A moving-target defense strategy for cloud-based services with heterogeneous and dynamic attack surfaces W Peng, F Li, CT Huang, X Zou 2014 IEEE International Conference on Communications (ICC), 804-809, 2014 | 102 | 2014 |
Minimizing energy consumptions in wireless sensor networks via two-modal transmission Y Liang, W Peng ACM SIGCOMM Computer Communication Review 40 (1), 12-18, 2010 | 88 | 2010 |
A two-stage deanonymization attack against anonymized social networks W Peng, F Li, X Zou, J Wu IEEE Transactions on computers 63 (2), 290-303, 2012 | 70 | 2012 |
Android malware detection via graphlet sampling T Gao, W Peng, D Sisodia, TK Saha, F Li, M Al Hasan IEEE Transactions on Mobile Computing 18 (12), 2754-2767, 2018 | 43 | 2018 |
Behavioral malware detection in delay tolerant networks W Peng, F Li, X Zou, J Wu IEEE Transactions on Parallel and Distributed systems 25 (1), 53-63, 2013 | 43 | 2013 |
Assurable, transparent, and mutual restraining e-voting involving multiple conflicting parties X Zou, H Li, Y Sui, W Peng, F Li IEEE INFOCOM 2014-IEEE Conference on Computer Communications, 136-144, 2014 | 32 | 2014 |
T-dominance: Prioritized defense deployment for BYOD security W Peng, F Li, KJ Han, X Zou, J Wu 2013 IEEE Conference on Communications and Network Security (CNS), 37-45, 2013 | 31 | 2013 |
Seed and grow: An attack against anonymized social networks W Peng, F Li, X Zou, J Wu 2012 9th annual IEEE communications society conference on sensor, mesh and …, 2012 | 26 | 2012 |
Smartphone strategic sampling in defending enterprise network security F Li, W Peng, CT Huang, X Zou 2013 IEEE International Conference on Communications (ICC), 2155-2159, 2013 | 16 | 2013 |
The virtue of patience: Offloading topical cellular content through opportunistic links W Peng, F Li, X Zou, J Wu 2013 IEEE 10th International Conference on Mobile Ad-Hoc and Sensor Systems …, 2013 | 15 | 2013 |
A privacy-preserving social-aware incentive system for word-of-mouth advertisement dissemination on smart mobile devices W Peng, F Li, X Zou, J Wu 2012 9th Annual IEEE Communications Society Conference on Sensor, Mesh and …, 2012 | 15 | 2012 |
A mutual agreement signature scheme for secure data provenance M Rangwala, Z Liang, W Peng, X Zou, F Li environments 13 (14), 726-733, 2016 | 14 | 2016 |
Transparent, auditable, and stepwise verifiable online e-voting enabling an open and fair election X Zou, H Li, F Li, W Peng, Y Sui Cryptography 1 (2), 13, 2017 | 13 | 2017 |
Feedback-based smartphone strategic sampling for BYOD security F Li, CT Huang, J Huang, W Peng 2014 23rd international conference on computer communication and networks …, 2014 | 10 | 2014 |
A viewable e-voting scheme for environments with conflict of interest H Li, Y Sui, W Peng, X Zou, F Li 2013 IEEE Conference on Communications and Network Security (CNS), 251-259, 2013 | 9 | 2013 |
Moving target defense for cloud infrastructures: Lessons from botnets W Peng, F Li, X Zou High Performance Cloud Auditing and Applications, 35-64, 2013 | 8 | 2013 |
ACTS: Extracting Android App Topological Signature through Graphlet Sampling W Peng, T Gao, D Sisodia, TK Saha, F Li, M Al Hasan | 7 | 2016 |
Behavioral detection and containment of proximity malware in delay tolerant networks W Peng, F Li, X Zou, J Wu 2011 IEEE Eighth International Conference on Mobile Ad-Hoc and Sensor …, 2011 | 7 | 2011 |
Temporal coverage based content distribution in heterogeneous smart device networks W Peng, F Li, X Zou 2015 IEEE International Conference on Communications (ICC), 3477-3482, 2015 | 2 | 2015 |
Create moving target defense in static networks by learning from botnets F Li, X Zou, W Peng Proceedings of the 13th Annual Information Security Symposium, 1, 2012 | 1 | 2012 |