default search action
Fangwei Wang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j20]Fangwei Wang, Xipeng Shi, Fang Yang, Ruixin Song, Qingru Li, Zhiyuan Tan, Changguang Wang:
MalSort: Lightweight and efficient image-based malware classification using masked self-supervised framework with Swin Transformer. J. Inf. Secur. Appl. 83: 103784 (2024) - [j19]Fangwei Wang, Meiyun Xie, Zhiyuan Tan, Qingru Li, Changguang Wang:
Preserving Differential Privacy in Deep Learning Based on Feature Relevance Region Segmentation. IEEE Trans. Emerg. Top. Comput. 12(1): 307-315 (2024) - 2023
- [c17]Fangwei Wang, Ruixin Song, Qingru Li, Changguang Wang:
Efficient Black-Box Adversarial Attacks with Training Surrogate Models Towards Speaker Recognition Systems. ICA3PP (5) 2023: 257-276 - [c16]Qingru Li, Yufei Zhang, Fangwei Wang, Changguang Wang:
An Android Malware Detection Method Based on Metapath Aggregated Graph Neural Network. ICA3PP (3) 2023: 344-357 - [c15]Fangwei Wang, Man Yan, Qingru Li, Changguang Wang:
A Multivariate Time Series Anomaly Detection Model Based on Spatio-Temporal Dual Features. NaNA 2023: 416-421 - [c14]Fangwei Wang, Ruixin Song, Zhiyuan Tan, Qingru Li, Changguang Wang, Yong Yang:
Self-attention is What You Need to Fool a Speaker Recognition System. TrustCom 2023: 929-936 - [c13]Qingru Li, Yahong Wang, Fangwei Wang, Zhiyuan Tan, Changguang Wang:
A Probability Mapping-Based Privacy Preservation Method for Social Networks. UbiSec 2023: 289-303 - 2022
- [j18]Fangwei Wang, Shaojie Yang, Changguang Wang, Qingru Li, Kehinde O. Babaagba, Zhiyuan Tan:
Toward machine intelligence that learns to fingerprint polymorphic worms in IoT. Int. J. Intell. Syst. 37(10): 7058-7078 (2022) - [j17]Fangwei Wang, Guofang Chai, Qingru Li, Changguang Wang:
An Efficient Deep Unsupervised Domain Adaptation for Unknown Malware Detection. Symmetry 14(2): 296 (2022) - [c12]Fangwei Wang, Yuanyuan Lu, Qingru Li, Changguang Wang, Yonglei Bai:
A Co-evolutionary Algorithm-Based Malware Adversarial Sample Generation Method. DSC 2022: 1-8 - [c11]Qingru Li, Xinru Wang, Fangwei Wang, Changguang Wang:
A Label Flipping Attack on Machine Learning Model and Its Defense Mechanism. ICA3PP 2022: 490-506 - 2021
- [j16]Fangwei Wang, Shaojie Yang, Qingru Li, Changguang Wang:
An internet of things malware classification method based on mixture of experts neural network. Trans. Emerg. Telecommun. Technol. 32(5) (2021) - [j15]Changguang Wang, Ziqiu Zhao, Fangwei Wang, Qingru Li:
A Novel Malware Detection and Family Classification Scheme for IoT Based on DEAM and DenseNet. Secur. Commun. Networks 2021: 6658842:1-6658842:16 (2021) - [j14]Fangwei Wang, Yuanyuan Lu, Changguang Wang, Qingru Li:
Binary Black-Box Adversarial Attacks with Evolutionary Learning against IoT Malware Detection. Wirel. Commun. Mob. Comput. 2021: 8736946:1-8736946:9 (2021) - 2020
- [j13]Changguang Wang, Zimeng Dai, Dongmei Zhao, Fangwei Wang:
A Novel Identity-based Authentication Scheme for IoV Security. Int. J. Netw. Secur. 22(4): 627-637 (2020) - [c10]Fangwei Wang, Shaojie Yang, Changguang Wang, Qingru Li:
A Novel Intrusion Detection System for Malware Based on Time-Series Meta-learning. ML4CS (1) 2020: 50-64 - [c9]Fangwei Wang, Yuanyuan Lu, Qingru Li, Changguang Wang:
A Feature-Based Detection System of Adversarial Sample Attack. ML4CS (2) 2020: 494-500 - [c8]Fangwei Wang, Guofang Chai, Qingru Li, Changguang Wang:
MagNet with Randomization Defense against Adversarial Examples. NaNA 2020: 316-320
