default search action
Shanshan Wang 0003
Person information
- affiliation: University of Jinan, Jinan, China
Other persons with the same name
- Shanshan Wang (aka: Shan-Shan Wang) — disambiguation page
- Shanshan Wang 0001 — Qualcomm Incorporated, San Diego, CA, USA (and 1 more)
- Shanshan Wang 0002 (aka: Shan-Shan Wang 0002) — Chinese Academy of Sciences, Paul C. Lauterbur Research Center for Biomedical Imaging, Shenzhen, China (and 2 more)
- Shanshan Wang 0004 — Nanjing University of Aeronautics and Astronautics, Nanjing, China
- Shanshan Wang 0005 — Beihang University, School of Economics and Management, Beijing, China (and 1 more)
- Shanshan Wang 0006 — Université Paris-Saclay, Gif-sur-Yvette, France
- Shanshan Wang 0007 — Guilin University of Electronic Technology, Guilin, China
- Shanshan Wang 0008 — Anhui University, Institutes of Physical Science and Information Technology, China (and 2 more)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c25]Yuchen Liu, Shanshan Wang, Jin Au-Yeung, Zhenxiang Chen:
Encrypted Malicious Traffic Detection Based on Graph Convolutional Network and Temporal Dissection. CSCWD 2024: 187-192 - [c24]Changlin Liu, Shanshan Wang, Zhenxiang Chen, Limei Huang, Yan Li, Hanwen Li:
KGhish: A Phishing Website Detection Method Based on Knowledge Graph. ICIC (13) 2024: 300-311 - 2023
- [c23]Shuhao Yan, Shanshan Wang, Zhenxiang Chen, Xiaoqing Jiang, Xueyang Cao:
CSLog: Anomaly Detection for Syslog Based on Contrastive Self-Supervised Representation Learning. APNOMS 2023: 165-170 - [c22]Chenghan Wang, Shanshan Wang, Chuan Zhao, Xueyang Cao, Shuhao Yan, Yadi Han, Limei Huang, Zhenxiang Chen:
The Secondary Isolated Data Island: Isolated Data Island Caused by Blockchain in Federated Learning. BIBM 2023: 4159-4166 - [c21]Daokuan Bai, Shanshan Wang, Wenyue Wang, Hua Wang, Chuan Zhao, Peng Yuan, Zhenxiang Chen:
Overcoming Noisy Labels in Federated Learning Through Local Self-Guiding. CCGrid 2023: 367-376 - [c20]Chenghan Wang, Shanshan Wang, Chuan Zhao, Wenyue Wang, Bin Hu, Youmian Wang, Lin Wang, Zhenxiang Chen:
Decentralized Reinforced Anonymous FLchain: a Secure Federated Learning Architecture for the Medical Industry. COMPSAC 2023: 396-405 - [c19]Yadi Han, Shanshan Wang, Yiwen Li, Xueyang Cao, Limei Huang, Zhenxiang Chen:
Measurement of Illegal Android Gambling App Ecosystem From Joint Promotion Perspective. DSAA 2023: 1-11 - [c18]Peng Yuan, Shanshan Wang, Chuan Zhao, Wenyue Wang, Daokuan Bai, Lizhi Peng, Zhenxiang Chen:
Adversarial Attack with Genetic Algorithm against IoT Malware Detectors. ICC 2023: 1413-1418 - [c17]Yuhui Zhu, Zhenxiang Chen, Qiben Yan, Shanshan Wang, Alberto Giaretta, Enlong Li, Lizhi Peng, Chuan Zhao, Mauro Conti:
Devils in the Clouds: An Evolutionary Study of Telnet Bot Loaders. ICC 2023: 2338-2344 - [c16]Yiwen Li, Shanshan Wang, Zhenxiang Chen, Xueyang Cao, Yadi Han:
Exploring Wi-Fi Privacy Disclosure: A Novel Approach to User Identity Prediction Based on Traffic Multi-level Information. ICPADS 2023: 2049-2056 - [c15]Limei Huang, Shanshan Wang, Changlin Liu, Xueyang Cao, Yadi Han, Shaolei Liu, Zhenxiang Chen:
Low-Frequency Aware Unsupervised Detection of Dark Jargon Phrases on Social Platforms. PRICAI (2) 2023: 198-209 - [c14]Jin Au-Yeung, Shanshan Wang, Yuchen Liu, Zhenxiang Chen:
Safety or Not? A Comparative Study for Deep Learning Apps on Smartphones. TrustCom 2023: 109-116 - 2022
- [c13]Xueyang Cao, Shanshan Wang, Zhenxiang Chen, Xiaoqing Jiang, Weiliang Zheng, Yadi Han:
Decision-based adversarial attack for speaker recognition models. CSAI 2022: 278-283 - [c12]Wenyue Wang, Shanshan Wang, Daokuan Bai, Chuan Zhao, Lizhi Peng, Zhenxiang Chen:
SFMD: A Semi-Supervised Federated Malicious Traffic Detection Approach in IoT. ISPA/BDCloud/SocialCom/SustainCom 2022: 774-781 - [i2]Yuhui Zhu, Zhenxiang Chen, Qiben Yan, Shanshan Wang, Enlong Li, Lizhi Peng, Chuan Zhao:
Mining Function Homology of Bot Loaders from Honeypot Logs. CoRR abs/2206.00385 (2022) - [i1]Yuhui Zhu, Zhenxiang Chen, Qiben Yan, Shanshan Wang, Alberto Giaretta, Enlong Li, Lizhi Peng, Chuan Zhao, Mauro Conti:
Devils in the Clouds: An Evolutionary Study of Telnet Bot Loaders. CoRR abs/2211.14790 (2022) - 2021
- [c11]Hanchen Xu, Zhenxiang Chen, Shanshan Wang, Xiaoqing Jiang:
Chinese NER Using ALBERT and Multi-word Information. ACM TUR-C 2021: 141-145 - 2020
- [j4]Shanshan Wang, Zhenxiang Chen, Qiben Yan, Ke Ji, Lizhi Peng, Bo Yang, Mauro Conti:
Deep and broad URL feature mining for android malware detection. Inf. Sci. 513: 600-613 (2020)
2010 – 2019
- 2019
- [j3]Shanshan Wang, Zhenxiang Chen, Qiben Yan, Bo Yang, Lizhi Peng, Zhongtian Jia:
A mobile malware detection method using behavior features in network traffic. J. Netw. Comput. Appl. 133: 15-25 (2019) - 2018
- [j2]Zhenxiang Chen, Qiben Yan, Hongbo Han, Shanshan Wang, Lizhi Peng, Lin Wang, Bo Yang:
Machine learning based mobile malware detection using highly imbalanced network traffic. Inf. Sci. 433-434: 346-364 (2018) - [j1]Shanshan Wang, Qiben Yan, Zhenxiang Chen, Bo Yang, Chuan Zhao, Mauro Conti:
Detecting Android Malware Leveraging Text Semantics of Network Flows. IEEE Trans. Inf. Forensics Secur. 13(5): 1096-1109 (2018) - [c10]Anran Liu, Zhenxiang Chen, Shanshan Wang, Lizhi Peng, Chuan Zhao, Yuliang Shi:
A Fast and Effective Detection of Mobile Malware Behavior Using Network Traffic. ICA3PP (4) 2018: 109-120 - [c9]Qun Li, Zhenxiang Chen, Qiben Yan, Shanshan Wang, Kun Ma, Yuliang Shi, Lizhen Cui:
MulAV: Multilevel and Explainable Detection of Android Malware with Data Fusion. ICA3PP (4) 2018: 166-177 - [c8]Shanshan Wang, Zhenxiang Chen, Qiben Yan, Ke Ji, Lin Wang, Bo Yang, Mauro Conti:
Deep and Broad Learning Based Detection of Android Malware via Network Traffic. IWQoS 2018: 1-6 - [c7]Shanshan Wang, Qiben Yan, Zhenxiang Chen, Lin Wang, Riccardo Spolaor, Bo Yang, Mauro Conti:
Lexical Mining of Malicious URLs for Classifying Android Malware. SecureComm (1) 2018: 248-263 - 2017
- [c6]Ying Pang, Zhenxiang Chen, Xiaomei Li, Shanshan Wang, Chuan Zhao, Lin Wang, Ke Ji, Zicong Li:
Finding Android Malware Trace from Highly Imbalanced Network Traffic. CSE/EUC (1) 2017: 588-595 - [c5]Shanshan Wang, Zhenxiang Chen, Xiaomei Li, Lin Wang, Ke Ji, Chuan Zhao:
Android Malware Clustering Analysis on Network-Level Behavior. ICIC (1) 2017: 796-807 - [c4]Shanshan Wang, Qiben Yan, Zhenxiang Chen, Bo Yang, Chuan Zhao, Mauro Conti:
TextDroid: Semantics-based detection of mobile malware using network flows. INFOCOM Workshops 2017: 18-23 - 2016
- [c3]Shanshan Wang, Zhenxiang Chen, Lei Zhang, Qiben Yan, Bo Yang, Lizhi Peng, Zhongtian Jia:
TrafficAV: An effective and explainable detection of mobile malware behavior using network traffic. IWQoS 2016: 1-6 - [c2]Dong Cao, Shanshan Wang, Qun Li, Zhenxiang Chen, Qiben Yan, Lizhi Peng, Bo Yang:
DroidCollector: A High Performance Framework for High Quality Android Traffic Collection. Trustcom/BigDataSE/ISPA 2016: 1753-1758 - 2015
- [c1]Shanshan Wang, Shifeng Hou, Lei Zhang, Zhenxiang Chen, Hongbo Han:
Android Malware Network Behavior Analysis at HTTP Protocol Packet Level. ICA3PP (Workshops and Symposiums) 2015: 497-507
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-31 21:07 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint