Weiping Wang

ORCID: 0000-0001-5255-5639
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Data Storage Technologies
  • Network Security and Intrusion Detection
  • Advanced Malware Detection Techniques
  • Caching and Content Delivery
  • Mobile Ad Hoc Networks
  • Internet Traffic Analysis and Secure E-voting
  • Adversarial Robustness in Machine Learning
  • Energy Efficient Wireless Sensor Networks
  • Cooperative Communication and Network Coding
  • Security in Wireless Sensor Networks
  • Anomaly Detection Techniques and Applications
  • Cellular Automata and Applications
  • Cloud Computing and Resource Management
  • Topic Modeling
  • Wireless Networks and Protocols
  • Spam and Phishing Detection
  • Distributed systems and fault tolerance
  • Advanced Database Systems and Queries
  • Software Testing and Debugging Techniques
  • Distributed and Parallel Computing Systems
  • Network Traffic and Congestion Control
  • Full-Duplex Wireless Communications
  • Data Management and Algorithms
  • Natural Language Processing Techniques
  • Peer-to-Peer Network Technologies

Central South University
2016-2025

Institute of Information Engineering
2015-2024

Chinese Academy of Sciences
2007-2024

University of Chinese Academy of Sciences
2018-2024

Shenyang Pharmaceutical University
2023-2024

Chinese University of Hong Kong, Shenzhen
2020

University of Science and Technology Beijing
2016

Xinjiang Uygur Autonomous Region Disease Prevention and Control Center
2013

North China Electric Power University
2013

Beijing Institute of Technology
2007-2008

Identification of essential proteins plays a significant role in understanding minimal requirements for the cellular survival and development. Many computational methods have been proposed predicting by using topological features protein-protein interaction (PPI) networks. However, most these ignored intrinsic biological meaning proteins. Moreover, PPI data contains many false positives negatives. To overcome limitations, recently research groups started to focus on identification...

10.1186/1752-0509-6-87 article EN BMC Systems Biology 2012-07-18

Through well-designed counterfeit websites, phishing induces online users to visit forged web pages obtain their private sensitive information, e.g., account number and password. Existing antiphishing approaches are mostly based on page-related features, which require crawl content of as well accessing third-party search engines or DNS services. This not only leads low efficiency in detecting but also makes them rely network environment services heavily. In this paper, we propose a fast...

10.1155/2019/2595794 article EN cc-by Security and Communication Networks 2019-10-29

Large Language Models (LLMs) have revolutionized natural language processing tasks with remarkable success. However, their formidable size and computational demands present significant challenges for practical deployment, especially in resource-constrained environments. As these become increasingly pertinent, the field of model compression has emerged as a pivotal research area to alleviate limitations. This paper presents comprehensive survey that navigates landscape techniques tailored...

10.48550/arxiv.2308.07633 preprint EN other-oa arXiv (Cornell University) 2023-01-01

In environments where sensor networks are used to monitor sensitive objects or valuable assets, attackers may use the method of hop-by-hop backtracking find out protected objects. This paper proposes a new source protocol in WSN, phantom routing with locational angle (PRLA). PRLA, inclination angles introduced and direct random walks, which avoids choosing paths harmful privacy location. Simulation results show that, compared single-path proposed literature, PRLA improves safety period by up...

10.1109/icc.2008.315 article EN IEEE International Conference on Communications 2008-01-01

Multi-component based Log-Structured Merge-tree (LSM-tree) has been becoming one of the mainstream indexes. LSM-tree adopts component-by-component KV item flowing down mechanism to push each from smaller component adjacent larger during compaction procedures until items reach largest component. This process incurs significant write amplification and limits throughput. In this paper, we propose multi-component Skip-tree aggressively non-adjacent components via skipping some then make items'...

10.1109/tpds.2016.2609912 article EN IEEE Transactions on Parallel and Distributed Systems 2016-09-15

10.1109/icme57554.2024.10688292 article EN 2022 IEEE International Conference on Multimedia and Expo (ICME) 2024-07-15

Malware detection is an important and challenging issue in the Android ecosystem. Many approaches have been proposed to distinguish malicious applications from benign ones, but few of them can represent behavior patterns help understand their intention. In this paper, we propose LSCDroid, a malware detecting approach that cannot only detect also malware's intention by analyzing its patterns. LSCDroid uses local sensitive application programming interface (API) invocation (LSAI) sequences as...

10.1109/tr.2019.2927285 article EN IEEE Transactions on Reliability 2019-07-25

With the popularity of Android intelligent terminals, malicious applications targeting platform are growing rapidly. Therefore, efficient and accurate detection software becomes particularly important. Dynamic API call sequences widely used in malware because they can reflect behaviours accurately. However, raw dynamic very usually too long to be directly used, most existing works just use a truncated segment sequence or statistical features perform detection, which loses execution order...

10.1155/2022/8398591 article EN cc-by Security and Communication Networks 2022-04-28

Based on the changeability of wireless network circumstance, information packets are prone to lose in process transmission. In broadcasting ,any node multi-nodes request retransmission .This paper presents a novel approach based coding (NCWBR), whose key idea is combine different lost with achieve retransmission. Theoretical analysis reveals that our can ensure solvability received nodes, and have better performance. Simulation results indicate compared existing approach, this effectively...

10.1109/iccsc.2008.171 article EN 2008-05-01

Backdoor attacks have severely threatened deep neural network (DNN) models in the past several years. In backdoor attacks, attackers try to plant hidden backdoors into DNN models, either training or inference stage, mislead output of model when input contains some specified triggers without affecting prediction normal inputs not containing triggers. As a rapidly developing topic, numerous works on designing various and techniques defend against such been proposed recent However,...

10.1109/ojcs.2023.3267221 article EN cc-by IEEE Open Journal of the Computer Society 2023-01-01

In many applications, transaction data arrive in the form of high speed streams. These contain a lot information about customers that needs to be carefully managed protect customerspsila privacy. this paper, we consider problem preserving customerpsilas privacy on sliding window This is challenging because updated frequently and rapidly. We propose novel approach, SWAF (sliding anonymization framework), solve by continuously facilitating k-anonymity window. Three advantages make practical:...

10.1109/colcom.2007.4553832 article EN 2007-11-01

Evidence shows that biological systems are composed of separable functional modules. Identifying protein complexes is essential for understanding the principles cellular functions. Many methods have been proposed to mine from protein-protein interaction networks. However, performances these algorithms not good enough since interactions detected experiments complete and noise. This paper presents an analysis topological properties show although proteins same complex more highly connected than...

10.1109/tst.2012.6374369 article EN Tsinghua Science & Technology 2012-12-01

Deep learning techniques such as convolutional neural networks (CNNs) have been used in a wide range of fields due to their superior performance, e.g., image classification, autonomous driving and natural language processing. However, recent progress shows that deep models are vulnerable adversarial samples, which crafted by adding small perturbations on normal samples imperceptible human beings but can mislead the output incorrect results. Many attack proposed many detection methods...

10.1109/tnse.2021.3057071 article EN IEEE Transactions on Network Science and Engineering 2021-02-07

Gesture recognition based on radio frequency identification (RFID) has attracted much research attention in recent years. Most existing RFID-based gesture approaches use signal profile matching to distinguish different gestures, which incur large latency and fail support real-time applications. In this paper, we design implement ReActor, a accurate system that recognizes user's gestures with low high accuracy even when the gestures'speed varies. ReActor combines time-domain statistical...

10.1109/tmc.2022.3211324 article EN IEEE Transactions on Mobile Computing 2022-01-01

Performing accurate sensing in diverse environments is a challenging issue wireless technologies. Existing solutions usually require collecting large number of samples to train classifier for every environment, or further assume similar sample distribution between different such that model trained one environment can be transferred another. In this paper, we propose RF-Siamese, an RFID-based gesture approach achieves comparable accuracy existing but requires only few each eivironment....

10.1109/tmc.2022.3217487 article EN IEEE Transactions on Mobile Computing 2022-11-04

Modern object detection methods based on convolutional neural network suffer from severe catastrophic forgetting in learning new classes without original data. Due to time consumption, storage burden and privacy of old data, it is inadvisable train the model scratch with both data when emerge after trained. In this paper, we propose a novel incremental detector Faster R-CNN continuously learn using It triple where an residual as assistants for helping previous learned knowledge. To better...

10.48550/arxiv.2007.13428 preprint EN other-oa arXiv (Cornell University) 2020-01-01
Coming Soon ...