Follow
Sheng Wen
Sheng Wen
Swinburne University of Technology
No verified email
Title
Cited by
Cited by
Year
The fog computing paradigm: Scenarios and security issues
I Stojmenovic, S Wen
2014 federated conference on computer science and information systems, 1-8, 2014
13642014
An overview of fog computing and its security issues
I Stojmenovic, S Wen, X Huang, H Luan
Concurrency and Computation: Practice and Experience 28 (10), 2991-3005, 2016
4802016
Software vulnerability detection using deep neural networks: a survey
G Lin, S Wen, QL Han, J Zhang, Y Xiang
Proceedings of the IEEE 108 (10), 1825-1848, 2020
3522020
Android HIV: A study of repackaging malware for evading machine-learning detection
X Chen, C Li, D Wang, S Wen, J Zhang, S Nepal, Y Xiang, K Ren
IEEE Transactions on Information Forensics and Security 15, 987-1001, 2019
2782019
Identifying propagation sources in networks: State-of-the-art and comparative studies
J Jiang, S Wen, S Yu, Y Xiang, W Zhou
IEEE Communications Surveys & Tutorials 19 (1), 465-481, 2016
2312016
Deep learning based attack detection for cyber-physical system cybersecurity: A survey
J Zhang, L Pan, QL Han, C Chen, S Wen, Y Xiang
IEEE/CAA Journal of Automatica Sinica 9 (3), 377-391, 2021
2282021
Twitter spam detection: Survey of new approaches and comparative study
T Wu, S Wen, Y Xiang, W Zhou
Computers & Security 76, 265-284, 2018
2092018
Modeling the propagation of worms in networks: A survey
Y Wang, S Wen, Y Xiang, W Zhou
IEEE Communications Surveys & Tutorials 16 (2), 942-960, 2013
2002013
A sword with two edges: Propagation studies on both positive and negative information in online social networks
S Wen, MS Haghighi, C Chen, Y Xiang, W Zhou, W Jia
IEEE Transactions on Computers 64 (3), 640-653, 2014
1862014
Detection and defense of application-layer DDoS attacks in backbone web traffic
W Zhou, W Jia, S Wen, Y Xiang, W Zhou
Future Generation Computer Systems 38, 36-46, 2014
1612014
To shut them up or to clarify: Restraining the spread of rumors in online social networks
S Wen, J Jiang, Y Xiang, S Yu, W Zhou, W Jia
IEEE Transactions on Parallel and Distributed Systems 25 (12), 3306-3316, 2014
1382014
Modeling propagation dynamics of social network worms
S Wen, W Zhou, J Zhang, Y Xiang, W Zhou, W Jia
IEEE Transactions on parallel and distributed systems 24 (8), 1633-1643, 2012
1302012
Fuzzing: a survey for roadmap
X Zhu, S Wen, S Camtepe, Y Xiang
ACM Computing Surveys (CSUR) 54 (11s), 1-36, 2022
1252022
DeepBalance: Deep-learning and fuzzy oversampling for vulnerability detection
S Liu, G Lin, QL Han, S Wen, J Zhang, Y Xiang
IEEE Transactions on Fuzzy Systems 28 (7), 1329-1343, 2019
1022019
Daedalus: Breaking nonmaximum suppression in object detection via adversarial examples
D Wang, C Li, S Wen, QL Han, S Nepal, X Zhang, Y Xiang
IEEE Transactions on Cybernetics 52 (8), 7427-7440, 2021
1002021
Rumor source identification in social networks with time-varying topology
J Jiang, S Wen, S Yu, Y Xiang, W Zhou
IEEE Transactions on Dependable and Secure Computing 15 (1), 166-179, 2016
992016
Snipuzz: Black-box fuzzing of iot firmware via message snippet inference
X Feng, R Sun, X Zhu, M Xue, S Wen, D Liu, S Nepal, Y Xiang
Proceedings of the 2021 ACM SIGSAC conference on computer and communications …, 2021
842021
Intersection traffic prediction using decision tree models
W Alajali, W Zhou, S Wen, Y Wang
Symmetry 10 (9), 386, 2018
782018
Modeling and analysis on the propagation dynamics of modern email malware
S Wen, W Zhou, J Zhang, Y Xiang, W Zhou, W Jia, CC Zou
IEEE transactions on dependable and secure computing 11 (4), 361-374, 2013
782013
Following targets for mobile tracking in wireless sensor networks
T Wang, Z Peng, J Liang, S Wen, MZA Bhuiyan, Y Cai, J Cao
ACM Transactions on Sensor Networks (TOSN) 12 (4), 1-24, 2016
732016
The system can't perform the operation now. Try again later.
Articles 1–20