Weiping Wang
Central South University
H-index: 29
Asia-China
Top articles of Weiping Wang
Title | Journal | Author(s) | Publication Date |
---|---|---|---|
UCG: A Universal Cross-Domain Generator for Transferable Adversarial Examples | IEEE Transactions on Information Forensics and Security | Zhankai Li Weiping Wang Jie Li Kai Chen Shigeng Zhang | 2024/1/11 |
TransAST: A Machine Translation-Based Approach for Obfuscated Malicious JavaScript Detection | Yan Qin Weiping Wang Zixian Chen Hong Song Shigeng Zhang | 2023/6/27 | |
Secure Fractional Repetition Codes for Distributed Storage Systems | Zhihang Deng Bing Zhu Kenneth W Shum Weiping Wang | 2023/12/4 | |
Accurate IoT Device Identification based on A Few Network Traffic | Shigeng Zhang Kai Xiao Jianjiang Yu Xuan Liu Weiping Wang | 2023/6/19 | |
Exploration and Research on Ideological and Political Education in Course Operating Systems and Security | Hong Song Ping Zhong Yu Sheng Weiping Wang | 2023/12/1 | |
CMMR: A Composite Multidimensional Models Robustness Evaluation Framework for Deep Learning | Wanyi Liu Shigeng Zhang Weiping Wang Jian Zhang Xuan Liu | 2023/10/20 | |
Backdoor Attacks to Deep Learning Models and Countermeasures: A Survey | IEEE Open Journal of the Computer Society | Yudong Li Shigeng Zhang Weiping Wang Hong Song | 2023/4/14 |
ImageDroid: Using deep learning to efficiently detect Android malware and automatically mark malicious features | Security and Communication Networks | Pengfei Liu Weiping Wang Shigeng Zhang Hong Song | 2023/4/7 |
Practical periodic strategy for 40/100 Gbps Energy Efficient Ethernet | Computer Networks | Wanchun Jiang Renfu Yao Kaiqin Liao Yulong Yan Jiawei Huang | 2023/6/26 |
LSD: Adversarial Examples Detection Based on Label Sequences Discrepancy | IEEE Transactions on Information Forensics and Security | Shigeng Zhang Shuxin Chen Chengyao Hua Zhetao Li Yanchun Li | 2023/8/11 |
ISAA: Boost Repair Process by Constructing the Degree Constrained Optimal Repair Tree for Erasure-coded Systems | Xianzhi Du Bing Zhu Zhihang Deng Kenneth W Shum Weiping Wang | 2023/12/17 | |
WBA: A Warping-based Approach to Generating Imperceptible Adversarial Examples | Chengyao Hua Shigeng Zhang Weiping Wang Zhankai Li Jian Zhang | 2022/12/9 | |
On Some Capacity-Achieving Fractional Repetition Codes | IEEE Transactions on Vehicular Technology | Bing Zhu Weiping Wang Jianxin Wang | 2022/1/13 |
HashDroid: Extraction of malicious features of Android applications based on function call graph pruning | Pengfei Liu Weiping Wang Hong Song Shigeng Zhang Yulu Hong | 2022/12/9 | |
RF-Siamese: Approaching accurate RFID gesture recognition with one sample | IEEE Transactions on Mobile Computing | Zijing Ma Shigeng Zhang Jia Liu Xuan Liu Weiping Wang | 2022/10/27 |
Real-time and accurate gesture recognition with commercial RFID devices | IEEE Transactions on Mobile Computing | Shigeng Zhang Zijing Ma Chengwei Yang Xiaoyan Kui Xuan Liu | 2022/10/3 |
Fgl_droid: An efficient android malware detection method based on hybrid analysis | Security and Communication Networks | Weiping Wang Congmin Ren Hong Song Shigeng Zhang Pengfei Liu | 2022/4/28 |
G-update: A group-based update scheme for heterogenous erasure-coded storage systems | Xuyu Zhao Bing Zhu Zhiwei Zeng Weiping Wang Kenneth W Shum | 2022/12/18 | |
High-Rate Constructions of Exact-Repair Regenerating Codes | Zhiwei Zeng Bing Zhu Xuyu Zhao Weiping Wang | 2022/4/10 | |
ECCH: Erasure Coded Consistent Hashing for Distributed Storage Systems | Yinglong Xiong Jiang Zhou Lin Su Weiping Wang Yong Chen | 2021/9/30 |