Skip to main content

and
  1. No Access

    Chapter and Conference Paper

    Efficient Black-Box Adversarial Attacks with Training Surrogate Models Towards Speaker Recognition Systems

    Speaker Recognition Systems (SRSs) are gradually introducing Deep Neural Networks (DNNs) as their core architecture, while attackers exploit the weakness of DNNs to launch adversarial attacks. Previous studies...

    Fangwei Wang, Ruixin Song, Qingru Li in Algorithms and Architectures for Parallel … (2024)

  2. No Access

    Chapter and Conference Paper

    An Android Malware Detection Method Based on Metapath Aggregated Graph Neural Network

    Android system is facing an increasing threat of malware. Most of the current malware detection systems need to use large-scale training samples to get high accuracy. However, it is difficult to get a lot of s...

    Qingru Li, Yufei Zhang, Fangwei Wang in Algorithms and Architectures for Parallel … (2024)

  3. No Access

    Chapter and Conference Paper

    A Probability Map**-Based Privacy Preservation Method for Social Networks

    The mining and analysis of social networks can bring significant economic and social benefits. However, it also poses a risk of privacy leakages. Differential privacy is a de facto standard to prevent such lea...

    Qingru Li, Yahong Wang, Fangwei Wang, Zhiyuan Tan, Changguang Wang in Ubiquitous Security (2024)

  4. No Access

    Chapter and Conference Paper

    A Label Flip** Attack on Machine Learning Model and Its Defense Mechanism

    Recently, the robustness of machine learning against data poisoning attacks is widely concerned. As a subclass of poisoning attack, the label flip** attack can poison training data resulting in reducing the ...

    Qingru Li, **nru Wang, Fangwei Wang in Algorithms and Architectures for Parallel … (2023)

  5. No Access

    Chapter and Conference Paper

    An Efficient Unsupervised Domain Adaptation Deep Learning Model for Unknown Malware Detection

    Emerging malware and zero-day vulnerabilities present new challenges to malware detection. Currently, numerous proposed malware detection approaches are based on supervised learning. However, these methods rel...

    Fangwei Wang, Guofang Chai, Qingru Li in Security and Privacy in New Computing Envi… (2022)

  6. No Access

    Chapter and Conference Paper

    Non-pre-trained Mine Pedestrian Detection Based on Automatic Generation of Anchor Box

    Mine pedestrian detection is an important part of computer vision and one of the key technologies of unmanned locomotive. In order to improve the structural adaptability of pedestrian detection network, reduce...

    **ng Wei, Changguang Wang, Haitao Zhang in Wireless Algorithms, Systems, and Applicat… (2020)

  7. No Access

    Chapter and Conference Paper

    A Novel Intrusion Detection System for Malware Based on Time-Series Meta-learning

    In recent years, frequent occurrence of network security incidents indicates that host security is more and more fragile. However, current protection tools leads to reduce the efficiency of CPU or GPU. Meanwhi...

    Fangwei Wang, Shaojie Yang, Changguang Wang in Machine Learning for Cyber Security (2020)

  8. No Access

    Chapter and Conference Paper

    A Feature-Based Detection System of Adversarial Sample Attack

    With the increase of malware, traditional malicious detection methods are not suitable to high-intensity detection work. In response to this question, many malware detection methods based on Machine Learning (...

    Fangwei Wang, Yuanyuan Lu, Qingru Li in Machine Learning for Cyber Security (2020)

  9. Article

    Analysis of SVEIR worm attack model with saturated incidence and partial immunization

    Internet worms can propagate across networks at terrifying speeds, reduce network security to a remarkable extent, and cause heavy economic losses. Thus, the rapid elimination of Internet worms using partial i...

    Fangwei Wang, Wenyan Huang, Yulong Shen in Journal of Communications and Information … (2016)

  10. No Access

    Chapter and Conference Paper

    The Research of Security Technology in the Internet of Things

    A security hierarchy structure of Internet of Things (IOT) was proposed, which is consisted of a sensation layer, a network layer and an application layer. From the three different layers, the security issues ...

    **angyu Sun, Changguang Wang in Advances in Computer Science, Intelligent … (2011)

  11. No Access

    Article

    Malicious code modeling and analysis in weighted scale-free networks

    We study the detailed malicious code propagating process in scale-free networks with link weights that denotes traffic between two nodes. It is found that the propagating velocity reaches a peak rapidly then d...

    Changguang Wang, Fangwei Wang, Yangkai Zhang in Wuhan University Journal of Natural Scienc… (2007)

  12. No Access

    Chapter and Conference Paper

    Intravitreal Injection of Triamcinolone Acetonide for Macular Edema Due to Retinitis Pigmentosa and Other Retinal Diseases

    Macular edema is a swelling of the macula that can result in decreased visual acuity. Because the macula is extensively surrounded by blood vessels, any resulting leakage can lead to macular edema and subseque...

    Changguang Wang, Jianbin Hu, Paul S. Bernstein in Retinal Degenerative Diseases (2006)

  13. No Access

    Chapter and Conference Paper

    Worm Propagation Modeling and Analysis on Network

    In recent years, network worms that had a dramatic increase in the frequency and virulence of such outbreaks have become one of the major threats to the security of the Internet. This paper provides a worm pro...

    Yunkai Zhang, Fangwei Wang, Changguang Wang in Computational Intelligence and Security (2005)