![](https://dblp.uni-trier.de./img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
Weina Niu
Person information
Refine list
![note](https://dblp.uni-trier.de./img/note-mark.dark.12x12.png)
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j34]Weina Niu, Kexuan Zhang, Ran Yan, Jie Li, Yan Zhang, Xiaosong Zhang:
ROPGMN: Effective ROP and variants discovery using dynamic feature and graph matching network. Future Gener. Comput. Syst. 164: 107567 (2025) - 2024
- [b1]Weina Niu, Xiaosong Zhang, Ran Yan, Jiacheng Gong:
Android Malware Detection and Adversarial Methods. Springer 2024, ISBN 978-981-97-1458-2, pp. 3-190 - [j33]Junpeng He
, Lingfeng Yao, Xiong Li, Muhammad Khurram Khan, Weina Niu, Xiaosong Zhang, Fagen Li:
Model-agnostic generation-enhanced technology for few-shot intrusion detection. Appl. Intell. 54(4): 3181-3204 (2024) - [j32]Weina Niu, Xuhan Liao, Shiping Huang, Yudong Li, Xiaosong Zhang, Beibei Li
:
A robust Wide & Deep learning framework for log-based anomaly detection. Appl. Soft Comput. 153: 111314 (2024) - [j31]Qingjun Yuan
, Weina Niu
, Yongjuan Wang
, Gaopeng Gou, Bin Lu
:
Malicious Traffic Detection With Noise Labels Based on Cross-Modal Consistency. IEEE Netw. Lett. 6(2): 148-151 (2024) - [j30]Weina Niu
, Zimu Li, Zhaoxu He, Aduo Wang, Beibei Li
, Xiaosong Zhang
:
FSMFLog: Discovering Anomalous Logs Combining Full Semantic Information and Multifeature Fusion. IEEE Internet Things J. 11(3): 4442-4453 (2024) - [j29]Guangyuan Gao, Weina Niu
, Jiacheng Gong
, Dujuan Gu, Song Li, Mingxue Zhang
, Xiaosong Zhang
:
GraphTunnel: Robust DNS Tunnel Detection Based on DNS Recursive Resolution Graph. IEEE Trans. Inf. Forensics Secur. 19: 7705-7719 (2024) - [j28]Jiacheng Gong
, Weina Niu
, Song Li
, Mingxue Zhang
, Xiaosong Zhang
:
Sensitive Behavioral Chain-Focused Android Malware Detection Fused With AST Semantics. IEEE Trans. Inf. Forensics Secur. 19: 9216-9229 (2024) - [c21]Xin Liu
, Yuanyuan Huang
, Tianyi Wang
, Song Li
, Weina Niu
, Jun Shen
, Qingguo Zhou
, Xiaokang Zhou
:
SQLStateGuard: Statement-Level SQL Injection Defense Based on Learning-Driven Middleware. SoCC 2024: 69-82 - [c20]Lingfeng Yao, Anran Hou, Weina Niu, Qingjun Yuan
, Junpeng He, Yanfeng Zhang:
Gedss: A Generic Framework to Enhance Model Robustness for Intrusion Detection on Noisy Data. CSCWD 2024: 1645-1650 - [c19]Junpeng He, Hanyue Kong, Shihe Zhang, Xiong Li, Weina Niu, Xiaosong Zhang, Fagen Li:
Local Augmentation with Functionality-Preservation for Semi-Supervised Graph Intrusion Detection. ICC 2024: 2047-2052 - [c18]Lingfeng Yao, Weina Niu, Qingjun Yuan, Beibei Li, Yanfeng Zhang, Xiaosong Zhang:
A Robust Malicious Traffic Detection Framework with Low-quality Labeled Data. ICC 2024: 2719-2724 - [c17]Xuan Hai, Xin Liu, Zhaorun Chen, Yuan Tan, Song Li, Weina Niu, Gang Liu, Rui Zhou, Qingguo Zhou:
Ghost-in-Wave: How Speaker-Irrelative Features Interfere DeepFake Voice Detectors. ICME 2024: 1-6 - [c16]Ziang Liu, Xin Liu, Yingli Zhang, Zihao Zhang, Song Li, Weina Niu, Qingguo Zhou, Rui Zhou, Xiaokang Zhou:
LiScopeLens: An Open-Source License Incompatibility Analysis Tool Based on Scope Representation of License Terms. ISSRE 2024: 13-24 - [c15]Xuan Hai
, Xin Liu
, Yuan Tan
, Gang Liu
, Song Li
, Weina Niu
, Rui Zhou
, Xiaokang Zhou
:
What's the Real: A Novel Design Philosophy for Robust AI-Synthesized Voice Detection. ACM Multimedia 2024: 6900-6909 - [c14]Zheyuan He, Zihao Li
, Ao Qiao, Xiapu Luo, Xiaosong Zhang, Ting Chen, Shuwei Song, Dijun Liu, Weina Niu:
Nurgle: Exacerbating Resource Consumption in Blockchain State Storage via MPT Manipulation. SP 2024: 2180-2197 - [c13]Jiaxi Yang, Sheng Cao, Cuifang Zhao, Weina Niu, Li-Chuan Tsai:
Portfolio-Based Incentive Mechanism Design for Cross-Device Federated Learning. WCNC 2024: 1-6 - [i2]Zheyuan He, Zihao Li, Ao Qiao, Xiapu Luo, Xiaosong Zhang, Ting Chen, Shuwei Song, Dijun Liu, Weina Niu:
Nurgle: Exacerbating Resource Consumption in Blockchain State Storage via MPT Manipulation. CoRR abs/2406.10687 (2024) - 2023
- [j27]Weina Niu, Yuheng Luo, Kangyi Ding, Xiaosong Zhang, Yanping Wang, Beibei Li:
A Novel Generation Method for Diverse Privacy Image Based on Machine Learning. Comput. J. 66(3): 540-553 (2023) - [j26]Weina Niu
, Yihang Wang
, Xingyu Liu, Ran Yan, Xiong Li
, Xiaosong Zhang:
GCDroid: Android Malware Detection Based on Graph Compression With Reachability Relationship Extraction for IoT Devices. IEEE Internet Things J. 10(13): 11343-11356 (2023) - [c12]Tianrui Wang, Weina Niu, Kangyi Ding, Lingfeng Yao, Pengsen Cheng, Xiaosong Zhang:
Black-box Word-level Textual Adversarial Attack Based On Discrete Harris Hawks Optimization. CSCWD 2023: 1166-1171 - [c11]Youlin Li, Weina Niu, Yukun Zhu
, Jiacheng Gong, Beibei Li
, Xiaosong Zhang:
Fuzzing Logical Bugs in eBPF Verifier with Bound-Violation Indicator. ICC 2023: 753-758 - [c10]Jia Hu, Weina Niu, Qingjun Yuan
, Lingfeng Yao, Junpeng He
, Yanfeng Zhang, Xiaosong Zhang:
DEML: Data-Enhanced Meta-Learning Method for IoT APT Traffic Detection. ICDF2C (1) 2023: 212-226 - [i1]Jiaxi Yang, Sheng Cao, Cuifang Zhao, Weina Niu, Li-Chuan Tsai:
Portfolio-Based Incentive Mechanism Design for Cross-Device Federated Learning. CoRR abs/2305.04081 (2023) - 2022
- [j25]Zhenfei Zhao, Weina Niu, Xiaosong Zhang, Runzi Zhang
, Zhenqi Yu, Cheng Huang:
Trine: Syslog anomaly detection with three transformer encoders in one generative adversarial network. Appl. Intell. 52(8): 8810-8819 (2022) - [j24]Weina Niu
, Jie Zhou, Yibin Zhao, Xiaosong Zhang, Yujie Peng, Cheng Huang
:
Uncovering APT malware traffic using deep learning combined with time sequence and association analysis. Comput. Secur. 120: 102809 (2022) - [j23]Hang Zhu
, Weina Niu
, Xuhan Liao
, Xiaosong Zhang
, Xiaofen Wang
, Beibei Li
, Zheyuan He
:
Attacker Traceability on Ethereum through Graph Analysis. Secur. Commun. Networks 2022: 3448950:1-3448950:12 (2022) - [j22]Kangyi Ding, Teng Hu
, Weina Niu
, Xiaolei Liu
, Junpeng He
, Mingyong Yin, Xiaosong Zhang:
A Novel Steganography Method for Character-Level Text Image Based on Adversarial Attacks. Sensors 22(17): 6497 (2022) - [c9]Weina Niu, Zhenqi Yu, Zimu Li, Beibei Li
