Follow
Wei Wang
Title
Cited by
Cited by
Year
Web phishing detection using a deep learning framework
P Yi, Y Guan, F Zou, Y Yao, W Wang, T Zhu
Wireless Communications and Mobile Computing 2018, 2018
1282018
Leveraging ambient lte traffic for ubiquitous passive communication
Z Chi, X Liu, W Wang, Y Yao, T Zhu
Proceedings of the Annual conference of the ACM Special Interest Group on …, 2020
802020
{VMscatter}: A versatile {MIMO} backscatter
X Liu, Z Chi, W Wang, Y Yao, T Zhu
17th USENIX Symposium on Networked Systems Design and Implementation (NSDI …, 2020
622020
Ect: Exploiting cross-technology concurrent transmission for reducing packet delivery delay in iot networks
W Wang, T Xie, X Liu, T Zhu
IEEE INFOCOM 2018-IEEE Conference on Computer Communications, 369-377, 2018
482018
Crf: Coexistent routing and flooding using wifi packets in heterogeneous iot networks
W Wang, X Liu, Y Yao, Y Pan, Z Chi, T Zhu
IEEE INFOCOM 2019-IEEE conference on computer communications, 19-27, 2019
462019
Verification and redesign of {OFDM} backscatter
X Liu, Z Chi, W Wang, Y Yao, P Hao, T Zhu
18th USENIX symposium on networked systems design and implementation (NSDI …, 2021
432021
GENPass: A multi-source deep learning model for password guessing
Z Xia, P Yi, Y Liu, B Jiang, W Wang, T Zhu
IEEE Transactions on Multimedia 22 (5), 1323-1332, 2019
432019
GENPass: A general deep learning model for password guessing with PCFG rules and adversarial generation
Y Liu, Z Xia, P Yi, Y Yao, T Xie, W Wang, T Zhu
2018 IEEE International Conference on Communications (ICC), 1-6, 2018
432018
I can see the light: Attacks on autonomous vehicles using invisible lights
W Wang, Y Yao, X Liu, X Li, P Hao, T Zhu
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021
402021
EAR: Exploiting uncontrollable ambient RF signals in heterogeneous networks for gesture recognition
Z Chi, Y Yao, T Xie, X Liu, Z Huang, W Wang, T Zhu
Proceedings of the 16th ACM conference on embedded networked sensor systems …, 2018
402018
Aegis: An interference-negligible RF sensing shield
Y Yao, Y Li, X Liu, Z Chi, W Wang, T Xie, T Zhu
IEEE INFOCOM 2018-IEEE conference on computer communications, 1718-1726, 2018
292018
Detecting Adversarial Examples in Deep Neural Networks using Normalizing Filters.
S Gu, P Yi, T Zhu, Y Yao, W Wang
ICAART (2), 164-173, 2019
262019
Countering cross-technology jamming attack
Z Chi, Y Li, X Liu, W Wang, Y Yao, T Zhu, Y Zhang
Proceedings of the 13th ACM conference on security and privacy in wireless …, 2020
222020
Charge station placement in electric vehicle energy distribution network
J Xu, P Yi, T Xie, W Wang, X Liu, T Zhu
2017 IEEE International Conference on Communications (ICC), 1-6, 2017
142017
CCID: Cross-Correlation identity distinction method for detecting shrew DDoS
C Huang, P Yi, F Zou, Y Yao, W Wang, T Zhu
Wireless Communications and Mobile Computing 2019, 2019
132019
Exploiting WiFi AP for Simultaneous Data Dissemination among WiFi and ZigBee Devices
W Wang, X Liu, Y Yao, T Zhu
The 29th IEEE International Conference on Network Protocols, 2021
112021
Machine learning and artificial intelligence in next-generation wireless network
W Iqbal, W Wang, T Zhu
arXiv preprint arXiv:2202.01690, 2021
102021
A power storage station placement algorithm for power distribution based on electric vehicle
J Xu, P Yi, W Wang, T Zhu
International Journal of Distributed Sensor Networks 13 (2), 1550147717694169, 2017
102017
ECT: Exploiting cross-technology transmission for reducing packet delivery delay in IoT networks
W Wang, T Xie, X Liu, Y Yao, T Zhu
ACM Transactions on Sensor Networks (TOSN) 15 (2), 1-28, 2019
92019
Optimization for charge station placement in electric vehicles energy network
Y Sui, P Yi, X Liu, W Wang, T Zhu
Proceedings of the Workshop on Smart Internet of Things, 1-6, 2017
92017
The system can't perform the operation now. Try again later.
Articles 1–20