Follow
Yu Wang
Yu Wang
Guangzhou University
Verified email at gzhu.edu.cn
Title
Cited by
Cited by
Year
When intrusion detection meets blockchain technology: a review
W Meng, EW Tischhauser, Q Wang, Y Wang, J Han
Ieee Access 6, 10179-10188, 2018
6072018
Network traffic classification using correlation information
J Zhang, Y Xiang, Y Wang, W Zhou, Y Xiang, Y Guan
IEEE Transactions on Parallel and Distributed systems 24 (1), 104-117, 2012
4312012
Statistical features-based real-time detection of drifted twitter spam
C Chen, Y Wang, J Zhang, Y Xiang, W Zhou, G Min
IEEE Transactions on Information Forensics and Security 12 (4), 914-925, 2016
2002016
Addressing the class imbalance problem in twitter spam detection using ensemble learning
S Liu, Y Wang, J Zhang, C Chen, Y Xiang
Computers & Security 69, 35-49, 2017
1542017
Internet traffic classification using constrained clustering
Y Wang, Y Xiang, J Zhang, W Zhou, G Wei, LT Yang
IEEE transactions on parallel and distributed systems 25 (11), 2932-2943, 2013
1252013
Unsupervised traffic classification using flow statistical properties and IP packet payload
J Zhang, Y Xiang, W Zhou, Y Wang
Journal of Computer and System Sciences 79 (5), 573-585, 2013
1122013
Generating regular expression signatures for network traffic classification in trusted network management
Y Wang, Y Xiang, W Zhou, S Yu
Journal of Network and Computer Applications 35 (3), 992-1000, 2012
972012
Adaptive machine learning‐based alarm reduction via edge computing for distributed intrusion detection systems
Y Wang, W Meng, W Li, Z Liu, Y Liu, H Xue
Concurrency and Computation: Practice and Experience 31 (19), e5101, 2019
892019
A fog-based privacy-preserving approach for distributed signature-based intrusion detection
Y Wang, W Meng, W Li, J Li, WX Liu, Y Xiang
Journal of Parallel and Distributed Computing 122, 26-35, 2018
852018
Detecting insider attacks in medical cyber–physical networks based on behavioral profiling
W Meng, W Li, Y Wang, MH Au
Future Generation Computer Systems 108, 1258-1266, 2020
812020
TouchWB: Touch behavioral user authentication based on web browsing on smartphones
W Meng, Y Wang, DS Wong, S Wen, Y Xiang
Journal of Network and Computer Applications 117, 1-9, 2018
742018
A novel semi-supervised approach for network traffic clustering
Y Wang, Y Xiang, J Zhang, S Yu
2011 5th International Conference on Network and System Security, 169-175, 2011
642011
Centralized duplicate removal video storage system with privacy preservation in IoT
H Yan, X Li, Y Wang, C Jia
Sensors 18 (6), 1814, 2018
622018
IoT-FBAC: Function-based access control scheme using identity-based encryption in IoT
H Yan, Y Wang, C Jia, J Li, Y Xiang, W Pedrycz
Future Generation Computer Systems 95, 344-353, 2019
612019
An automatic application signature construction system for unknown traffic
Y Wang, Y Xiang, SZ Yu
Concurrency and Computation: Practice and Experience 22 (13), 1927-1944, 2010
582010
Enhancing network capacity by weakening community structure in scale-free network
J Cai, Y Wang, Y Liu, JZ Luo, W Wei, X Xu
Future Generation Computer Systems 87, 765-771, 2018
572018
Internet traffic clustering with side information
Y Wang, Y Xiang, J Zhang, W Zhou, B Xie
Journal of Computer and System Sciences 80 (5), 1021-1036, 2014
462014
Modeling oscillation behavior of network traffic by nested hidden Markov model with variable state-duration
Y Xie, J Hu, Y Xiang, S Yu, S Tang, Y Wang
IEEE Transactions on Parallel and Distributed Systems 24 (9), 1807-1817, 2012
392012
Supervised Learning Real-time Traffic Classifiers.
Y Wang, SZ Yu
J. Networks 4 (7), 622-629, 2009
362009
JFCGuard: detecting juice filming charging attack via processor usage analysis on smartphones
W Meng, L Jiang, Y Wang, J Li, J Zhang, Y Xiang
Computers & Security 76, 252-264, 2018
342018
The system can't perform the operation now. Try again later.
Articles 1–20