, Runzi Zhang
, Xiaosong Zhang:
LogTracer: Efficient Anomaly Tracing Combining System Log Detection and Provenance Graph. GLOBECOM 2022: 3356-3361 - [c8]Kangyi Ding, Teng Hu, Xiaolei Liu, Weina Niu, Yanping Wang, Xiaosong Zhang:
Targeted Anonymization: A Face Image Anonymization Method for Unauthorized Models. ICME 2022: 1-6 - [c7]Xiaoxiao Zhou, Weina Niu, Xiaosong Zhang, Ruidong Chen, Yan Wang:
A Fine-Grained Approach for Vulnerabilities Discovery Using Augmented Vulnerability Signatures. KSEM (3) 2022: 27-38 - [c6]Jie Li, Weina Niu, Ran Yan, Zhiqin Duan, Beibei Li
, Xiaosong Zhang:
IDROP: Intelligently detecting Return-Oriented Programming using real-time execution flow and LSTM. TrustCom 2022: 167-174 - 2021
- [j21]Weina Niu
, Jian'An Xiao, Xiyue Zhang
, Xiaosong Zhang, Xiaojiang Du
, Xiaoming Huang, Mohsen Guizani
:
Malware on Internet of UAVs Detection Combining String Matching and Fourier Transformation. IEEE Internet Things J. 8(12): 9905-9919 (2021) - [j20]Teng Hu, Xiaolei Liu, Ting Chen, Xiaosong Zhang, Xiaoming Huang, Weina Niu, Jiazhong Lu
, Kun Zhou, Yuan Liu:
Transaction-based classification and detection approach for Ethereum smart contract. Inf. Process. Manag. 58(2): 102462 (2021) - [j19]Ying Li, Jiaxing Cheng, Cheng Huang
, Zhouguo Chen, Weina Niu:
NEDetector: Automatically extracting cybersecurity neologisms from hacker forums. J. Inf. Secur. Appl. 58: 102784 (2021) - [j18]Wenbo Guo
, Cheng Huang, Weina Niu, Yong Fang
:
Intelligent mining vulnerabilities in python code snippets. J. Intell. Fuzzy Syst. 41(2): 3615-3628 (2021) - [j17]Kangyi Ding, Xiaolei Liu, Weina Niu, Teng Hu, Yanping Wang, Xiaosong Zhang:
A low-query black-box adversarial attack based on transferability. Knowl. Based Syst. 226: 107102 (2021) - [j16]Weina Niu
, Jiao Xie
, Xiaosong Zhang
, Chong Wang
, Xin-Qiang Li
, Ruidong Chen
, Xiao-Lei Liu
:
HTTP-Based APT Malware Infection Detection Using URL Correlation Analysis. Secur. Commun. Networks 2021: 6653386:1-6653386:12 (2021) - [c5]Beibei Li
, Yukun Jiang, Wenbin Sun, Weina Niu, Peiran Wang:
FedVANET: Efficient Federated Learning with Non-IID Data for Vehicular Ad Hoc Networks. GLOBECOM 2021: 1-6 - 2020
- [j15]Rongfeng Zheng, Jiayong Liu
, Weina Niu, Liang Liu, Kai Li, Shan Liao:
Preprocessing Method for Encrypted Traffic Based on Semisupervised Clustering. Secur. Commun. Networks 2020: 8824659:1-8824659:13 (2020) - [j14]Weina Niu
, Rong Cao, Xiaosong Zhang, Kangyi Ding, Kaimeng Zhang, Ting Li:
OpCode-Level Function Call Graph Based Android Malware Classification Using Deep Learning. Sensors 20(13): 3645 (2020) - [c4]Xiaolei Liu, Teng Hu, Kangyi Ding, Yang Bai, Weina Niu, Jiazhong Lu:
A Black-Box Attack on Neural Networks Based on Swarm Evolutionary Algorithm. ACISP 2020: 268-284
2010 – 2019
- 2019
- [j13]Jiazhong Lu
, Weina Niu, Xiaolei Liu, Teng Hu, Xiaosong Zhang:
A Lockable Abnormal Electromagnetic Signal Joint Detection Algorithm. Int. J. Pattern Recognit. Artif. Intell. 33(13): 1958009:1-1958009:17 (2019) - [j12]Weina Niu
, Ting Li, Xiaosong Zhang
, Teng Hu
, Tianyu Jiang, Heng Wu:
Using XGBoost to Discover Infected Hosts Based on HTTP Traffic. Secur. Commun. Networks 2019: 2182615:1-2182615:11 (2019) - [j11]Teng Hu
, Weina Niu
, Xiaosong Zhang
, Xiaolei Liu, Jiazhong Lu
, Yuan Liu:
An Insider Threat Detection Approach Based on Mouse Dynamics and Deep Learning. Secur. Commun. Networks 2019: 3898951:1-3898951:12 (2019) - [j10]Weina Niu
, Zhongliu Zhuo
, Xiaosong Zhang
, Xiaojiang Du
, Guowu Yang, Mohsen Guizani
:
A Heuristic Statistical Testing Based Approach for Encrypted Network Traffic Identification. IEEE Trans. Veh. Technol. 68(4): 3843-3853 (2019) - [j9]Weina Niu, Xiaosong Zhang, Xiaojiang Du, Teng Hu, Xin Xie, Nadra Guizani:
Detecting Malware on X86-Based IoT Devices in Autonomous Driving. IEEE Wirel. Commun. 26(4): 80-87 (2019) - [c3]Xin Xie, Weina Niu, Xiaosong Zhang, Zhongwei Ren, Yuheng Luo, Jiangchao Li:
Co-Clustering Host-Domain Graphs to Discover Malware Infection. AIAM (ACM) 2019: 49:1-49:6 - 2018
- [j8]Weina Niu, Xiaosong Zhang, Guowu Yang, Zhongliu Zhuo, Jiazhong Lu:
具有异构感染率的僵尸网络建模与分析 (Modeling and Analysis of Botnet with Heterogeneous Infection Rate). 计算机科学 45(7): 135-138 (2018) - [j7]Zhihong Rao, Weina Niu, Xiaosong Zhang, Hongwei Li:
Tor anonymous traffic identification based on gravitational clustering. Peer-to-Peer Netw. Appl. 11(3): 592-601 (2018) - [j6]Zhiyuan Ma
, Guangchun Luo, Ke Qin, Nan Wang, Weina Niu:
Online Sensor Drift Compensation for E-Nose Systems Using Domain Adaptation and Extreme Learning Machine. Sensors 18(3): 742 (2018) - [j5]Zhiyuan Ma
, Guangchun Luo
, Ke Qin
, Nan Wang, Weina Niu:
Weighted Domain Transfer Extreme Learning Machine and Its Online Version for Gas Sensor Drift Compensation in E-Nose Systems. Wirel. Commun. Mob. Comput. 2018 (2018) - [j4]Dong Wang
, Xiaosong Zhang
, Jiang Ming, Ting Chen, Chao Wang
, Weina Niu
:
Resetting Your Password Is Vulnerable: A Security Study of Common SMS-Based Authentication in IoT Device. Wirel. Commun. Mob. Comput. 2018: 7849065:1-7849065:15 (2018) - 2017
- [j3]Weina Niu, Xiaosong Zhang, Guowu Yang, Ruidong Chen, Dong Wang:
Modeling Attack Process of Advanced Persistent Threat Using Network Evolution. IEICE Trans. Inf. Syst. 100-D(10): 2275-2286 (2017) - [c2]Weina Niu, Xiaosong Zhang, Guowu Yang, Zhiyuan Ma, Zhongliu Zhuo:
Phishing Emails Detection Using CS-SVM. ISPA/IUCC 2017: 1054-1059 - 2016
- [j2]Zhongliu Zhuo, Xiaosong Zhang, Weina Niu, Guowu Yang, Jingzhong Zhang:
Improving data field hierarchical clustering using Barnes-Hut algorithm. Pattern Recognit. Lett. 80: 113-120 (2016) - [c1]Weina Niu, Xiaosong Zhang, Kenli Li, Guowu Yang, Ruidong Chen:
Modeling Attack Process of Advanced Persistent Threat. SpaCCS 2016: 383-391 - 2014
- [j1]Qing-bin Luo, Guowu Yang, Kun She, Weina Niu, Yuqi Wang:
Multi-party quantum private comparison protocol based on d-dimensional entangled states. Quantum Inf. Process. 13(10): 2343-2352 (2014)
Coauthor Index
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-21 00:05 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint