Follow
Wei Peng
Wei Peng
Unknown affiliation
Verified email at google.com - Homepage
Title
Cited by
Cited by
Year
A moving-target defense strategy for cloud-based services with heterogeneous and dynamic attack surfaces
W Peng, F Li, CT Huang, X Zou
2014 IEEE International Conference on Communications (ICC), 804-809, 2014
1012014
Minimizing energy consumptions in wireless sensor networks via two-modal transmission
Y Liang, W Peng
ACM SIGCOMM Computer Communication Review 40 (1), 12-18, 2010
852010
A two-stage deanonymization attack against anonymized social networks
W Peng, F Li, X Zou, J Wu
IEEE Transactions on computers 63 (2), 290-303, 2012
712012
Android malware detection via graphlet sampling
T Gao, W Peng, D Sisodia, TK Saha, F Li, M Al Hasan
IEEE Transactions on Mobile Computing 18 (12), 2754-2767, 2018
402018
Behavioral malware detection in delay tolerant networks
W Peng, F Li, X Zou, J Wu
IEEE Transactions on Parallel and Distributed systems 25 (1), 53-63, 2013
402013
Assurable, transparent, and mutual restraining e-voting involving multiple conflicting parties
X Zou, H Li, Y Sui, W Peng, F Li
IEEE INFOCOM 2014-IEEE Conference on Computer Communications, 136-144, 2014
322014
T-dominance: Prioritized defense deployment for BYOD security
W Peng, F Li, KJ Han, X Zou, J Wu
2013 IEEE Conference on Communications and Network Security (CNS), 37-45, 2013
312013
Seed and grow: An attack against anonymized social networks
W Peng, F Li, X Zou, J Wu
2012 9th annual IEEE communications society conference on sensor, mesh and …, 2012
272012
Smartphone strategic sampling in defending enterprise network security
F Li, W Peng, CT Huang, X Zou
2013 IEEE International Conference on Communications (ICC), 2155-2159, 2013
162013
The virtue of patience: Offloading topical cellular content through opportunistic links
W Peng, F Li, X Zou, J Wu
2013 IEEE 10th International Conference on Mobile Ad-Hoc and Sensor Systems …, 2013
152013
A privacy-preserving social-aware incentive system for word-of-mouth advertisement dissemination on smart mobile devices
W Peng, F Li, X Zou, J Wu
2012 9th Annual IEEE Communications Society Conference on Sensor, Mesh and …, 2012
152012
A mutual agreement signature scheme for secure data provenance
M Rangwala, Z Liang, W Peng, X Zou, F Li
environments 13 (14), 726-733, 2016
132016
Transparent, auditable, and stepwise verifiable online e-voting enabling an open and fair election
X Zou, H Li, F Li, W Peng, Y Sui
Cryptography 1 (2), 13, 2017
122017
Feedback-based smartphone strategic sampling for BYOD security
F Li, CT Huang, J Huang, W Peng
2014 23rd international conference on computer communication and networks …, 2014
102014
A viewable e-voting scheme for environments with conflict of interest
H Li, Y Sui, W Peng, X Zou, F Li
2013 IEEE Conference on Communications and Network Security (CNS), 251-259, 2013
92013
Moving target defense for cloud infrastructures: Lessons from botnets
W Peng, F Li, X Zou
High Performance Cloud Auditing and Applications, 35-64, 2013
82013
ACTS: Extracting Android App Topological Signature through Graphlet Sampling
W Peng, T Gao, D Sisodia, TK Saha, F Li, M Al Hasan
72016
Behavioral detection and containment of proximity malware in delay tolerant networks
W Peng, F Li, X Zou, J Wu
2011 IEEE Eighth International Conference on Mobile Ad-Hoc and Sensor …, 2011
72011
Temporal coverage based content distribution in heterogeneous smart device networks
W Peng, F Li, X Zou
2015 IEEE International Conference on Communications (ICC), 3477-3482, 2015
22015
Create moving target defense in static networks by learning from botnets
F Li, X Zou, W Peng
Proceedings of the 13th Annual Information Security Symposium, 1, 2012
12012
The system can't perform the operation now. Try again later.
Articles 1–20