default search action
Sheng Wen
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j98]Shaoyong Luo, Sheng Wen, Lei Zhang, Yubin Lan, Xiaoshuai Chen:
Extraction of crop canopy features and decision-making for variable spraying based on unmanned aerial vehicle LiDAR data. Comput. Electron. Agric. 224: 109197 (2024) - [j97]Lihong Tang, Tingmin Wu, Xiao Chen, Sheng Wen, Wei Zhou, Xiaogang Zhu, Yang Xiang:
How COVID-19 impacts telehealth: an empirical study of telehealth services, users and the use of metaverse. Connect. Sci. 36(1) (2024) - [j96]Tengyun Jiao, Zhiyu Xu, Minfeng Qi, Sheng Wen, Yang Xiang, Gary Nan:
A Survey of Ethereum Smart Contract Security: Attacks and Detection. Distributed Ledger Technol. Res. Pract. 3(3): 23:1-23:28 (2024) - [j95]Lihong Tang, Xiao Chen, Sheng Wen, Li Li, Marthie Grobler, Yang Xiang:
Demystifying the Evolution of Android Malware Variants. IEEE Trans. Dependable Secur. Comput. 21(4): 3324-3341 (2024) - [j94]Wanlun Ma, Yiliao Song, Minhui Xue, Sheng Wen, Yang Xiang:
The "Code" of Ethics: A Holistic Audit of AI Code Generators. IEEE Trans. Dependable Secur. Comput. 21(5): 4997-5013 (2024) - [j93]Gaolei Fei, Yang Liu, Guangmin Hu, Sheng Wen, Yang Xiang:
Online Social Network User Home Location Inference Based on Heterogeneous Networks. IEEE Trans. Dependable Secur. Comput. 21(6): 5509-5525 (2024) - [j92]Wanlun Ma, Derui Wang, Chao Chen, Sheng Wen, Gaolei Fei, Yang Xiang:
LocGuard: A Location Privacy Defender for Image Sharing. IEEE Trans. Dependable Secur. Comput. 21(6): 5526-5537 (2024) - [j91]Xiaogang Zhu, Siyu Zhang, Chaoran Li, Sheng Wen, Yang Xiang:
Fuzzing Android Native System Libraries via Dynamic Data Dependency Graph. IEEE Trans. Inf. Forensics Secur. 19: 3733-3744 (2024) - [j90]Xiangyu Hu, Hanpeng Cai, Mamoun Alazab, Wei Zhou, Mohammad Sayad Haghighi, Sheng Wen:
Federated Learning in Industrial IoT: A Privacy-Preserving Solution That Enables Sharing of Data in Hydrocarbon Explorations. IEEE Trans. Ind. Informatics 20(3): 4337-4346 (2024) - [c55]Jianguo Yin, Sheng Wen, Chenhao Zhang, Meng Zhao:
Radar sequence HRRP target recognition based on DRSN-LSTM. CCEAI 2024: 66-72 - [c54]Xuanchun Yin, Junliang Xie, Pengyu Zhou, Sheng Wen, Jiantao Zhang:
A Helical Bistable Soft Gripper Enable by Pneumatic Actuation. ICRA 2024: 8807-8813 - [c53]Kunpeng Zhang, Xiaogang Zhu, Xi Xiao, Minhui Xue, Chao Zhang, Sheng Wen:
ShapFuzz: Efficient Fuzzing via Shapley-Guided Byte Selection. NDSS 2024 - [i25]Zehang Deng, Ruoxi Sun, Minhui Xue, Sheng Wen, Seyit Camtepe, Surya Nepal, Yang Xiang:
Leakage-Resilient and Carbon-Neutral Aggregation Featuring the Federated AI-enabled Critical Infrastructure. CoRR abs/2405.15258 (2024) - [i24]Zehang Deng, Yongjian Guo, Changzhou Han, Wanlun Ma, Junwu Xiong, Sheng Wen, Yang Xiang:
AI Agents Under Threat: A Survey of Key Security Challenges and Future Pathways. CoRR abs/2406.02630 (2024) - [i23]Yuxin Cao, Yumeng Zhu, Derui Wang, Sheng Wen, Minhui Xue, Jin Lu, Hao Ge:
Rethinking the Threat and Accessibility of Adversarial Attacks against Face Recognition Systems. CoRR abs/2407.08514 (2024) - [i22]Duoxun Tang, Yuxin Cao, Xi Xiao, Derui Wang, Sheng Wen, Tianqing Zhu:
Query-Efficient Video Adversarial Attack with Stylized Logo. CoRR abs/2408.12099 (2024) - 2023
- [j89]Zhiniang Peng, Wei Zhou, Xiaogang Zhu, Youke Wu, Sheng Wen:
On the security of fully homomorphic encryption for data privacy in Internet of Things. Concurr. Comput. Pract. Exp. 35(19) (2023) - [j88]Huacheng Li, Chunhe Xia, Tianbo Wang, Sheng Wen, Chao Chen, Yang Xiang:
Capturing Dynamics of Information Diffusion in SNS: A Survey of Methodology and Techniques. ACM Comput. Surv. 55(2): 22:1-22:51 (2023) - [j87]Xiaotao Feng, Xiaogang Zhu, Qing-Long Han, Wei Zhou, Sheng Wen, Yang Xiang:
Detecting Vulnerability on IoT Device Firmware: A Survey. IEEE CAA J. Autom. Sinica 10(1): 25-41 (2023) - [j86]Xuanchun Yin, Jinchun Yan, Sheng Wen, Jiantao Zhang, Muye Pang:
Origami-Based Decoupling Clutch Achieves Energy-Efficient Legged Robots. IEEE Robotics Autom. Lett. 8(12): 8058-8065 (2023) - [j85]Xiaoqin Feng, Jianfeng Ma, Huaxiong Wang, Sheng Wen, Yang Xiang, Yinbin Miao:
Space-Efficient Storage Structure of Blockchain Transactions Supporting Secure Verification. IEEE Trans. Cloud Comput. 11(3): 2631-2645 (2023) - [j84]Gaolei Fei, Yong Cheng, Wanlun Ma, Chao Chen, Sheng Wen, Guangmin Hu:
Real-Time Detection of COVID-19 Events From Twitter: A Spatial-Temporally Bursty-Aware Method. IEEE Trans. Comput. Soc. Syst. 10(2): 656-672 (2023) - [j83]Lihong Tang, Tingmin Wu, Xiao Chen, Sheng Wen, Li Li, Xin Xia, Marthie Grobler, Yang Xiang:
How Does Visualisation Help App Practitioners Analyse Android Apps? IEEE Trans. Dependable Secur. Comput. 20(3): 2238-2255 (2023) - [j82]Chuan Xu, Yingyi Ding, Chao Chen, Yong Ding, Wei Zhou, Sheng Wen:
Personalized Location Privacy Protection for Location-Based Services in Vehicular Networks. IEEE Trans. Intell. Transp. Syst. 24(1): 1163-1177 (2023) - [j81]Rongjunchen Zhang, Tingmin Wu, Sheng Wen, Surya Nepal, Cécile Paris, Yang Xiang:
SAM: Multi-turn Response Selection Based on Semantic Awareness Matching. ACM Trans. Internet Techn. 23(1): 3:1-3:18 (2023) - [c52]Wanlun Ma, Derui Wang, Ruoxi Sun, Minhui Xue, Sheng Wen, Yang Xiang:
The "Beatrix" Resurrections: Robust Backdoor Detection via Gram Matrices. NDSS 2023 - [c51]Yuxin Cao, Xi Xiao, Ruoxi Sun, Derui Wang, Minhui Xue, Sheng Wen:
StyleFool: Fooling Video Classification Systems via Style Transfer. SP 2023: 1631-1648 - [c50]Yuxing Zhang, Xiaogang Zhu, Daojing He, Minhui Xue, Shouling Ji, Mohammad Sayad Haghighi, Sheng Wen, Zhiniang Peng:
Detecting Union Type Confusion in Component Object Model. USENIX Security Symposium 2023: 4265-4281 - [c49]Rongjunchen Zhang, Tingmin Wu, Xiao Chen, Sheng Wen, Surya Nepal, Cécile Paris, Yang Xiang:
Dynalogue: A Transformer-Based Dialogue System with Dynamic Attention. WWW 2023: 1604-1615 - [i21]Wanlun Ma, Yiliao Song, Minhui Xue, Sheng Wen, Yang Xiang:
The "code" of Ethics: A Holistic Audit of AI Code Generators. CoRR abs/2305.12747 (2023) - [i20]Kunpeng Zhang, Xiaogang Zhu, Xi Xiao, Minhui Xue, Chao Zhang, Sheng Wen:
SHAPFUZZ: Efficient Fuzzing via Shapley-Guided Byte Selection. CoRR abs/2308.09239 (2023) - 2022
- [j80]Jiadong Lu, Fangming Gu, Yiqi Wang, Jiahui Chen, Zhiniang Peng, Sheng Wen:
Static Detection of File Access Control Vulnerabilities on Windows System. Concurr. Comput. Pract. Exp. 34(16) (2022) - [j79]Xiangyu Hu, Wanlun Ma, Chao Chen, Sheng Wen, Jun Zhang, Yang Xiang, Gaolei Fei:
Event detection in online social network: Methodologies, state-of-art, and evolution. Comput. Sci. Rev. 46: 100500 (2022) - [j78]Xiaogang Zhu, Sheng Wen, Seyit Camtepe, Yang Xiang:
Fuzzing: A Survey for Roadmap. ACM Comput. Surv. 54(11s): 230:1-230:36 (2022) - [j77]Jun Zhang, Lei Pan, Qing-Long Han, Chao Chen, Sheng Wen, Yang Xiang:
Deep Learning Based Attack Detection for Cyber-Physical System Cybersecurity: A Survey. IEEE CAA J. Autom. Sinica 9(3): 377-391 (2022) - [j76]Feixue Yan, Sheng Wen, Surya Nepal, Cécile Paris, Yang Xiang:
Explainable machine learning in cybersecurity: A survey. Int. J. Intell. Syst. 37(12): 12305-12334 (2022) - [j75]Xuanchun Yin, Jinchun Yan, Sheng Wen, Jiantao Zhang:
Magnetorheological Fluid-Based Bending Actuator for Magnetic Sensing. IEEE Robotics Autom. Lett. 7(4): 12169-12176 (2022) - [j74]Xuanchun Yin, Jinchun Yan, Sheng Wen, Jiantao Zhang:
Spring-linkage integrated mechanism design for jumping robots. Robotics Auton. Syst. 158: 104268 (2022) - [j73]Derui Wang, Chaoran Li, Sheng Wen, Qing-Long Han, Surya Nepal, Xiangyu Zhang, Yang Xiang:
Daedalus: Breaking Nonmaximum Suppression in Object Detection via Adversarial Examples. IEEE Trans. Cybern. 52(8): 7427-7440 (2022) - [j72]Xiaogang Zhu, Xiaotao Feng, Xiaozhu Meng, Sheng Wen, Seyit Camtepe, Yang Xiang, Kui Ren:
CSI-Fuzz: Full-Speed Edge Tracing Using Coverage Sensitive Instrumentation. IEEE Trans. Dependable Secur. Comput. 19(2): 912-923 (2022) - [j71]Derui Wang, Chaoran Li, Sheng Wen, Surya Nepal, Yang Xiang:
Defending Against Adversarial Attack Towards Deep Neural Networks Via Collaborative Multi-Task Training. IEEE Trans. Dependable Secur. Comput. 19(2): 953-965 (2022) - [j70]Chaoran Li, Xiao Chen, Derui Wang, Sheng Wen, Muhammad Ejaz Ahmed, Seyit Camtepe, Yang Xiang:
Backdoor Attack on Machine Learning Based Android Malware Detectors. IEEE Trans. Dependable Secur. Comput. 19(5): 3357-3370 (2022) - [j69]Tian Wang, Haoxiong Ke, Alireza Jolfaei, Sheng Wen, Mohammad Sayad Haghighi, Shuqiang Huang:
Missing Value Filling Based on the Collaboration of Cloud and Edge in Artificial Intelligence of Things. IEEE Trans. Ind. Informatics 18(8): 5394-5402 (2022) - [j68]Xuanchun Yin, Pengyu Zhou, Sheng Wen, Jiantao Zhang:
Origami Improved Dielectric Elastomer Actuation for Tunable Lens. IEEE Trans. Instrum. Meas. 71: 1-9 (2022) - [j67]Wanlun Ma, Xiangyu Hu, Chao Chen, Sheng Wen, Kim-Kwang Raymond Choo, Yang Xiang:
Social Media Event Prediction using DNN with Feedback Mechanism. ACM Trans. Manag. Inf. Syst. 13(3): 33:1-33:24 (2022) - [j66]Xiaogang Zhu, Sheng Wen, Alireza Jolfaei, Mohammad Sayad Haghighi, Seyit Camtepe, Yang Xiang:
Vulnerability Detection in SIoT Applications: A Fuzzing Method on their Binaries. IEEE Trans. Netw. Sci. Eng. 9(3): 970-979 (2022) - [j65]Derui Wang, Sheng Wen, Alireza Jolfaei, Mohammad Sayad Haghighi, Surya Nepal, Yang Xiang:
On the Neural Backdoor of Federated Generative Models in Edge Computing. ACM Trans. Internet Techn. 22(2): 43:1-43:21 (2022) - [j64]Tingmin Wu, Wanlun Ma, Sheng Wen, Xin Xia, Cécile Paris, Surya Nepal, Yang Xiang:
Analysis of Trending Topics and Text-based Channels of Information Delivery in Cybersecurity. ACM Trans. Internet Techn. 22(2): 52:1-52:27 (2022) - [j63]Jiaqi Liu, Shiyue Huang, Deng Li, Sheng Wen, Hui Liu:
Addictive Incentive Mechanism in Crowdsensing From the Perspective of Behavioral Economics. IEEE Trans. Parallel Distributed Syst. 33(5): 1109-1127 (2022) - [c48]Lei Shi, Shanti Krishnan, Sheng Wen:
Study Cybersecurity of Cyber Physical System in the Virtual Environment: A Survey and New Direction. ACSW 2022: 46-55 - [c47]Kunpeng Zhang, Xi Xiao, Xiaogang Zhu, Ruoxi Sun, Minhui Xue, Sheng Wen:
Path Transitions Tell More: Optimizing Fuzzing Schedules via Runtime Program States. ICSE 2022: 1658-1668 - [c46]Lei Shi, Shanti Krishnan, Sheng Wen, Yang Xiang:
Supporting Cyber-Attacks and System Anomaly Detection Research with an Industry 4.0 Dataset. NSS 2022: 335-353 - [c45]Chaoran Li, Xiao Chen, Ruoxi Sun, Minhui Xue, Sheng Wen, Muhammad Ejaz Ahmed, Seyit Camtepe, Yang Xiang:
Cross-language Android permission specification. ESEC/SIGSOFT FSE 2022: 772-783 - [c44]Minfeng Qi, Zhiyu Xu, Tengyun Jiao, Sheng Wen, Yang Xiang, Gary Nan:
A Comparative Study on the Security of Cryptocurrency Wallets in Android System. TrustCom 2022: 399-406 - [i19]Kunpeng Zhang, Xi Xiao, Xiaogang Zhu, Ruoxi Sun, Minhui Xue, Sheng Wen:
Path Transitions Tell More: Optimizing Fuzzing Schedules via Runtime Program States. CoRR abs/2201.04441 (2022) - [i18]Xiaoyu Sun, Xiao Chen, Kui Liu, Sheng Wen, Li Li, John C. Grundy:
Characterizing Sensor Leaks in Android Apps. CoRR abs/2201.06235 (2022) - [i17]Yuxin Cao, Xi Xiao, Ruoxi Sun, Derui Wang, Minhui Xue, Sheng Wen:
StyleFool: Fooling Video Classification Systems via Style Transfer. CoRR abs/2203.16000 (2022) - [i16]Wanlun Ma, Derui Wang, Ruoxi Sun, Minhui Xue, Sheng Wen, Yang Xiang:
The "Beatrix" Resurrections: Robust Backdoor Detection via Gram Matrices. CoRR abs/2209.11715 (2022) - 2021
- [j62]Jiale Deng, Xiaogang Zhu, Xi Xiao, Sheng Wen, Qing Li, Shutao Xia:
Fuzzing With Optimized Grammar-Aware Mutation Strategies. IEEE Access 9: 95061-95071 (2021) - [j61]Derui Wang, Chaoran Li, Sheng Wen, Surya Nepal, Yang Xiang:
Man-in-the-Middle Attacks Against Machine Learning Classifiers Via Malicious Generative Models. IEEE Trans. Dependable Secur. Comput. 18(5): 2074-2087 (2021) - [j60]Xiaogang Zhu, Sheng Wen, Alireza Jolfaei, Seyit Camtepe, Yang Xiang:
Synthesized Corpora to Evaluate Fuzzing for Green Internet of Things Programs. IEEE Trans. Green Commun. Netw. 5(3): 1041-1050 (2021) - [j59]Xuanchun Yin, Chan Wu, Sheng Wen, Jiantao Zhang:
Smart Design of Z-Width Expanded Thumb Haptic Interface Using Magnetorheological Fluids. IEEE Trans. Instrum. Meas. 70: 1-11 (2021) - [j58]Faezeh Farivar, Mohammad Sayad Haghighi, Alireza Jolfaei, Sheng Wen:
On the Security of Networked Control Systems in Smart Vehicle and Its Adaptive Cruise Control. IEEE Trans. Intell. Transp. Syst. 22(6): 3824-3831 (2021) - [c43]Van Cuong Bui, Sheng Wen, Jiangshan Yu, Xin Xia, Mohammad Sayad Haghighi, Yang Xiang:
Evaluating Upgradable Smart Contract. Blockchain 2021: 252-256 - [c42]Zhiyu Xu, Minfeng Qi, Ziyuan Wang, Sheng Wen, Shiping Chen, Yang Xiang:
IB2P: An image-based privacy-preserving blockchain model for financial services. Blockchain 2021: 552-558 - [c41]Xiaotao Feng, Ruoxi Sun, Xiaogang Zhu, Minhui Xue, Sheng Wen, Dongxi Liu, Surya Nepal, Yang Xiang:
Snipuzz: Black-box Fuzzing of IoT Firmware via Message Snippet Inference. CCS 2021: 337-350 - [c40]Xiaoyu Sun, Xiao Chen, Kui Liu, Sheng Wen, Li Li, John Grundy:
Characterizing Sensor Leaks in Android Apps. ISSRE 2021: 498-509 - [c39]Dusit Niyato, Yan Zhang, Sheng Wen:
Message from the GreenCom 2021 General Chairs and Program Chairs: iThings-GreenCom-CPSCom-SmartData-Cybermatics 2021. iThings/GreenCom/CPSCom/SmartData/Cybermatics 2021: xxiv - [c38]Zhiyu Xu, Tengyun Jiao, Ziyuan Wang, Sheng Wen, Shiping Chen, Yang Xiang:
AC2M: An Automated Consent Management Model for Blockchain Financial Services Platform. SMDS 2021: 33-41 - [i15]Xiaotao Feng, Ruoxi Sun, Xiaogang Zhu, Minhui Xue, Sheng Wen, Dongxi Liu, Surya Nepal, Yang Xiang:
Snipuzz: Black-box Fuzzing of IoT Firmware via Message Snippet Inference. CoRR abs/2105.05445 (2021) - [i14]Huacheng Li, Chunhe Xia, Tianbo Wang, Sheng Wen, Chao Chen, Yang Xiang:
Capturing Dynamics of Information Diffusion in SNS: A Survey of Methodology and Techniques. CoRR abs/2110.14245 (2021) - [i13]Chaoran Li, Xiao Chen, Ruoxi Sun, Jason Xue, Sheng Wen, Muhammad Ejaz Ahmed, Seyit Camtepe, Yang Xiang:
NatiDroid: Cross-Language Android Permission Specification. CoRR abs/2111.08217 (2021) - 2020
- [j57]Gaolei Fei, Jian Ye, Sheng Wen, Guangmin Hu:
Network Topology Inference Using Higher-Order Statistical Characteristics of End-to-End Measured Delays. IEEE Access 8: 59960-59975 (2020) - [j56]Guanjun Lin, Sheng Wen, Qing-Long Han, Jun Zhang, Yang Xiang:
Software Vulnerability Detection Using Deep Neural Networks: A Survey. Proc. IEEE 108(10): 1825-1848 (2020) - [j55]Shigang Liu, Guanjun Lin, Qing-Long Han, Sheng Wen, Jun Zhang, Yang Xiang:
DeepBalance: Deep-Learning and Fuzzy Oversampling for Vulnerability Detection. IEEE Trans. Fuzzy Syst. 28(7): 1329-1343 (2020) - [j54]Xiao Chen, Chaoran Li, Derui Wang, Sheng Wen, Jun Zhang, Surya Nepal, Yang Xiang, Kui Ren:
Android HIV: A Study of Repackaging Malware for Evading Machine-Learning Detection. IEEE Trans. Inf. Forensics Secur. 15: 987-1001 (2020) - [c37]Zhiyu Xu, Qin Wang, Ziyuan Wang, Donghai Liu, Yang Xiang, Sheng Wen:
PPM: A Provenance-Provided Data Sharing Model for Open Banking via Blockchain. ACSW 2020: 5:1-5:8 - [c36]Tingmin Wu, Rongjunchen Zhang, Wanlun Ma, Sheng Wen, Xin Xia, Cécile Paris, Surya Nepal, Yang Xiang:
What risk? I don't understand. An Empirical Study on Users' Understanding of the Terms Used in Security Texts. AsiaCCS 2020: 248-262 - [c35]Zhenyu Li, Yujue Wang, Sheng Wen, Yong Ding:
Evil Chaincode: APT Attacks Based on Smart Contract. FCS 2020: 178-196 - [c34]Yi Li, Xi Xiao, Xiaogang Zhu, Xiao Chen, Sheng Wen, Bin Zhang:
SpeedNeuzz: Speed Up Neural Program Approximation with Neighbor Edge Knowledge. TrustCom 2020: 450-457 - [c33]Zhiyu Xu, Lin Yang, Ziyuan Wang, Sheng Wen, Rob Hanson, Shiping Chen, Yang Xiang:
BHDA - A Blockchain-Based Hierarchical Data Access Model for Financial Services. TrustCom 2020: 530-538 - [e5]Sheng Wen, Albert Y. Zomaya, Laurence T. Yang:
Algorithms and Architectures for Parallel Processing - 19th International Conference, ICA3PP 2019, Melbourne, VIC, Australia, December 9-11, 2019, Proceedings, Part I. Lecture Notes in Computer Science 11944, Springer 2020, ISBN 978-3-030-38990-1 [contents] - [e4]Sheng Wen, Albert Y. Zomaya, Laurence T. Yang:
Algorithms and Architectures for Parallel Processing - 19th International Conference, ICA3PP 2019, Melbourne, VIC, Australia, December 9-11, 2019, Proceedings, Part II. Lecture Notes in Computer Science 11945, Springer 2020, ISBN 978-3-030-38960-4 [contents] - [i12]Tingmin Wu, Wanlun Ma, Sheng Wen, Xin Xia, Cécile Paris, Surya Nepal, Yang Xiang:
Analysis of Trending Topics and Text-based Channels of Information Delivery in Cybersecurity. CoRR abs/2006.14765 (2020) - [i11]Faezeh Farivar, Mohammad Sayad Haghighi, Alireza Jolfaei, Sheng Wen:
On the Security of Networked Control Systems in Smart Vehicle and its Adaptive Cruise Control. CoRR abs/2008.00414 (2020) - [i10]Xiaogang Zhu, Shigang Liu, Xian Li, Sheng Wen, Jun Zhang, Seyit Ahmet Çamtepe, Yang Xiang:
DeFuzz: Deep Learning Guided Directed Fuzzing. CoRR abs/2010.12149 (2020)
2010 – 2019
- 2019
- [b1]Jiaojiao Jiang, Sheng Wen, Shui Yu, Bo Liu, Yang Xiang, Wanlei Zhou:
Malicious Attack Propagation and Source Identification. Advances in Information Security 73, Springer 2019, ISBN 978-3-030-02178-8, pp. 1-181 - [j53]Lihong Tang, Wanlun Ma, Marthie Grobler, Weizhi Meng, Yu Wang, Sheng Wen:
Faces are Protected as Privacy: An Automatic Tagging Framework Against Unpermitted Photo Sharing in Social Media. IEEE Access 7: 75556-75567 (2019) - [j52]Rongjunchen Zhang, Xiao Chen, Sheng Wen, Xi Zheng, Yong Ding:
Using AI to Attack VA: A Stealthy Spyware Against Voice Assistances in Smart Phones. IEEE Access 7: 153542-153554 (2019) - [j51]Tian Wang, Zhen Peng, Sheng Wen, Guojun Wang, Baowei Wang, Anfeng Liu:
A Survey of Fog Computing in Wireless Sensor Networks: Concepts, Frameworks, Applications and Issues. Ad Hoc Sens. Wirel. Networks 44(1-2): 109-130 (2019) - [j50]Sheng Wen, Jie Han, Zhihua Ning, Yubin Lan, Xuanchun Yin, Jiantao Zhang, Yufeng Ge:
Numerical analysis and validation of spray distributions disturbed by quad-rotor drone wake at different flight speeds. Comput. Electron. Agric. 166 (2019) - [j49]Sheng Wen, Ningwen Shen, Jiantao Zhang, Yubin Lan, Jie Han, Xuanchun Yin, Quanyong Zhang, Yufeng Ge:
Single-rotor UAV flow field simulation using generative adversarial networks. Comput. Electron. Agric. 167 (2019) - [j48]Xiangyu Hu, Lemin Li, Tingmin Wu, Xiaoxiang Ai, Jie Gu, Sheng Wen:
Every word is valuable: Studied influence of negative words that spread during election period in social media. Concurr. Comput. Pract. Exp. 31(21) (2019) - [j47]Sheng Wen, Aniello Castiglione, Tian Wang, Md. Zakirul Alam Bhuiyan:
Forward to the special issue of the 9th International Symposium on Cyberspace Safety and Security (CSS 2017). Concurr. Comput. Pract. Exp. 31(22) (2019) - [j46]Xuemeng Zhai, Wanlei Zhou, Gaolei Fei, Cai Lu, Sheng Wen, Guangmin Hu:
Edge-based stochastic network model reveals structural complexity of edges. Future Gener. Comput. Syst. 100: 1073-1087 (2019) - [j45]Deng Li, Sihui Wang, Jiaqi Liu, Hui Liu, Sheng Wen:
Crowdsensing From the Perspective of Behavioral Economics: An Incentive Mechanism Based on Mental Accounting. IEEE Internet Things J. 6(5): 9123-9139 (2019) - [j44]Meixia Miao, Jianfeng Wang, Sheng Wen, Jianfeng Ma:
Publicly verifiable database scheme with efficient keyword search. Inf. Sci. 475: 18-28 (2019) - [j43]Sheng Wen, Quanyong Zhang, Xuanchun Yin, Yubin Lan, Jiantao Zhang, Yufeng Ge:
Design of Plant Protection UAV Variable Spray System Based on Neural Networks. Sensors 19(5): 1112 (2019) - [j42]Tingmin Wu, Lihong Tang, Rongjunchen Zhang, Sheng Wen, Cécile Paris, Surya Nepal, Marthie Grobler, Yang Xiang:
Catering to Your Concerns: Automatic Generation of Personalised Security-Centric Descriptions for Android Apps. ACM Trans. Cyber Phys. Syst. 3(4): 36:1-36:21 (2019) - [j41]Tianbo Wang, Chunhe Xia, Sheng Wen, Hui Xue, Yang Xiang, Shouzhong Tu:
SADI: A Novel Model to Study the Propagation of Social Worms in Hierarchical Networks. IEEE Trans. Dependable Secur. Comput. 16(1): 142-155 (2019) - [j40]Derek Wang, Tingmin Wu, Sheng Wen, Xiaofeng Chen, Yang Xiang, Wanlei Zhou:
STC: Exposing Hidden Compromised Devices in Networked Sustainable Green Smart Computing Platforms by Partial Observation. IEEE Trans. Sustain. Comput. 4(2): 178-190 (2019) - [c32]Sheng Wen:
Session details: Keynote & Invited Talks. BSCI 2019 - [c31]Zhiyu Xu, Tengyun Jiao, Qin Wang, Cuong Bui Van, Sheng Wen, Yang Xiang:
An Efficient Supply Chain Architecture Based on Blockchain for High-value Commodities. BSCI 2019: 81-88 - [c30]Xiaogang Zhu, Xiaotao Feng, Tengyun Jiao, Sheng Wen, Yang Xiang, Seyit Camtepe, Jingling Xue:
A Feature-Oriented Corpus for Understanding, Evaluating and Improving Fuzz Testing. AsiaCCS 2019: 658-663 - [c29]Lei Shi, Xiao Chen, Sheng Wen, Yang Xiang:
Main Enabling Technologies in Industry 4.0 and Cybersecurity Threats. CSS (2) 2019: 588-597 - [c28]Zhiyu Xu, Tengyun Jiao, Lin Yang, Donghai Liu, Sheng Wen, Yang Xiang:
RBAC-GL: A Role-Based Access Control Gasless Architecture of Consortium Blockchain. ICA3PP (1) 2019: 439-453 - [c27]Rongjunchen Zhang, Xiao Chen, Sheng Wen, James Zheng:
Who Activated My Voice Assistant? A Stealthy Attack on Android Phones Without Users' Awareness. ML4CS 2019: 378-396 - [e3]Keke Gai, Kim-Kwang Raymond Choo, Debiao He, Sheng Wen:
Proceedings of the 2019 ACM International Symposium on Blockchain and Secure Critical Infrastructure, BSCI 2019, Auckland, New Zealand, July 8, 2019. ACM 2019, ISBN 978-1-4503-6786-8 [contents] - [i9]Derui Wang, Chaoran Li, Sheng Wen, Surya Nepal, Yang Xiang:
Daedalus: Breaking Non-Maximum Suppression in Object Detection via Adversarial Examples. CoRR abs/1902.02067 (2019) - [i8]Xiaotao Feng, Qin Wang, Xiaogang Zhu, Sheng Wen:
Bug Searching in Smart Contract. CoRR abs/1905.00799 (2019) - [i7]Xiaogang Zhu, Xiaotao Feng, Tengyun Jiao, Sheng Wen, Yang Xiang, Seyit Camtepe, Jingling Xue:
A Feature-Oriented Corpus for Understanding, Evaluating and Improving Fuzz Testing. CoRR abs/1905.01405 (2019) - [i6]Mahdi Dibaei, Xi Zheng, Kun Jiang, Sasa Maric, Robert Abbas, Shigang Liu, Yuexin Zhang, Yao Deng, Sheng Wen, Jun Zhang, Yang Xiang, Shui Yu:
An Overview of Attacks and Defences on Intelligent Connected Vehicles. CoRR abs/1907.07455 (2019) - [i5]Derui Wang, Chaoran Li, Sheng Wen, Surya Nepal, Yang Xiang:
Man-in-the-Middle Attacks against Machine Learning Classifiers via Malicious Generative Models. CoRR abs/1910.06838 (2019) - 2018
- [j39]Tingmin Wu, Sheng Wen, Yang Xiang, Wanlei Zhou:
Twitter spam detection: Survey of new approaches and comparative study. Comput. Secur. 76: 265-284 (2018) - [j38]Xingpo Ma, Junbin Liang, Jianxin Wang, Sheng Wen, Tian Wang, Yin Li, Wenpeng Ma, Chuanda Qi:
Secure fine-grained spatio-temporal Top-k queries in TMWSNs. Future Gener. Comput. Syst. 86: 174-184 (2018) - [j37]Weizhi Meng, Yu Wang, Duncan S. Wong, Sheng Wen, Yang Xiang:
TouchWB: Touch behavioral user authentication based on web browsing on smartphones. J. Netw. Comput. Appl. 117: 1-9 (2018) - [j36]Derek Wang, Tingmin Wu, Sheng Wen, Donghai Liu, Yang Xiang, Wanlei Zhou, Houcine Hassan, Abdulhameed Alelaiwi:
Pokémon GO in Melbourne CBD: A case study of the cyber-physical symbiotic social networks. J. Comput. Sci. 26: 456-467 (2018) - [j35]Huasheng Huang, Yubin Lan, Jizhong Deng, Aqing Yang, Xiaoling Deng, Lei Zhang, Sheng Wen:
A Semantic Labeling Approach for Accurate Weed Mapping of High Resolution UAV Imagery. Sensors 18(7): 2113 (2018) - [j34]Huasheng Huang, Jizhong Deng, Yubin Lan, Aqing Yang, Xiaoling Deng, Sheng Wen, Huihui Zhang, Yali Zhang:
Accurate Weed Mapping and Prescription Map Generation Based on Fully Convolutional Networks Using UAV Imagery. Sensors 18(10): 3299 (2018) - [j33]Walaa Alajali, Wei Zhou, Sheng Wen, Yu Wang:
Intersection Traffic Prediction Using Decision Tree Models. Symmetry 10(9): 386 (2018) - [j32]Jiao Jiao Jiang, Sheng Wen, Shui Yu, Yang Xiang, Wanlei Zhou:
Rumor Source Identification in Social Networks with Time-Varying Topology. IEEE Trans. Dependable Secur. Comput. 15(1): 166-179 (2018) - [j31]Bo Liu, Wanlei Zhou, Longxiang Gao, Haibo Zhou, Tom H. Luan, Sheng Wen:
Malware Propagations in Wireless Ad Hoc Networks. IEEE Trans. Dependable Secur. Comput. 15(6): 1016-1026 (2018) - [c26]Derek Wang, Wanlei Zhou, James Xi Zheng, Sheng Wen, Jun Zhang, Yang Xiang:
Who Spread to Whom? Inferring Online Social Networks with User Features. ICC 2018: 1-6 - [c25]Ahmed Raad Al-Sudani, Wanlei Zhou, Sheng Wen, Ahmed Al-Mansoori:
SCARA: A Framework for Secure Cloud-Assisted RFID Authentication for Smart Building Access Control. NSS 2018: 202-211 - [c24]Ahmed Raad Al-Sudani, Shang Gao, Sheng Wen, Muhmmad Al-Khiza'ay:
Secure and Privacy Preserving RFID Based Access Control to Smart Buildings. SpaCCS 2018: 146-155 - [c23]Ahmed Raad Al-Sudani, Shang Gao, Sheng Wen, Muhmmad Al-Khiza'ay:
Checking an Authentication of Person Depends on RFID with Thermal Image. SpaCCS 2018: 371-380 - [c22]Walaa Alajali, Wanlei Zhou, Sheng Wen:
Traffic Flow Prediction for Road Intersection Safety. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2018: 812-820 - [c21]Ahmed Raad Al-Sudani, Wanlei Zhou, Sheng Wen, Haider Adeeb Kassem:
Hiding RFID in the Image Matching Based Access Control to a Smart Building. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2018: 1988-1993 - [e2]Jiankun Hu, Ibrahim Khalil, Zahir Tari, Sheng Wen:
Mobile Networks and Management - 9th International Conference, MONAMI 2017, Melbourne, Australia, December 13-15, 2017, Proceedings. Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering 235, Springer 2018, ISBN 978-3-319-90774-1 [contents] - [i4]Derek Wang, Chaoran Li, Sheng Wen, Yang Xiang, Wanlei Zhou, Surya Nepal:
Defensive Collaborative Multi-task Training - Defending against Adversarial Attack towards Deep Neural Networks. CoRR abs/1803.05123 (2018) - [i3]Rongjunchen Zhang, Xiao Chen, Jianchao Lu, Sheng Wen, Surya Nepal, Yang Xiang:
Using AI to Hack IA: A New Stealthy Spyware Against Voice Assistance Functions in Smart Phones. CoRR abs/1805.06187 (2018) - [i2]Tingmin Wu, Lihong Tang, Zhiyu Xu, Sheng Wen, Cécile Paris, Surya Nepal, Marthie Grobler, Yang Xiang:
Catering to Your Concerns: Automatic Generation of Personalised Security-Centric Descriptions for Android Apps. CoRR abs/1805.07070 (2018) - [i1]Xiao Chen, Chaoran Li, Derui Wang, Sheng Wen, Jun Zhang, Surya Nepal, Yang Xiang, Kui Ren:
Android HIV: A Study of Repackaging Malware for Evading Machine-Learning Detection. CoRR abs/1808.04218 (2018) - 2017
- [j30]Ke Gu, Weijia Jia, Guojun Wang, Sheng Wen:
Efficient and secure attribute-based signature for monotone predicates. Acta Informatica 54(5): 521-541 (2017) - [j29]Tian Wang, Wenhua Wang, Yongxuan Lai, Sheng Wen, Hui Tian, Yiqiao Cai, Yonghong Chen, Baowei Wang:
The Chaotic Video Surveillance in Mobile Camera Sensor Networks: Improving the Efficiency and Security. Ad Hoc Sens. Wirel. Networks 37(1-4): 95-115 (2017) - [j28]Jiaojiao Jiang, Sheng Wen, Shui Yu, Yang Xiang, Wanlei Zhou:
Identifying Propagation Sources in Networks: State-of-the-Art and Comparative Studies. IEEE Commun. Surv. Tutorials 19(1): 465-481 (2017) - [j27]Jiao Jiao Jiang, Sheng Wen, Shui Yu, Yang Xiang, Wanlei Zhou, Houcine Hassan:
The structure of communities in scale-free networks. Concurr. Comput. Pract. Exp. 29(14) (2017) - [j26]Tingmin Wu, Sheng Wen, Shigang Liu, Jun Zhang, Yang Xiang, Majed A. AlRubaian, Mohammad Mehedi Hassan:
Detecting spamming activities in twitter based on deep-learning technique. Concurr. Comput. Pract. Exp. 29(19) (2017) - [j25]Guan Xu, Bin Dai, Benxiong Huang, Jun Yang, Sheng Wen:
Bandwidth-aware energy efficient flow scheduling with SDN in data center networks. Future Gener. Comput. Syst. 68: 163-174 (2017) - [j24]Chao Chen, Sheng Wen, Jun Zhang, Yang Xiang, Jonathan J. Oliver, Abdulhameed Alelaiwi, Mohammad Mehedi Hassan:
Investigating the deceptive information in Twitter spam. Future Gener. Comput. Syst. 72: 319-326 (2017) - [j23]Tian Wang, Zhen Peng, Sheng Wen, Yongxuan Lai, Weijia Jia, Yiqiao Cai, Hui Tian, Yonghong Chen:
Reliable wireless connections for fast-moving rail users based on a chained fog structure. Inf. Sci. 379: 160-176 (2017) - [j22]Ke Gu, Yong Wang, Sheng Wen:
Traceable Threshold Proxy Signature. J. Inf. Sci. Eng. 33(1): 63-79 (2017) - [j21]Sheng Wen, Jiao Jiao Jiang, Bo Liu, Yang Xiang, Wanlei Zhou:
Using epidemic betweenness to measure the influence of users in complex networks. J. Netw. Comput. Appl. 78: 288-299 (2017) - [j20]Tian Wang, Qun Wu, Sheng Wen, Yiqiao Cai, Hui Tian, Yonghong Chen, Baowei Wang:
Propagation Modeling and Defending of a Mobile Sensor Worm in Wireless Sensor and Actuator Networks. Sensors 17(1): 139 (2017) - [c20]Derek Wang, Sheng Wen, Yang Xiang, Wanlei Zhou, Jun Zhang, Surya Nepal:
Catch Me If You Can: Detecting Compromised Users Through Partial Observation on Networks. ICDCS 2017: 2417-2422 - [c19]Tingmin Wu, Derek Wang, Sheng Wen, Yang Xiang:
How Spam Features Change in Twitter and the Impact to Machine Learning Based Detection. ISPEC 2017: 898-904 - [c18]Walaa Alajali, Sheng Wen, Wanlei Zhou:
On-Street Car Parking Prediction in Smart City: A Multi-source Data Analysis in Sensor-Cloud Environment. SpaCCS Workshops 2017: 641-652 - [c17]Lihong Tang, Wanlun Ma, Sheng Wen, Marthie Grobler, Yang Xiang, Wanlei Zhou:
My Face is Mine: Fighting Unpermitted Tagging on Personal/Group Photos in Social Media. WISE (2) 2017: 528-539 - [e1]Sheng Wen, Wei Wu, Aniello Castiglione:
Cyberspace Safety and Security - 9th International Symposium, CSS 2017, Xi'an, China, October 23-25, 2017, Proceedings. Lecture Notes in Computer Science 10581, Springer 2017, ISBN 978-3-319-69470-2 [contents] - 2016
- [j19]Ivan Stojmenovic, Sheng Wen, Xinyi Huang, Hao Luan:
An overview of Fog computing and its security issues. Concurr. Comput. Pract. Exp. 28(10): 2991-3005 (2016) - [j18]Ke Gu, Lihao Yang, Yong Wang, Sheng Wen:
Traceable Identity-Based Group Signature. RAIRO Theor. Informatics Appl. 50(3): 193-226 (2016) - [j17]Junlei Wang, Sheng Wen, Xingqiang Zhao, Min Zhang, Jingyu Ran:
Piezoelectric Wind Energy Harvesting from Self-Excited Vibration of Square Cylinder. J. Sensors 2016: 2353517:1-2353517:12 (2016) - [j16]Mohammad Sayad Haghighi, Sheng Wen, Yang Xiang, Barry G. Quinn, Wanlei Zhou:
On the Race of Worms and Patches: Modeling the Spread of Information in Wireless Sensor Networks. IEEE Trans. Inf. Forensics Secur. 11(12): 2854-2865 (2016) - [j15]Tian Wang, Zhen Peng, Junbin Liang, Sheng Wen, Md. Zakirul Alam Bhuiyan, Yiqiao Cai, Jiannong Cao:
Following Targets for Mobile Tracking in Wireless Sensor Networks. ACM Trans. Sens. Networks 12(4): 31:1-31:24 (2016) - [c16]Jiao Jiao Jiang, Sheng Wen, Shui Yu, Wanlei Zhou, Yi Qian:
Analysis of the Spreading Influence Variations for Online Social Users under Attacks. GLOBECOM 2016: 1-6 - 2015
- [j14]Tian Wang, Yiqiao Cai, Weijia Jia, Sheng Wen, Guojun Wang, Hui Tian, Yonghong Chen, Bineng Zhong:
Maximizing real-time streaming services based on a multi-servers networking framework. Comput. Networks 93: 199-212 (2015) - [j13]Sheng Wen, Di Wu, Ping Li, Yang Xiang, Wanlei Zhou, Guiyi Wei:
Detecting stepping stones by abnormal causality probability. Secur. Commun. Networks 8(10): 1831-1844 (2015) - [j12]Sheng Wen, Mohammad Sayad Haghighi, Chao Chen, Yang Xiang, Wanlei Zhou, Weijia Jia:
A Sword with Two Edges: Propagation Studies on Both Positive and Negative Information in Online Social Networks. IEEE Trans. Computers 64(3): 640-653 (2015) - [j11]Jiao Jiao Jiang, Sheng Wen, Shui Yu, Yang Xiang, Wanlei Zhou:
K-Center: An Approach on the Multi-Source Identification of Information Diffusion. IEEE Trans. Inf. Forensics Secur. 10(12): 2616-2626 (2015) - [c15]Li Xu, Limei Lin, Sheng Wen:
First-Priority Relation Graph-Based Malicious Users Detection in Mobile Social Networks. NSS 2015: 459-466 - [c14]Sheng Wen, Jiaojiao Jiang, Kasra Majbouri Yazdi, Yang Xiang, Wanlei Zhou:
The Relation Between Local and Global Influence of Individuals in Scale-Free Networks. SocialSec 2015: 80-84 - [c13]Bo Liu, Wanlei Zhou, Longxiang Gao, Sheng Wen, Tom H. Luan:
Mobility Increases the Risk of Malware Propagations in Wireless Networks. TrustCom/BigDataSE/ISPA (1) 2015: 90-95 - [c12]Jiao Jiao Jiang, Andi Zhou, Kasra Majbouri Yazdi, Sheng Wen, Shui Yu, Yang Xiang:
Identifying Diffusion Sources in Large Networks: A Community Structure Based Approach. TrustCom/BigDataSE/ISPA (1) 2015: 302-309 - 2014
- [j10]Yini Wang, Sheng Wen, Yang Xiang, Wanlei Zhou:
Modeling the Propagation of Worms in Networks: A Survey. IEEE Commun. Surv. Tutorials 16(2): 942-960 (2014) - [j9]Wei Zhou, Weijia Jia, Sheng Wen, Yang Xiang, Wanlei Zhou:
Detection and defense of application-layer DDoS attacks in backbone web traffic. Future Gener. Comput. Syst. 38: 36-46 (2014) - [j8]Sheng Wen, Jiao Jiao Jiang, Yang Xiang, Shui Yu, Wanlei Zhou:
Are the popular users always important for information dissemination in online social networks? IEEE Netw. 28(5): 64-67 (2014) - [j7]Sheng Wen, Wei Zhou, Jun Zhang, Yang Xiang, Wanlei Zhou, Weijia Jia, Cliff C. Zou:
Modeling and Analysis on the Propagation Dynamics of Modern Email Malware. IEEE Trans. Dependable Secur. Comput. 11(4): 361-374 (2014) - [j6]Sheng Wen, Jiao Jiao Jiang, Yang Xiang, Shui Yu, Wanlei Zhou, Weijia Jia:
To Shut Them Up or to Clarify: Restraining the Spread of Rumors in Online Social Networks. IEEE Trans. Parallel Distributed Syst. 25(12): 3306-3316 (2014) - [c11]Ivan Stojmenovic, Sheng Wen:
The Fog Computing Paradigm: Scenarios and Security Issues. FedCSIS 2014: 1-8 - [c10]Hang Xing, Tiemin Zhang, Sheng Wen, Xiuli Yang, Zhilin Xu, Fei Cao:
Cymbal Piezoelectric Micro Displacement Actuator Characteristics Analysis. ICIRA (1) 2014: 161-170 - [c9]Tiemin Zhang, Fei Cao, Shenghua Li, Li Liang, Sheng Wen:
FEM Analysis and Parameter Optimization of a Linear Piezoelectric Motor Macro Driven. ICIRA (1) 2014: 171-178 - [c8]Tiemin Zhang, Fei Cao, Shenghua Li, Sheng Wen, Li Liang:
Finite Element Study on the Cylindrical Linear Piezoelectric Motor Micro Driven. ICIRA (1) 2014: 179-186 - 2013
- [j5]Sheng Wen, Wei Zhou, Jun Zhang, Yang Xiang, Wanlei Zhou, Weijia Jia:
Modeling Propagation Dynamics of Social Network Worms. IEEE Trans. Parallel Distributed Syst. 24(8): 1633-1643 (2013) - [c7]Sheng Wen, Ping Li, Di Wu, Yang Xiang, Wanlei Zhou:
Detecting Stepping Stones by Abnormal Causality Probability. CSS 2013: 308-322 - [c6]Sheng Wen, Yang Xiang, Wanlei Zhou:
Modeling and Analysis for Thwarting Worm Propagation in Email Networks. NSS 2013: 763-769 - 2012
- [j4]Sheng Wen, Wei Zhou, Yang Xiang, Wanlei Zhou:
CAFS: a novel lightweight cache-based scheme for large-scale intrusion alert fusion. Concurr. Comput. Pract. Exp. 24(10): 1137-1153 (2012) - [j3]Sheng Wen, Wei Zhou, Yini Wang, Wanlei Zhou, Yang Xiang:
Locating Defense Positions for Thwarting the Propagation of Topological Worms. IEEE Commun. Lett. 16(4): 560-563 (2012) - [c5]Wei Zhou, Sheng Wen, Yini Wang, Yang Xiang, Wanlei Zhou:
An Analytical Model on the Propagation of Modern Email Worms. TrustCom 2012: 533-540 - 2011
- [j2]Yini Wang, Sheng Wen, Silvio Cesare, Wanlei Zhou, Yang Xiang:
The Microcosmic Model of Worm Propagation. Comput. J. 54(10): 1700-1720 (2011) - [j1]Yini Wang, Sheng Wen, Silvio Cesare, Wanlei Zhou, Yang Xiang:
Eliminating Errors in Worm Propagation Models. IEEE Commun. Lett. 15(9): 1022-1024 (2011) - [c4]Yini Wang, Sheng Wen, Wei Zhou, Wanlei Zhou, Yang Xiang:
The Probability Model of Peer-to-Peer Botnet Propagation. ICA3PP (1) 2011: 470-480 - [c3]Yini Wang, Sheng Wen, Yang Xiang:
Modeling worms propagation on probability. NSS 2011: 49-56 - 2010
- [c2]Sheng Wen, Yang Xiang, Wanlei Zhou:
A Lightweight Intrusion Alert Fusion System. HPCC 2010: 695-700 - [c1]Sheng Wen, Weijia Jia, Wei Zhou, Wanlei Zhou, Chuan Xu:
CALD: Surviving Various Application-Layer DDoS Attacks That Mimic Flash Crowd. NSS 2010: 247-254
Coauthor Index
aka: Seyit Camtepe
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-02 22:34 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint