Detection of malicious behavior in android apps through API calls and permission uses analysis M Yang, S Wang, Z Ling, Y Liu, Z Ni Concurrency and Computation: Practice and Experience 29 (19), e4172, 2017 | 34 | 2017 |
On Private Data Collection of Hyperledger Fabric S Wang, M Yang, Y Zhang, Y Luo, T Ge, X Fu, W Zhao 2021 IEEE 41st International Conference on Distributed Computing Systems …, 2021 | 22 | 2021 |
BBS: A Blockchain Big-Data Sharing System S Wang, M Yang, T Ge, Y Luo, X Fu ICC 2022-IEEE International Conference on Communications, 4205-4210, 2022 | 7 | 2022 |
Implication of Animation on Android Security S Wang, Z Ling, Y Zhang, R Liu, J Kraunelis, K Jia, B Pearson, X Fu 2022 IEEE 42nd International Conference on Distributed Computing Systems …, 2022 | 5 | 2022 |
On Automating BACnet Device Discovery and Property Identification M Cash, S Wang, B Pearson, Q Zhou, X Fu ICC 2021-IEEE International Conference on Communications, 1-6, 2021 | 5 | 2021 |
On False Data Injection Attack against Building Automation Systems M Cash, C Morales-Gonzalez, S Wang, X Jin, A Parlato, J Zhu, QZ Sun, ... 2023 International Conference on Computing, Networking and Communications …, 2023 | 4 | 2023 |
On Security of Proof-of-Policy (PoP) in the Execute-Order-Validate Blockchain Paradigm S Wang, M Yang, B Pearson, T Ge, X Fu, W Zhao 2022 IEEE Conference on Communications and Network Security (CNS), 317-325, 2022 | 1 | 2022 |
BBS: A secure and autonomous blockchain-based big-data sharing system S Wang, M Yang, S Jiang, F Chen, Y Zhang, X Fu Journal of Systems Architecture 150, 103133, 2024 | | 2024 |