Остановите войну!
for scientists:
default search action
Yu Wang 0017
- > Home > Persons > Yu Wang 0017
Publications
- 2023
- [j54]Bailin Xie, Yu Wang, Guogui Wen, Xiaojun Xu:
Application-Layer DDoS Attack Detection Using Explicit Duration Recurrent Network-Based Application-Layer Protocol Communication Models. Int. J. Intell. Syst. 2023: 1-13 (2023) - [j53]Zhiping Jin, Zhibiao Liang, Meirong He, Yao Peng, Hanxiao Xue, Yu Wang:
A federated semi-supervised learning approach for network traffic classification. Int. J. Netw. Manag. 33(3) (2023) - [j52]Xiaobing Sun, Liangqiong Tu, Jiale Zhang, Jie Cai, Bin Li, Yu Wang:
ASSBert: Active and semi-supervised bert for smart contract vulnerability detection. J. Inf. Secur. Appl. 73: 103423 (2023) - [j51]Binjie Liao, Hongyi Chen, Yu Wang, Weizhi Meng, Jun Zhang:
Analysis of hybrid attack and defense based on block withholding strategy. J. Inf. Secur. Appl. 78: 103620 (2023) - 2022
- [j50]Wenjuan Li, Yu Wang, Weizhi Meng, Jin Li, Chunhua Su:
BlockCSDN: Towards Blockchain-Based Collaborative Intrusion Detection in Software Defined Networking. IEICE Trans. Inf. Syst. 105-D(2): 272-279 (2022) - [j49]Wenjuan Li, Yu Wang, Jin Li:
Enhancing blockchain-based filtration mechanism via IPFS for collaborative intrusion detection in IoT networks. J. Syst. Archit. 127: 102510 (2022) - [j48]Wenjuan Li, Yu Wang, Jiao Tan, Nan Zhu:
DCUS: Evaluating Double-Click-Based Unlocking Scheme on Smartphones. Mob. Networks Appl. 27(1): 382-391 (2022) - [c34]Thomas Gleerup, Wenjuan Li, Jiao Tan, Yu Wang:
ZoomPass: A Zoom-Based Android Unlock Scheme on Smart Devices. SciSec 2022: 245-259 - 2021
- [j47]Zhiping Jin, Zhibiao Liang, Yu Wang, Weizhi Meng:
Mobile network traffic pattern classification with incomplete a priori information. Comput. Commun. 166: 262-270 (2021) - [j46]Wenjuan Li, Yu Wang, Zhiping Jin, Keping Yu, Jin Li, Yang Xiang:
Challenge-based collaborative intrusion detection in software-defined networking: an evaluation. Digit. Commun. Networks 7(2): 257-263 (2021) - [j45]Wenjuan Li, Yu Wang, Jin Li, Man Ho Au:
Toward a blockchain-based framework for challenge-based collaborative intrusion detection. Int. J. Inf. Sec. 20(2): 127-139 (2021) - [j44]Wenjuan Li, Man Ho Au, Yu Wang:
A fog-based collaborative intrusion detection framework for smart grid. Int. J. Netw. Manag. 31(2) (2021) - [j43]Waixi Liu, Jun Cai, Qing Chun Chen, Yu Wang:
DRL-R: Deep reinforcement learning approach for intelligent routing in software-defined data-center networks. J. Netw. Comput. Appl. 177: 102865 (2021) - [j42]Zhonghua Zhang, Xifei Song, Lei Liu, Jie Yin, Yu Wang, Dapeng Lan:
Recent Advances in Blockchain and Artificial Intelligence Integration: Feasibility Analysis, Research Issues, Applications, Challenges, and Future Work. Secur. Commun. Networks 2021: 9991535:1-9991535:15 (2021) - [j41]Jinao Yu, Hanyu Xue, Bo Liu, Yu Wang, Shibing Zhu, Ming Ding:
GAN-Based Differential Private Image Privacy Protection Framework for the Internet of Multimedia Things. Sensors 21(1): 58 (2021) - [c33]Yi He, Jiaxian Dong, Bo-Jian Hou, Yu Wang, Fei Wang:
Online Learning in Variable Feature Spaces with Mixed Data. ICDM 2021: 181-190 - [c32]Wenjuan Li, Weizhi Meng, Yu Wang, Jin Li:
Enhancing Blackslist-Based Packet Filtration Using Blockchain in Wireless Sensor Networks. WASA (2) 2021: 624-635 - 2020
- [j40]Yunxia Tang, Yu Wang, Jiaqian Wang, Miao Li, Linmin Peng, Guochao Wei, Yixing Zhang, Jin Li, Zhibo Gao:
TruNeo: an integrated pipeline improves personalized true tumor neoantigen identification. BMC Bioinform. 21(1): 532 (2020) - [j39]Waixi Liu, Yu Wang, Jie Zhang, Hongjian Liao, Zhong-Wei Liang, Xiaochu Liu:
AAMcon: an adaptively distributed SDN controller in data center networks. Frontiers Comput. Sci. 14(1): 146-161 (2020) - [j38]Weizhi Meng, Wenjuan Li, Yu Wang, Man Ho Au:
Detecting insider attacks in medical cyber-physical networks based on behavioral profiling. Future Gener. Comput. Syst. 108: 1258-1266 (2020) - [j37]Wenjuan Li, Yu Wang, Jin Li, Yang Xiang:
Toward supervised shape-based behavioral authentication on smartphones. J. Inf. Secur. Appl. 55: 102591 (2020) - [j36]Wenjuan Li, Jiao Tan, Weizhi Meng, Yu Wang:
A swipe-based unlocking mechanism with supervised learning on smartphones: Design and evaluation. J. Netw. Comput. Appl. 165: 102687 (2020) - [j35]Waixi Liu, Jun Cai, Yu Wang, Qing Chun Chen, Jia-Qi Zeng:
Fine-grained flow classification using deep learning for software defined data center networks. J. Netw. Comput. Appl. 168: 102766 (2020) - [c31]Wenjuan Li, Jiao Tan, Yu Wang:
A Framework of Blockchain-Based Collaborative Intrusion Detection in Software Defined Networking. NSS 2020: 261-276 - [c30]Wenjuan Li, Jiao Tan, Nan Zhu, Yu Wang:
Designing Double-Click-Based Unlocking Mechanism on Smartphones. SpaCCS Workshops 2020: 573-585 - 2019
- [j34]Lihong Tang, Wanlun Ma, Marthie Grobler, Weizhi Meng, Yu Wang, Sheng Wen:
Faces are Protected as Privacy: An Automatic Tagging Framework Against Unpermitted Photo Sharing in Social Media. IEEE Access 7: 75556-75567 (2019) - [j33]Junyang Qiu, Jun Zhang, Wei Luo, Lei Pan, Surya Nepal, Yu Wang, Yang Xiang:
A3CM: Automatic Capability Annotation for Android Malware. IEEE Access 7: 147156-147168 (2019) - [j32]Yu Wang, Hanxiao Xue, Yang Liu, Waixi Liu:
Statistical network protocol identification with unknown pattern extraction. Ann. des Télécommunications 74(7-8): 473-482 (2019) - [j31]Weizhi Meng, Lijun Jiang, Kim-Kwang Raymond Choo, Yu Wang, Chong Jiang:
Towards detection of juice filming charging attacks via supervised CPU usage analysis on smartphones. Comput. Electr. Eng. 78: 230-241 (2019) - [j30]Yu Wang, Weizhi Meng, Wenjuan Li, Zhe Liu, Yang Liu, Hanxiao Xue:
Adaptive machine learning-based alarm reduction via edge computing for distributed intrusion detection systems. Concurr. Comput. Pract. Exp. 31(19) (2019) - [j29]Yang Xiang, Md. Zakirul Alam Bhuiyan, Aniello Castiglione, Yu Wang:
Foreword to the special issue on security, privacy, and social networks. Concurr. Comput. Pract. Exp. 31(21) (2019) - [j28]Yuxia Cheng, Huijuan Yao, Yu Wang, Yang Xiang, Hongpei Li:
Protecting VNF services with smart online behavior anomaly detection method. Future Gener. Comput. Syst. 95: 265-276 (2019) - [j27]Hongyang Yan, Yu Wang, Chunfu Jia, Jin Li, Yang Xiang, Witold Pedrycz:
IoT-FBAC: Function-based access control scheme using identity-based encryption in IoT. Future Gener. Comput. Syst. 95: 344-353 (2019) - [j26]Wenjuan Li, Steven Tug, Weizhi Meng, Yu Wang:
Designing collaborative blockchained signature-based intrusion detection in IoT environments. Future Gener. Comput. Syst. 96: 481-489 (2019) - [j25]Waixi Liu, Jun Cai, Yu Wang, Qing Chun Chen, Dong Tang:
Mix-flow scheduling using deep reinforcement learning for software-defined data-center networks. Internet Technol. Lett. 2(3) (2019) - [c29]Wenjuan Li, Yu Wang, Jin Li, Man Ho Au:
Towards Blockchained Challenge-Based Collaborative Intrusion Detection. ACNS Workshops 2019: 122-139 - [c28]Wenjuan Li, Jiao Tan, Weizhi Meng, Yu Wang, Jing Li:
SwipeVLock: A Supervised Unlocking Mechanism Based on Swipe Behavior on Smartphones. ML4CS 2019: 140-153 - [c27]Yang Liu, Hanxiao Xue, Guocheng Wei, Lisu Wu, Yu Wang:
A Comparative Study on Network Traffic Clustering. NSS 2019: 443-455 - [c26]Zian Liu, Chao Chen, Shigang Liu, Dongxi Liu, Yu Wang:
Exploit in Smart Devices: A Case Study. SocialSec 2019: 152-164 - 2018
- [j24]Weizhi Meng, Elmar Tischhauser, Qingju Wang, Yu Wang, Jinguang Han:
When Intrusion Detection Meets Blockchain Technology: A Review. IEEE Access 6: 10179-10188 (2018) - [j23]Weizhi Meng, Lijun Jiang, Yu Wang, Jin Li, Jun Zhang, Yang Xiang:
JFCGuard: Detecting juice filming charging attack via processor usage analysis on smartphones. Comput. Secur. 76: 252-264 (2018) - [j22]Miroslaw Kutylowski, Yu Wang, Shouhuai Xu, Laurence T. Yang:
Special issue on social network security and privacy. Concurr. Comput. Pract. Exp. 30(5) (2018) - [j21]Jun Cai, Yu Wang, Yan Liu, Jian-Zhen Luo, Wenguo Wei, Xiaoping Xu:
Enhancing network capacity by weakening community structure in scale-free network. Future Gener. Comput. Syst. 87: 765-771 (2018) - [j20]Weizhi Meng, Yu Wang, Duncan S. Wong, Sheng Wen, Yang Xiang:
TouchWB: Touch behavioral user authentication based on web browsing on smartphones. J. Netw. Comput. Appl. 117: 1-9 (2018) - [j19]Yu Wang, Weizhi Meng, Wenjuan Li, Jin Li, Waixi Liu, Yang Xiang:
A fog-based privacy-preserving approach for distributed signature-based intrusion detection. J. Parallel Distributed Comput. 122: 26-35 (2018) - [j18]Hongyang Yan, Xuan Li, Yu Wang, Chunfu Jia:
Centralized Duplicate Removal Video Storage System with Privacy Preservation in IoT. Sensors 18(6): 1814 (2018) - [j17]Walaa Alajali, Wei Zhou, Sheng Wen, Yu Wang:
Intersection Traffic Prediction Using Decision Tree Models. Symmetry 10(9): 386 (2018) - [j16]Waixi Liu, Jin Li, Jun Cai, Yu Wang, Xiao-Chu Liu, Shun-Zheng Yu:
COD: caching on demand in information-centric networking. Telecommun. Syst. 69(3): 303-319 (2018) - [c25]Weizhi Meng, Yu Wang, Wenjuan Li, Zhe Liu, Jin Li, Christian W. Probst:
Enhancing Intelligent Alarm Reduction for Distributed Intrusion Detection Systems via Edge Computing. ACISP 2018: 759-767 - [c24]Shigang Liu, Jun Zhang, Yu Wang, Wanlei Zhou, Yang Xiang, Olivier Y. de Vel:
A Data-driven Attack against Support Vectors of SVM. AsiaCCS 2018: 723-734 - [c23]Mark Huasong Meng, Guangdong Bai, Joseph K. Liu, Xiapu Luo, Yu Wang:
Analyzing Use of High Privileges on Android: An Empirical Case Study of Screenshot and Screen Recording Applications. Inscrypt 2018: 349-369 - [c22]David Madsen, Wenjuan Li, Weizhi Meng, Yu Wang:
Evaluating the Impact of Intrusion Sensitivity on Securing Collaborative Intrusion Detection Networks Against SOOA. ICA3PP (4) 2018: 481-494 - [c21]Wenjuan Li, Weizhi Meng, Yu Wang, Jinguang Han, Jin Li:
Towards Securing Challenge-Based Collaborative Intrusion Detection Networks via Message Verification. ISPEC 2018: 313-328 - [c20]Steven Tug, Weizhi Meng, Yu Wang:
CBSigIDS: Towards Collaborative Blockchained Signature-Based Intrusion Detection. iThings/GreenCom/CPSCom/SmartData 2018: 1228-1235 - [c19]Francisco-Javier Rodrigo-Ginés, Javier Parra-Arnau, Weizhi Meng, Yu Wang:
PrivacySearch: An End-User and Query Generalization Tool for Privacy Enhancement in Web Search. NSS 2018: 304-318 - [c18]Xinbo Ban, Chao Chen, Shigang Liu, Yu Wang, Jun Zhang:
Deep-learnt features for Twitter spam detection. SocialSec 2018: 22-26 - [c17]Wenjuan Li, Weizhi Meng, Yu Wang, Lam For Kwok, Rongxing Lu:
Identifying Passive Message Fingerprint Attacks via Honey Challenge in Collaborative Intrusion Detection Networks. TrustCom/BigDataSE 2018: 1208-1213 - [i1]Yuantian Miao, Zichan Ruan, Lei Pan, Yu Wang, Jun Zhang, Yang Xiang:
Automated Big Traffic Analytics for Cyber Security. CoRR abs/1804.09023 (2018) - 2017
- [j15]Shigang Liu, Yu Wang, Jun Zhang, Chao Chen, Yang Xiang:
Addressing the class imbalance problem in Twitter spam detection using ensemble learning. Comput. Secur. 69: 35-49 (2017) - [j14]Chao Chen, Yu Wang, Jun Zhang, Yang Xiang, Wanlei Zhou, Geyong Min:
Statistical Features-Based Real-Time Detection of Drifted Twitter Spam. IEEE Trans. Inf. Forensics Secur. 12(4): 914-925 (2017) - [c16]Weizhi Meng, Wenjuan Li, Yu Wang, Man Ho Au:
Detecting Malicious Nodes in Medical Smartphone Networks Through Euclidean Distance-Based Behavioral Profiling. CSS 2017: 163-175 - [c15]Yu Wang, Lin Xie, Wenjuan Li, Weizhi Meng, Jin Li:
A Privacy-Preserving Framework for Collaborative Intrusion Detection Networks Through Fog Computing. CSS 2017: 267-279 - [c14]Bo Liu, Wanlei Zhou, Shui Yu, Kun Wang, Yu Wang, Yong Xiang, Jin Li:
Home Location Protection in Mobile Social Networks: A Community Based Method (Short Paper). ISPEC 2017: 694-704 - [c13]Lijun Jiang, Weizhi Meng, Yu Wang, Chunhua Su, Jin Li:
Exploring Energy Consumption of Juice Filming Charging Attack on Smartphones: A Pilot Study. NSS 2017: 199-213 - 2016
- [j13]Chenghua Tang, Xin Zhang, Lu Wang, Yu Wang, Baohua Qiang:
一种跨域网络资源的安全互操作模型 (Security Interoperation Model of Cross-domain Network Resources). 计算机科学 43(6): 141-145 (2016) - [j12]Chenghua Tang, Yang Xiang, Yu Wang, Junyan Qian, Baohua Qiang:
Detection and classification of anomaly intrusion using hierarchy clustering and SVM. Secur. Commun. Networks 9(16): 3401-3411 (2016) - [j11]Yi Xie, Yu Wang, Haitao He, Yang Xiang, Shunzheng Yu, Xincheng Liu:
A General Collaborative Framework for Modeling and Perceiving Distributed Network Behavior. IEEE/ACM Trans. Netw. 24(5): 3162-3176 (2016) - [c12]Yuantian Miao, Zichan Ruan, Lei Pan, Jun Zhang, Yang Xiang, Yu Wang:
Comprehensive Analysis of Network Traffic Data. CIT 2016: 423-430 - [c11]Shigang Liu, Jun Zhang, Yu Wang, Yang Xiang:
Fuzzy-Based Feature and Instance Recovery. ACIIDS (1) 2016: 605-615 - [c10]Shigang Liu, Yu Wang, Chao Chen, Yang Xiang:
An Ensemble Learning Approach for Addressing the Class Imbalance Problem in Twitter Spam Detection. ACISP (1) 2016: 215-228 - [c9]Bailin Xie, Yu Wang, Chao Chen, Yang Xiang:
Gatekeeping Behavior Analysis for Information Credibility Assessment on Weibo. NSS 2016: 483-496 - 2015
- [c8]Yu Wang, Chao Chen, Yang Xiang:
Unknown pattern extraction for statistical network protocol identification. LCN 2015: 506-509 - 2014
- [j10]Yu Wang, Yang Xiang, Jun Zhang, Wanlei Zhou, Bailin Xie:
Internet traffic clustering with side information. J. Comput. Syst. Sci. 80(5): 1021-1036 (2014) - [j9]Yu Wang, Yang Xiang, Jun Zhang, Wanlei Zhou, Guiyi Wei, Laurence T. Yang:
Internet Traffic Classification Using Constrained Clustering. IEEE Trans. Parallel Distributed Syst. 25(11): 2932-2943 (2014) - 2013
- [j8]Jun Zhang, Yang Xiang, Wanlei Zhou, Yu Wang:
Unsupervised traffic classification using flow statistical properties and IP packet payload. J. Comput. Syst. Sci. 79(5): 573-585 (2013) - [j7]Jun Zhang, Yang Xiang, Yu Wang, Wanlei Zhou, Yong Xiang, Yong Guan:
Network Traffic Classification Using Correlation Information. IEEE Trans. Parallel Distributed Syst. 24(1): 104-117 (2013) - [j6]Yi Xie, Jiankun Hu, Yang Xiang, Shui Yu, Shensheng Tang, Yu Wang:
Modeling Oscillation Behavior of Network Traffic by Nested Hidden Markov Model with Variable State-Duration. IEEE Trans. Parallel Distributed Syst. 24(9): 1807-1817 (2013) - [c7]Yu Wang, Yang Xiang, Jun Zhang:
Network traffic clustering using Random Forest proximities. ICC 2013: 2058-2062 - 2012
- [j5]Yu Wang, Yang Xiang, Wanlei Zhou, Shunzheng Yu:
Generating regular expression signatures for network traffic classification in trusted network management. J. Netw. Comput. Appl. 35(3): 992-1000 (2012) - [j4]Huisheng Liu, Zhenxing Wang, Yu Wang:
Semi-supervised Encrypted Traffic Classification Using Composite Features Set. J. Networks 7(8): 1195-1200 (2012) - [c6]Yu Wang, Yang Xiang, Jun Zhang, Shunzheng Yu:
Internet traffic clustering with constraints. IWCMC 2012: 619-624 - 2011
- [j3]Jun Cai, Shun-Zheng Yu, Yu Wang:
The community Analysis of User Behaviors Network for Web Traffic. J. Softw. 6(11): 2217-2224 (2011) - [c5]Yu Wang, Yang Xiang, Shunzheng Yu:
Internet Traffic Classification Using Machine Learning: A Token-based Approach. CSE 2011: 285-289 - [c4]Yu Wang, Yang Xiang, Jun Zhang, Shun-Zheng Yu:
A novel semi-supervised approach for network traffic clustering. NSS 2011: 169-175 - 2010
- [j2]Yu Wang, Yang Xiang, Shun-Zheng Yu:
An automatic application signature construction system for unknown traffic. Concurr. Comput. Pract. Exp. 22(13): 1927-1944 (2010) - [c3]Yu Wang, Yang Xiang, Shun-Zheng Yu:
Automatic Application Signature Construction from Unknown Traffic. AINA 2010: 1115-1120 - 2009
- [j1]Yu Wang, Shun-Zheng Yu:
Supervised Learning Real-time Traffic Classifiers. J. Networks 4(7): 622-629 (2009) - [c2]Ming-Ming Xiao, Shun-Zheng Yu, Yu Wang:
Automatic Network Protocol Automaton Extraction. NSS 2009: 336-343 - 2008
- [c1]Yu Wang, Shun-Zheng Yu:
Move Statistics-Based Traffic Classifiers Online. CSSE (4) 2008: 721-725
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-22 22:39 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint