What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Wei Wang
Google Scholar
27
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/compsec
Evading backdoor defenses: Concealing genuine backdoors through scapegoat strategy.
Yaguan Qian
Zejie Lian
Yiming Li
Wei Wang
Zhaoquan Gu
Bin Wang
Yanchun Zhang
2025
journals/istr
DMRP: Privacy-Preserving Deep Learning Model with Dynamic Masking and Random Permutation.
Chongzhen Zhang
Zhiwang Hu
Xiangrui Xu
Yong Liu
Bin Wang
Jian Shen
Tao Li
Yu Huang
Baigen Cai
Wei Wang
2025
journals/tifs
Across-Platform Detection of Malicious Cryptocurrency Accounts via Interaction Feature Learning.
Zheng Che
Meng Shen
Zhehui Tan
Hanbiao Du
Wei Wang
Ting Chen
Qinglin Zhao
Yong Xie
Liehuang Zhu
2025
journals/tifs
SoFi: Spoofing OS Fingerprints Against Network Reconnaissance.
Xu Han
Haocong Li
Wei Wang
Haining Wang
Xiaobo Ma
Shouling Ji
Qiang Li
2025
journals/tifs
Differential-Trust-Mechanism-Based Trade-Off Method Between Privacy and Accuracy in Recommender Systems.
Guangquan Xu
Shicheng Feng
Hao Xi
Qingyang Yan
Wenshan Li
Cong Wang
Wei Wang
Shaoying Liu
Zhihong Tian
James Xi Zheng
2025
journals/tifs
VFLMonitor: Defending One-Party Hijacking Attacks in Vertical Federated Learning.
Xiangrui Xu
Yiwen Zhao
Yufei Han
Yongsheng Zhu
Zhen Han
Guangquan Xu
Bin Wang
Shouling Ji
Wei Wang
2025
journals/tifs
FedEditor: Efficient and Effective Federated Unlearning in Cooperative Intelligent Transportation Systems.
Xiaohan Yuan
Jiqiang Liu
Bin Wang
Guorong Chen
Xiangrui Xu
Junyong Wang
Tao Li
Wei Wang
2025
journals/tifs
Fine-Grained and Class-Incremental Malicious Account Detection in Ethereum via Dynamic Graph Learning.
Hanbiao Du
Meng Shen
Yang Liu
Zheng Che
Jinhe Wu
Wei Wang
Liehuang Zhu
2025
conf/uss
From Risk to Resilience: Towards Assessing and Mitigating the Risk of Data Reconstruction Attacks in Federated Learning.
Xiangrui Xu
Zhize Li
Yufei Han
Bin Wang
Jiqiang Liu
Wei Wang
2024
journals/compsec
BFS2Adv: Black-box adversarial attack towards hard-to-attack short texts.
Xu Han
Qiang Li
Hongbo Cao
Lei Han
Bin Wang
Xuhua Bao
Yufei Han
Wei Wang
2024
journals/tifs
Eyes on Federated Recommendation: Targeted Poisoning With Competition and Its Mitigation.
Yurong Hao
Xihui Chen
Wei Wang
Jiqiang Liu
Tao Li
Junyong Wang
Witold Pedrycz
2024
journals/tifs
FedComm: A Privacy-Enhanced and Efficient Authentication Protocol for Federated Learning in Vehicular Ad-Hoc Networks.
Xiaohan Yuan
Jiqiang Liu
Bin Wang
Wei Wang
Bin Wang
Tao Li
Xiaobo Ma
Witold Pedrycz
2024
journals/tifs
Enhancing Transferability of Adversarial Examples Through Mixed-Frequency Inputs.
Yaguan Qian
Kecheng Chen
Bin Wang
Zhaoquan Gu
Shouling Ji
Wei Wang
Yanchun Zhang
2024
conf/ccs
Not One Less: Exploring Interplay between User Profiles and Items in Untargeted Attacks against Federated Recommendation.
Yurong Hao
Xihui Chen
Xiaoting Lyu
Jiqiang Liu
Yongsheng Zhu
Zhiguo Wan
Sjouke Mauw
Wei Wang
2024
conf/uss
Lurking in the shadows: Unveiling Stealthy Backdoor Attacks against Personalized Federated Learning.
Xiaoting Lyu
Yufei Han
Wei Wang
Jingkai Liu
Yongsheng Zhu
Guangquan Xu
Jiqiang Liu
Xiangliang Zhang
2023
journals/compsec
UAF-GUARD: Defending the use-after-free exploits via fine-grained memory permission management.
Guangquan Xu
Wenqing Lei
Lixiao Gong
Jian Liu
Hongpeng Bai
Kai Chen
Ran Wang
Wei Wang
Kaitai Liang
Weizhe Wang
Weizhi Meng
Shaoying Liu
2023
journals/compsec
Object-free backdoor attack and defense on semantic segmentation.
Jiaoze Mao
Yaguan Qian
Jianchang Huang
Zejie Lian
Renhui Tao
Bin Wang
Wei Wang
Tengteng Yao
2023
conf/ccs
How Hard is Takeover in DPoS Blockchains? Understanding the Security of Coin-based Voting Governance.
Chao Li
Balaji Palanisamy
Runhua Xu
Li Duan
Jiqiang Liu
Wei Wang
2022
conf/cns
Alexa Skills: Security Vulnerabilities and Countermeasures.
Dan Su
Jiqiang Liu
Sencun Zhu
Xiaoyang Wang
Wei Wang
2019
journals/istr
Dynamic privacy leakage analysis of Android third-party libraries.
Yongzhong He
Xuejun Yang
Binghui Hu
Wei Wang
2018
conf/esorics
Efficient and Secure Outsourcing of Differentially Private Data Publication.
Jin Li
Heng Ye
Wei Wang
Wenjing Lou
Y. Thomas Hou
Jiqiang Liu
Rongxing Lu
2017
journals/tifs
DAPASA: Detecting Android Piggybacked Apps Through Sensitive Subgraph Analysis.
Ming Fan
Jun Liu
Wei Wang
Haifei Li
Zhenzhou Tian
Ting Liu
2016
conf/ccs
Fast, Private and Verifiable: Server-aided Approximate Similarity Computation over Large-Scale Datasets.
Shuo Qiu
Boyang Wang
Ming Li
Jesse Victors
Jiqiang Liu
Yanfeng Shi
Wei Wang
2015
conf/ccs
POSTER: The Popular Apps in Your Pocket Are Leaking Your Privacy.
Xing Liu
Wei Wang
Jiqiang Liu
2014
journals/tifs
Exploring Permission-Induced Risk in Android Applications for Malicious Application Detection.
Wei Wang
Xing Wang
Dawei Feng
Jiqiang Liu
Zhen Han
Xiangliang Zhang
2010
conf/iciss
Abstracting Audit Data for Lightweight Intrusion Detection.
Wei Wang
Xiangliang Zhang
Georgios Pitsilis
2006
journals/compsec
Profiling program behavior for anomaly intrusion detection based on the transition and frequency property of computer audit data.
Wei Wang
Xiaohong Guan
Xiangliang Zhang
Liwei Yang
Coauthors
Baigen Cai
(1)
Balaji Palanisamy
(1)
Bin Wang
(8)
Bin Wang
(1)
Bin Wang
(1)
Binghui Hu
(1)
Boyang Wang
(1)
Chao Li
(1)
Chongzhen Zhang
(1)
Cong Wang
(1)
Dan Su
(1)
Dawei Feng
(1)
Georgios Pitsilis
(1)
Guangquan Xu
(4)
Guorong Chen
(1)
Haifei Li
(1)
Haining Wang
(1)
Hanbiao Du
(2)
Hao Xi
(1)
Haocong Li
(1)
Heng Ye
(1)
Hongbo Cao
(1)
Hongpeng Bai
(1)
James Xi Zheng
(1)
Jesse Victors
(1)
Jian Liu
(1)
Jian Shen
(1)
Jianchang Huang
(1)
Jiaoze Mao
(1)
Jin Li
(1)
Jingkai Liu
(1)
Jinhe Wu
(1)
Jiqiang Liu
(12)
Jun Liu
(1)
Junyong Wang
(2)
Kai Chen
(1)
Kaitai Liang
(1)
Kecheng Chen
(1)
Lei Han
(1)
Li Duan
(1)
Liehuang Zhu
(2)
Liwei Yang
(1)
Lixiao Gong
(1)
Meng Shen
(2)
Ming Fan
(1)
Ming Li
(1)
Qiang Li
(2)
Qinglin Zhao
(1)
Qingyang Yan
(1)
Ran Wang
(1)
Renhui Tao
(1)
Rongxing Lu
(1)
Runhua Xu
(1)
Sencun Zhu
(1)
Shaoying Liu
(2)
Shicheng Feng
(1)
Shouling Ji
(3)
Shuo Qiu
(1)
Sjouke Mauw
(1)
Tao Li
(4)
Tengteng Yao
(1)
Ting Chen
(1)
Ting Liu
(1)
Wei Wang
(27)
Weizhe Wang
(1)
Weizhi Meng
(1)
Wenjing Lou
(1)
Wenqing Lei
(1)
Wenshan Li
(1)
Witold Pedrycz
(2)
Xiangliang Zhang
(4)
Xiangrui Xu
(4)
Xiaobo Ma
(2)
Xiaohan Yuan
(2)
Xiaohong Guan
(1)
Xiaoting Lyu
(2)
Xiaoyang Wang
(1)
Xihui Chen
(2)
Xing Liu
(1)
Xing Wang
(1)
Xu Han
(2)
Xuejun Yang
(1)
Xuhua Bao
(1)
Y. Thomas Hou
(1)
Yaguan Qian
(3)
Yanchun Zhang
(2)
Yanfeng Shi
(1)
Yang Liu
(1)
Yiming Li
(1)
Yiwen Zhao
(1)
Yong Liu
(1)
Yong Xie
(1)
Yongsheng Zhu
(3)
Yongzhong He
(1)
Yu Huang
(1)
Yufei Han
(4)
Yurong Hao
(2)
Zejie Lian
(2)
Zhaoquan Gu
(2)
Zhehui Tan
(1)
Zhen Han
(2)
Zheng Che
(2)
Zhenzhou Tian
(1)
Zhiguo Wan
(1)
Zhihong Tian
(1)
Zhiwang Hu
(1)
Zhize Li
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to