The fog computing paradigm: Scenarios and security issues I Stojmenovic, S Wen 2014 federated conference on computer science and information systems, 1-8, 2014 | 1366 | 2014 |
An overview of fog computing and its security issues I Stojmenovic, S Wen, X Huang, H Luan Concurrency and Computation: Practice and Experience 28 (10), 2991-3005, 2016 | 482 | 2016 |
Software vulnerability detection using deep neural networks: a survey G Lin, S Wen, QL Han, J Zhang, Y Xiang Proceedings of the IEEE 108 (10), 1825-1848, 2020 | 357 | 2020 |
Android HIV: A study of repackaging malware for evading machine-learning detection X Chen, C Li, D Wang, S Wen, J Zhang, S Nepal, Y Xiang, K Ren IEEE Transactions on Information Forensics and Security 15, 987-1001, 2019 | 280 | 2019 |
Deep learning based attack detection for cyber-physical system cybersecurity: A survey J Zhang, L Pan, QL Han, C Chen, S Wen, Y Xiang IEEE/CAA Journal of Automatica Sinica 9 (3), 377-391, 2021 | 233 | 2021 |
Identifying propagation sources in networks: State-of-the-art and comparative studies J Jiang, S Wen, S Yu, Y Xiang, W Zhou IEEE Communications Surveys & Tutorials 19 (1), 465-481, 2016 | 232 | 2016 |
Twitter spam detection: Survey of new approaches and comparative study T Wu, S Wen, Y Xiang, W Zhou Computers & Security 76, 265-284, 2018 | 210 | 2018 |
Modeling the propagation of worms in networks: A survey Y Wang, S Wen, Y Xiang, W Zhou IEEE Communications Surveys & Tutorials 16 (2), 942-960, 2013 | 200 | 2013 |
A sword with two edges: Propagation studies on both positive and negative information in online social networks S Wen, MS Haghighi, C Chen, Y Xiang, W Zhou, W Jia IEEE Transactions on Computers 64 (3), 640-653, 2014 | 186 | 2014 |
Detection and defense of application-layer DDoS attacks in backbone web traffic W Zhou, W Jia, S Wen, Y Xiang, W Zhou Future Generation Computer Systems 38, 36-46, 2014 | 161 | 2014 |
To shut them up or to clarify: Restraining the spread of rumors in online social networks S Wen, J Jiang, Y Xiang, S Yu, W Zhou, W Jia IEEE Transactions on Parallel and Distributed Systems 25 (12), 3306-3316, 2014 | 139 | 2014 |
Fuzzing: a survey for roadmap X Zhu, S Wen, S Camtepe, Y Xiang ACM Computing Surveys (CSUR) 54 (11s), 1-36, 2022 | 130 | 2022 |
Modeling propagation dynamics of social network worms S Wen, W Zhou, J Zhang, Y Xiang, W Zhou, W Jia IEEE Transactions on parallel and distributed systems 24 (8), 1633-1643, 2012 | 130 | 2012 |
DeepBalance: Deep-learning and fuzzy oversampling for vulnerability detection S Liu, G Lin, QL Han, S Wen, J Zhang, Y Xiang IEEE Transactions on Fuzzy Systems 28 (7), 1329-1343, 2019 | 102 | 2019 |
Daedalus: Breaking nonmaximum suppression in object detection via adversarial examples D Wang, C Li, S Wen, QL Han, S Nepal, X Zhang, Y Xiang IEEE Transactions on Cybernetics 52 (8), 7427-7440, 2021 | 100 | 2021 |
Rumor source identification in social networks with time-varying topology J Jiang, S Wen, S Yu, Y Xiang, W Zhou IEEE Transactions on Dependable and Secure Computing 15 (1), 166-179, 2016 | 99 | 2016 |
Snipuzz: Black-box fuzzing of iot firmware via message snippet inference X Feng, R Sun, X Zhu, M Xue, S Wen, D Liu, S Nepal, Y Xiang Proceedings of the 2021 ACM SIGSAC conference on computer and communications …, 2021 | 88 | 2021 |
Intersection traffic prediction using decision tree models W Alajali, W Zhou, S Wen, Y Wang Symmetry 10 (9), 386, 2018 | 79 | 2018 |
Modeling and analysis on the propagation dynamics of modern email malware S Wen, W Zhou, J Zhang, Y Xiang, W Zhou, W Jia, CC Zou IEEE transactions on dependable and secure computing 11 (4), 361-374, 2013 | 79 | 2013 |
Following targets for mobile tracking in wireless sensor networks T Wang, Z Peng, J Liang, S Wen, MZA Bhuiyan, Y Cai, J Cao ACM Transactions on Sensor Networks (TOSN) 12 (4), 1-24, 2016 | 73 | 2016 |