},
  url          = {https://doi.org/10.1109/TDSC.2013.49},
  doi          = {10.1109/TDSC.2013.49},
  timestamp    = {Fri, 22 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tdsc/WenZZXZJZ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tpds/WenJXYZJ14,
  author       = {Sheng Wen and
                  Jiao Jiao Jiang and
                  Yang Xiang and
                  Shui Yu and
                  Wanlei Zhou and
                  Weijia Jia},
  title        = {To Shut Them Up or to Clarify: Restraining the Spread of Rumors in
                  Online Social Networks},
  journal      = {{IEEE} Trans. Parallel Distributed Syst.},
  volume       = {25},
  number       = {12},
  pages        = {3306--3316},
  year         = {2014},
  url          = {https://doi.org/10.1109/TPDS.2013.2297115},
  doi          = {10.1109/TPDS.2013.2297115},
  timestamp    = {Fri, 30 Dec 2022 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/tpds/WenJXYZJ14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fedcsis/StojmenovicW14,
  author       = {Ivan Stojmenovic and
                  Sheng Wen},
  editor       = {Maria Ganzha and
                  Leszek A. Maciaszek and
                  Marcin Paprzycki},
  title        = {The Fog Computing Paradigm: Scenarios and Security Issues},
  booktitle    = {Proceedings of the 2014 Federated Conference on Computer Science and
                  Information Systems, Warsaw, Poland, September 7-10, 2014},
  series       = {Annals of Computer Science and Information Systems},
  volume       = {2},
  pages        = {1--8},
  year         = {2014},
  url          = {https://doi.org/10.15439/2014F503},
  doi          = {10.15439/2014F503},
  timestamp    = {Tue, 23 Apr 2024 09:55:03 +0200},
  biburl       = {https://dblp.org/rec/conf/fedcsis/StojmenovicW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icira/XingZWYXC14,
  author       = {Hang Xing and
                  Tiemin Zhang and
                  Sheng Wen and
                  Xiuli Yang and
                  Zhilin Xu and
                  Fei Cao},
  editor       = {Xianmin Zhang and
                  Honghai Liu and
                  Zhong Chen and
                  Nianfeng F. Wang},
  title        = {Cymbal Piezoelectric Micro Displacement Actuator Characteristics Analysis},
  booktitle    = {Intelligent Robotics and Applications - 7th International Conference,
                  {ICIRA} 2014, Guangzhou, China, December 17-20, 2014, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8917},
  pages        = {161--170},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-13966-1\_16},
  doi          = {10.1007/978-3-319-13966-1\_16},
  timestamp    = {Thu, 04 Mar 2021 17:06:03 +0100},
  biburl       = {https://dblp.org/rec/conf/icira/XingZWYXC14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icira/ZhangCLLW14,
  author       = {Tiemin Zhang and
                  Fei Cao and
                  Shenghua Li and
                  Li Liang and
                  Sheng Wen},
  editor       = {Xianmin Zhang and
                  Honghai Liu and
                  Zhong Chen and
                  Nianfeng F. Wang},
  title        = {{FEM} Analysis and Parameter Optimization of a Linear Piezoelectric
                  Motor Macro Driven},
  booktitle    = {Intelligent Robotics and Applications - 7th International Conference,
                  {ICIRA} 2014, Guangzhou, China, December 17-20, 2014, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8917},
  pages        = {171--178},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-13966-1\_17},
  doi          = {10.1007/978-3-319-13966-1\_17},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icira/ZhangCLLW14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icira/ZhangCLWL14,
  author       = {Tiemin Zhang and
                  Fei Cao and
                  Shenghua Li and
                  Sheng Wen and
                  Li Liang},
  editor       = {Xianmin Zhang and
                  Honghai Liu and
                  Zhong Chen and
                  Nianfeng F. Wang},
  title        = {Finite Element Study on the Cylindrical Linear Piezoelectric Motor
                  Micro Driven},
  booktitle    = {Intelligent Robotics and Applications - 7th International Conference,
                  {ICIRA} 2014, Guangzhou, China, December 17-20, 2014, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {8917},
  pages        = {179--186},
  publisher    = {Springer},
  year         = {2014},
  url          = {https://doi.org/10.1007/978-3-319-13966-1\_18},
  doi          = {10.1007/978-3-319-13966-1\_18},
  timestamp    = {Wed, 24 May 2017 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/icira/ZhangCLWL14.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tpds/WenZZXZJ13,
  author       = {Sheng Wen and
                  Wei Zhou and
                  Jun Zhang and
                  Yang Xiang and
                  Wanlei Zhou and
                  Weijia Jia},
  title        = {Modeling Propagation Dynamics of Social Network Worms},
  journal      = {{IEEE} Trans. Parallel Distributed Syst.},
  volume       = {24},
  number       = {8},
  pages        = {1633--1643},
  year         = {2013},
  url          = {https://doi.org/10.1109/TPDS.2012.250},
  doi          = {10.1109/TPDS.2012.250},
  timestamp    = {Fri, 22 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tpds/WenZZXZJ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/css/WenLWXZ13,
  author       = {Sheng Wen and
                  Ping Li and
                  Di Wu and
                  Yang Xiang and
                  Wanlei Zhou},
  editor       = {Guojun Wang and
                  Indrakshi Ray and
                  Dengguo Feng and
                  Muttukrishnan Rajarajan},
  title        = {Detecting Stepping Stones by Abnormal Causality Probability},
  booktitle    = {Cyberspace Safety and Security - 5th International Symposium, {CSS}
                  2013, Zhangjiajie, China, November 13-15, 2013, Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {8300},
  pages        = {308--322},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-319-03584-0\_23},
  doi          = {10.1007/978-3-319-03584-0\_23},
  timestamp    = {Fri, 05 Aug 2022 08:50:55 +0200},
  biburl       = {https://dblp.org/rec/conf/css/WenLWXZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/WenXZ13,
  author       = {Sheng Wen and
                  Yang Xiang and
                  Wanlei Zhou},
  editor       = {Javier L{\'{o}}pez and
                  Xinyi Huang and
                  Ravi S. Sandhu},
  title        = {Modeling and Analysis for Thwarting Worm Propagation in Email Networks},
  booktitle    = {Network and System Security - 7th International Conference, {NSS}
                  2013, Madrid, Spain, June 3-4, 2013. Proceedings},
  series       = {Lecture Notes in Computer Science},
  volume       = {7873},
  pages        = {763--769},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-38631-2\_68},
  doi          = {10.1007/978-3-642-38631-2\_68},
  timestamp    = {Thu, 21 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/nss/WenXZ13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/concurrency/WenZXZ12,
  author       = {Sheng Wen and
                  Wei Zhou and
                  Yang Xiang and
                  Wanlei Zhou},
  title        = {{CAFS:} a novel lightweight cache-based scheme for large-scale intrusion
                  alert fusion},
  journal      = {Concurr. Comput. Pract. Exp.},
  volume       = {24},
  number       = {10},
  pages        = {1137--1153},
  year         = {2012},
  url          = {https://doi.org/10.1002/cpe.1747},
  doi          = {10.1002/CPE.1747},
  timestamp    = {Fri, 22 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/concurrency/WenZXZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/icl/WenZWZX12,
  author       = {Sheng Wen and
                  Wei Zhou and
                  Yini Wang and
                  Wanlei Zhou and
                  Yang Xiang},
  title        = {Locating Defense Positions for Thwarting the Propagation of Topological
                  Worms},
  journal      = {{IEEE} Commun. Lett.},
  volume       = {16},
  number       = {4},
  pages        = {560--563},
  year         = {2012},
  url          = {https://doi.org/10.1109/LCOMM.2012.030512.112452},
  doi          = {10.1109/LCOMM.2012.030512.112452},
  timestamp    = {Fri, 22 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/icl/WenZWZX12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/ZhouWWXZ12,
  author       = {Wei Zhou and
                  Sheng Wen and
                  Yini Wang and
                  Yang Xiang and
                  Wanlei Zhou},
  editor       = {Geyong Min and
                  Yulei Wu and
                  Lei (Chris) Liu and
                  Xiaolong Jin and
                  Stephen A. Jarvis and
                  Ahmed Yassin Al{-}Dubai},
  title        = {An Analytical Model on the Propagation of Modern Email Worms},
  booktitle    = {11th {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2012, Liverpool, United
                  Kingdom, June 25-27, 2012},
  pages        = {533--540},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/TrustCom.2012.70},
  doi          = {10.1109/TRUSTCOM.2012.70},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/ZhouWWXZ12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cj/WangWCZX11,
