Остановите войну!
for scientists:
default search action
Feng Wang 0002
- > Home > Persons > Feng Wang 0002
Publications
- 2023
- [c32]Yinxin Wan, Xuanli Lin, Kuai Xu, Feng Wang, Guoliang Xue:
Extracting Spatial Information of IoT Device Events for Smart Home Safety Monitoring. INFOCOM 2023: 1-10 - [c31]Feng Wang, Kuai Xu, Guoliang Xue:
A Holistic Curriculum Towards Teaching Smart Home Security. SIGCSE (2) 2023: 1284 - 2022
- [j28]Guoliang Xue, Yinxin Wan, Xuanli Lin, Kuai Xu, Feng Wang:
An Effective Machine Learning Based Algorithm for Inferring User Activities From IoT Device Events. IEEE J. Sel. Areas Commun. 40(9): 2733-2745 (2022) - [j27]Yinxin Wan, Kuai Xu, Feng Wang, Guoliang Xue:
IoTAthena: Unveiling IoT Device Activities From Network Traffic. IEEE Trans. Wirel. Commun. 21(1): 651-664 (2022) - [c30]Keith Erkert, Andrew Lamontagne, Jereming Chen, John Cummings, Mitchell Hoikka, Kuai Xu, Feng Wang:
An End-to-End System for Monitoring IoT Devices in Smart Homes. CCNC 2022: 929-930 - [c29]Xuanli Lin, Yinxin Wan, Kuai Xu, Feng Wang, Guoliang Xue:
Inferring User Activities from IoT Device Events in Smart Homes: Challenges and Opportunities. ICCCN 2022: 1-10 - [c28]Yinxin Wan, Kuai Xu, Feng Wang, Guoliang Xue:
IoTMosaic: Inferring User Activities from IoT Network Traffic in Smart Homes. INFOCOM 2022: 370-379 - 2021
- [j26]Paul Wagenseller III, Yunpeng Zhao, Feng Wang, Adrian Avram:
Community-based location inference in social media using supervised learning approach. Soc. Netw. Anal. Min. 11(1): 64 (2021) - [j25]Yinxin Wan, Kuai Xu, Feng Wang, Guoliang Xue:
Characterizing and Mining Traffic Patterns of IoT Devices in Edge Networks. IEEE Trans. Netw. Sci. Eng. 8(1): 89-101 (2021) - [i5]Yinxin Wan, Kuai Xu, Feng Wang, Guoliang Xue:
IoTAthena: Unveiling IoT Device Activities from Network Traffic. CoRR abs/2105.14405 (2021) - 2020
- [j24]Kuai Xu, Feng Wang, Sergio Jimenez, Andrew Lamontagne, John Cummings, Mitchell Hoikka:
Characterizing DNS Behaviors of Internet of Things in Edge Networks. IEEE Internet Things J. 7(9): 7991-7998 (2020) - [j23]Kuai Xu, Feng Wang, Haiyan Wang, Yufang Wang, Ying Zhang:
Mitigating the Impact of Data Sampling on Social Media Analysis and Mining. IEEE Trans. Comput. Soc. Syst. 7(2): 546-555 (2020) - [c27]Yinxin Wan, Kuai Xu, Guoliang Xue, Feng Wang:
IoTArgos: A Multi-Layer Security Monitoring System for Internet-of-Things in Smart Homes. INFOCOM 2020: 874-883 - 2019
- [c26]Paul Wagenseller III, Adrian Avram, Eric Jiang, Feng Wang, Yunpeng Zhao:
Location Prediction with Communities in User Ego-Net in Social Media. ICC 2019: 1-6 - [c25]Kuai Xu, Yinxin Wan, Guoliang Xue, Feng Wang:
Multidimensional behavioral profiling of internet-of-things in edge networks. IWQoS 2019: 37:1-37:10 - 2018
- [j22]Feng Wang, Ken Orton, Paul Wagenseller III, Kuai Xu:
Towards Understanding Community Interests With Topic Modeling. IEEE Access 6: 24660-24668 (2018) - [j21]Paul Wagenseller III, Feng Wang, Weili Wu:
Size Matters: A Comparative Analysis of Community Detection Algorithms. IEEE Trans. Comput. Soc. Syst. 5(4): 951-960 (2018) - [c24]Kuai Xu, Feng Wang, Haiyan Wang, Bo Yang:
A First Step Towards Combating Fake News over Online Social Media. WASA 2018: 521-531 - 2017
- [c23]Feng Wang, Ken Orton:
Community Verification with Topic Modeling. WASA 2017: 278-288 - [i4]Paul Wagenseller III, Feng Wang:
Size Matters: A Comparative Analysis of Community Detection Algorithms. CoRR abs/1712.01690 (2017) - 2016
- [j20]Feng Wang, Haiyan Wang, Kuai Xu, Ross Raymond, Jaime Chon, Shaun Fuller, Anton Debruyn:
Regional Level Influenza Study with Geo-Tagged Twitter Data. J. Medical Syst. 40(8): 189:1-189:8 (2016) - [j19]Kuai Xu, Feng Wang, Xiaohua Jia:
Secure the Internet, one home at a time. Secur. Commun. Networks 9(16): 3821-3832 (2016) - [r4]Feng Wang, Ding-Zhu Du, Xiuzhen Cheng:
Connected Dominating Set. Encyclopedia of Algorithms 2016: 425-430 - [r3]Weili Wu, Feng Wang:
Greedy Approximation Algorithms. Encyclopedia of Algorithms 2016: 882-886 - [i3]Paul Wagenseller III, Feng Wang:
Community Detection Algorithm Evaluation using Size and Hashtags. CoRR abs/1612.03362 (2016) - 2015
- [c22]Kuai Xu, Feng Wang, Xiaohua Jia:
Secure the Internet, One Home at a Time. GLOBECOM 2015: 1-6 - [c21]Kuai Xu, Feng Wang, Xiaohua Jia, Haiyan Wang:
The Impact of Sampling on Big Data Analysis of Social Media: A Case Study on Flu and Ebola. GLOBECOM 2015: 1-6 - [c20]Jaime Chon, Ross Raymond, Haiyan Wang, Feng Wang:
Modeling Flu Trends with Real-Time Geo-tagged Twitter Data Streams. WASA 2015: 60-69 - 2014
- [j18]Kuai Xu, Feng Wang, Lin Gu, Jianhua Gao, Yaohui Jin:
Characterizing home network traffic: an inside view. Pers. Ubiquitous Comput. 18(4): 967-975 (2014) - [j17]Kuai Xu, Feng Wang, Lin Gu:
Behavior Analysis of Internet Traffic via Bipartite Graphs and One-Mode Projections. IEEE/ACM Trans. Netw. 22(3): 931-942 (2014) - [c19]Kuai Xu, Feng Wang, Richard Egli, Aaron Fives, Russell Howell, Odayne Mcintyre:
Object-Oriented Big Data Security Analytics: A Case Study on Home Network Traffic. WASA 2014: 313-323 - 2013
- [c18]Kuai Xu, Lin Gu, Feng Wang:
Monitoring home network traffic via programmable routers. GLOBECOM 2013: 605-610 - [c17]Feng Wang, Haiyan Wang, Kuai Xu, Jianhong Wu, Xiaohua Jia:
Characterizing Information Diffusion in Online Social Networks with Linear Diffusive Model. ICDCS 2013: 307-316 - [i2]Haiyan Wang, Feng Wang, Kuai Xu:
Modeling Information Diffusion in Online Social Networks with Partial Differential Equations. CoRR abs/1310.0505 (2013) - 2012
- [j16]Kuai Xu, Feng Wang, Haiyan Wang:
Lightweight and Informative Traffic Metrics for Data Center Monitoring. J. Netw. Syst. Manag. 20(2): 226-243 (2012) - [j15]Wei Zhang, Weili Wu, Feng Wang, Kuai Xu:
Positive influence dominating sets in power-law graphs. Soc. Netw. Anal. Min. 2(1): 31-37 (2012) - [c16]Kuai Xu, Feng Wang, Michael Lee:
HomeTPS: Uncovering what is happening in home networks. CCNC 2012: 40-41 - [c15]Feng Wang, Haiyan Wang, Kuai Xu:
Diffusive Logistic Model Towards Predicting Information Diffusion in Online Social Networks. ICDCS Workshops 2012: 133-139 - [c14]Feng Wang, Kuai Xu, Haiyan Wang:
Discovering Shared Interests in Online Social Networks. ICDCS Workshops 2012: 163-168 - [c13]Kuai Xu, Feng Wang, Lin Gu:
Profiling-as-a-Service in Multi-tenant Cloud Computing Environments. ICDCS Workshops 2012: 461-465 - [c12]Kuai Xu, Feng Wang, Lin Gu, Jianhua Gao, Yaohui Jin:
Characterizing Home Network Traffic: An Inside View. WASA 2012: 60-71 - 2011
- [j14]Feng Wang, David Hongwei Du, Erika Camacho, Kuai Xu, Wonjun Lee, Yan Shi, Shan Shan:
On positive influence dominating sets in social networks. Theor. Comput. Sci. 412(3): 265-269 (2011) - [c11]Kuai Xu, Feng Wang:
Behavioral Graph Analysis of Internet Applications. GLOBECOM 2011: 1-5 - [c10]Kuai Xu, Feng Wang, Lin Gu:
Network-aware behavior clustering of Internet end hosts. INFOCOM 2011: 2078-2086 - [i1]Feng Wang, Haiyang Wang, Kuai Xu:
Diffusive Logistic Model Towards Predicting Information Diffusion in Online Social Networks. CoRR abs/1108.0442 (2011) - 2010
- [j13]Kuai Xu, Feng Wang, Supratik Bhattacharyya, Zhi-Li Zhang:
Real-time behaviour profiling for network monitoring. Int. J. Internet Protoc. Technol. 5(1/2): 65-80 (2010) - [c9]Kuai Xu, Feng Wang, Bin Wang:
Behavior Profiling and Analysis in Wireless Home Networks. CCNC 2010: 1-2 - [c8]Feng Wang, Jianhua Gao:
Behavior monitoring framework in large-scale wireless sensor networks. IPCCC 2010: 138-145 - 2009
- [j12]Chen Wang, My T. Thai, Yingshu Li, Feng Wang, Weili Wu:
Optimization scheme for sensor coverage scheduling with bandwidth constraints. Optim. Lett. 3(1): 63-75 (2009) - [j11]Feng Wang, My T. Thai, Ding-Zhu Du:
On the construction of 2-connected virtual backbone in wireless networks. IEEE Trans. Wirel. Commun. 8(3): 1230-1237 (2009) - [c7]Feng Wang, Erika Camacho, Kuai Xu:
Positive Influence Dominating Set in Online Social Networks. COCOA 2009: 313-321 - 2008
- [j10]My T. Thai, Feng Wang, David Hongwei Du, Xiaohua Jia:
Coverage problems in wireless sensor networks: designs and analysis. Int. J. Sens. Networks 3(3): 191-200 (2008) - [j9]Ping Deng, Frank K. Hwang, Weili Wu, David MacCallum, Feng Wang, Taieb Znati:
Improved construction for pooling design. J. Comb. Optim. 15(1): 123-126 (2008) - [j8]Feng Wang, My T. Thai, Yingshu Li, Xiuzhen Cheng, Ding-Zhu Du:
Fault-Tolerant Topology Control for All-to-One and One-to-All Communication in Wireles Networks. IEEE Trans. Mob. Comput. 7(3): 322-331 (2008) - [c6]Kuai Xu, Feng Wang:
Cooperative Monitoring for Internet Data Centers. IPCCC 2008: 111-118 - [r2]Xiuzhen Cheng, Feng Wang, Ding-Zhu Du:
Connected Dominating Set. Encyclopedia of Algorithms 2008 - [r1]Feng Wang, Weili Wu:
Greedy Approximation Algorithms. Encyclopedia of Algorithms 2008 - 2007
- [j7]Feng Wang, Kuai Xu, My T. Thai, Ding-Zhu Du:
Fault tolerant topology control for one-to-all communications in symmetric wireless networks. Int. J. Sens. Networks 2(3/4): 163-168 (2007) - [j6]Feng Wang, David Hongwei Du, Xiaohua Jia, Ping Deng, Weili Wu, David MacCallum:
Non-unique probe selection and group testing. Theor. Comput. Sci. 381(1-3): 29-32 (2007) - [j5]My T. Thai, Feng Wang, Dan Liu, Shiwei Zhu, Ding-Zhu Du:
Connected Dominating Sets in Wireless Networks with Different Transmission Ranges. IEEE Trans. Mob. Comput. 6(7): 721-730 (2007) - [c5]Kuai Xu, Feng Wang, Supratik Bhattacharyya, Zhi-Li Zhang:
A Real-Time Network Traffic Profiling System. DSN 2007: 595-605 - [c4]Chen Wang, My T. Thai, Yingshu Li, Feng Wang, Weili Wu:
Minimum Coverage Breach and Maximum Network Lifetime in Wireless Sensor Networks. GLOBECOM 2007: 1118-1123 - [c3]My T. Thai, Yingshu Li, Feng Wang:
O(log n)-Localized Algorithms on the Coverage Problem in Heterogeneous Sensor Networks. IPCCC 2007: 85-92 - 2006
- [j4]Yingshu Li, My T. Thai, Feng Wang, Ding-Zhu Du:
On the Construction of a Strongly Connected Broadcast Arborescence with Bounded Transmission Delay. IEEE Trans. Mob. Comput. 5(10): 1460-1470 (2006) - 2005
- [j3]Hongwei Du, Xiaohua Jia, Feng Wang, My T. Thai, Yingshu Li:
A Note on Optical Network with Nonsplitting Nodes. J. Comb. Optim. 10(2): 199-202 (2005) - [j2]Longjiang Guo, Weili Wu, Feng Wang, My T. Thai:
An Approximation for Minimum Multicast Route in Optical Networks with Nonsplitting Nodes. J. Comb. Optim. 10(4): 391-394 (2005) - [j1]Yingshu Li, My T. Thai, Feng Wang, Chih-Wei Yi, Peng-Jun Wan, Ding-Zhu Du:
On greedy construction of connected dominating sets in wireless networks. Wirel. Commun. Mob. Comput. 5: 927-932 (2005) - [c2]Feng Wang, Manki Min, Yingshu Li, Ding-Zhu Du:
On the construction of stable virtual backbones in mobile ad-hoc networks. IPCCC 2005: 355-362 - 2004
- [c1]Manki Min, Feng Wang, Ding-Zhu Du, Panos M. Pardalos:
A reliable virtual backbone scheme in mobile ad-hoc networks. MASS 2004: 60-69
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-25 05:59 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint