王伟

博士、教授、信息安全系主任,北京市重点实验室副主任,区块链研究中心主任

基本信息

办公电话:010-51688637 电子邮件: wangwei1@bjtu.edu.cn
通讯地址: 邮编:100044

教育背景

2005年毕业于西安交通大学获博士学位。2005-2006在意大利Trento大学做博士后研究。2007-2008在法国Telecom Bretagne及法国国家计算机与自动化研究院(INRIA)做博士后研究。2009-2011作为欧洲ERCIM Fellow在挪威科技大学以及卢森堡大学SnT研究中心从事研究工作。2011年底加入北京交通大学计算机学院。2014年短期访问纽约大学;2019-2021年访问阿卜杜拉国王科技大学。

工作经历

个人中文简历(2024年1月更新)

简介(短)

王伟,北京交通大学教授、博士生导师。主要从事网络与系统安全、数据安全及区块链研究。主持国家重点研发计划首个Web3.0共性关键技术项目(首席科学家),并主持包括国家自然科学基金联合基金重点项目、国家重点研发计划课题等项目30余项。申请发明专利70余项,联合编制国际、国家或行业标准20余项。在Usenix Security、CCS、TIFS、TDSC、TKDE、KDD等国际期刊或会议上发表论文100余篇,连续入选爱思唯尔“中国高被引学者”。中国计算机学会(CCF)区块链专委副主任、杰出演讲者。ACM SIGSAC 中国区副主席。担任IEEE Transactions on Dependable and Secure Computing和Computers & Security等期刊编委。获中国自动化学会科技进步一等奖1项(排名1)及其他省部级科技进步二等奖3项,获ACM CCS 2023 杰出论文奖。部分科研成果在大型企业得到应用。


简介

王伟,北京交通大学计算机与信息技术学院教授,博士生导师,信息安全系主任,智能交通数据安全与隐私保护技术北京市重点实验室副主任,区块链研究中心主任。2005年获西安交通大学工学博士学位(导师:管晓宏院士)。2005-2006年在意大利Trento大学做博士后研究;2007-2008在法国布列塔尼电信学院INRIA做博士后研究;2009-2011在挪威科技大学卢森堡大学担任ERCIM Fellow。2011年底加入北京交通大学。主要研究网络与系统安全、区块链及隐私计算理论与技术。主持国家重点研发计划首个Web3.0共性关键技术项目,并主持包括国家自然科学基金联合基金重点项目、国家重点研发计划课题和子课题等项目30余项。入选北京交通大学“青年英才”I类培育计划。申请发明专利70余项,授权近40项。联合编制行业标准/国家/国际标准23项。在Usenix Security、CCS、TDSC、TIFS、TDKE、KDD、AAAI等国内外重要学术期刊或国际会议上发表论文100余篇,论文被引用超5500次,ESI高被引论文8篇。连续入选爱思唯尔(Elsevier)“网络空间安全”领域“中国高被引学者”(2020-2023)。

2009 和2010 年连续两年获欧洲ERCIM“Alain Bensoussan”研究学者支持 (ERCIM Fellowship)。2009 年获由教育部与科技部联合主办的第四届“春晖杯”留学人员创新创业大赛二等奖(独立完成)。2018年获省部级科技进步二等奖;2020年获教育部科技进步二等奖。2022年获中国通信学会科技进步二等奖、中国电子学会自然科学三等奖。2023年获中国自动化学会科技进步一等奖(排名1)、中国产学研合作促进会产学研合作创新奖 (个人奖)。2008 和2009 年分获国际会议ICIMP2008 最佳论文奖及ECG2009 最佳应用论文提名奖,获ACM CCS 2023杰出论文奖。是ACM SIGSAC China 副主席;中国计算机学会(CCF)杰出会员;CCF杰出演讲者(2022、2023),CCF区块链专业委员会副主任。中国中文信息学会大数据与隐私计算专委常务委员。北京市网络法学研究会常务理事;ACM及IEEE 会员。

目前担任信息安全领域CCF A期刊 IEEE Transactions on Dependable and Secure Computing 副编辑(AE),权威SCI期刊Computers & Security编委,SCI 一区期刊Frontiers of Computer Science 编委,《重庆邮电大学学报(自然科学版)》,《网络与信息安全》和《网络空间安全》期刊编委。曾经担任通信领域权威刊物Cybersecurity, IEEE Network, Computers & Security, International Journal of Intelligent Systems等期刊的客座编辑(Guest Editor);是国际会议ATC2023程序委员会主席,ICDIS2022技术委员会共同主席,是ICDCS2024,AAA2023, CIKM 2022, ICC 2019, ECML/PKDD 2018, SecureComm 2018, GlobeCom 2017,AsiaCCS 2016等100 余个国际会议的程序委员会委员。

研究方向

  • 应用安全
  • 网络与信息安全
  • 软件工程
  • 人工智能

招生专业

  • 网络空间安全硕士
  • 网络空间安全博士
  • 网络与信息安全硕士
  • 软件工程硕士
  • 软件工程博士
  • 人工智能博士
  • 网络与信息安全博士

科研项目

进行中
  1. 国家重点研发计划项目 [区块链、Web3.0],2023-2026,主持
  2. 国家自然科学基金联合基金重点项目 [区块链],2022-2025,主持 
  3. 国家重点研发计划-课题1 [隐私计算],2020-2023,主持 
  4. 国家自然科学基金联合基金重点项目-课题 [区块链],2023-2026,主持
  5. 工信部专项课题1 [人工智能安全],2022-2024,主持
  6. 工信部专项课题2 [人工智能安全],2022-2024,主持
  7. 国家重点研发计划-任务 [区块链],2022-2025,主持
  8. 国家重点研发计划-课题2 [区块链],2020-2023,核心成员 
  9. 北京市自然科学基金联合基金 [隐私计算],2023-2025,主持
  10. 北京市自然科学基金面上专项 [区块链],2023-2025,主持
  11. 省部级课题 [区块链],2022-2023,主持
  12. 国家铁路集团公司重大项目-多任务 [数据安全],2023-2025,主持
  13. 企业横向课题2 [区块链],2022-2023,主持
  14. 企业横向课题3 [隐私计算],2023-2024,主持 
  15. 企业横向课题4 [隐私计算 + 区块链],2020-2023,主持 

已结题(部分)

  1. 国家自然科学基金,2018-2020,主持
  2. 国家重点研发计划子课题(任务),2017-2021,主持
  3. 企业横向课题4,2019-2021,主持
  4. 企业横向课题5,2018-2021,主持
  5. 企业横向课题6,2018-2020,主持
  6. 教育部留学回国人员基金,2014-01-07--2017-01-06,主持
  7. 中央高校基本科研业务费,2013-01-01--2014-12-31,主持
  8. 教育部博士点基金,2013-01-01--2015-12-31,主持
  9. 北京交通大学人才基金,2012-01-01--2013-12-31,主持

主要研究方向(基于课题以及长期兴趣):

1. 数据要素高效安全流通理论、方法、应用与实践;

2. 区块链安全与应用(Web3.0);

3. 大模型安全。



研究小组近几年课题经费充足,希望有志于科研的同学积极与我联系,攻读硕士或博士学位。有信必复!

课题组将为各位同学提供良好的科研条件和经费支持。

教学工作

教学


  • 网络空间安全前沿(研究生课程,2022-至今)
  • 入侵与检测技术(本科生课程,2011-至今;中国大学MOOC(慕课)-国家精品课程在线学习平台建设课程)
  • 恶意代码与异常检测(研究生课程,2018-至今)
  • 专业实习(本科生课程,2014-至今)
  • 算法设计与分析(研究生课程,2013-2017)
  • 专业研究方法论与创新教育(本科生课程,2011-2017)
  • Information Security(留学生硕士课程,2015-2016)
  • 密码学与安全协议(研究生课程,2012)


指导学生


 在读博士生 
2018:Xiangyu Wei(卫相宇)(co-supervised)
2019:Xu Han (韩昫)
2020:Pengrui Liu (刘鹏睿)
2020:Guorong Chen (陈国荣)(co-supervised)
2020:Hao Zhen (振昊)(co-supervised)
2021: Xiaoting Lyu(吕晓婷)
2021: Bin Wang(王斌)(co-supervised)
2021: Xiangrui Xu(许向蕊)(co-supervised)
2021: Xiaohan Yuan(原笑含)(co-supervised)
2021: Yurong Hao(郝玉蓉)(co-supervised)
2022: Fuqiang Hu(胡福强)
2022: Chang Chen(陈畅)(co-supervised)
2022: Zheng Chen(陈政)
2023: Jiangkai Liu(刘敬楷)
2023: Yuan Weng(翁渊)
2023: Jiao Dai(代娇)
2023: Jin Qian(钱进)
在读硕士生
2023:王文奇,李河欢,严丹彤,刘芷辰,刘冲,周皓骏 

2022:Yang Li(李洋),Tianjian Liu(刘天健),Yike He(何亿柯),Yang Gao(高阳),Hanxi Li(李晗溪),Wenkang Kong(孔文康),Yanzi Liu(刘彦孜)

2021:Shan Li(李珊),Junyong Wang(王俊勇),Tiantian He (何甜甜)
博士毕业生 
2021:Dan Su (苏丹, co-supervised),visited Pennsylvania State University (Nov 2018- Nov 2019); 
     China Electronics Standardization Institute(CESI) (中国电子技术标准化研究院-工业和信息化部,北京)
2019: Xing Liu (刘行, co-supervised), visited Pennsylvania State University from 
    Oct. 2015 to Oct. 2016; China Electronics Standardization Institute(CESI)
   (中国电子技术标准化研究院-工业和信息化部,北京)
2018: Xing Wang (王星, co-supervised), interned at KAUST University Jan-Apr, 2014; 
      Hikvision Digital Technology Co., Ltd(海康威视,杭州)
2018: Hongliang Ma (马洪亮, co-supervised),Lecturer at Shihezi University(石河子大学) 
硕士毕业生 
2023:孙阳阳,中国联通数字科技有限公司,北京
2023:刘文博,中国农业银行,北京
2023:刘煜昊,南开大学博士生,天津
2023:吕红梅,渤海银行,天津
2023:周英楠,南开大学博士生,天津
2023:易龙杨,浙江大学博士生,杭州
2023:曹鸿博,北京交通大学博士生,北京
2023:刘敬楷,北京交通大学博士生,北京
2023:伍羽放,北京交通大学博士生,北京
2023: 张军,华为,成都
2022: Yaling Qi(齐亚灵), 中信银行,北京
2022: Chenxi Wu (武辰奚), 欧冶云商,上海
2022: Zikun Zhu(朱子坤),  中国工商银行,北京
2022: Qi Chen(陈奇), 360公司,北京 
2022: Di wu(吴迪), 北森云计算,北京
2022: Yunxiao Zhang(张云肖),上海华为技术有限公司,上海
2021: Enhui Wang(王恩慧), Beijing Railway Administration(北京铁路局,北京)
2021: Yuange Ren(任远歌), ByteDance Inc. (字节跳动, 北京)
2021: Xingna Zhang (张星娜),Xi'an Railway Administration(西安铁路局,西安)
2021: Pengfei Guo(郭鹏飞), China Bohai Bank(渤海银行,天津)
2021: Zheng Li(李政),ByteDance Inc. (字节跳动, 北京)
2021: Xiaoting Lyu(吕晓婷), Ph.D. student at BJTU(北京交通大学硕博连读博士生,北京)
2020: Yingjie Wang(王英杰), Meituan Dianping(北京三快在线科技有限公司-美团网, 北京)
2020: Li Zhang(张黎), Agricultural Bank of China (中国农业银行总行数据中心, 北京)
2020: Jingjing Song(宋晶晶),China Mobile Research Institute (中国移动通信研究院, 北京)
2020: Xiaoyang Suo(索晓阳),China Post Inf. Tech. inc. (中邮信息科技有限公司, 北京)
2020: Yuanqing Li(李元青), JD.Com Inc.(京东, 北京)
2019: Yuchen Liu(刘禹辰),Agricultural Development Bank of China (中国农业发展银行, 北京)
2019: Zhenzhen Gao(高珍祯),Venustech Inc. (启明星辰, 北京)
2019: Xiaoyu Ji(冀晓宇), Huawei Inc. (华为北研院, 北京)
2019: Yaoyao Shang(尚瑶瑶), State Grid (国家电网公司, 北京)
2019: Yang Wang(王洋), ByteDance Inc. (字节跳动 - 头条、抖音, 北京)
2019: Meichen Zhao(赵美晨), SF Express (顺丰速运, 深圳)
2019: Haohui Peng (彭豪辉), Zhihu Inc. (知乎, 北京) 
2018: Yuanyuan Li(李媛媛), China Construction Bank (中国建设银行, 北京)
2018: Mengxue Zhao(赵梦雪), 通信局, 北京
2018:Xiangyu Wei(卫相宇), Ph.D. student at BJTU(北京交通大学硕博连读博士生,北京)
2018: Mi Cao(曹咪, Co-supervised), China Unicom Research Lab (中国联通集团研究院, 北京)
2018: Fang Wu(吴芳,co-supervised), Beijing Jiaotong University (北京交通大学,北京) 
2017: Zongtao Wei(魏宗涛) (Interned at KAUST July-October 2015), Baidu Inc. (百度,北京)
2016: Junli Ma (马君丽), TongCheng Travel (同程旅游,苏州)
2016: Xiaoming Liu (刘晓明), Hengfeng Bank (恒丰银行,北京)
2016: Ruiqin Zhang (张瑞琴), Haerbin Bank (哈尔滨银行,北京)
2016: Yunyi Pei (裴蕴艺), China Unicom (中国联通广东,广州)
2016: Fanglin Zhou (周芳林, co-supervised), 360 Global Security (奇虎360公司,北京)
2016: Yue Hu (胡越,co-supervised), China Mobile (中移在线,郑州)
2015: Shumin Li (李淑民), 360 Global Security (奇虎360公司,北京) 
2015: Yang Liu (刘阳),  Aisino Corporation Inc. (中国航天信息股份有限公司,北京) 
2014: Shaohui Li (李少辉, co-supervised), Bank of China (中国银行,北京)


论文/期刊

近年代表作:

  1. Xiaoting Lyu, Yufei Han, Wei Wang*, Jingkai Liu, Yongsheng Zhu, Guangquan Xu, Jiqiang Liu, Xiangliang Zhang, Lurking in the shadows: Unveiling Stealthy Backdoor Attacks against Personalized Federated Learning, USENIX Security 2024, Accepted [PDF]. [联邦学习安全]
  2. Xiaoting Lyu, Yufei Han, Wei Wang*, Hangwei Qian, Ivor Tsang, Xiangliang Zhang, Cross-Context Backdoor Attacks against Graph Prompt Learning, KDD 2024, accepted [PDF]. [联邦学习安全]
  3. Yurong Hao, Xihui Chen, Xiaoting Lyu, Jiqiang Liu, Yongsheng Zhu, Zhiguo Wan, Sjouke Mauw, Wei Wang*, Not One Less: Exploring Interplay between User Profiles and Items in Untargeted Attacks against Federated Recommendation, ACM CCS 2024, accepted [PDF] [联邦推荐安全]
  4. Meng Shen, Zhehui Tan, Dusit Niyato, Yuzhi Liu, Jiawen Kang, Zehui Xiong, Liehuang Zhu, Wei Wang, Xuemin (Sherman)Shen, Artificial Intelligence for Web 3.0: A Comprehensive Survey, ACM Computing Surveys, 2024, accepted [PDF]. [Web3.0]
  5. Xueshuo Xie, Haoxu Wang, Zhaolong Jian and Li Tao, Wei Wang, Zhiwei Xu, Guiling Wang, Memory-Efficient and Secure DNN Inference on TrustZone-enabled Consumer IoT Devices,  IEEE Conference on Computer Communications (IEEE INFOCOM 2024), Vancouver, Canada, 20–23 May 2024 (acceptance rate=256/1307=19.6%). CCF A
  6. Yaguan Qian, Kecheng Chen, Bin Wang, Zhaoquan Gu, Shouling Ji, Wei Wang, Yanchun Zhang, Enhancing Transferability of Adversarial Examples through Mixed-Frequency Inputs, IEEE Transactions on Information Forensics and Security2024, accepted
  7. Chao Li, Balaji Palanisamy*, Runhua Xu, Li Duan, Jiqiang Liu*, Wei Wang*, How Hard is Takeover in DPoS Blockchains? Understanding the Security of Coin-based Voting Governance, Proceedings of The 30th ACM Conference on Computer and Communications Security (CCS 2023), 26-30 NOV., Copenhagen, Denmark, 2023 [DOI][PDF], (acceptance rate=234/1222=19.1%) CCF A [区块链治理][2023年度中国区块链技术领域(英文)优秀论文][CCS 2023 Distinguished Paper Award]
  8. Xiaoting Lyu, Yufei Han, Wei Wang*, Jingkai Liu, Bin Wang, Jiqiang Liu, Xiangliang Zhang. Poisoning with Cerberus: Stealthy and Colluded Backdoor Attack against Federated Learning. Proceedings of Thirty-Seventh AAAI Conference on Artificial Intelligence (AAAI 2023). Feb 7-14, 2023 Washington DC (Acceptance rate 1721/8777 = 19.6%). [DOI]PDF][CODE], CCF A [联邦学习中的后门攻击]
  9. Yaguan Qian, Shuke He, Chenyu Zhao,  Jiaqiang Sha, Wei Wang, Bin Wang, LEA2: A Lightweight Ensemble Adversarial Attack via Non-overlapping Vulnerable Frequency Regions, International Conference on Computer Vision (ICCV 2023), Paris, October 2023, CCF A [人工智能安全]
  10. Xiaohan Yuan, Jiqiang Liu,  Bin Wang, Wei Wang*, Bin Wang, Tao Li, Xiaobo Ma, Witold Pedrycz, FedComm: A Privacy-Enhanced and Efficient Authentication Protocol for Federated Learning in Vehicular Ad-hoc Networks.IEEE Transactions on Information Forensics and Security, [DOI]PDF][CODE] 2023, CCF A (early access) [联邦学习隐私增强]
  11. Yingnan Zhou, Xue Hu, Sihan Xu, Yan Jia, Yuhao Liu, Junyong Wang, Guangquan Xu, Wei Wang, Shaoying Liu, Thar Baker, Multi-misconfiguration Diagnosis via Identifying Correlated Configuration Parameters, IEEE Transactions on Software Engineering, [DOI][PDF] 2023, early access, CCF A [软件安全与分析]
  12. Yongzhong He, Yiming Wang, Sencun Zhu, Wei Wang*, Yunjia Zhang, Qiang Li, Aimin Yu, Automatically Identifying CVE Affected Versions with Patches and Developer Logs, IEEE Transactions on Dependable and Secure Computing (TDSC), [DOI]PDF][CODE2023, CCF A (early access) [软件漏洞挖掘]
  13. Xiangrui Xu, Pengrui Liu, Wei Wang*, Hong-Liang Ma, Bin Wang, Zhen Han, and Yufei Han, CGIR: Conditional Generative Instance Reconstruction Attacks against Federated Learning,  IEEE Transactions on Dependable and Secure Computing (TDSC), 2023 [DOI] [PDF][CODE] (early access), CCF A [联邦学习中的隐私推理攻击]
  14. Heng Ye, Qiang Zeng, Jiqiang Liu, Xiaojiang Du, Wei Wang* : Easy Peasy: A New Handy Method for Pairing Multiple COTS IoT Devices, IEEE Transactions on Dependable and Secure Computing (TDSC), 2022 [DOI], CCF A (early access).
  15. Wei Wang, Xiangyu Wei, Xiaoyang Suo, Bin Wang, Hao Wang, Hong-Ning Dai, Xiangliang Zhang: HGATE: Heterogeneous Graph Attention Auto-Encoders, IEEE Transactions on Knowledge and Data Engineering, early access, 2022 [DOI], CCF A. ESI高被引论文
  16. Jin Li, Heng Ye, Tong Li, Wei Wang, Wenjing Lou, Y. Thomas Hou, Jiqiang Liu, Rongxing Lu, Efficient and Secure Outsourcing of Differentially Private Data Publishing with Multiple Evaluators, IEEE Transactions on Dependable and Secure Computing (TDSC), Vol. 19, Issue: 1, pp. 67-76, 2022.ESI高被引论文
  17. Wei Wang, Jingjing Song, Guangquan Xu, Yidong Li, Hao Wang, Chunhua Su: ContractWard: Automated Vulnerability Detection Models for Ethereum Smart Contracts.IEEE Transactions on Network Science and Engineering 8(2): 1133-1144 (2021) [DOIESI高被引论文. [智能合约漏洞挖掘]
  18. Dawei Wang, Kai Chen*, Wei Wang*: Demystifying the Vetting Process of Voice-controlled Skills on Markets, Proc. ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT) (UbiComp 2021), 5(3): 130:1-130:28 (2021) [DOI], CCF A [智能音箱中的应用安全]
  19. Xing Liu, Jiqiang Liu, Sencun Zhu, Wei Wang*, Xiangliang Zhang, Privacy Risk Analysis and Mitigation of Analytics Libraries in the Android Ecosystem, IEEE Transactions on Mobile Computing, vol. 19, no. 5, pp. 1184-1199, 2020 [DOI] CCF A, ESI高被引论文
  20. Lun Li, Jiqiang Liu, Lichen Cheng, Shuo Qiu, Wei Wang*, Xiangliang Zhang, Zonghua Zhang, “CreditCoin: A Privacy-Preserving Blockchain-based Incentive Announcement Network for Communications of Smart Vehicles”, IEEE Transactions on Intelligent Transportation Systems, 19(7): 2204-2220 (2018) [DOI], one of the  most 10 frequently accessed documents for this Transaction! (6000+ full text views since 2018). ESI高被引论文, 2021年度北京市广泛关注学术论文, 谷歌学术被引500+次


Journal Papers

  1. Yaguan Qian, Kecheng Chen, Bin Wang, Zhaoquan Gu, Shouling Ji, Wei Wang, Yanchun Zhang, Enhancing Transferability of Adversarial Examples through Mixed-Frequency Inputs, IEEE Transactions on Information Forensics and Security2024, accepted
  2. Meng Shen, Zhehui Tan, Dusit Niyato, Yuzhi Liu, Jiawen Kang, Zehui Xiong, Liehuang Zhu, Wei Wang, Xuemin (Sherman)Shen, Artificial Intelligence for Web 3.0: A Comprehensive Survey, ACM Computing Surveys, 2024, accepted [PDF].
  3. Xiangrui Xu, Pengrui Liu, Wei Wang*, Hong-Liang Ma, Bin Wang, Zhen Han, and Yufei Han, CGIR: Conditional Generative Instance Reconstruction Attacks against Federated Learning,  IEEE Transactions on Dependable and Secure Computing (TDSC), 2023 [DOI] [PDF][CODE](early access).
  4. Xiaohan Yuan, Jiqiang Liu,  Bin Wang, Wei Wang, Bin Wang, Tao Li, Xiaobo Ma, Witold Pedrycz, FedComm: A Privacy-Enhanced and Efficient Authentication Protocol for Federated Learning in Vehicular Ad-hoc Networks.  IEEE Transactions on Information Forensics and Security, [DOI]PDF][CODE] 2023, CCF A (early access) 
  5. Yingnan Zhou, Xue Hu, Sihan Xu, Yan Jia, Yuhao Liu, Junyong Wang, Guangquan Xu, Wei Wang, Shaoying Liu, Thar Baker, Multi-misconfiguration Diagnosis via Identifying Correlated Configuration Parameters, IEEE Transactions on Software Engineering, [DOI][PDF] 2023, early access
  6. Yongzhong He, Yiming Wang, Sencun Zhu, Wei Wang*, Yunjia Zhang, Qiang Li, Aimin YuAutomatically Identifying CVE Affected Versions with Patches and Developer Logs, IEEE Transactions on Dependable and Secure Computing (TDSC), [DOI]PDF][CODE2023 (early access) 
  7. Bin Wang, Xiaohan Yuan, Li Duan, Hongliang Ma, Bin Wang, Chunhua Su, Wei Wang*, DeFiScanner: Spotting DeFi Attacks Exploiting Logic Vulnerabilities on Blockchain, IEEE Transactions on Computational Social Systems, 2023 [DOI] (early access)
  8. Li Duan, Liu Yang, Chunhong Liu, Wei Ni, Wei Wang, A New Smart Contract Anomaly Detection Method by Fusing Opcode and Source Code Features for Blockchain Services, IEEE Transactions on Network Science and Engineering, 2023  [DOI(early access)
  9. Li Duan, Yangyang Sun, Wei Ni, Weiping Ding, Jiqiang Liu, Wei Wang, Attacks against Cross-chain Systems and Defense Approaches: A Contemporary Survey, IEEE/CAA Journal of Automatica Sinica, 2023 [DOI] (early access)
  10. Guangquan Xu, Wenqing Lei, Lixiao Gong, Jian Liu, Hongpeng Bai, Kai Chen, Ran Wang, Wei Wang, Kaitai Liang, Weizhe Wang, Weizhi Meng, Shaoying Liu, UAF-GUARD: Defending the Use-After-Free Exploits via Fine-grained Memory Permission Management. Computers & Security, Volume 125, February 2023, 103048. [DOI]
  11. Euijin Choo, Mohamed Nabeel, Mashael Al Sabah, Issa Khalil, Ting Yu, Wei Wang: DeviceWatch: A Data-Driven Network Analysis Approach to Identifying Compromised Mobile Devices with Graph-Inference”, ACM Transactions on Privacy and Security 2022 [DOI] (early access)
  12. Heng Ye, Qiang Zeng, Jiqiang Liu, Xiaojiang Du, Wei Wang* : Easy Peasy: A New Handy Method for Pairing Multiple COTS IoT Devices, IEEE Transactions on Dependable and Secure Computing (TDSC), 2022 [DOI] (early access).
  13. Zikai Zhang, Yidong Li, Wei Wang, Haifeng Song, Hairong Dong: Malware detection with dynamic evolving graph convolutional networks,  International Journal of Intelligent Systems, 2022 [DOI] (early access)
  14. Wei Wang, Xiangyu Wei, Xiaoyang Suo, Bin Wang, Hao Wang, Hong-Ning Dai, Xiangliang Zhang: HGATE: Heterogeneous Graph Attention Auto-Encoders, IEEE Transactions on Knowledge and Data Engineering, early access, 2022 [DOI](to appear). ESI高被引论文. 
  15. Xudong He, Jian Wang, Jiqiang Liu, Weiping Ding, Zhen Han, Bin Wang, Jamel Nebhen, Wei Wang*, DNS Rebinding Threat Modelling and Security Analysis for Local Area Network of Maritime Transportation Systems, IEEE Transactions on Intelligent Transportation Systems, 2022 [DOI][PDF](to appear). 
  16. Heng Ye, Jiqiang Liu, Hao Zhen, Wenbin Jiang, Bin Wang, Wei Wang, VREFL: Verifiable and Reconnection-Efficient Federated Learning in IoT scenarios, Journal of Network and Computer Applications, 2022 [DOI][PDF](to appear).
  17. Zhuo Lv, Hongbo Cao, Feng Zhang, Yuange Ren, Bin Wang, Cen Chen, Nuannuan Li, Hao Chang, Wei Wang*, AWFC: Preventing Label Flipping Attacks towards Federated Learning for Intelligent IoT, The Computer Journal, 2022 [DOI](early access)
  18. Xingze Wang, Guoxian Yu, Zhongmin Yan, Lin Wan, Wei Wang, Lizhen Cui, Lung Cancer Subtype Diagnosis by Fusing Image-genomics Data and Hybrid Deep Networks, IEEE/ACM Transactions on Computational Biology and Bioinformatics, 2022 [DOI][PDF](to appear). 
  19. Longyang Yi, Yangyang Sun, Bin Wang, Li Duan, Hongliang Ma, Zhen Han, Wei Wang*: CCUBI: A cross-chain based premium competition scheme with privacy preservation for usage-based insurance,  International Journal of Intelligent Systems, 2022 [DOI](early access)
  20. 姚爽, 张大伟, 李勇, 王伟,区块链交易内容隐私保护技术研究综述,密码学报,2022, 9(4): 596-618 [DOI].
  21. Bin Wang, Pengfei Guo, Xing Wang, Yongzhong He,  Wei Wang*, Transparent Aspect-Level Sentiment Analysis Based on Dependency Syntax Analysis and Its Application on COVID-19, ACM Journal of Data and Information Quality, Vol. 14, Issue 2, No. 10, pp 1–24, June 2022 [DOI].
  22. Chongsheng Zhang, Yuefeng Tao, Kai Du, Weiping Ding, Bin Wang, Ji Liu, Wei Wang, Character-level Street View Text Spotting Based on Deep Multi-Segmentation Network for Smarter Autonomous Driving, IEEE Transactions on Artificial Intelligence, vol. 3, no. 2, pp. 297-308, April 2022 [DOI].
  23. Jin Li, Heng Ye, Tong Li, Wei Wang, Wenjing Lou, Y. Thomas Hou, Jiqiang Liu, Rongxing Lu, Efficient and Secure Outsourcing of Differentially Private Data Publishing with Multiple Evaluators, IEEE Transactions on Dependable and Secure Computing (TDSC), Vol. 19, Issue: 1, pp. 67-76, 2022.ESI高被引论文. 
  24. Wei Wang, Jingjing Song, Guangquan Xu, Yidong Li, Hao Wang, Chunhua Su: ContractWard: Automated Vulnerability Detection Models for Ethereum Smart Contracts.IEEE Transactions on Network Science and Engineering 8(2): 1133-1144 (2021) [DOIESI高被引论文. 
  25. Xiangliang Zhang*, Qiang Yang, Somayah Albaradei, Xiaoting Lyu, Hind Alamro, Adil Salhi, Changsheng Ma, Manal Alshehri, Inji Ibrahim Jaber, Faroug Tifratene, Wei Wang*, Takashi Gojobori, Carlos M. Duarte*, Xin Gao*. Rise and Fall of the Global Conversation and Shifting Sentiments During the COVID-19 Pandemic. Nature’s Humanities and Social Sciences Communications. 8, Article number: 120 (2021) [PDF]. 

  26. Li Duan, Tieliang Gao, Wei Ni, Wei Wang*, A hybrid intelligent service recommendation by latent semantics and explicit ratings, International Journal of Intelligent Systems, vol. 36, issue 12, pp. 7867-7894, December 2021.

  27. Yidong Li, Li Zhang, Zhuo Lv, Wei Wang*, Detecting Anomalies in Intelligent Vehicle Charging and Station Power Supply Systems with Multi-head Attention Models, IEEE Transactions on Intelligent Transportation Systems, 22(1): 555-564 (2021).

  28. Lichen Cheng, Jiqiang Liu, Yi Jin, Yidong Li, Wei Wang, Account Guarantee Scheme: Making Anonymous Accounts Supervised in Blockchain, ACM Transactions on Internet Technology (TOIT), Volume 21, Issue 1, Article No.: 11, pp. 1–19, 2021 [DOI][PDF].
  29. Chongsheng Zhang, Weiping Ding, Guowen Peng, Feifei Fu, Wei Wang: Street View Text Recognition With Deep Learning for Urban Scene Understanding in Intelligent Transportation Systems. IEEE Transactions on Intelligent Transportation Systems, 22(7): 4727-4743 (2021)[DOI][PDF]
  30. Zikai Zhang, Yidong Li, Hairong Dong, Honghao Gao, Yi Jin, Wei Wang: Spectral-Based Directed Graph Network for Malware Detection. IEEE Trans. Netw. Sci. Eng. , IEEE Transactions on Network Science and Engineering, 8(2): 957-970 (2021) [DOI][PDF].
  31. 李浥东,张俊,陶耀东,王伟,王飞跃: 平行安全:基于CPSS的生成式对抗安全智能系统。智能科学与技术学报,2020, 2(2): 194-202. 年度最佳论文
  32. Yingjie Wang, Guangquan Xu, Xing Liu, Weixuan Mao, Chengxiang Si, Witold Pedrycz, Wei Wang*, Identifying Vulnerabilities of SSL/TLS Certificate Verification in Android Apps with Static and Dynamic Analysis, Journal of Systems and Software, 167: 110609 (2020) [DOI].
  33. Xiaoming Liu, Chao Shen, Wei Wang, Xiaohong Guan, CoEvil: A Co-Evolutionary Model for Crime Inference Based on Fuzzy Rough Feature Selection, IEEE Transactions on Fuzzy Systems, 28(5): 806-817, 2020 [DOI][PDF](to appear) .
  34. Wei Wang, Yaoyao Shang, Yongzhong He, Yidong Li, Jiqiang Liu, BotMark: Automated botnet detection with hybrid analysis of flow-based and graph-based traffic behaviors, Information Sciences, 511: 284-296 (2020) [DOI][PDF].ESI高被引论文
  35. Heng Ye, Jiqiang Liu, Wei Wang, Ping Li, Tong Li, Jin Li, “Secure and efficient outsourcing differential privacy data release scheme in Cyber-physical system”, Future Generation Computer Systems, 108: 1314-1323, 2020 [DOI][PDF].
  36. Xing Liu, Jiqiang Liu, Sencun Zhu, Wei Wang*, Xiangliang Zhang, Privacy Risk Analysis and Mitigation of Analytics Libraries in the Android Ecosystem, IEEE Transactions on Mobile Computing, vol. 19, no. 5, pp. 1184-1199, 2020 [DOI][PDF].ESI高被引论文
  37. Yongzhong He, Chao Wang, Guangquan Xu, Wenjuan Lian, Hequn Xian, Wei Wang, Privacy-Preserving Categorization of Mobile Applications Based on Large-scale Usage Data, Information Sciences, 514: 557-570 (2020) [DOI][PDF].
  38. Xiangyu Wei, Guangquan Xu, Hao Wang, Yongzhong He, Zhen Han, and Wei Wang*: Sensing Users’ Emotional Intelligence in Social Networks, IEEE Transactions on Computational Social Systems, vol. 7, no. 1, pp. 103-112, 2020 [DOI][PDF].
  39. Lichen Cheng, Jiqiang Liu, Guangquan Xu, Zonghua Zhang, Hao Wang, Hong-Ning Dai, Yulei Wu, and Wei Wang*: SCTSC: A Semi-centralized Traffic Signal Control Mode with Attribute-based Blockchain in IoVs, IEEE Transactions on Computational Social Systems, 6(6):1373-1385 (2019) [DOI][PDF].
  40. Xiaoming Li, Guangquan Xu, Xi Zheng, Kaitai Liang, Emmanouil Panaousis, Tao Li, Wei Wang, Chao Shen, Using Sparse Representation to Detect Anomalies in Complex WSNs, ACM Transactions on Intelligent Systems and Technology (TIST), 10(6): 64:1-18(2019)[DOI][PDF] .
  41. Lichen Cheng, Jiqiang Liu, Chunhua Su, Kaitai Liang, Guangquan Xu, Wei Wang*, “Polynomial-based Modifiable Blockchain Structure for Removing Fraud Transactions”, Future Generation Computer Systems99(10):154-163(2019) [DOI][PDF].
  42. Wei Wang, Meichen Zhao, Zhenzhen Gao, Guangquan Xu, Yuanyuan Li, Hequn Xian, Xiangliang Zhang: Constructing Features for Detecting Android Malicious Applications: Issues, Taxonomy and Directions, IEEE Access, 7: 67602 – 67631, 2019 [DOI][PDF].
  43. Nannan Xie, Xing Wang, Wei Wang*, Jiqiang Liu, “Fingerprinting Android Malware Families”, Frontiers of Computer Science, 13(3): 637–646 (2019)[DOI][PDF].
  44. Weixuan Mao, Bo Sun, Guangquan Xu, Cheng Liu, Chengxiang Si, Wei Wang: Understanding Effects of Collaborations in Developing Mobile Computing Systems: Popularity, Efficiency, and Quality, IEEE Access,  7: 33380-33392 (2019) [PDF][PDF].
  45. Yongzhong He, Xuejun Yang, Binghui Hu, Wei Wang*, Dynamic privacy leakage analysis of Android third-party libraries, Journal of Information Security and Applications , 99 (10): 154-163 (2019) [DOI][PDF].
  46. Dan Su, Jiqiang Liu, Xiaoyang Wang, Wei Wang*, Detecting Android Locker-ransomware on Chinese Social Networks, IEEE Access, 7(1): 20381-20393, 2019 [DOI][PDF].
  47. Wei Wang, Mengxue Zhao, Jigang Wang, “Effective android malware detection with a hybrid model based on deep autoencoder and convolutional neural network”, Journal of Ambient Intelligence and Humanized Computing, 10(8): 3035-3043 (2019) [DOI][PDF]. ESI高被引论文
  48. Lun Li, Jiqiang Liu, Lichen Cheng, Shuo Qiu, Wei Wang*, Xiangliang Zhang, Zonghua Zhang, “CreditCoin: A Privacy-Preserving Blockchain-based Incentive Announcement Network for Communications of Smart Vehicles”, IEEE Transactions on Intelligent Transportation Systems, 19(7): 2204-2220 (2018) [DOI][PDF], one of the 50 most frequently accessed documents for this Transaction! (5000+ full text views since 2018). ESI高被引论文, 2021年度北京市广泛关注学术论文
  49. Xing Liu,Jiqiang Liu, Wei Wang*, Sencun Zhu, “Android single sign-on security: Issues, taxonomy and directions”, Future Generation Computer Systemsvol.89, pp. 402-420 (2018) [DOI][PDF].
  50. Wei Wang, Yuanyuan Li, Xing Wang, Jiqiang Liu, Xiangliang Zhang, “Detecting Android Malicious Apps and Categorizing Benign Apps with Ensemble of Classifiers”, Future Generation Computer Systemsvol.78, pp. 987–994 (2018) [DOI][PDF].ESI高被引论文
  51. Shuo Qiu, Jiqiang Liu, Yanfeng Shi, Ming Li, Wei Wang, “Identity-Based Private Matching over Outsourced Encrypted Datasets”, IEEE Transactions on Cloud Computing, 6(3):747-759 (2018) [DOI].
  52. Dan Su, Jiqiang Liu, Wei Wang*, Xiaoyang Wang, Xiaojiang Du, Mohsen Guizani, “Discovering communities of malapps on Android-based mobile cyber-physical systems”, Ad Hoc Networks,80: 104-115 (2018) [DOI][PDF].
  53. Yongzhong He, Endalew Elsabeth Alem, Wei Wang*, “Hybritus: A Password Strength Checker by Ensemble Learning from the Query Feedbacks of Websites”, Frontiers of Computer Science (to appear), 2018 [DOI][PDF].
  54. Wei Wang, Zhenzhen Gao, Meichen Zhao, Yidong Li, Jiqiang Liu, Xiangliang Zhang, DroidEnsemble: Detecting Android Malicious Applications With Ensemble of String and Structural Static Features. IEEE Access 6: 31798-31807 (2018) [DOI][PDF].
  55. Xing Liu, Jiqiang Liu, Wei Wang*, Yongzhong He, Xiangliang Zhang, “Discovering and Understanding Android Sensor Usage Behaviors with Data Flow Analysis”, World Wide Web, 21(1): 105-126 (2018)[DOI]
  56. Wei Wang, Jiqiang Liu, Georgios Pitsilis, Xiangliang Zhang, “Abstracting Massive Data for Lightweight Intrusion Detection in Computer Networks”, Information Sciences, 433–434(4): 417-430 (2018) [DOI].
  57. Yubin Yang, Zongtao Wei, Yong Xu, Haiwu He, Wei Wang, “DroidWard: An Effective Dynamic Analysis Method for Vetting Android Applications”, Cluster Computing (2018) 21: 265–275 [DOI][PDF].
  58. Ming Fan, Jun Liu, Wei Wang, Haifei Li, Zhenzhou Tian and Ting Liu, “DAPASA: Detecting Android Piggybacked Apps Based on Sensitive-subgraph Analysis”,  IEEE Transactions on Information Forensics and Security (TIFS)vol. 12, no. 8, pp. 1772-1785, 2017 [DOI].
  59. Xing Wang, Wei Wang*, Yongzhong He, Jiqiang Liu, Zhen Han, Xiangliang Zhang, “Characterizing Android Apps’ Behavior for Effective Detection of Malapps at Large Scale”,  Future Generation Computer Systems, vol. 75, pp. 30-45 (2017) [DOI].
  60. Wei Huang, Chunwang Yan, Jinsong Wang, Wei Wang, “A time-delay neural network for solving time-dependent shortest path problem”, Neural Networksvol. 90, pp. 21-28, 2017 [DOI].
  61. 马洪亮, 王伟*, 韩臻, “混淆恶意JavaScript代码的检测与反混淆方法研究”. 计算机学报, 40(7): 1799-1713, 2017.
  62. 马洪亮, 王伟*, 韩臻, “面向drive-by-download攻击的检测方法”.华中科技大学学报(自然科学版). 44卷, 3期, pp. 6-11, 2016 [PDF].
  63. Wei Wang, Yongzhong He, Jiqiang Liu, Sylvain Gombault, “Constructing Important Features from Massive Network Traffic for Lightweight Intrusion Detection”. IET Information Security, vol. 9, no. 6, pp. 374-379, 2015.
  64. Georgios Pitsilis, Wei Wang, “Harnessing the power of social bookmarking for improving tag-based recommendations”, Computers in Human Behavior (SSCI IF=2.273),vol. 50, pp. 239-251, 2015 [arXiv].
  65. Wei Wang, Xing Wang, Dawei Feng, Jiqiang Liu, Zhan Han, Xiangliang Zhang, “Exploring Permission-induced Risk in Android Applications for Malicious Application Detection”. IEEE Transactions on Information Forensics and Security (TIFS), vol. 9, no. 11, pp.1869-1882, 2014 (frequently downloaded paper)[PDF][DOI].
  66. Wei Wang, Thomas Guyet, Rene Quiniou, Marie-Odile Cordier, Florent Masseglia, Xiangliang Zhang, “Autonomic Intrusion Detection: Adaptively Detecting Anomalies over Unlabeled Audit Data Streams in Computer Networks”. Knowledge-Based Systems (IF(2012)=4.104IF (2013) =3.058), vol.70 no. 11, pp. 103-117, 2014 [PDF][DOI]
  67. Tong Wu, Zhen Han, Wei Wang, Lizhi Peng, “Early-stage internet traffic identification based on packet payload size”. Journal of Southeast University (English Edition). vol. 30, no. 3, pp. 289-295, 2014.
  68. 马洪亮,王伟*,韩臻, “基于Javascript的轻量级恶意网页异常检测方法”.华中科技大学学报(自然科学版). 42卷, 11期, pp. 34-38, 2014.
  69. Wei Wang, Xiangliang Zhang, Wenchang Shi, Shiguo Lian, Dengguo Feng, “Understanding and analyzing network traffic”. IEEE Network, vol. 26, no.1, pp. 4-5, Jan 2012
  70. Wei Wang, Xiangliang Zhang, Wenchang Shi, Shiguo Lian, Dengguo Feng, “Network traffic monitoring, analysis and anomaly detection”, IEEE Network, vol. 25, no. 3, pp. 6-7, May 2011
  71. Wei Wang, Xiangliang Zhang, Sylvain Gombault, “Constructing Attribute Weights from Audit Data for Effective Intrusion Detection”, Journal of Systems and Software, vol.82, no.12, pp.1974-1981, 2009
  72. Li Feng, Wei Wang, Lina Zhu, Yi Zhang, “Predicting Intrusion Goal Using Dynamic Bayesian Network with Transfer Probability Estimation”. Journal of Network and Computer Applications, vol. 32, no. 3, pp. 721-732, 2009
  73. Xiaohong Guan, Wei Wang (corresponding author), Xiangliang Zhang, “Fast Intrusion Detection Based on a Non-negative Matrix Factorization Model”. Journal of Network and Computer Applications, vol. 32, no.1, pp.31-44, 2009
  74. Wei Wang, Xiaohong Guan and Xiangliang Zhang, “Processing of Massive Audit Data Streams for Real-Time Anomaly Intrusion Detection”. Computer Communications, vol. 31, no. 1, pp.58-72, 2008
  75. Wei Wang, Xiaohong Guan, Xiangliang Zhang, Liwei Yang, “Profiling program behavior for anomaly intrusion detection based on the transition and frequency property of computer audit data”. Computers & Security, vol. 25, no 7, pp. 539-550, 2006
  76. 张响亮,王伟,管晓宏;基于隐马尔可夫模型的程序行为异常检测[J];西安交通大学学报;2005年10期,Vol. 39, no.10, pp. 1056-1059
  77. 王伟,陈秀真,管晓宏,张响亮;深度防卫的自适应入侵检测系统[J];西安交通大学学报;2005年04期, vol 39, no. 4, pp. 339~342
  78. 王伟,彭勤科.主机日志分析及其在入侵检测中的应用.计算机工程与应用, 2002(13):35-37
  79. 林晖,王伟,张优云;基于产品特征的信息检索技术[J];计算机辅助设计与图形学学报;2002年03期, pp. 261~265, 2002

Conference Papers

  1. Xiaoting Lyu, Yufei Han, Wei Wang*, Jingkai Liu, Yongsheng Zhu, Guangquan Xu, Jiqiang Liu, Xiangliang Zhang, Lurking in the shadows: Unveiling Stealthy Backdoor Attacks against Personalized Federated Learning, USENIX Security 2024Accepted [PDF]. 
  2. Xiaoting Lyu, Yufei Han, Wei Wang*, Hangwei Qian, Ivor Tsang, Xiangliang Zhang, Cross-Context Backdoor Attacks against Graph Prompt Learning, KDD 2024, accepted [PDF].  
  3. Yurong Hao, Xihui Chen, Xiaoting Lyu, Jiqiang Liu, Yongsheng Zhu, Zhiguo Wan, Sjouke Mauw, Wei Wang*, Not One Less: Exploring Interplay between User Profiles and Items in Untargeted Attacks against Federated Recommendation, ACM CCS 2024, accepted [PDF]
  4. Xueshuo Xie, Haoxu Wang, Zhaolong Jian and Li Tao, Wei Wang, Zhiwei Xu, Guiling Wang, Memory-Efficient and Secure DNN Inference on TrustZone-enabled Consumer IoT Devices,  IEEE Conference on Computer Communications (IEEE INFOCOM 2024), Vancouver, Canada, 20–23 May 2024. 
  5. Chao Li, Balaji Palanisamy*, Runhua Xu, Li Duan, Jiqiang Liu*, Wei Wang*, How Hard is Takeover in DPoS Blockchains? Understanding the Security of Coin-based Voting Governance, Proceedings of The 30th ACM Conference on Computer and Communications Security (CCS 2023), 26-30 NOV., Copenhagen, Denmark, 2023 [DOI][PDF], CCF A [区块链治理][CCS 2023 Distinguished Paper Award]
  6. Xiaoting Lyu, Yufei Han, Wei Wang*, Jingkai Liu, Bin Wang, Jiqiang Liu, Xiangliang Zhang. Poisoning with Cerberus: Stealthy and Colluded Backdoor Attack against Federated Learning. Proceedings of Thirty-Seventh AAAI Conference on Artificial Intelligence (AAAI 2023). Feb 7-14, 2023 Washington DC (Acceptance rate 1721/8777 = 19.6%). [DOI]PDF][CODE], CCF A [联邦学习中的后门攻击]
  7. Yaguan Qian, Shuke He, Chenyu Zhao,  Jiaqiang Sha, Wei Wang, Bin Wang, LEA2: A Lightweight Ensemble Adversarial Attack via Non-overlapping Vulnerable Frequency Regions, International Conference on Computer Vision (ICCV 2023), Paris, October 2023.
  8. Helene Orsini, Hongyan Bao, Yujun Zhou, Xiangrui Xu, Yufei Han, Longyang Yi, Wei Wang, Xin Gao, and Xiangliang Zhang. AdvCat: Domain-Agnostic Robustness Assessment for Cybersecurity-Critical Applications with Categorical Inputs. The 2022 IEEE International Conference on Big Data (BigData 2022). Regular paper. December 17-20, 2022, Osaka, Japan(acceptance rate=122/633=19.2%)
  9. Dan Su, Jiqiang Liu, Sencun Zhu, Xiaoyang Wang, Wei Wang*: Alexa Skills: Security Vulnerabilities and Countermeasures, IEEE Conference on Communications and Network Security (IEEE CNS), Austin, TX, USA, 2022
  10. Dawei Wang, Kai Chen*, Wei Wang*: Demystifying the Vetting Process of Voice-controlled Skills on Markets, ACM international joint conference on pervasive and ubiquitous computing (UbiComp 2021), Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous Technologies (IMWUT)(May cycle), 2021
  11. Xiaoting Lv, Zhe Chen, Di Wu, Wei Wang*: Sentiment Analysis on Chinese Weibo regarding COVID-19, accepted by 9th CCF International Conference on Natural Language Processing and Chinese Computing (NLPCC 2020), Zhengzhou, China, Oct 14-18, 2020 (oral presentation)[PDF][Bib].Y
  12. Jin Li, Heng Ye, Wei Wang, Wenjing Lou, Y. Thomas Hou, Jiqiang Liu and Rongxing Lu: Efficient and Secure Outsourcing of Differentially Private Data Publication, accepted by 23rd European Symposium on Research in Computer Security (ESORICS 2018), pp. 187-206, Barcelona, Spain, September 3-7, 2018 (acceptance rate = 56/283 = 19.8%)[PDF][Bib].
  13. Yan Chen, Wei Wang, Xiangliang Zhang: Randomizing SVM against Adversarial Attacks Under Uncertainty, accepted by 22nd Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD 2018), Melbourne, Australia, June 3rd - 6th, 2018 (regular paper with long presentation, acceptance rate = 59/590=10%)[PDF][Bib].

  14. Longfei Wu, Xiaojiang Du, Wei Wang, Bin Lin, "An Out-of-band Authentication Scheme for Internet of Things Using Blockchain Technology". Accepted by 2018 International Conference on Computing, Networking and Communications (ICNC 2018), Maui, Hawaii, USA, March 5-8, 2018 (acceptance rate = 26%)[PDF].
  15. Xing Liu, Sencun Zhu, Wei Wang*, Jiqiang Liu, "Alde: Privacy Risk Analysis of Analytics Libraries in the Android Ecosystem". Accepted by the 12th EAI International Conference on Security and Privacy in Communication Networks (SecureComm 2016), Guangzhou, China, October, 10-12, 2016 (acceptance rate=32/137=23.4%) [PDF].
  16. Dan Su, Wei Wang*, Xing Wang, Jiqiang Liu, "Anomadroid: profiling Android application behaviors for identifying unknown malapps", accepted by 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (IEEE TrustCom 2016), Tianjin, China, 23-26 August, 2016.
  17. Shuo Qiu, Boyang Wang, Ming Li, Jesse Victors, Jiqiang Liu, Yanfeng Shi, Wei Wang, "Fast, Private and Verifiable: Server-aided Approximate Similarity Computation over Large-Scale Datasets". Proceedings of the 4th ACM International Workshop on Security in Cloud Computing, SCC@AsiaCCS, pp. 29-36, Xi'an, China, May 30 - June 3, 2016
  18. Xing Liu, Jiqiang Liu, Wei Wang* "Exploring Sensor Usage Behaviors of Android Applications Based on Data Flow Analysis", Proceedings of the 34th IEEE International Performance Computing and Communications Conference (IPCCC 2015), Nanjing, China, December 14-16, 2015 (acceptance rate=88/298=29.5%) [PDF].
  19. Xing Liu, Wei Wang, Jiqiang Liu, "POSTER: The Popular Apps in Your Pocket Are Leaking Your Privacy", 22nd ACM Conference on Computer and Communications Security (ACM CCS 2015 (Poster)), pp. 1653-1655, Denver, Colorado, October 12-16, 2015.
  20. Georgios Pitsilis, Xiangliang Zhang, Wei Wang, "Clustering Recommenders in Collaborative Filtering Using Explicit Trust Information'', 5th IFIP WG 11.11 International Conference on Trust Management (IFIPTM 2011), Springer, pp. 82-97, Copenhagen, Denmark, June 29- July 1, 2011(full paper)}
  21. Wei Wang, Xiangliang Zhang, "High-speed Web Attack Detection through Extracting Exemplars from HTTP Traffic'', 26th ACM Symposium on Applied Computing (ACM SAC 2011)(Security track), ACM Press, pp. 1538-1543, TaiChung, Taiwan, 21-25 March, 2011 (security track acceptance rate=9/41=22%). }
  22. Xiangliang Zhang, Wei Wang, Kjetil Norvag, Michele Sebag, "K-AP: Generating Specified K Clusters by Efficient Affinity Propagation'', 10th IEEE International Conference on Data Mining (ICDM 2010), pp. 1187-1192, Sydney, Australia, December 14-17, 2010 (acceptance rate=155/797=19.4%)}
  23. Atef Abdelkefi, Yuming Jiang, Wei Wang, Arne Aslebo, Olav Kvittem, "Robust Traffic Anomaly Detection with Principal Component Pursuit'', Student Workshop, ACM CoNEXT 2010, Philadelphia, USA, November 2010
  24. Wei Wang, Xiangliang Zhang, Georgios Pitsilis, "Abstracting Audit Data for Efficient Anomaly Intrusion Detection'', Sixth International Conference on Information Systems Security (ICISS 2010), pp. 201-215, Gandhinagar, Gujarat, India, December 15-19, 2010 (acceptance rate 14/51=27.5%)
  25. Xiangliang Zhang, Wei Wang, "Self-adaptive Change Detection in Streaming Data with Non-stationary Distribution'', 6th International Conference on Advanced Data Mining and Applications (ADMA 2010), pp. 334-345, Chongqing, China, Nov. 19-21, 2010 (oral full paper, acceptance rate = 17%)}
  26. Wei Wang, Xiangliang Zhang, Sylvain Gombault, Svein J. Knapskog, "Attribute Normalization in Network Intrusion Detection'', 10th International Symposium on Pervasive Systems, Algorithms and Networks (I-SPAN 2009), IEEE Press, pp. 448-453, Kaohxiung, Taiwan, China, Dec 14-16, 2009
  27. Wei Wang, Thomas Guyet and Svein J. Knapskog, "Autonomic Intrusion Detection System". Proceedings of 12th International Symposium on Recent Advances in Intrusion Detection (RAID 2009), pp. 359-361, LNCS 5758, Sep 23-25, 2009 (Poster presentation)
  28. Wei Wang, Florent Masseglia, Thomas Guyet, Rene Quiniou and Marie-Odile Cordier, "A General Framework for Adaptive and Online Detection of Web attacks". 18th international World Wide Web conference (WWW 2009), pp. 1141-1142, ACM press, Madrid, Spain, Apr 20-24, 2009 (Poster presentation)
  29. Thomas Guyet, Wei Wang, Rene Quiniou, Marie-Odile Cordier, "Diagnostic adaptatif distribue d'un flux de donnees. Application a la detection d'intrusion dans des serveurs Web". Proceedings of conference Extraction et Gestion des Connaissances (EGC 2009), pp. 325-336, Strasbourg, France, Jan 2009 (Nominated for best application paper award, in French) 
  30. Wei Wang, Thomas Guyet, Rene Quiniou, Marie-Odile Cordier, Florent Masseglia, "Online and adaptive anomaly Detection: detecting intrusions in unlabelled audit data streams", Proceedings of conference Extraction et Gestion des Connaissances (EGC 2009)(Poster), pp. 457-458, Strasbourg, France, Jan 2009
  31. Wei Wang, Sylvain Gombault, "Efficient Detection of DDoS Attacks with Important Attributes". Proceedings of 3rd International Conference on Risks and Security of Internet and Systems (CRiSIS  2008), pp. 61-67, IEEE Press, Tozeur, Tunisia, Oct 28-30, 2008.
  32. Wei Wang, Sylvain Gombault, Thomas Guyet, "Towards fast detecting intrusions: using key attributes of network traffic". Proceedings of The Third International Conference on Internet Monitoring and Protection (ICIMP 2008), IEEE Computer society press, Bucharest, Romania, pp. 86-91, June 29 - July 5, 2008 (acceptance rate 23%) (Best paper award) 
  33. Wei Wang, Sylvain Gombault, Amine Bsila, "Building multiple behavioral models for network intrusion detection". 2nd IEEE Workshop on "Monitoring, Attack Detection and Mitigation'' (MonAM 2007), Toulouse, pp. 31-36, France, Nov 2007
  34. Wei Wang, Sylvain Gombault, "Detecting masquerades with principal component analysis based on cross frequency weights". Proceedings of 14th Anniversary HP-SUA Workshop, Munich, Germany, pp. 227-232, July 2007
  35. Wei Wang, Sylvain Gombault, "Distance measures for anomaly intrusion detection". Proceedings of 2007 International Conference on Security and management, Las Vegas, NV, pp. 17-23, June 2007 (SAM 2007) (regular paper, acceptance rate 28%)
  36. Wei Wang, Roberto Battiti, "Identifying Intrusions in Computer Networks with Principal Component Analysis". Proceedings of First IEEE International Conference on Availability, Reliability and Security (ARES 2006), IEEE press society, pp. 270-277, April, 20-22nd, Vienna, Austria, 2006 
  37. Wei Wang, Xiaohong Guan, Xiangliang Zhang, "Profiling Program and User Behavior for Anomaly Intrusion Detection Based on Non-negative Matrix Factorization". Proceedings of 43rd IEEE Conference on Decision and Control (CDC 2004), Atlantis, Paradise Island, Bahamas, pp. 99-104, Dec 2004
  38. Wei Wang, Xiaohong Guan and Xiangliang Zhang. "A Novel Intrusion Detection Method Based on Principal Component Analysis in Computer Security". Advances in Neural Networks-ISNN 2004. International IEEE Symposium on Neural Networks, Dalian, China. Lecture Notes in Computer Science (LNCS), No. 3174. pp. 657-662. Aug 2004
  39. Wei Wang, Xiaohong Guan and Xiangliang Zhang, "Modeling Program Behavior by Hidden Markov Models for Intrusion Detection". The Third IEEE International Conference on Machine Learning and Cybernetics (ICMLC 2004), Shanghai, China, pp. 2830-2835. Aug 2004


Ph.D. Thesis

  1. 王伟, 多信息源的实时入侵检测方法研究, 西安交通大学, 2005 [WangPhDThesis]

Other Papers

  1. 王伟, 何永忠, 以完整解决一个具体问题为中心的研究性教学, 计算机教育(录用), 2014年
  2. 何永忠, 王伟,黎琳, 基于云计算的信息安全实验教学系统构建, 计算机教育(录用), 2014年


专著/译著

专利

申请中国发明专利71项,授权41

授权美国专利1

参与编制行业标准8

参与编制国家标准12

参与编制国际标准3

软件著作权

获奖与荣誉

2024年,入选爱思唯尔(Elsevier) 2023年 “中国高被引学者”

2023年,中国自动化学会科技进步一等奖(排名1)

2023年,中国计算机学会杰出传播者、杰出演讲者

2023年,中国产学研合作促进会产学研合作创新奖 (个人奖)

2023年,中国产学研合作促进会科技进步奖二等奖

2023年,ACM CCS 2023 Distinguished Paper Award(杰出论文奖)

2023年,入选爱思唯尔(Elsevier) 2022年 “中国高被引学者”

2022年,中国通信学会科技进步二等奖

2022年,中国电子学会自然科学三等奖

2022年,入选北京交通大学“青年英才培育计划” 

2022年,入选爱思唯尔(Elsevier) 2021年 “中国高被引学者”

2022年,中国计算机学会杰出演讲者、杰出传播者

2021年,入选爱思唯尔(Elsevier) 2020年 “中国高被引学者” 

2020年,教育部高等学校科技进步二等奖

2018年,省部级科技进步二等奖

2010年,欧洲ERCIM学者奖(ERCIM “Alain Bensoussan” Fellowship Award (2010-2011) (http://fellowship.ercim.eu/))

2009年,第四届“春晖杯”留学人员创新创业大赛(教育部科技部联合主办)二等奖 (第一完成人)
2009年,EGC最佳应用论文提名奖
2008年,欧盟ERCIM学者奖(ERCIM “Alain Bensoussan" Fellowship Award (2009-2010))
2008年,ICIMP 最佳论文奖

社会兼职

  • ACM SIGSAC China 副主席
  • 中国科协海智计划特聘专家(2023-2025)
  • CCF A期刊IEEE TDSC副编辑(Associate Editor)
  • 国际权威SCI期刊Computers & Security编委
  • 一区期刊Frontiers of Computer Science编委
  • 《重庆邮电大学学报(自然科学版)》编委
  • 《网络空间安全》期刊编委
  • 网络与信息安全》期刊编委
  • 100余个国际学术会议的程序委员会委员-TPC Member
  • CCF 区块链专委会副主任委员
  • 中国计算机学会杰出会员 (CCF)
  • 中国计算机学会青年科技论坛学术委员会委员(YOCSEF AC)
  • CCF出版工委执行委员
  • 北京市网络法学研究会常务理事