Publications

Journal Papers

  1. Heng Ye, Qiang Zeng, Jiqiang Liu, Xiaojiang Du, Wei Wang* : Easy Peasy: A New Handy Method for Pairing Multiple COTS IoT Devices, IEEE Transactions on Dependable and Secure Computing, 2022 [DOI](early access).
  2. Euijin Choo, Mohamed Nabeel, Mashael Al Sabah, Issa Khalil, Ting Yu, Wei Wang: DeviceWatch: A Data-Driven Network Analysis Approach to Identifying Compromised Mobile Devices with Graph-Inference”, ACM Transactions on Privacy and Security 2022 [DOI](early access).
  3. Zikai Zhang, Yidong Li, Wei Wang, Haifeng Song, Hairong Dong: Malware detection with dynamic evolving graph convolutional networks,  International Journal of Intelligent Systems, 2022 [DOI](early access)
  4. Wei Wang, Xiangyu Wei, Xiaoyang Suo, Bin Wang, Hao Wang, Hong-Ning Dai, Xiangliang Zhang: HGATE: Heterogeneous Graph Attention Auto-Encoders, IEEE Transactions on Knowledge and Data Engineering, early access, 2022 [DOI](to appear).
  5. Heng Ye, Jiqiang Liu, Hao Zhen, Wenbin Jiang, Bin Wang, Wei Wang, VREFL: Verifiable and Reconnection-Efficient Federated Learning in IoT scenarios, Journal of Network and Computer Applications, 2022 [DOI][PDF](to appear).
  6. Zhuo Lv, Hongbo Cao, Feng Zhang, Yuange Ren, Bin Wang, Cen Chen, Nuannuan Li, Hao Chang, Wei Wang*, AWFC: Preventing Label Flipping Attacks towards Federated Learning for Intelligent IoT, The Computer Journal, 2022 [DOI](early access)
  7. Xudong He, Jian Wang, Jiqiang Liu, Weiping Ding, Zhen Han, Bin Wang, Jamel Nebhen, Wei Wang*, DNS Rebinding Threat Modelling and Security Analysis for Local Area Network of Maritime Transportation Systems, IEEE Transactions on Intelligent Transportation Systems, 2022 [DOI][PDF](to appear).
  8. Xingze Wang, Guoxian Yu, Zhongmin Yan, Lin Wan, Wei Wang, Lizhen Cui, Lung Cancer Subtype Diagnosis by Fusing Image-genomics Data and Hybrid Deep Networks, IEEE/ACM Transactions on Computational Biology and Bioinformatics, 2022 [DOI][PDF](to appear).
  9. Longyang Yi, Yangyang Sun, Bin Wang, Li Duan, Hongliang Ma, Zhen Han, Wei Wang*: CCUBI: A cross-chain based premium competition scheme with privacy preservation for usage-based insurance,  International Journal of Intelligent Systems, 2022 [DOI](early access)
  10. Xiangliang Zhang*, Qiang Yang, Somayah Albaradei, Xiaoting Lyu, Hind Alamro, Adil Salhi, Changsheng Ma, Manal Alshehri, Inji Ibrahim Jaber, Faroug Tifratene, Wei Wang*, Takashi Gojobori, Carlos M. Duarte*, Xin Gao*. Rise and Fall of the Global Conversation and Shifting Sentiments During the COVID-19 Pandemic. To appear in Nature’s Humanities and Social Sciences Communications. 8, Article number: 120 (2021) [PDF​]
  11. Bin Wang, Pengfei Guo, Xing Wang, Yongzhong He,  Wei Wang*, Transparent Aspect-Level Sentiment Analysis Based on Dependency Syntax Analysis and Its Application on COVID-19, ACM Journal of Data and Information Quality, 14, 2, Article 10 (November 2021), 24 pages. [DOI][PDF].
  12. Chongsheng Zhang, Weiping Ding, Bin Wang, Wei Wang, Character-level Street View Text Spotting Based on Deep Multi-Segmentation Network for Smarter Autonomous Driving, IEEE Transactions on Artificial Intelligence, 2021 [DOI][PDF](to appear).