2010 – 2019
- 2019
- [c7]Fangwei Wang, Shaojie Yang, Dongmei Zhao, Changguang Wang:
An Automatic Signature-Based Approach for Polymorphic Worms in Big Data Environment. NaNA 2019: 223-228 - 2017
- [j12]Fangwei Wang, Hongfeng Gao, Yong Yang, Changguang Wang:
An SVEIR Defending Model with Partial Immunization for Worms. Int. J. Netw. Secur. 19(1): 20-26 (2017) - 2016
- [j11]Fangwei Wang, Fang Yang, Changguang Wang, Dongmei Zhao, Yunkai Zhang:
Stability Analysis of a Worm Propagation Model with Quarantine and Vaccination. Int. J. Netw. Secur. 18(3): 493-500 (2016) - [j10]Fangwei Wang, Wen-Yan Huang, Yulong Shen, Changguang Wang:
Analysis of SVEIR worm attack model with saturated incidence and partial immunization. J. Commun. Inf. Networks 1(4): 105-115 (2016) - [c6]Liye Peng, Fangwei Wang, Changguang Wang:
An Improved Algorithm of Node Credibility Management for Lightweight WSN. NaNA 2016: 99-102 - [c5]Fangwei Wang, Changguang Wang, Dongmei Zhao, Yunkai Zhang:
Analysis of an SEIVR Epidemic Model with Partial Immunization and Nonlinear Infection Rate. NaNA 2016: 307-312 - 2015
- [j9]Fangwei Wang, Yunkai Zhang, Changguang Wang, Jianfeng Ma:
Stability analysis of an e-SEIAR model with point-to-group worm propagation. Commun. Nonlinear Sci. Numer. Simul. 20(3): 897-904 (2015) - [j8]Fangwei Wang, Yunkai Zhang, Yong Yang, Jianfang Ma:
Global Analysis of a SEIQV Epidemic Model for Scanning Worms with Quarantine Strategy. Int. J. Netw. Secur. 17(4): 423-430 (2015) - [j7]Fangwei Wang, Yong Yang, Dongmei Zhao, Yunkai Zhang:
A Worm Defending Model with Partial Immunization and Its Stability Analysis. J. Commun. 10(4): 276-283 (2015) - [c4]Zhaohao Sun, Francisca Pambel, Fangwei Wang:
Incorporating Big Data Analytics into Enterprise Information Systems. ICT-EurAsia/CONFENIS 2015: 300-309 - 2014
- [j6]Fangwei Wang, Fang Yang, Yunkai Zhang, Jianfeng Ma:
Stability Analysis of a SEIQRS Model with Graded Infection Rates for Internet Worms. J. Comput. 9(10): 2420-2427 (2014) - 2013
- [j5]Fangwei Wang, Yunkai Zhang, Honggang Guo, Changguang Wang:
Combating Good Point Set Scanning-based Self-learning Worms by Using Predators. Int. J. Netw. Secur. 15(3): 171-178 (2013) - 2010
- [j4]Fangwei Wang, Yunkai Zhang, Changguang Wang, Jianfeng Ma, Sang-Jae Moon:
Stability analysis of a SEIQV epidemic model for rapid spreading worms. Comput. Secur. 29(4): 410-418 (2010) - [j3]Fangwei Wang, Yunkai Zhang, Jianfeng Ma:
Modelling and Analyzing Passive Worms over Unstructured Peer-to-Peer Networks. Int. J. Netw. Secur. 11(1): 39-45 (2010) - [c3]Fangwei Wang, Yunkai Zhang, Honggang Guo, Changguang Wang:
Combating self-learning worms by using predators. WCNIS 2010: 607-611
2000 – 2009
- 2009
- [j2]Fangwei Wang, Yunkai Zhang, Jianfeng Ma:
Defending passive worms in unstructured P2P networks based on healthy file dissemination. Comput. Secur. 28(7): 628-636 (2009) - [j1]Fangwei Wang, Yunkai Zhang, Jianfeng Ma:
Modeling and analysis of a self-learning worm based on good point set scanning. Wirel. Commun. Mob. Comput. 9(4): 573-586 (2009) - [c2]Fangwei Wang, Yunkai Zhang, Changguang Wang, Jianfeng Ma:
Predators Combat Good Point Set Scanning-Based Self-Learning Worms. CIS (1) 2009: 418-422 - 2005
- [c1]Yunkai Zhang, Fangwei Wang, Changguang Wang, Jianfeng Ma:
Worm Propagation Modeling and Analysis on Network. CIS (2) 2005: 476-481
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-10 02:11 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint