Wei Wang
Beijing Jiaotong University
H-index: 38
Asia-China
Top articles of Wei Wang
Title | Journal | Author(s) | Publication Date |
---|---|---|---|
CRSExtractor: Automated configuration option read sites extraction towards IoT cloud infrastructure | Heliyon | Yuhao Liu Wei Wang Yan Jia Sihan Xu Zheli Liu | 2023/4/1 |
Artificial intelligence for Web 3.0: A comprehensive survey | Meng Shen Zhehui Tan Dusit Niyato Yuzhi Liu Jiawen Kang | 2023/8/17 | |
UAF-GUARD: Defending the use-after-free exploits via fine-grained memory permission management | Computers & security | Guangquan Xu Wenqing Lei Lixiao Gong Jian Liu Hongpeng Bai | 2023/2/1 |
Poisoning with cerberus: Stealthy and colluded backdoor attack against federated learning | Proceedings of the AAAI Conference on Artificial Intelligence | Xiaoting Lyu Yufei Han Wei Wang Jingkai Liu Bin Wang | 2023/6/26 |
How Hard is Takeover in DPoS Blockchains? Understanding the Security of Coin-based Voting Governance | Chao Li Balaji Palanisamy Runhua Xu Li Duan Jiqiang Liu | 2023/11/15 | |
ASOZ: a decentralized payment system with privacy preserving and auditing on public blockchain | Cryptology ePrint Archive | Tianjian Liu Dawei Zhang Wei Wang Chang Chen | 2023 |
A New Smart Contract Anomaly Detection Method by Fusing Opcode and Source Code Features for Blockchain Services | IEEE Transactions on Network and Service Management | Li Duan Liu Yang Chunhong Liu Wei Ni Wei Wang | 2023/5/22 |
Attacks Against Cross-Chain Systems and Defense Approaches: A Contemporary Survey | IEEE/CAA Journal of Automatica Sinica | Li Duan Yangyang Sun Wei Ni Weiping Ding Jiqiang Liu | 2023/7/25 |
Defending Privacy Inference Attacks to Federated Learning for Intelligent IoT with Parameter Compression | Security and Communication Networks | Yongsheng Zhu Hongbo Cao Yuange Ren Wanqi Wang Bin Wang | 2023/5/11 |
Object-free backdoor attack and defense on semantic segmentation | Computers & Security | Jiaoze Mao Yaguan Qian Jianchang Huang Zejie Lian Renhui Tao | 2023/9/1 |
Automatically Identifying CVE Affected Versions with Patches and Developer Logs | IEEE Transactions on Dependable and Secure Computing | Yongzhong He Yiming Wang Sencun Zhu Wei Wang Yunjia Zhang | 2023/4/5 |
BSAF: A blockchain-based secure access framework with privacy protection for cloud-device service collaborations | Journal of Systems Architecture | Li Duan Wenyao Xu Wei Ni Wei Wang | 2023/7/1 |
Threats, attacks and defenses to federated learning: issues, taxonomy and perspectives | Cybersecurity | Pengrui Liu Xiangrui Xu Wei Wang | 2022/2/2 |
Prevention of gan-based privacy inferring attacks towards federated learning | Hongbo Cao Yongsheng Zhu Yuange Ren Bin Wang Mingqing Hu | 2022/10/15 | |
CCUBI: A cross‐chain based premium competition scheme with privacy preservation for usage‐based insurance | International Journal of Intelligent Systems | Longyang Yi Yangyang Sun Bin Wang Li Duan Hongliang Ma | 2022/12 |
Toward Blockchain-Based Spoofing Defense for Controlled Optimization of Phases in Traffic Signal System | IEICE TRANSACTIONS on Information and Systems | Yingxiao Xiang Chao Li Tong Chen Yike Li Endong Tong | 2022/2/1 |
A Decentralized Cross-Chain Service Protocol based on Notary Schemes and Hash-Locking | Yangyang Sun Longyang Yi Li Duan Wei Wang | 2022/7/1 | |
DeviceWatch: a data-driven network analysis approach to identifying compromised mobile devices with graph-inference | ACM Transactions on Privacy and Security | Euijin Choo Mohamed Nabeel Mashael Alsabah Issa Khalil Ting Yu | 2022/11/7 |
AdvCat: Domain-Agnostic Robustness Assessment for Cybersecurity-Critical Applications with Categorical Inputs | Helene Orsini Hongyan Bao Yujun Zhou Xiangrui Xu Yufei Han | 2022/12/17 | |
Alexa Skills: Security Vulnerabilities and Countermeasures | Dan Su Jiqiang Liu Sencun Zhu Xiaoyang Wang Wei Wang | 2022/10/3 |