  13. Li Duan, Tieliang Gao, Wei Ni, Wei Wang*, A hybrid intelligent service recommendation by latent semantics and explicit ratings, International Journal of Intelligent Systems, 2021 [DOI][PDF](to appear).
  14. Yidong Li, Li Zhang, Zhuo Lv, Wei Wang*, Detecting Anomalies in Intelligent Vehicle Charging and Station Power Supply Systems with Multi-head Attention Models, IEEE Transactions on Intelligent Transportation Systems, 22(1): 555-564 (2021).
  15. Wei Wang, Jingjing Song, Guangquan Xu, Yidong Li, Hao Wang, Chunhua Su: ContractWard: Automated Vulnerability Detection Models for Ethereum Smart Contracts.IEEE Transactions on Network Science and Engineering 8(2): 1133-1144 (2021) [DOI][ESI Highly Cited Paper].
  16. Lichen Cheng, Jiqiang Liu, Yi Jin, Yidong Li, Wei Wang, Account Guarantee Scheme: Making Anonymous Accounts Supervised in Blockchain, ACM Transactions on Internet Technology (TOIT), Volume 21, Issue 1, Article No.: 11, pp. 1–19, 2021 [DOI][PDF].
  17. Jin Li, Heng Ye, Tong Li, Wei Wang, Wenjing Lou, Y. Thomas Hou, Jiqiang Liu, Rongxing Lu, Efficient and Secure Outsourcing of Differentially Private Data Publishing with Multiple Evaluators, IEEE Transactions on Dependable and Secure Computing (TDSC), 2020[DOI][PDF](to appear).
  18. Zikai Zhang, Yidong Li, Hairong Dong, Honghao Gao, Yi Jin, Wei Wang: Spectral-Based Directed Graph Network for Malware Detection. IEEE Trans. Netw. Sci. Eng. , IEEE Transactions on Network Science and Engineering, 8(2): 957-970 (2021) [DOI][PDF].
  19. Chongsheng Zhang, Weiping Ding, Guowen Peng, Feifei Fu, Wei Wang: Street View Text Recognition With Deep Learning for Urban Scene Understanding in Intelligent Transportation Systems. IEEE Transactions on Intelligent Transportation Systems, 22(7): 4727-4743 (2021)[DOI][PDF].
  20. 李浥东,张俊,陶耀东,王伟,王飞跃: 平行安全:基于CPSS的生成式对抗安全智能系统。智能科学与技术学报,2020 [DOI][PDF](to appear).
  21. Yingjie Wang, Guangquan Xu, Xing Liu, Weixuan Mao, Chengxiang Si, Witold Pedrycz, Wei Wang*, Identifying Vulnerabilities of SSL/TLS Certificate Verification in Android Apps with Static and Dynamic Analysis, Journal of Systems and Software, 167: 110609 (2020) [DOI].
  22. Xiaoming Liu, Chao Shen, Wei Wang, Xiaohong Guan, CoEvil: A Co-Evolutionary Model for Crime Inference Based on Fuzzy Rough Feature Selection, IEEE Transactions on Fuzzy Systems, 28(5): 806-817, 2020 [DOI].
  23. Wei Wang, Yaoyao Shang, Yongzhong He, Yidong Li, Jiqiang Liu, BotMark: Automated botnet detection with hybrid analysis of flow-based and graph-based traffic behaviors, Information Sciences, 511: 284-296 (2020) [DOI][PDF][ESI Highly Cited Paper]
  24. Heng Ye, Jiqiang Liu, Wei Wang, Ping Li, Tong Li, Jin Li, “Secure and efficient outsourcing differential privacy data release scheme in Cyber-physical system”, Future Generation Computer Systems, 108: 1314-1323, 2020 [DOI][PDF].
  25. Xing Liu, Jiqiang Liu, Sencun Zhu, Wei Wang*, Xiangliang Zhang, Privacy Risk Analysis and Mitigation of Analytics Libraries in the Android Ecosystem, IEEE Transactions on Mobile Computing, vol. 19, no. 5, pp. 1184-1199, 2020 [DOI][PDF].[ESI Highly Cited Paper]
  26. Yongzhong He, Chao Wang, Guangquan Xu, Wenjuan Lian, Hequn Xian, Wei Wang, Privacy-Preserving Categorization of Mobile Applications Based on Large-scale Usage Data, Information Sciences, 514: 557-570 (2020) [DOI][PDF].
  27. Xiangyu Wei, Guangquan Xu, Hao Wang, Yongzhong He, Zhen Han, and Wei Wang*: Sensing Users’ Emotional Intelligence in Social Networks, IEEE Transactions on Computational Social Systems, vol. 7, no. 1, pp. 103-112, 2020 [DOI][PDF].
  28. Lichen Cheng, Jiqiang Liu, Guangquan Xu, Zonghua Zhang, Hao Wang, Hong-Ning Dai, Yulei Wu, and Wei Wang*: SCTSC: A Semi-centralized Traffic Signal Control Mode with Attribute-based Blockchain in IoVs, IEEE Transactions on Computational Social Systems, 6(6):1373-1385 (2019) [DOI][PDF].
  29. Xiaoming Li, Guangquan Xu, Xi Zheng, Kaitai Liang, Emmanouil Panaousis, Tao Li, Wei Wang, Chao Shen, Using Sparse Representation to Detect Anomalies in Complex WSNs, ACM Transactions on Intelligent Systems and Technology (TIST), 10(6): 64:1-18(2019)[DOI][PDF] .
  30. Lichen Cheng, Jiqiang Liu, Chunhua Su, Kaitai Liang, Guangquan Xu, Wei Wang*, “Polynomial-based Modifiable Blockchain Structure for Removing Fraud Transactions”, Future Generation Computer Systems, 99(10):154-163(2019) [DOI][PDF].
  31. Wei Wang, Meichen Zhao, Zhenzhen Gao, Guangquan Xu, Yuanyuan Li, Hequn Xian, Xiangliang Zhang: Constructing Features for Detecting Android Malicious Applications: Issues, Taxonomy and Directions, IEEE Access, 7: 67602 – 67631, 2019 [DOI][PDF].
  32. Nannan Xie, Xing Wang, Wei Wang*, Jiqiang Liu, “Fingerprinting Android Malware Families”, Frontiers of Computer Science, 13(3): 637–646 (2019)[DOI][PDF].
  33. Weixuan Mao, Bo Sun, Guangquan Xu, Cheng Liu, Chengxiang Si, Wei Wang: Understanding Effects of Collaborations in Developing Mobile Computing Systems: Popularity, Efficiency, and Quality, IEEE Access,  7: 33380-33392 (2019) [PDF][PDF].
  34. Yongzhong He, Xuejun Yang, Binghui Hu, Wei Wang*, Dynamic privacy leakage analysis of Android third-party libraries, Journal of Information Security and Applications , 99 (10): 154-163 (2019) [DOI][PDF].
  35. Dan Su, Jiqiang Liu, Xiaoyang Wang, Wei Wang*, Detecting Android Locker-ransomware on Chinese Social Networks, IEEE Access, 7(1): 20381-20393, 2019 [DOI][PDF].
  36. Wei Wang, Mengxue Zhao, Jigang Wang, “Effective android malware detection with a hybrid model based on deep autoencoder and convolutional neural network”, Journal of Ambient Intelligence and Humanized Computing, 10(8): 3035-3043 (2019) [DOI][PDF][ESI Highly Cited Paper].
  37. Lun Li, Jiqiang Liu, Lichen Cheng, Shuo Qiu, Wei Wang*, Xiangliang Zhang, Zonghua Zhang, “CreditCoin: A Privacy-Preserving Blockchain-based Incentive Announcement Network for Communications of Smart Vehicles”, IEEE Transactions on Intelligent Transportation Systems, 19(7): 2204-2220 (2018) [DOI][PDF], one of the 50 most frequently accessed documents for this Transaction! (5000+ full text views since 2018) [ESI Highly Cited Paper].[北京地区2021年度广受关注学术论文].
  38. Xing Liu, Jiqiang Liu, Wei Wang*, Sencun Zhu, “Android single sign-on security: Issues, taxonomy and directions”, Future Generation Computer Systemsvol.89, pp. 402-420 (2018) [DOI][PDF].
  39. Wei Wang, Yuanyuan Li, Xing Wang, Jiqiang Liu, Xiangliang Zhang, “Detecting Android Malicious Apps and Categorizing Benign Apps with Ensemble of Classifiers”, Future Generation Computer Systemsvol.78, pp. 987–994 (2018) [DOI][PDF] [ESI Highly Cited Paper].
  40. Shuo Qiu, Jiqiang Liu, Yanfeng Shi, Ming Li, Wei Wang, “Identity-Based Private Matching over Outsourced Encrypted Datasets”, IEEE Transactions on Cloud Computing, 6(3):747-759 (2018) [DOI].
  41. Dan Su, Jiqiang Liu, Wei Wang*, Xiaoyang Wang, Xiaojiang Du, Mohsen Guizani, “Discovering communities of malapps on Android-based mobile cyber-physical systems”, Ad Hoc Networks,80: 104-115 (2018) [DOI][PDF].
  42. Yongzhong He, Endalew Elsabeth Alem, Wei Wang*, “Hybritus: A Password Strength Checker by Ensemble Learning from the Query Feedbacks of Websites”, Frontiers of Computer Science (to appear), 2018 [DOI][PDF].
  43. Wei Wang, Zhenzhen Gao, Meichen Zhao, Yidong Li, Jiqiang Liu, Xiangliang Zhang, DroidEnsemble: Detecting Android Malicious Applications With Ensemble of String and Structural Static Features. IEEE Access 6: 31798-31807 (2018) [DOI][PDF].
  44. Xing Liu, Jiqiang Liu, Wei Wang*, Yongzhong He, Xiangliang Zhang, “Discovering and Understanding Android Sensor Usage Behaviors with Data Flow Analysis”, World Wide Web, 21(1): 105-126 (2018)[DOI]
  45. Wei Wang, Jiqiang Liu, Georgios Pitsilis, Xiangliang Zhang, “Abstracting Massive Data for Lightweight Intrusion Detection in Computer Networks”, Information Sciences, 433–434(4): 417-430 (2018) [DOI].
  46. Yubin Yang, Zongtao Wei, Yong Xu, Haiwu He, Wei Wang, “DroidWard: An Effective Dynamic Analysis Method for Vetting Android Applications”, Cluster Computing (2018) 21: 265–275 [DOI][PDF].
  47. Ming Fan, Jun Liu, Wei Wang, Haifei Li, Zhenzhou Tian and Ting Liu, “DAPASA: Detecting Android Piggybacked Apps Based on Sensitive-subgraph Analysis”,  IEEE Transactions on Information Forensics and Security (TIFS), vol. 12, no. 8, pp. 1772-1785, 2017 [DOI].
  48. Xing Wang, Wei Wang*, Yongzhong He, Jiqiang Liu, Zhen Han, Xiangliang Zhang, “Characterizing Android Apps’ Behavior for Effective Detection of Malapps at Large Scale”,  Future Generation Computer Systems, vol. 75, pp. 30-45 (2017) [DOI].
  49. Wei Huang, Chunwang Yan, Jinsong Wang, Wei Wang, “A time-delay neural network for solving time-dependent shortest path problem”, Neural Networks, vol. 90, pp. 21-28, 2017 [DOI].
  50. 马洪亮, 王伟*, 韩臻, “混淆恶意JavaScript代码的检测与反混淆方法研究”. 计算机学报, 40(7): 1799-1713, 2017.
  51. 马洪亮, 王伟*, 韩臻, “面向drive-by-download攻击的检测方法”.华中科技大学学报(自然科学版). 44卷, 3期, pp. 6-11, 2016 [PDF].
  52. Wei Wang, Yongzhong He, Jiqiang Liu, Sylvain Gombault, “Constructing Important Features from Massive Network Traffic for Lightweight Intrusion Detection”. IET Information Security, vol. 9, no. 6, pp. 374-379, 2015.
  53. Georgios Pitsilis, Wei Wang, “Harnessing the power of social bookmarking for improving tag-based recommendations”, Computers in Human Behavior (SSCI IF=2.273),vol. 50, pp. 239-251, 2015 [arXiv].
  54. Wei Wang, Xing Wang, Dawei Feng, Jiqiang Liu, Zhan Han, Xiangliang Zhang, “Exploring Permission-induced Risk in Android Applications for Malicious Application Detection”. IEEE Transactions on Information Forensics and Security (TIFS), vol. 9, no. 11, pp.1869-1882, 2014 (frequently downloaded paper)[PDF][DOI].
  55. Wei Wang, Thomas Guyet, Rene Quiniou, Marie-Odile Cordier, Florent Masseglia, Xiangliang Zhang, “Autonomic Intrusion Detection: Adaptively Detecting Anomalies over Unlabeled Audit Data Streams in Computer Networks”. Knowledge-Based Systems (IF(2012)=4.104IF (2013) =3.058), vol.70 no. 11, pp. 103-117, 2014 [PDF][DOI]
  56. Tong Wu, Zhen Han, Wei Wang, Lizhi Peng, “Early-stage internet traffic identification based on packet payload size”. Journal of Southeast University (English Edition). vol. 30, no. 3, pp. 289-295, 2014.

  57. 马洪亮,王伟*,韩臻, “基于Javascript的轻量级恶意网页异常检测方法”.华中科技大学学报(自然科学版). 42卷, 11期, pp. 34-38, 2014.

  58. Wei Wang, Xiangliang Zhang, Wenchang Shi, Shiguo Lian, Dengguo Feng, “Understanding and analyzing network traffic”. IEEE Network, vol. 26, no.1, pp. 4-5, Jan 2012
  59. Wei Wang, Xiangliang Zhang, Wenchang Shi, Shiguo Lian, Dengguo Feng, “Network traffic monitoring, analysis and anomaly detection”, IEEE Networkvol. 25, no. 3, pp. 6-7, May 2011
  60. Wei Wang, Xiangliang Zhang, Sylvain Gombault, “Constructing Attribute Weights from Audit Data for Effective Intrusion Detection”, Journal of Systems and Software, vol.82, no.12, pp.1974-1981, 2009
  61. Li Feng, Wei Wang, Lina Zhu, Yi Zhang, “Predicting Intrusion Goal Using Dynamic Bayesian Network with Transfer Probability Estimation”. Journal of Network and Computer Applications, vol. 32, no. 3, pp. 721-732, 2009
  62. Xiaohong Guan, Wei Wang (corresponding author), Xiangliang Zhang, “Fast Intrusion Detection Based on a Non-negative Matrix Factorization Model”. Journal of Network and Computer Applications, vol. 32, no.1, pp.31-44, 2009
  63. Wei Wang, Xiaohong Guan and Xiangliang Zhang, “Processing of Massive Audit Data Streams for Real-Time Anomaly Intrusion Detection”. Computer Communications, vol. 31, no. 1, pp.58-72, 2008
  64. Wei Wang, Xiaohong Guan, Xiangliang Zhang, Liwei Yang, “Profiling program behavior for anomaly intrusion detection based on the transition and frequency property of computer audit data”. Computers & Security, vol. 25, no 7, pp. 539-550, 2006
  65. 张响亮,王伟,管晓宏;基于隐马尔可夫模型的程序行为异常检测[J];西安交通大学学报;2005年10期,Vol. 39, no.10, pp. 1056-1059
  66. 王伟,陈秀真,管晓宏,张响亮;深度防卫的自适应入侵检测系统[J];西安交通大学学报;2005年04期, vol 39, no. 4, pp. 339~342
  67. 王伟,彭勤科.主机日志分析及其在入侵检测中的应用.计算机工程与应用, 2002(13):35-37
  68. 林晖,王伟,张优云;基于产品特征的信息检索技术[J];计算机辅助设计与图形学学报;2002年03期, pp. 261~265, 2002

Conference Papers

  1. Dan Su, Jiqiang Liu, Sencun Zhu, Xiaoyang Wang, Wei Wang*: Alexa Skills: Security Vulnerabilities and Countermeasures, IEEE Conference on Communications and Network Security (IEEE CNS), Austin, TX, USA, 2022
  2. Dawei Wang, Kai Chen*, Wei Wang*: Alexa Skills: Security Vulnerabilities and Countermeasures, ACM international joint conference on pervasive and ubiquitous computing (UbiComp 2021), Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT)(May cycle), 2021
  3. Xiaoting Lv, Zhe Chen, Di Wu, Wei Wang*: Sentiment Analysis on Chinese Weibo regarding COVID-19, accepted by 9th CCF International Conference on Natural Language Processing and Chinese Computing (NLPCC 2020), Zhengzhou, China, Oct 14-18, 2020 (oral presentation)[PDF][Bib]..
  4. Jin Li, Heng Ye, Wei Wang, Wenjing Lou, Y. Thomas Hou, Jiqiang Liu and Rongxing Lu: Efficient and Secure Outsourcing of Differentially Private Data Publication, accepted by 23rd European Symposium on Research in Computer Security (ESORICS 2018), pp. 187-206, Barcelona, Spain, September 3-7, 2018 (acceptance rate = 56/283 = 19.8%)[PDF][Bib].
  5. Yan Chen, Wei Wang, Xiangliang Zhang: Randomizing SVM against Adversarial Attacks Under Uncertainty, accepted by 22nd Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD 2018), Melbourne, Australia, June 3rd – 6th, 2018 (regular paper with long presentation, acceptance rate = 59/590=10%)[PDF][Bib].

  6. Longfei Wu, Xiaojiang Du, Wei Wang, Bin Lin, “An Out-of-band Authentication Scheme for Internet of Things Using Blockchain Technology”. Accepted by 2018 International Conference on Computing, Networking and Communications (ICNC 2018), Maui, Hawaii, USA, March 5-8, 2018 (acceptance rate = 26%)[PDF].
  7. Xing Liu, Sencun Zhu, Wei Wang*, Jiqiang Liu, “Alde: Privacy Risk Analysis of Analytics Libraries in the Android Ecosystem”. Accepted by the 12th EAI International Conference on Security and Privacy in Communication Networks (SecureComm 2016), Guangzhou, China, October, 10-12, 2016 (acceptance rate=32/137=23.4%) [PDF].
  8. Dan Su, Wei Wang*, Xing Wang, Jiqiang Liu, “Anomadroid: profiling Android application behaviors for identifying unknown malapps”, accepted by 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom 2016), Tianjin, China, 23-26 August, 2016.
  9. Shuo Qiu, Boyang Wang, Ming Li, Jesse Victors, Jiqiang Liu, Yanfeng Shi, Wei Wang, “Fast, Private and Verifiable: Server-aided Approximate Similarity Computation over Large-Scale Datasets”. Proceedings of the 4th ACM International Workshop on Security in Cloud Computing, SCC@AsiaCCS, pp. 29-36, Xi’an, China, May 30 – June 3, 2016
  10. Xing Liu, Jiqiang Liu, Wei Wang* “Exploring Sensor Usage Behaviors of Android Applications Based on Data Flow Analysis”, Proceedings of the 34th IEEE International Performance Computing and Communications Conference (IPCCC 2015), Nanjing, China, December 14-16, 2015 (acceptance rate=88/298=29.5%) [PDF].
  11. Xing Liu, Wei Wang, Jiqiang Liu, “POSTER: The Popular Apps in Your Pocket Are Leaking Your Privacy”, 22nd ACM Conference on Computer and Communications Security (ACM CCS 2015 (Poster)), pp. 1653-1655, Denver, Colorado, October 12-16, 2015.
  12. 马洪亮,王伟,韩臻. 基于WEB攻击的异常检测模型分析与应用研究, 第23届全国信息保密学术会议(IS2013), 62-69
  13. 王星, 周芳林, 王伟, 韩臻. Android平台的一种安全域隔离方法, 第23届全国信息保密学术会议(IS2013)论文集 ,57-61
  14. Georgios Pitsilis, Xiangliang Zhang, Wei Wang, “Clustering Recommenders in Collaborative Filtering Using Explicit Trust Information”, 5th IFIP WG 11.11 International Conference on Trust Management (IFIPTM 2011), Springer, pp. 82-97, Copenhagen, Denmark, June 29- July 1, 2011(full paper)}
  15. Wei Wang, Xiangliang Zhang, “High-speed Web Attack Detection through Extracting Exemplars from HTTP Traffic”, 26th ACM Symposium on Applied Computing (ACM SAC 2011)(Security track), ACM Press, pp. 1538-1543, TaiChung, Taiwan, 21-25 March, 2011 (security track acceptance rate=9/41=22%). }
  16. Xiangliang Zhang, Wei Wang, Kjetil Norvag, Michele Sebag, “K-AP: Generating Specified K Clusters by Efficient Affinity Propagation”, 10th IEEE International Conference on Data Mining (ICDM 2010), pp. 1187-1192, Sydney, Australia, December 14-17, 2010 (acceptance rate=155/797=19.4%)}
  17. Atef Abdelkefi, Yuming Jiang, Wei Wang, Arne Aslebo, Olav Kvittem, “Robust Traffic Anomaly Detection with Principal Component Pursuit”, Student Workshop, ACM CoNEXT 2010, Philadelphia, USA, November 2010
  18. Wei Wang, Xiangliang Zhang, Georgios Pitsilis, “Abstracting Audit Data for Efficient Anomaly Intrusion Detection”, Sixth International Conference on Information Systems Security (ICISS 2010), pp. 201-215, Gandhinagar, Gujarat, India, December 15-19, 2010 (acceptance rate 14/51=27.5%)
  19. Xiangliang Zhang, Wei Wang, “Self-adaptive Change Detection in Streaming Data with Non-stationary Distribution”, 6th International Conference on Advanced Data Mining and Applications (ADMA 2010), pp. 334-345, Chongqing, China, Nov. 19-21, 2010 (oral full paper, acceptance rate = 17%)}
  20. Wei Wang, Xiangliang Zhang, Sylvain Gombault, Svein J. Knapskog, “Attribute Normalization in Network Intrusion Detection”, 10th International Symposium on Pervasive Systems, Algorithms and Networks (I-SPAN 2009), IEEE Press, pp. 448-453, Kaohxiung, Taiwan, China, Dec 14-16, 2009
  21. Wei Wang, Thomas Guyet and Svein J. Knapskog, “Autonomic Intrusion Detection System”. Proceedings of 12th International Symposium on Recent Advances in Intrusion Detection (RAID 2009), pp. 359-361, LNCS 5758, Sep 23-25, 2009 (Poster presentation)
  22. Wei Wang, Florent Masseglia, Thomas Guyet, Rene Quiniou and Marie-Odile Cordier, “A General Framework for Adaptive and Online Detection of Web attacks”. 18th international World Wide Web conference (WWW 2009), pp. 1141-1142, ACM press, Madrid, Spain, Apr 20-24, 2009 (Poster presentation)
  23. Thomas Guyet, Wei Wang, Rene Quiniou, Marie-Odile Cordier, “Diagnostic adaptatif distribue d’un flux de donnees. Application a la detection d’intrusion dans des serveurs Web”. Proceedings of conference Extraction et Gestion des Connaissances (EGC 2009), pp. 325-336, Strasbourg, France, Jan 2009 (Nominated for best application paper award, in French) 
  24. Wei Wang, Thomas Guyet, Rene Quiniou, Marie-Odile Cordier, Florent Masseglia, “Online and adaptive anomaly Detection: detecting intrusions in unlabelled audit data streams”, Proceedings of conference Extraction et Gestion des Connaissances (EGC 2009)(Poster), pp. 457-458, Strasbourg, France, Jan 2009
  25. Wei Wang, Sylvain Gombault, “Efficient Detection of DDoS Attacks with Important Attributes”. Proceedings of 3rd International Conference on Risks and Security of Internet and Systems (CRiSIS  2008), pp. 61-67, IEEE Press, Tozeur, Tunisia, Oct 28-30, 2008.
  26. Wei Wang, Sylvain Gombault, Thomas Guyet, “Towards fast detecting intrusions: using key attributes of network traffic”. Proceedings of The Third International Conference on Internet Monitoring and Protection (ICIMP 2008), IEEE Computer society press, Bucharest, Romania, pp. 86-91, June 29 – July 5, 2008 (acceptance rate 23%) (Best paper award
  27. Wei Wang, Sylvain Gombault, Amine Bsila, “Building multiple behavioral models for network intrusion detection”. 2nd IEEE Workshop on “Monitoring, Attack Detection and Mitigation” (MonAM 2007), Toulouse, pp. 31-36, France, Nov 2007
  28. Wei Wang, Sylvain Gombault, “Detecting masquerades with principal component analysis based on cross frequency weights”. Proceedings of 14th Anniversary HP-SUA Workshop, Munich, Germany, pp. 227-232, July 2007
  29. Wei Wang, Sylvain Gombault, “Distance measures for anomaly intrusion detection”. Proceedings of 2007 International Conference on Security and management, Las Vegas, NV, pp. 17-23, June 2007 (SAM 2007) (regular paper, acceptance rate 28%)
  30. Wei Wang, Roberto Battiti, “Identifying Intrusions in Computer Networks with Principal Component Analysis”. Proceedings of First IEEE International Conference on Availability, Reliability and Security (ARES 2006), IEEE press society, pp. 270-277, April, 20-22nd, Vienna, Austria, 2006 
  31. Wei Wang, Xiaohong Guan, Xiangliang Zhang, “Profiling Program and User Behavior for Anomaly Intrusion Detection Based on Non-negative Matrix Factorization”. Proceedings of 43rd IEEE Conference on Decision and Control (CDC 2004), Atlantis, Paradise Island, Bahamas, pp. 99-104, Dec 2004
  32. Wei Wang, Xiaohong Guan and Xiangliang Zhang. “A Novel Intrusion Detection Method Based on Principal Component Analysis in Computer Security”. Advances in Neural Networks-ISNN 2004. International IEEE Symposium on Neural Networks, Dalian, China. Lecture Notes in Computer Science (LNCS), No. 3174. pp. 657-662. Aug 2004
  33. Wei Wang, Xiaohong Guan and Xiangliang Zhang, “Modeling Program Behavior by Hidden Markov Models for Intrusion Detection”. The Third IEEE International Conference on Machine Learning and Cybernetics (ICMLC 2004), Shanghai, China, pp. 2830-2835. Aug 2004

Ph.D. Thesis

  1. 王伟, 多信息源的实时入侵检测方法研究, 西安交通大学, 2005 [WangPhDThesis]

Other Papers

  1. 何永忠,李响,陈美玲,王伟.基于云流量混淆的Tor匿名通信识别方法[J].工程科学与技术,2017,49(2):121~132 [PDF].
  2. Fang Wu, Jiqiang Liu, Jigang Wang, Wei Wang*, Vulnerability Detection Using Deep Learning, 3rd IEEE International Conference on Computer and Communications (ICCC), Chengdu, China, Dec 13-16, 2017.
  3. 查明明, 王伟*. FlowMonitor: Android隐私数据流向监控防护系统[J]山东大学学报(理学版), 2016, 51 (9): 59-67 [PDF]
  4. 王伟, 何永忠, 以完整解决一个具体问题为中心的研究性教学, 计算机教育,2014 (13) :7-9
  5. 何永忠, 王伟,黎琳, 基于云计算的信息安全实验教学平台建设, 计算机教育,2014 (1) :39-42