default search action
Wen Wang 0008
Person information
- affiliation: Chinese Academy of Sciences, State Key Laboratory of Information Security, Institute of Information Engineering, Beijing, China
Other persons with the same name
- Wen Wang — disambiguation page
- Wen Wang 0001 — Alibaba Group, DAMO Academy, Speech Lab, Sunnyvale, CA, USA (and 2 more)
- Wen Wang 0002 — University of Minnesota Twin Cities, Minneapolis, MN, USA
- Wen Wang 0003 — Massachusetts Institute of Technology, Cambridge, MA, USA
- Wen Wang 0004 — Fourth Military Medical University, Tangdu Hospital, Xi'an, Shaanxi, China
- Wen Wang 0005 — Changsha University of Science & Technology, Changsha, Hunan, China
- Wen Wang 0006 — Hangzhou Dianzi University, School of Mechanical Engineering, China (and 2 more)
- Wen Wang 0007 — Yale University, Department of Electrical Engineering, New Haven, CT, USA
- Wen Wang 0009 — University of Science and Technology of China, China
- Wen Wang 0011 — Beijing University of Posts and Telecommunications, State Key Laboratory of Networking and Switching Technology, Beijing, China
- Wen Wang 0012 — University of Electronic Science and Technology of China, School of Information and Communication Engineering, Chengdu, China
- Wen Wang 0013 — Tiangong University, School of Life Sciences, Tianjin, China (and 2 more)
Other persons with a similar name
- Mingwen Wang (aka: Ming-Wen Wang) — disambiguation page
- Wen-June Wang
- Wen-Qin Wang
- Wenhao Wang (aka: Wen-Hao Wang) — disambiguation page
- Wenjing Wang (aka: Wen-Jing Wang) — disambiguation page
- Wentao Wang (aka: Wen-Tao Wang) — disambiguation page
- Yawen Wang (aka: Ya-wen Wang) — disambiguation page
- Zhaowen Wang (aka: Zhao-Wen Wang)
- Zhiwen Wang (aka: Zhi-wen Wang, Zhi-Wen Wang, Wang Zhiwen) — disambiguation page
- Qing-Wen Wang 0001 (aka: Qingwen Wang 0001) — Shanghai University, Department of Mathematics, Collaborative Innovation Center for the Marine Artificial Intelligence, China
- show all similar names
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j4]Huaifeng Bao, Wenhao Li, Huashan Chen, Han Miao, Qiang Wang, Zixian Tang, Feng Liu, Wen Wang:
Stories behind decisions: Towards interpretable malware family classification with hierarchical attention. Comput. Secur. 144: 103943 (2024) - [c19]Huaifeng Bao, Xingyu Wang, Wenhao Li, Jinpeng Xu, Peng Yin, Wen Wang, Feng Liu:
CAFE: Robust Detection of Malicious Macro based on Cross-modal Feature Extraction. CSCWD 2024: 2534-2540 - 2023
- [c18]Huaifeng Bao, Wen Wang, Feng Liu:
Towards Open-Set APT Malware Classification under Few-Shot Setting. GLOBECOM 2023: 6844-6849 - [c17]Huaifeng Bao, Wenhao Li, Xingyu Wang, Zixian Tang, Qiang Wang, Wen Wang, Feng Liu:
Payload Level Graph Attention Network for Web Attack Traffic Detection. ICCS (5) 2023: 394-407 - [c16]Han Miao, Huaifeng Bao, Zixian Tang, Wenhao Li, Wen Wang, Huashan Chen, Feng Liu, Yanhui Sun:
AST2Vec: A Robust Neural Code Representation for Malicious PowerShell Detection. SciSec 2023: 207-224 - 2022
- [c15]Qiang Wang, Wenhao Li, Huaifeng Bao, Zixian Tang, Wen Wang, Feng Liu, Lingyun Ying:
High-Efficient and Few-shot Adaptive Encrypted Traffic Classification with Deep Tree. MILCOM 2022: 458-463 - [c14]Kun Jia, Jiazhi Liu, Wen Wang, Feng Liu:
Hybrid Routing for Efficient Fine-Grained Management of Specific Services in SDN. SciSec 2022: 170-185 - 2021
- [c13]Zixian Tang, Qiang Wang, Wenhao Li, Huaifeng Bao, Feng Liu, Wen Wang:
HSLF: HTTP Header Sequence Based LSH Fingerprints for Application Traffic Classification. ICCS (1) 2021: 41-54 - [c12]Zixian Tang, Qiang Wang, Wenhao Li, Huaifeng Bao, Feng Liu, Wen Wang:
Mining Trojan Detection Based on Multi-dimensional Static Features. SciSec 2021: 51-65
2010 – 2019
- 2019
- [j3]YaWei Ren, Feng Liu, Wei Qi Yan, Wen Wang:
A new visual evaluation criterion of visual cryptography scheme for character secret image. Multim. Tools Appl. 78(18): 25299-25319 (2019) - 2018
- [j2]Teng Guo, Feng Liu, Wen Wang:
Visual Gambling. Int. J. Digit. Crime Forensics 10(3): 43-49 (2018) - 2017
- [j1]Teng Guo, Jian Jiao, Feng Liu, Wen Wang:
On the Pixel Expansion of Visual Cryptography Scheme. Int. J. Digit. Crime Forensics 9(2): 38-44 (2017) - [c11]Wen Wang, Feng Liu, Teng Guo, YaWei Ren:
Temporal Integration Based Visual Cryptography Scheme and Its Application. IWDW 2017: 406-419 - 2016
- [c10]Teng Guo, Feng Liu, Wen Wang, BingTao Yu:
Privacy Monitor. IWDW 2016: 187-197 - [c9]Wen Wang, Feng Liu, Teng Guo, YaWei Ren, Gang Shen:
Information Security Display Technology with Multi-view Effect. IWDW 2016: 198-208 - [c8]Gang Shen, Feng Liu, Zhengxin Fu, Bin Yu, Wen Wang:
Halftone Visual Cryptography with Complementary Cover Images. IWDW 2016: 223-237 - [c7]YaWei Ren, Feng Liu, Wen Wang:
Collusive Attacks to Partition Authentication Visual Cryptography Scheme. IWDW 2016: 238-250 - 2015
- [c6]Wen Wang, Feng Liu, WeiQi Yan, Gang Shen, Teng Guo:
An Improved Aspect Ratio Invariant Visual Cryptography Scheme with Flexible Pixel Expansion. IWDW 2015: 418-432 - [c5]YaWei Ren, Feng Liu, Dongdai Lin, Rongquan Feng, Wen Wang:
A New Construction of Tagged Visual Cryptography Scheme. IWDW 2015: 433-445 - 2013
- [c4]Teng Guo, Feng Liu, Chuan Kun Wu, Ching-Nung Yang, Wen Wang, YaWei Ren:
Threshold Secret Image Sharing. ICICS 2013: 404-412 - [c3]Teng Guo, Feng Liu, Chuan Kun Wu, YaWei Ren, Wen Wang:
On (k, n) Visual Cryptography Scheme with t Essential Parties. ICITS 2013: 56-68 - [c2]Teng Guo, Feng Liu, Chuan Kun Wu, YaWei Ren, Wen Wang:
On the Randomness of Visual Cryptography Scheme. IIH-MSP 2013: 391-394 - [c1]Teng Guo, Feng Liu, Chuan Kun Wu, YoungChang Hou, YaWei Ren, Wen Wang:
The Security Defect of a Multi-pixel Encoding Method. ISC 2013: 39-48 - [i1]Teng Guo, Feng Liu, Chuan Kun Wu, Ching-Nung Yang, Wen Wang, YaWei Ren:
Threshold Secret Image Sharing. IACR Cryptol. ePrint Arch. 2013: 524 (2013)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-02 21:29 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint