Wei Wang

Wei Wang

Beijing Jiaotong University

H-index: 38

Asia-China

About Wei Wang

Wei Wang, With an exceptional h-index of 38 and a recent h-index of 29 (since 2020), a distinguished researcher at Beijing Jiaotong University, specializes in the field of Information Security, Cyber security.

His recent articles reflect a diverse array of research interests and contributions to the field:

CRSExtractor: Automated configuration option read sites extraction towards IoT cloud infrastructure

Artificial intelligence for Web 3.0: A comprehensive survey

UAF-GUARD: Defending the use-after-free exploits via fine-grained memory permission management

Poisoning with cerberus: Stealthy and colluded backdoor attack against federated learning

How Hard is Takeover in DPoS Blockchains? Understanding the Security of Coin-based Voting Governance

ASOZ: a decentralized payment system with privacy preserving and auditing on public blockchain

A New Smart Contract Anomaly Detection Method by Fusing Opcode and Source Code Features for Blockchain Services

Attacks Against Cross-Chain Systems and Defense Approaches: A Contemporary Survey

Wei Wang Information

University

Position

Professor

Citations(all)

5365

Citations(since 2020)

4036

Cited By

2859

hIndex(all)

38

hIndex(since 2020)

29

i10Index(all)

78

i10Index(since 2020)

66

Email

University Profile Page

Beijing Jiaotong University

Google Scholar

View Google Scholar Profile

Wei Wang Skills & Research Interests

Information Security

Cyber security

Top articles of Wei Wang

Title

Journal

Author(s)

Publication Date

CRSExtractor: Automated configuration option read sites extraction towards IoT cloud infrastructure

Heliyon

Yuhao Liu

Wei Wang

Yan Jia

Sihan Xu

Zheli Liu

2023/4/1

Artificial intelligence for Web 3.0: A comprehensive survey

Meng Shen

Zhehui Tan

Dusit Niyato

Yuzhi Liu

Jiawen Kang

...

2023/8/17

UAF-GUARD: Defending the use-after-free exploits via fine-grained memory permission management

Computers & security

Guangquan Xu

Wenqing Lei

Lixiao Gong

Jian Liu

Hongpeng Bai

...

2023/2/1

Poisoning with cerberus: Stealthy and colluded backdoor attack against federated learning

Proceedings of the AAAI Conference on Artificial Intelligence

Xiaoting Lyu

Yufei Han

Wei Wang

Jingkai Liu

Bin Wang

...

2023/6/26

How Hard is Takeover in DPoS Blockchains? Understanding the Security of Coin-based Voting Governance

Chao Li

Balaji Palanisamy

Runhua Xu

Li Duan

Jiqiang Liu

...

2023/11/15

ASOZ: a decentralized payment system with privacy preserving and auditing on public blockchain

Cryptology ePrint Archive

Tianjian Liu

Dawei Zhang

Wei Wang

Chang Chen

2023

A New Smart Contract Anomaly Detection Method by Fusing Opcode and Source Code Features for Blockchain Services

IEEE Transactions on Network and Service Management

Li Duan

Liu Yang

Chunhong Liu

Wei Ni

Wei Wang

2023/5/22

Attacks Against Cross-Chain Systems and Defense Approaches: A Contemporary Survey

IEEE/CAA Journal of Automatica Sinica

Li Duan

Yangyang Sun

Wei Ni

Weiping Ding

Jiqiang Liu

...

2023/7/25

Defending Privacy Inference Attacks to Federated Learning for Intelligent IoT with Parameter Compression

Security and Communication Networks

Yongsheng Zhu

Hongbo Cao

Yuange Ren

Wanqi Wang

Bin Wang

...

2023/5/11

Object-free backdoor attack and defense on semantic segmentation

Computers & Security

Jiaoze Mao

Yaguan Qian

Jianchang Huang

Zejie Lian

Renhui Tao

...

2023/9/1

Automatically Identifying CVE Affected Versions with Patches and Developer Logs

IEEE Transactions on Dependable and Secure Computing

Yongzhong He

Yiming Wang

Sencun Zhu

Wei Wang

Yunjia Zhang

...

2023/4/5

BSAF: A blockchain-based secure access framework with privacy protection for cloud-device service collaborations

Journal of Systems Architecture

Li Duan

Wenyao Xu

Wei Ni

Wei Wang

2023/7/1

Threats, attacks and defenses to federated learning: issues, taxonomy and perspectives

Cybersecurity

Pengrui Liu

Xiangrui Xu

Wei Wang

2022/2/2

Prevention of gan-based privacy inferring attacks towards federated learning

Hongbo Cao

Yongsheng Zhu

Yuange Ren

Bin Wang

Mingqing Hu

...

2022/10/15

CCUBI: A cross‐chain based premium competition scheme with privacy preservation for usage‐based insurance

International Journal of Intelligent Systems

Longyang Yi

Yangyang Sun

Bin Wang

Li Duan

Hongliang Ma

...

2022/12

Toward Blockchain-Based Spoofing Defense for Controlled Optimization of Phases in Traffic Signal System

IEICE TRANSACTIONS on Information and Systems

Yingxiao Xiang

Chao Li

Tong Chen

Yike Li

Endong Tong

...

2022/2/1

A Decentralized Cross-Chain Service Protocol based on Notary Schemes and Hash-Locking

Yangyang Sun

Longyang Yi

Li Duan

Wei Wang

2022/7/1

DeviceWatch: a data-driven network analysis approach to identifying compromised mobile devices with graph-inference

ACM Transactions on Privacy and Security

Euijin Choo

Mohamed Nabeel

Mashael Alsabah

Issa Khalil

Ting Yu

...

2022/11/7

AdvCat: Domain-Agnostic Robustness Assessment for Cybersecurity-Critical Applications with Categorical Inputs

Helene Orsini

Hongyan Bao

Yujun Zhou

Xiangrui Xu

Yufei Han

...

2022/12/17

Alexa Skills: Security Vulnerabilities and Countermeasures

Dan Su

Jiqiang Liu

Sencun Zhu

Xiaoyang Wang

Wei Wang

2022/10/3

See List of Professors in Wei Wang University(Beijing Jiaotong University)

Co-Authors

H-index: 79
Xiaojiang Du, Endowed-Chair Professor, IEEE Fellow, ACM Distinguished Member

Xiaojiang Du, Endowed-Chair Professor, IEEE Fellow, ACM Distinguished Member

Temple University

H-index: 59
Sencun Zhu

Sencun Zhu

Penn State University

H-index: 53
Xiangliang Zhang

Xiangliang Zhang

King Abdullah University of Science and Technology

H-index: 44
Roberto Battiti

Roberto Battiti

Università degli Studi di Trento

H-index: 16
Ming Fan (范铭)

Ming Fan (范铭)

Xi'an Jiaotong University

H-index: 15
Thomas Guyet

Thomas Guyet

Agrocampus Ouest

academic-engine