  author       = {Yini Wang and
                  Sheng Wen and
                  Silvio Cesare and
                  Wanlei Zhou and
                  Yang Xiang},
  title        = {The Microcosmic Model of Worm Propagation},
  journal      = {Comput. J.},
  volume       = {54},
  number       = {10},
  pages        = {1700--1720},
  year         = {2011},
  url          = {https://doi.org/10.1093/comjnl/bxr082},
  doi          = {10.1093/COMJNL/BXR082},
  timestamp    = {Thu, 21 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cj/WangWCZX11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/icl/WangWCZX11,
  author       = {Yini Wang and
                  Sheng Wen and
                  Silvio Cesare and
                  Wanlei Zhou and
                  Yang Xiang},
  title        = {Eliminating Errors in Worm Propagation Models},
  journal      = {{IEEE} Commun. Lett.},
  volume       = {15},
  number       = {9},
  pages        = {1022--1024},
  year         = {2011},
  url          = {https://doi.org/10.1109/LCOMM.2011.070711.110254},
  doi          = {10.1109/LCOMM.2011.070711.110254},
  timestamp    = {Thu, 21 Apr 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/icl/WangWCZX11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/ica3pp/WangWZZX11,
  author       = {Yini Wang and
                  Sheng Wen and
                  Wei Zhou and
                  Wanlei Zhou and
                  Yang Xiang},
  editor       = {Yang Xiang and
                  Alfredo Cuzzocrea and
                  Michael Hobbs and
                  Wanlei Zhou},
  title        = {The Probability Model of Peer-to-Peer Botnet Propagation},
  booktitle    = {Algorithms and Architectures for Parallel Processing - 11th International
                  Conference, ICA3PP, Melbourne, Australia, October 24-26, 2011, Proceedings,
                  Part {I}},
  series       = {Lecture Notes in Computer Science},
  volume       = {7016},
  pages        = {470--480},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-24650-0\_41},
  doi          = {10.1007/978-3-642-24650-0\_41},
  timestamp    = {Fri, 22 Apr 2022 17:07:03 +0200},
  biburl       = {https://dblp.org/rec/conf/ica3pp/WangWZZX11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/WangWX11,
  author       = {Yini Wang and
                  Sheng Wen and
                  Yang Xiang},
  editor       = {Pierangela Samarati and
                  Sara Foresti and
                  Jiankun Hu and
                  Giovanni Livraga},
  title        = {Modeling worms propagation on probability},
  booktitle    = {5th International Conference on Network and System Security, {NSS}
                  2011, Milan, Italy, September 6-8, 2011},
  pages        = {49--56},
  publisher    = {{IEEE}},
  year         = {2011},
  url          = {https://doi.org/10.1109/ICNSS.2011.6059959},
  doi          = {10.1109/ICNSS.2011.6059959},
  timestamp    = {Wed, 16 Oct 2019 14:14:50 +0200},
  biburl       = {https://dblp.org/rec/conf/nss/WangWX11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hpcc/WenXZ10,
  author       = {Sheng Wen and
                  Yang Xiang and
                  Wanlei Zhou},
  title        = {A Lightweight Intrusion Alert Fusion System},
  booktitle    = {12th {IEEE} International Conference on High Performance Computing
                  and Communications, {HPCC} 2010, 1-3 September 2010, Melbourne, Australia},
  pages        = {695--700},
  publisher    = {{IEEE}},
  year         = {2010},
  url          = {https://doi.org/10.1109/HPCC.2010.120},
  doi          = {10.1109/HPCC.2010.120},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hpcc/WenXZ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/nss/WenJZZX10,
  author       = {Sheng Wen and
                  Weijia Jia and
                  Wei Zhou and
                  Wanlei Zhou and
                  Chuan Xu},
  editor       = {Yang Xiang and
                  Pierangela Samarati and
                  Jiankun Hu and
                  Wanlei Zhou and
                  Ahmad{-}Reza Sadeghi},
  title        = {{CALD:} Surviving Various Application-Layer DDoS Attacks That Mimic
                  Flash Crowd},
  booktitle    = {Fourth International Conference on Network and System Security, {NSS}
                  2010, Melbourne, Victoria, Australia, September 1-3, 2010},
  pages        = {247--254},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/NSS.2010.69},
  doi          = {10.1109/NSS.2010.69},
  timestamp    = {Thu, 23 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/nss/WenJZZX10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics