Yu Wang
Yu Wang
Guangzhou University
Verified email at gzhu.edu.cn
Title
Cited by
Cited by
Year
Network traffic classification using correlation information
J Zhang, Y Xiang, Y Wang, W Zhou, Y Xiang, Y Guan
IEEE Transactions on Parallel and Distributed systems 24 (1), 104-117, 2012
3292012
When intrusion detection meets blockchain technology: a review
W Meng, EW Tischhauser, Q Wang, Y Wang, J Han
Ieee Access 6, 10179-10188, 2018
2652018
Statistical features-based real-time detection of drifted twitter spam
C Chen, Y Wang, J Zhang, Y Xiang, W Zhou, G Min
IEEE Transactions on Information Forensics and Security 12 (4), 914-925, 2016
1022016
Internet traffic classification using constrained clustering
Y Wang, Y Xiang, J Zhang, W Zhou, G Wei, LT Yang
IEEE transactions on parallel and distributed systems 25 (11), 2932-2943, 2013
952013
Generating regular expression signatures for network traffic classification in trusted network management
Y Wang, Y Xiang, W Zhou, S Yu
Journal of Network and Computer Applications 35 (3), 992-1000, 2012
842012
Unsupervised traffic classification using flow statistical properties and IP packet payload
J Zhang, Y Xiang, W Zhou, Y Wang
Journal of Computer and System Sciences 79 (5), 573-585, 2013
662013
Addressing the class imbalance problem in Twitter spam detection using ensemble learning
S Liu, Y Wang, J Zhang, C Chen, Y Xiang
Computers & Security 69, 35-49, 2017
592017
A novel semi-supervised approach for network traffic clustering
Y Wang, Y Xiang, J Zhang, S Yu
2011 5th International Conference on Network and System Security, 169-175, 2011
552011
An automatic application signature construction system for unknown traffic
Y Wang, Y Xiang, SZ Yu
Concurrency and Computation: Practice and Experience 22 (13), 1927-1944, 2010
542010
Enhancing network capacity by weakening community structure in scale-free network
J Cai, Y Wang, Y Liu, JZ Luo, W Wei, X Xu
Future Generation Computer Systems 87, 765-771, 2018
382018
Modeling oscillation behavior of network traffic by nested hidden Markov model with variable state-duration
Y Xie, J Hu, Y Xiang, S Yu, S Tang, Y Wang
IEEE Transactions on Parallel and Distributed Systems 24 (9), 1807-1817, 2012
362012
Internet traffic clustering with side information
Y Wang, Y Xiang, J Zhang, W Zhou, B Xie
Journal of Computer and System Sciences 80 (5), 1021-1036, 2014
352014
Supervised Learning Real-time Traffic Classifiers.
Y Wang, SZ Yu
J. Networks 4 (7), 622-629, 2009
332009
Centralized duplicate removal video storage system with privacy preservation in iot
H Yan, X Li, Y Wang, C Jia
Sensors 18 (6), 1814, 2018
312018
A fog-based privacy-preserving approach for distributed signature-based intrusion detection
Y Wang, W Meng, W Li, J Li, WX Liu, Y Xiang
Journal of Parallel and Distributed Computing 122, 26-35, 2018
272018
TouchWB: Touch behavioral user authentication based on web browsing on smartphones
W Meng, Y Wang, DS Wong, S Wen, Y Xiang
Journal of Network and Computer Applications 117, 1-9, 2018
252018
Detecting insider attacks in medical cyber–physical networks based on behavioral profiling
W Meng, W Li, Y Wang, MH Au
Future Generation Computer Systems 108, 1258-1266, 2020
242020
Machine learned real-time traffic classifiers
Y Wang, SZ Yu
2008 Second International Symposium on Intelligent Information Technology …, 2008
242008
JFCGuard: detecting juice filming charging attack via processor usage analysis on smartphones
W Meng, L Jiang, Y Wang, J Li, J Zhang, Y Xiang
Computers & security 76, 252-264, 2018
222018
Adaptive machine learning‐based alarm reduction via edge computing for distributed intrusion detection systems
Y Wang, W Meng, W Li, Z Liu, Y Liu, H Xue
Concurrency and Computation: Practice and Experience 31 (19), e5101, 2019
182019
The system can't perform the operation now. Try again later.
Articles 1–20