Wenbo Fang

ORCID: 0000-0002-2100-4794
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Network Security and Intrusion Detection
  • Advanced Malware Detection Techniques
  • Artificial Immune Systems Applications
  • Software Testing and Debugging Techniques
  • Anomaly Detection Techniques and Applications
  • Security and Verification in Computing
  • Face and Expression Recognition
  • Educational Technology and Assessment
  • Imbalanced Data Classification Techniques
  • Internet Traffic Analysis and Secure E-voting
  • vaccines and immunoinformatics approaches
  • Influenza Virus Research Studies
  • Digital and Cyber Forensics
  • Higher Education and Teaching Methods
  • Evolutionary Algorithms and Applications
  • Neural Networks and Applications
  • Information and Cyber Security

Sichuan University
2023-2025

Xinjiang University
2020

Wuhan Textile University
2013

Android malware and its variants are a major challenge for mobile platforms. However, there two main problems in the existing detection methods: <italic xmlns:mml="http://www.w3.org/1998/Math/MathML" xmlns:xlink="http://www.w3.org/1999/xlink">a</i> ) The method lacks evolution ability malware, which leads to low rate of model variants. xmlns:xlink="http://www.w3.org/1999/xlink">b</i> Traditional methods require centralized data training, however, aggregation training samples is limited due...

10.1109/tifs.2023.3287395 article EN IEEE Transactions on Information Forensics and Security 2023-01-01

Unmanned aerial vehicles (UAVs) have experienced rapid development, permeating diverse domains. However, addressing security challenges in UAV networks remains daunting due to resource limitations and the high autonomy of terminals. The current research on network intrusion detection lacks an efficient process covering each terminal a lightweight collaborative response mechanism between UAVs ground stations, which affects performance detection. In this article, inspired by vaccine...

10.1109/jiot.2024.3426054 article EN IEEE Internet of Things Journal 2024-07-10

Application‐layer distributed denial of service (DDoS) attacks have become the main threat to Web server security. Because application‐layer DDoS strong concealability and high authenticity, intrusion detection technologies that rely solely on judging client authenticity cannot accurately detect such attacks. In addition, are periodic repetitive, attack targets suddenly in a short period. this study, we propose an efficient system based improved random forest. Firstly, logs preprocessed...

10.1155/2024/9044391 article EN cc-by International Journal of Intelligent Systems 2024-01-01

Given the continual evolution of new network attack methodologies, defenders face imperative constantly upgrading security defenses. Current technologies, albeit effective against known threats, often fall short in handling intricacies diverse and novel attacks. Artificial immunity-based anomaly detection offers a promising avenue by dynamically adapting to evolving threats. However, prevailing algorithms this domain suffer from low rates, limited adaptability, extended detector generation...

10.2139/ssrn.4705265 preprint EN 2024-01-01

With the continuous expansion of Android operating system and market for mobile apps continues to expand, number malwares designed is also exploding. Therefore, identifying detecting malware becomes a challenging task in security. Because low detection efficiency by using traditional machine learning methods, we propose novel method based on multi-model deep learning. Specifically, select four features permissions, API, Intent, hardware components build feature vector each app. In our study,...

10.1109/dasc-picom-cbdcom-cyberscitech49142.2020.00052 article EN 2021 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech) 2020-08-01

Abstract The problem of data imbalance is common in reality, which greatly affects the performance classifiers. Most solutions are to balance set by generating new minority class samples, faced with problems selecting appropriate area for fuzzy classification boundary and uneven distribution samples. To solve these problems, we propose a novel oversampling algorithm named space partitioning adaptive weighted synthetic technique (SPAW-SMOTE). We first divide into non-boundary based on spatial...

10.1093/comjnl/bxad098 article EN The Computer Journal 2023-10-05
Coming Soon ...