default search action
Weixuan Mao
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [c11]Ruwang Wen, Zhengxiang Cheng, Weixuan Mao, Zhuolin Mei, Jiaoli Shi, Xiao Cheng:
HMGR: A Hybrid Model for Geolocation Recommendation. BigData 2023: 48-62 - [c10]Zhengxiang Cheng, Weixuan Mao, Ruwang Wen, Zhuolin Mei, Bin Wu, Jiaoli Shi, Xiao Cheng:
Secure and Fast Query Approach for High-Precision Multi-dimensional Satellite Remote Sensing Data. EDGE 2023: 69-81 - [c9]Xiaoyu Liu, Weixuan Mao, Anqi Wang, Zheng Li, Hui Xue, Yijing Zhang, Jianjun Lin, Xiaodu Yang, Ziqian Chen, Bo Sun:
DNS Tunnel Detection for Low Throughput Data Exfiltration via Time-Frequency Domain Analysis. ICC 2023: 2331-2337 - [c8]Weixuan Mao, Ruwang Wen, Zhengxiang Cheng, Zhuolin Mei, Haibin Wang, Bin Wu, Jiaoli Shi:
A Location Recommendation Model Based on User Behavior and Sequence Influence. ICIOT 2023: 18-30 - [c7]Hui Xue, Bo Sun, Weixuan Mao:
Linking User Identities Across Social Networks via Frequency Domain Analysis. IFIP Networking 2023: 1-8 - 2022
- [c6]Hui Xue, Bo Sun, Weixuan Mao, Jianjun Lin, Yijing Zhang, Xiaoyu Liu, Xiaodu Yang, Ziqian Chen:
Spatial Density-based User Identity Linkage across Social Networks. IEEE Big Data 2022: 656-664 - 2020
- [j5]Yingjie Wang, Guangquan Xu, Xing Liu, Weixuan Mao, Chengxiang Si, Witold Pedrycz, Wei Wang:
Identifying vulnerabilities of SSL/TLS certificate verification in Android apps with static and dynamic analysis. J. Syst. Softw. 167: 110609 (2020)
2010 – 2019
- 2019
- [j4]Weixuan Mao, Bo Sun, Guangquan Xu, Cheng Liu, Chengxiang Si, Wei Wang:
Understanding Effects of Collaborations in Developing Mobile Computing Systems: Popularity, Efficiency, and Quality. IEEE Access 7: 33380-33392 (2019) - [j3]Weixuan Mao, Zhongmin Cai, Bo Zeng, Xiaohong Guan:
Learning edge weights in file co-occurrence graphs for malware detection. Data Min. Knowl. Discov. 33(1): 168-203 (2019) - [c5]Yingjie Wang, Xing Liu, Weixuan Mao, Wei Wang:
DCDroid: automated detection of SSL/TLS certificate verification vulnerabilities in Android apps. ACM TUR-C 2019: 137:1-137:9 - [c4]Muyue Feng, Weixuan Mao, Zimu Yuan, Yang Xiao, Gu Ban, Wei Wang, Shiyang Wang, Qian Tang, Jiahuan Xu, He Su, Binghong Liu, Wei Huo:
Open-Source License Violations of Binary Software at Large Scale. SANER 2019: 564-568 - 2018
- [j2]Weixuan Mao, Zhongmin Cai, Yuan Yang, Xiaohong Shi, Xiaohong Guan:
From big data to knowledge: A spatio-temporal approach to malware detection. Comput. Secur. 74: 167-183 (2018) - 2017
- [j1]Weixuan Mao, Zhongmin Cai, Don Towsley, Qian Feng, Xiaohong Guan:
Security importance assessment for system objects and malware detection. Comput. Secur. 68: 47-68 (2017) - 2015
- [c3]Yuan Yang, Zhongmin Cai, Weixuan Mao, Zhihai Yang:
Identifying Intrusion Infections via Probabilistic Inference on Bayesian Network. DIMVA 2015: 307-326 - [c2]Weixuan Mao, Zhongmin Cai, Don Towsley, Xiaohong Guan:
Probabilistic Inference on Integrity for Access Behavior Based Malware Detection. RAID 2015: 155-176 - 2014
- [c1]Weixuan Mao, Zhongmin Cai, Xiaohong Guan, Don Towsley:
Centrality metrics of importance in access behaviors and malware detections. ACSAC 2014: 376-385
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-04 20:59 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint