default search action
Weiping Wang 0003
Person information
- affiliation: Central South University, School of Information Science and Engineering, Changsha, China
Other persons with the same name
- Weiping Wang (aka: Wei-ping Wang, Wei-Ping Wang) — disambiguation page
- Weiping Wang 0001 — Harbin Institute of Technology
- Weiping Wang 0002 — National University of Defense Technology, Changsha
- Weiping Wang 0004 — Zhejiang Sci-Tech University, School of Science, Hangzhou, China (and 1 more)
- Weiping Wang 0005 — Chinese Academy of Sciences, Institute of Information Engineering, Beijing, China (and 1 more)
- Weiping Wang 0006 — School of Management, Univ. of Science & Technology of China
- Weiping Wang 0007 — University of Science and Technology Beijing, China (and 1 more)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j36]Zhankai Li, Weiping Wang, Jie Li, Kai Chen, Shigeng Zhang:
UCG: A Universal Cross-Domain Generator for Transferable Adversarial Examples. IEEE Trans. Inf. Forensics Secur. 19: 3023-3037 (2024) - [j35]Zhankai Li, Weiping Wang, Jie Li, Kai Chen, Shigeng Zhang:
Foolmix: Strengthen the Transferability of Adversarial Examples by Dual-Blending and Direction Update Strategy. IEEE Trans. Inf. Forensics Secur. 19: 5286-5300 (2024) - [j34]Zijing Ma, Shigeng Zhang, Jia Liu, Xuan Liu, Weiping Wang, Jianxin Wang, Song Guo:
RF-Siamese: Approaching Accurate RFID Gesture Recognition With One Sample. IEEE Trans. Mob. Comput. 23(1): 797-811 (2024) - 2023
- [j33]Wanchun Jiang, Renfu Yao, Kaiqin Liao, Yulong Yan, Jiawei Huang, Weiping Wang, Jian-xin Wang:
Practical periodic strategy for 40/100 Gbps Energy Efficient Ethernet. Comput. Networks 233: 109901 (2023) - [j32]Yudong Li, Shigeng Zhang, Weiping Wang, Hong Song:
Backdoor Attacks to Deep Learning Models and Countermeasures: A Survey. IEEE Open J. Comput. Soc. 4: 134-146 (2023) - [j31]Shigeng Zhang, Shuxin Chen, Chengyao Hua, Zhetao Li, Yanchun Li, Xuan Liu, Kai Chen, Zhankai Li, Weiping Wang:
LSD: Adversarial Examples Detection Based on Label Sequences Discrepancy. IEEE Trans. Inf. Forensics Secur. 18: 5133-5147 (2023) - [j30]Shigeng Zhang, Zijing Ma, Chengwei Yang, Xiaoyan Kui, Xuan Liu, Weiping Wang, Jianxin Wang, Song Guo:
Real-Time and Accurate Gesture Recognition With Commercial RFID Devices. IEEE Trans. Mob. Comput. 22(12): 7327-7342 (2023) - [c39]Yan Qin, Weiping Wang, Zixian Chen, Hong Song, Shigeng Zhang:
TransAST: A Machine Translation-Based Approach for Obfuscated Malicious JavaScript Detection. DSN 2023: 327-338 - [c38]Zhihang Deng, Bing Zhu, Kenneth W. Shum, Weiping Wang:
Secure Fractional Repetition Codes for Distributed Storage Systems. GLOBECOM 2023: 2209-2214 - [c37]Wanyi Liu, Shigeng Zhang, Weiping Wang, Jian Zhang, Xuan Liu:
CMMR: A Composite Multidimensional Models Robustness Evaluation Framework for Deep Learning. ICA3PP (5) 2023: 238-256 - [c36]Hong Song, Ping Zhong, Yu Sheng, Weiping Wang:
Exploration and Research on Ideological and Political Education in Course Operating Systems and Security. ICCSE (2) 2023: 327-335 - [c35]Xianzhi Du, Bing Zhu, Zhihang Deng, Kenneth W. Shum, Weiping Wang:
ISAA: Boost Repair Process by Constructing the Degree Constrained Optimal Repair Tree for Erasure-coded Systems. ICPADS 2023: 194-199 - [c34]Shigeng Zhang, Kai Xiao, Jianjiang Yu, Xuan Liu, Weiping Wang:
Accurate IoT Device Identification based on A Few Network Traffic. IWQoS 2023: 1-10 - [c33]Weihong Zou, Shigeng Zhang, Weiping Wang, Jian Zhang, Xuan Liu:
MPS: A Multiple Poisoned Samples Selection Strategy in Backdoor Attack. TrustCom 2023: 873-880 - 2022
- [j29]Bing Zhu, Kenneth W. Shum, Weiping Wang, Jianxin Wang:
An Improved Bound and Singleton-Optimal Constructions of Fractional Repetition Codes. IEEE Trans. Commun. 70(2): 749-758 (2022) - [j28]Shigeng Zhang, Shuxin Chen, Xuan Liu, Chengyao Hua, Weiping Wang, Kai Chen, Jian Zhang, Jianxin Wang:
Detecting Adversarial Samples for Deep Learning Models: A Comparative Study. IEEE Trans. Netw. Sci. Eng. 9(1): 231-244 (2022) - [j27]Bing Zhu, Weiping Wang, Jianxin Wang:
On Some Capacity-Achieving Fractional Repetition Codes. IEEE Trans. Veh. Technol. 71(3): 3332-3337 (2022) - [c32]Xuyu Zhao, Bing Zhu, Zhiwei Zeng, Weiping Wang, Kenneth W. Shum:
G-Update: A Group-based Update Scheme for Heterogenous Erasure-coded Storage Systems. HPCC/DSS/SmartCity/DependSys 2022: 1135-1140 - [c31]Pengfei Liu, Weiping Wang, Hong Song, Shigeng Zhang, Yulu Hong:
HashDroid:Extraction of malicious features of Android applications based on function call graph pruning. TrustCom 2022: 66-73 - [c30]Chengyao Hua, Shigeng Zhang, Weiping Wang, Zhankai Li, Jian Zhang:
WBA: A Warping-based Approach to Generating Imperceptible Adversarial Examples. TrustCom 2022: 361-368 - [c29]Zhiwei Zeng, Bing Zhu, Xuyu Zhao, Weiping Wang:
High-Rate Constructions of Exact-Repair Regenerating Codes. WCNC 2022: 1099-1104 - 2021
- [j26]Pengfei Liu, Weiping Wang, Xi Luo, Haodong Wang, Chushu Liu:
NSDroid: efficient multi-classification of android malware using neighborhood signature in local function call graphs. Int. J. Inf. Sec. 20(1): 59-71 (2021) - [j25]Sujun Li, Boqing Zhou, Qinqin Hu, Jianxin Wang, Jingguo Dai, Weiping Wang, Huiyong Yuan, Yun Cheng, Jie Wu:
A Secure Scheme Based on One-Way Associated Key Management Model in Wireless Sensor Networks. IEEE Internet Things J. 8(4): 2920-2930 (2021) - [j24]Yan Qin, Weiping Wang, Shigeng Zhang, Kai Chen:
An Exploit Kits Detection Approach Based on HTTP Message Graph. IEEE Trans. Inf. Forensics Secur. 16: 3387-3400 (2021) - [c28]Bing Zhu, Shigeng Zhang, Weiping Wang:
Square Fractional Repetition Codes for Distributed Storage Systems. ICA3PP (2) 2021: 230-239 - [c27]Bing Zhu, Shigeng Zhang, Weiping Wang:
Expandable Fractional Repetition Codes for Distributed Storage Systems. ITW 2021: 1-5 - [c26]Xue Liu, Shigeng Zhang, Huihui Li, Weiping Wang:
Fast Application Activity Recognition with Encrypted Traffic. WASA (2) 2021: 314-325 - 2020
- [j23]Yinggang Li, Shigeng Zhang, Bing Zhu, Weiping Wang:
Accurate human activity recognition with multi-task learning. CCF Trans. Pervasive Comput. Interact. 2(4): 288-298 (2020) - [j22]Shigeng Zhang, Yinggang Li, Xuan Liu, Song Guo, Weiping Wang, Jianxin Wang, Bo Ding, Di Wu:
Towards Real-time Cooperative Deep Inference over the Cloud and Edge End Devices. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 4(2): 69:1-69:24 (2020) - [j21]Jiazhi Xia, Yu-hong Zhang, Hui Ye, Ying Wang, Guang Jiang, Ying Zhao, Cong Xie, Xiaoyan Kui, Sheng-Hui Liao, Weiping Wang:
SuPoolVisor: a visual analytics system for mining pool surveillance. Frontiers Inf. Technol. Electron. Eng. 21(4): 507-523 (2020) - [j20]Weiping Wang, Jianjian Wei, Shigeng Zhang, Xi Luo:
LSCDroid: Malware Detection Based on Local Sensitive API Invocation Sequences. IEEE Trans. Reliab. 69(1): 174-187 (2020) - [c25]Bing Zhu, Kenneth W. Shum, Weiping Wang, Jianxin Wang:
On the Optimal Minimum Distance of Fractional Repetition Codes. GLOBECOM 2020: 1-6 - [c24]Yizhen Sun, Yiman Xie, Weiping Wang, Shigeng Zhang, Jun Gao, Yating Chen:
WSAD: An Unsupervised Web Session Anomaly Detection Method. MSN 2020: 735-739 - [c23]Yizhen Sun, Yiman Xie, Weiping Wang, Shigeng Zhang, Yuxi Wu, Jingchuan Feng:
RPAD: An Unsupervised HTTP Request Parameter Anomaly Detection Method. TrustCom 2020: 1215-1221 - [i1]Bing Zhu, Kenneth W. Shum, Weiping Wang, Jianxin Wang:
On the Optimal Minimum Distance of Fractional Repetition Codes. CoRR abs/2005.06823 (2020)
2010 – 2019
- 2019
- [j19]Boqing Zhou, Sujun Li, Weiping Wang, Jianxin Wang, Yun Cheng, Jie Wu:
An Efficient Authentication Scheme Based on Deployment Knowledge Against Mobile Sink Replication Attack in UWSNs. IEEE Internet Things J. 6(6): 9738-9747 (2019) - [j18]Weiping Wang, Feng Zhang, Xi Luo, Shigeng Zhang:
PDRCNN: Precise Phishing Detection with Recurrent Convolutional Neural Networks. Secur. Commun. Networks 2019: 2595794:1-2595794:15 (2019) - [j17]Junyang Bai, Weiping Wang, Yan Qin, Shigeng Zhang, Jianxin Wang, Yi Pan:
BridgeTaint: A Bi-Directional Dynamic Taint Tracking Method for JavaScript Bridges in Android Hybrid Applications. IEEE Trans. Inf. Forensics Secur. 14(3): 677-692 (2019) - [c22]Hong Song, Dandan Lin, Ping Zhong, Yu Sheng, Weiping Wang:
Project-driven information talents training mode in opening environment. ICCSE 2019: 1054-1058 - [c21]Hong Song, Dandan Lin, Shuang Zhu, Weiping Wang, Shigeng Zhang:
ADS-SA: System for Automatically Detecting Sensitive Path of Android Applications Based on Static Analysis. iSCI 2019: 309-322 - [c20]Bing Zhu, Kenneth W. Shum, Hui Li, Weiping Wang:
On the Optimal Reconstruction Degree of Fractional Repetition Codes. ISIT 2019: 1557-1561 - [c19]Kun Huang, Xuchong Liu, Weiping Wang, Haodong Wang:
VDetector: Detecting Vulnerability Based on Inter-Component Data Flows in Android Applications. MSN 2019: 321-326 - 2018
- [j16]Wei Jiang, Wanchun Jiang, Weiping Wang, Haodong Wang, Yi Pan, Jianxin Wang:
A fine-grained rule partition algorithm in cloud data centers. J. Netw. Comput. Appl. 113: 14-25 (2018) - [j15]Sujun Li, Weiping Wang, Boqing Zhou, Jianxin Wang, Yun Cheng, Jie Wu:
A (M, m) Authentication Scheme Against Mobile Sink Replicated Attack in Unattended Sensor Networks. IEEE Wirel. Commun. Lett. 7(2): 250-253 (2018) - 2017
- [j14]Sujun Li, Weiping Wang, Boqing Zhou, Jianxin Wang, Yun Cheng, Jie Wu:
A Secure Scheme for Heterogeneous Sensor Networks. IEEE Wirel. Commun. Lett. 6(2): 182-185 (2017) - 2016
- [j13]Boqing Zhou, Jianxin Wang, Sujun Li, Weiping Wang, Yun Cheng, Jie Wu:
A Secure Scheme Based on Layer Model in Multi-Phase Sensor Networks. IEEE Commun. Lett. 20(7): 1421-1424 (2016) - [j12]Junyang Bai, Weiping Wang, Mingming Lu, Haodong Wang, Jianxin Wang:
TD-WS: a threat detection tool of WebSocket and Web Storage in HTML5 websites. Secur. Commun. Networks 9(18): 5432-5443 (2016) - [j11]Weiping Wang, Xiaozhuan Chen, Mingming Lu, Jianxin Wang, Xi Zhang, Jie Wu:
Code pruning in opportunistic routing through bidirectional coding traffic comparison. Wirel. Commun. Mob. Comput. 16(3): 279-299 (2016) - [j10]Xiang Yang, Weiping Wang, Mingming Lu, Jianxin Wang, Xi Zhang:
Fair coding for inter-session network coding in wireless mesh networks. Wirel. Commun. Mob. Comput. 16(14): 1922-1942 (2016) - 2015
- [j9]Yuzhu Cheng, Weiping Wang, Geyong Min, Jianxin Wang:
A new approach to designing firewall based on multidimensional matrix. Concurr. Comput. Pract. Exp. 27(12): 3075-3088 (2015) - [j8]Yao Liu, Jiawei Huang, Weiping Wang, Hongjing Zhou, Ying An, Jianxin Wang:
Mobility Similarity-Based Routing in Buffer-Limited Delay Tolerant Networks. Int. J. Distributed Sens. Networks 11: 593607:1-593607:16 (2015) - [c18]Hongling Xiao, Hong Song, Weiping Wang:
EPAMP: An Anonymous Multicast Protocol in Mobile Ad Hoc Networks. ICA3PP (Workshops and Symposiums) 2015: 276-289 - 2014
- [j7]Lixia Zhang, Weiping Wang, Jianliang Gao, Jianxin Wang:
Lossy links diagnosis for wireless sensor networks by utilising the existing traffic information. Int. J. Embed. Syst. 6(2/3): 140-147 (2014) - [j6]Boqing Zhou, Jianxin Wang, Sujun Li, Weiping Wang:
A New Key Predistribution Scheme for Multiphase Sensor Networks Using a New Deployment Model. J. Sensors 2014: 573913:1-573913:10 (2014) - 2013
- [j5]Jianxin Wang, Pingping Dong, Jie Chen, Jiawei Huang, Shigeng Zhang, Weiping Wang:
Adaptive explicit congestion control based on bandwidth estimation for high bandwidth-delay product networks. Comput. Commun. 36(10-11): 1235-1244 (2013) - [j4]Jianliang Gao, Jianxin Wang, Jianbiao He, Weiping Wang:
QSA: Query Splitting-Based Anticollision for Mobile RFID-Based Internet-of-Things. Int. J. Distributed Sens. Networks 9 (2013) - [c17]Ang Mi, Weiping Wang, Shigeng Zhang, Hong Song:
Design of Lightweight Web Page Tamper-Resistant Mechanism for Linux. CSS 2013: 29-39 - [c16]Xiang Yang, Weiping Wang, Jianxin Wang:
A Cross-Layer Optimization Mechanism for Inter-session Network Coding in Wireless Mesh Network. HPCC/EUC 2013: 264-271 - [c15]Hao Li, Weiping Wang, Xiang Yang, Mingming Lu:
ARSM: A Lightweight Packet Reception Notification Mechanism for Wireless Localized Network Coding. HPCC/EUC 2013: 286-293 - [c14]Jianliang Gao, Jianxin Wang, Weiping Wang:
Energy-Efficient Multicast Protocol for Real-Time Wireless Sensor Networks. HPCC/EUC 2013: 979-984 - [c13]Yaxing Zhou, Hong Song, Weiping Wang:
Adaptive Relay Selection Algorithm Based on Network Coding in 802.16m Network. HPCC/EUC 2013: 1262-1268 - 2012
- [j3]Wei Peng, Jianxin Wang, Weiping Wang, Qing Liu, Fang-Xiang Wu, Yi Pan:
Iteration method for predicting essential proteins based on orthology and protein-protein interaction networks. BMC Syst. Biol. 6: 87 (2012) - [j2]Xingpo Ma, Jianliang Gao, Weiping Wang, Jianxin Wang:
A Virtual-Ring-Based Data Storage and Retrieval Scheme in Wireless Sensor Networks. Int. J. Distributed Sens. Networks 8 (2012) - [c12]Zhuofan Liao, Shigeng Zhang, Jiannong Cao, Weiping Wang, Jianxin Wang:
Minimizing Movement for Target Coverage in Mobile Sensor Networks. ICDCS Workshops 2012: 194-200 - 2011
- [c11]Jianxin Wang, Jie Chen, Shigeng Zhang, Weiping Wang:
An Explicit Congestion Control Protocol Based on Bandwidth Estimation. GLOBECOM 2011: 1-5 - [c10]Hong Song, Xiao Xiao, Weiping Wang, Luming Yang:
DENNC: A Wireless Malicious Detection Approach Based on Network Coding. TrustCom 2011: 160-165 - 2010
- [c9]Yu Sheng, Jianxin Wang, Weiping Wang, Lanying Liu:
Design and Implementation of Collaboration Support in Virtual Experiment Environment. ICWL 2010: 399-403
2000 – 2009
- 2009
- [j1]Guofeng Yan, Jianxin Wang, Weiping Wang:
An analytical model for end-to-end communication channel over PLCN based on QBDs. Inf. Process. Lett. 109(23-24): 1252-1259 (2009) - [c8]Weiping Wang, Guihua Duan, Jianxin Wang, Jianer Chen:
An Anonymous Communication Mechanism without Key Infrastructure Based on Multi-Paths Network Coding. GLOBECOM 2009: 1-6 - [c7]Weiping Wang, Jinhong Xu, Jianxin Wang:
Detection and location of malicious nodes based on source coding and multi-path transmission in WSN. HPCC 2009: 458-463 - 2008
- [c6]Guihua Duan, Weiping Wang, Jianxin Wang, Luming Yang:
A New Anonymity Measure Based on Partial Entropy. ICC 2008: 1484-1488 - [c5]Weiping Wang, Liang Chen, Jianxin Wang:
A Source-Location Privacy Protocol in WSN Based on Locational Angle. ICC 2008: 1630-1634 - [c4]Yu Sheng, Weiping Wang, Jianxin Wang, Jianer Chen:
A Virtual Laboratory Platform Based on Integration of Java and Matlab. ICWL 2008: 285-295 - [c3]Xiao Xiao, Luming Yang, Weiping Wang, Shuai Zhang:
A Broadcasting Retransmission Approach Based on Random Linear Network Coding. ICYCS 2008: 457-461 - [c2]Yu Sheng, Weiping Wang:
Design and Implementation of Compression Algorithm Comparator for Digital Image Processing Based on Component. ICYCS 2008: 1337-1341 - [c1]Yanhui Wu, Weiping Wang, Jianer Chen:
A Novel Anonymous Communication Strategy with Respect to Payment Mechanism. ICYCS 2008: 1527-1531
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-15 19:32 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint