default search action
Wandong Cai
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j16]Pin Lyu, Wandong Cai, Yao Wang:
Collusive attack that exploits biometric similarity difference and basic countermeasures. Wirel. Networks 30(5): 4555-4567 (2024) - 2022
- [j15]Pin Lyu, Wandong Cai, Yao Wang:
Continuous Authentication against Collusion Attacks. Sensors 22(13): 4711 (2022) - 2021
- [j14]Yun Bai, Wandong Cai:
Recommendation with Diversity: Mass Diffusion Model Based on Trust Network and Object Reputation. Mob. Inf. Syst. 2021: 5527568:1-5527568:13 (2021) - [c25]Pin Lyu, Wandong Cai, Yao Wang:
Active Attack that Exploits Biometric Similarity Difference and Basic Countermeasures. ADHOCNETS/TRIDENTCOM 2021: 81-95 - 2020
- [j13]Bai Yun, Wandong Cai:
Trust circle recommended model based on different fields. Int. J. Inf. Commun. Technol. 17(1): 1-21 (2020) - [j12]Yao Wang, Wan-Dong Cai, Tao Gu, Wei Shao:
Your Eyes Reveal Your Secrets: An Eye Movement Based Password Inference on Smartphone. IEEE Trans. Mob. Comput. 19(11): 2714-2730 (2020)
2010 – 2019
- 2019
- [j11]Yao Wang, Wandong Cai, Tao Gu, Wei Shao, Yannan Li, Yong Yu:
Secure Your Voice: An Oral Airflow-Based Continuous Liveness Detection for Voice Assistants. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 3(4): 157:1-157:28 (2019) - 2018
- [j10]Yao Wang, Wan-Dong Cai, Pin Lyu, Wei Shao:
A Combined Static and Dynamic Analysis Approach to Detect Malicious Browser Extensions. Secur. Commun. Networks 2018: 7087239:1-7087239:16 (2018) - [c24]Yao Wang, Wan-Dong Cai, Tao Gu, Wei Shao, Ibrahim Khalil, Xianghua Xu:
GazeRevealer: Inferring Password Using Smartphone Front Camera. MobiQuitous 2018: 254-263 - 2017
- [j9]Ru Wang, Seungmin Rho, Wandong Cai:
High-performance social networking: microblog community detection based on efficient interactive characteristic clustering. Clust. Comput. 20(2): 1209-1221 (2017) - [j8]Ru Wang, Seungmin Rho, Bo-Wei Chen, Wandong Cai:
Modeling of large-scale social network services based on mechanisms of information diffusion: Sina Weibo as a case study. Future Gener. Comput. Syst. 74: 291-301 (2017) - 2016
- [j7]Huijie Xu, Wandong Cai, Guirong Chen:
Forums-Oriented Research on the Spreading and Inhibition of Rumors. Int. J. Found. Comput. Sci. 27(7): 845-862 (2016) - [j6]Yao Wang, Wan-Dong Cai, Pengcheng Wei:
A deep learning approach for detecting malicious JavaScript code. Secur. Commun. Networks 9(11): 1520-1534 (2016) - [j5]Ru Wang, Wandong Cai, Bo Shen:
The study of the dynamic model on KAD network information spreading. Telecommun. Syst. 63(3): 371-379 (2016) - [c23]Guirong Chen, Wandong Cai, Jiuming Huang, Xianlong Jiao:
Uncovering and Characterizing Internet Water Army in Online Forums. DSC 2016: 169-178 - 2015
- [j4]Ru Wang, Wandong Cai:
A sequential game-theoretic study of the retweeting behavior in Sina Weibo. J. Supercomput. 71(9): 3301-3319 (2015) - [c22]Guirong Chen, Wandong Cai, Jiuming Huang, Huijie Xu, Rong Wang, Hua Jiang, Fengqin Zhang:
Detection and Analysis of Water Army Groups on Virtual Community. NCCET 2015: 105-117 - [c21]Zhilin Luo, Yue Wang, Xintao Wu, Wandong Cai, Ting Chen:
On Burst Detection and Prediction in Retweeting Sequence. PAKDD (1) 2015: 96-107 - 2014
- [c20]Ru Wang, Wandong Cai, Bo Shen:
Analysis of the retweetting behavior of Weibo users based on game theory. GAMENETS 2014: 1-5 - [c19]Huijie Xu, Wandong Cai, Guirong Chen:
Forum-Oriented Research on Water Army Detection for Bursty Topics. NAS 2014: 78-82 - 2013
- [j3]Ye Yao, Wandong Cai, Vincent Hilaire, Abder Koukam, Chonggang Wang:
Statistical analysis technique on Ad Hoc network topology dynamic characteristics: Markov stochastic process. Telecommun. Syst. 53(1): 33-45 (2013) - [c18]Guirong Chen, Wandong Cai, Huijie Xu, Jianping Wang:
Empirical Analysis of Human Behavior Patterns in BBS. NCCET 2013: 131-142 - 2012
- [c17]Zhilin Luo, Xintao Wu, Wandong Cai, Dong Peng:
Examining Multi-factor Interactions in Microblogging Based on Log-linear Modeling. ASONAM 2012: 189-193 - 2011
- [c16]Zhilin Luo, Wandong Cai, Yongjun Li, Dong Peng:
The correlation between social tie and reciprocity in social media. EMEIT 2011: 3909-3911 - 2010
- [j2]Ye Yao, Wandong Cai:
Ad Hoc Network Measurement Based on Network Tomography: Theory, Technique, and Application. J. Networks 5(6): 666-674 (2010) - [c15]Guangli Tian, Wandong Cai:
Routing Topology Identification Based on Multiple Sources End-to-End Measurements. APWCS 2010: 322-325
2000 – 2009
- 2009
- [j1]Ye Yao, Wandong Cai:
Interior Link Delay Reference of Ad Hoc Networks Based on End-to-End Measurement: Linear Analysis Model of Delay. J. Networks 4(4): 244-253 (2009) - [c14]Guishan Li, Wandong Cai, Yongjun Li:
Link Delay Estimation in Network with Stochastic Routing. CSIE (2) 2009: 110-114 - [c13]Qi Duan, Wandong Cai, Guangli Tian:
A Simple Graph-structure Network Tomography Topology Identification Method. JCAI 2009: 337-340 - 2008
- [c12]Ye Yao, Vincent Hilaire, Abder Koukam, Wandong Cai:
A RIO Approach for Modeling Wireless Sensor Network. ICYCS 2008: 481-486 - [c11]Ye Yao, Wandong Cai, Vincent Hilaire, Abder Koukam:
Location Scheme in Wireless Sensor Networks. IIH-MSP 2008: 121-125 - [c10]Ye Yao, Vincent Hilaire, Abder Koukam, Wandong Cai:
A Holonic Model in Wireless Sensor Networks. IIH-MSP 2008: 491-495 - [c9]Guangli Tian, Wandong Cai, Wei Wang:
Topology variety model for mobile ad hoc networks. MOBILWARE 2008: 33 - [c8]Yi Zhang, Wandong Cai, Yue Wang:
Adaptive Safety Critical Middleware for Distributed and Embedded Safety Critical System. NCM (1) 2008: 162-166 - [c7]Na Fan, Wandong Cai, Yu Zhao:
Research on the Model of Multiple Levels for Determining Sentiment of Text. PACIIA (1) 2008: 267-271 - 2007
- [c6]Tao Zhao, Wandong Cai, Yongjun Li:
MPIDA: A Sensor Network Topology Inference Algorithm. CIS 2007: 451-455 - [c5]Yongjun Li, Wandong Cai, Guangli Tian, Wei Wang:
Loss Tomography in Wireless Sensor Network Using Gibbs Sampling. EWSN 2007: 150-162 - [c4]Hui-Xian Li, Liao-Jun Pang, Wan-Dong Cai:
An Efficient Threshold Multi-group-Secret Sharing Scheme. ICFIE 2007: 911-918 - [c3]Yue Wang, Wandong Cai, Qi Duan:
Survivable Embedded Mission-Critical Network Base on Fibre Channel. ICPP Workshops 2007: 16 - 2006
- [c2]Yongjun Li, Wandong Cai, Wei Wang, Guangli Tian:
Lossy Node Identification in Wireless Sensor Network. NCA 2006: 255-258 - 2005
- [c1]Weiping Liu, Wandong Cai:
Study on Security iSCSI Based on SSH. CIS (2) 2005: 457-462
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-16 19:25 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint