BibTeX records: Fei Wang 0007

download as .bib file

@article{DBLP:journals/mcm/LuWZWS13,
  author       = {Huabiao Lu and
                  Xiaofeng Wang and
                  Baokang Zhao and
                  Fei Wang and
                  Jinshu Su},
  title        = {ENDMal: An anti-obfuscation and collaborative malware detection system
                  using syscall sequences},
  journal      = {Math. Comput. Model.},
  volume       = {58},
  number       = {5-6},
  pages        = {1140--1154},
  year         = {2013},
  url          = {https://doi.org/10.1016/j.mcm.2013.03.008},
  doi          = {10.1016/J.MCM.2013.03.008},
  timestamp    = {Wed, 17 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/mcm/LuWZWS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icc/WangXBS13,
  author       = {Fei Wang and
                  Bin Xiao and
                  Kai Bu and
                  Jinshu Su},
  title        = {Detect and identify blocker tags in tree-based {RFID} systems},
  booktitle    = {Proceedings of {IEEE} International Conference on Communications,
                  {ICC} 2013, Budapest, Hungary, June 9-13, 2013},
  pages        = {2133--2137},
  publisher    = {{IEEE}},
  year         = {2013},
  url          = {https://doi.org/10.1109/ICC.2013.6654842},
  doi          = {10.1109/ICC.2013.6654842},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icc/WangXBS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sigcomm/LiuZWWSYWS13,
  author       = {Bo Liu and
                  Baokang Zhao and
                  Ziling Wei and
                  Chunqing Wu and
                  Jinshu Su and
                  Wanrong Yu and
                  Fei Wang and
                  Shihai Sun},
  editor       = {Dah Ming Chiu and
                  Jia Wang and
                  Paul Barford and
                  Srinivasan Seshan},
  title        = {Qphone: a quantum security VoIP phone},
  booktitle    = {{ACM} {SIGCOMM} 2013 Conference, {SIGCOMM} 2013, Hong Kong, August
                  12-16, 2013},
  pages        = {477--478},
  publisher    = {{ACM}},
  year         = {2013},
  url          = {https://doi.org/10.1145/2486001.2491696},
  doi          = {10.1145/2486001.2491696},
  timestamp    = {Thu, 11 Mar 2021 15:20:15 +0100},
  biburl       = {https://dblp.org/rec/conf/sigcomm/LiuZWWSYWS13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@proceedings{DBLP:conf/icoc/2013,
  editor       = {Jinshu Su and
                  Baokang Zhao and
                  Zhigang Sun and
                  Xiaofeng Wang and
                  Fei Wang and
                  Ke Xu},
  title        = {Frontiers in Internet Technologies - Second {CCF} Internet Conference
                  of China, ICoC 2013, Zhangjiajie, China, July 10, 2013, Revised Selected
                  Papers},
  series       = {Communications in Computer and Information Science},
  volume       = {401},
  publisher    = {Springer},
  year         = {2013},
  url          = {https://doi.org/10.1007/978-3-642-53959-6},
  doi          = {10.1007/978-3-642-53959-6},
  isbn         = {978-3-642-53958-9},
  timestamp    = {Fri, 27 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icoc/2013.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/mcm/WangWWS12,
  author       = {Fei Wang and
                  Hailong Wang and
                  Xiaofeng Wang and
                  Jinshu Su},
  title        = {A new multistage approach to detect subtle DDoS attacks},
  journal      = {Math. Comput. Model.},
  volume       = {55},
  number       = {1-2},
  pages        = {198--213},
  year         = {2012},
  url          = {https://doi.org/10.1016/j.mcm.2011.02.025},
  doi          = {10.1016/J.MCM.2011.02.025},
  timestamp    = {Sat, 30 Sep 2023 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/mcm/WangWWS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mass/HanWWW12,
  author       = {Zilong Han and
                  Xiaofeng Wang and
                  Fei Wang and
                  Yongjun Wang},
  title        = {Collaborative detection of DDoS attacks based on chord protocol},
  booktitle    = {9th {IEEE} International Conference on Mobile Ad-Hoc and Sensor Systems,
                  {MASS} 2012, Las Vegas, NV, USA, October 8-11, 2012 - Supplement Volume
                  / Workshops},
  pages        = {1--4},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/MASS.2012.6708531},
  doi          = {10.1109/MASS.2012.6708531},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mass/HanWWW12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/mass/WangWHS12,
  author       = {Fei Wang and
                  Xiaofeng Wang and
                  Xiaofeng Hu and
                  Jinshu Su},
  title        = {Bitwise sketch for lightweight reverse {IP} reconstruction in network
                  anomaly detection},
  booktitle    = {9th {IEEE} International Conference on Mobile Ad-Hoc and Sensor Systems,
                  {MASS} 2012, Las Vegas, NV, USA, October 8-11, 2012 - Supplement Volume
                  / Workshops},
  pages        = {1--4},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/MASS.2012.6708530},
  doi          = {10.1109/MASS.2012.6708530},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/mass/WangWHS12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/trustcom/0007WSX12,
  author       = {Fei Wang and
                  Xiaofeng Wang and
                  Jinshu Su and
                  Bin Xiao},
  editor       = {Geyong Min and
                  Yulei Wu and
                  Lei (Chris) Liu and
                  Xiaolong Jin and
                  Stephen A. Jarvis and
                  Ahmed Yassin Al{-}Dubai},
  title        = {VicSifter: {A} Collaborative DDoS Detection System with Lightweight
                  Victim Identification},
  booktitle    = {11th {IEEE} International Conference on Trust, Security and Privacy
                  in Computing and Communications, TrustCom 2012, Liverpool, United
                  Kingdom, June 25-27, 2012},
  pages        = {215--222},
  publisher    = {{IEEE} Computer Society},
  year         = {2012},
  url          = {https://doi.org/10.1109/TrustCom.2012.295},
  doi          = {10.1109/TRUSTCOM.2012.295},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/trustcom/0007WSX12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnit/YujingBFJ10,
  author       = {Yujing Liu and
                  Bofeng Zhang and
                  Fei Wang and
                  Jinshu Su},
  title        = {Evaluation of Prefix Hijacking Impact Based on Hinge-Transmit Property
                  of {BGP} Routing System},
  journal      = {J. Next Gener. Inf. Technol.},
  volume       = {1},
  number       = {3},
  pages        = {96--105},
  year         = {2010},
  url          = {http://www.humanpub.org/jnit/ppl/JNIT0103\_11.pdf},
  timestamp    = {Thu, 18 Jun 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jnit/YujingBFJ10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics