Follow
Alex Hai Wang
Alex Hai Wang
Apple, Hitachi, Verisign, Penn State
Verified email at apple.com - Homepage
Title
Cited by
Cited by
Year
Don't follow me: Spam detection in twitter
AH Wang
2010 international conference on security and cryptography (SECRYPT), 1-10, 2010
8422010
Twitter spammer detection using data stream clustering
Z Miller, B Dickinson, W Deitrick, W Hu, AH Wang
Information Sciences 260, 64-73, 2014
4042014
Detecting spam bots in online social networking sites: a machine learning approach
AH Wang
IFIP Annual Conference on Data and Applications Security and Privacy, 335-342, 2010
3682010
Modeling and evaluating the survivability of an intrusion tolerant database system
H Wang, P Liu
Computer Security–ESORICS 2006, 207-224, 2006
442006
Machine learning for the detection of spam in twitter networks
AH Wang
e-Business and Telecommunications: 7th International Joint Conference, ICETE …, 2012
412012
Towards database firewalls
K Bai, H Wang, P Liu
Data and Applications Security XIX, 924-924, 2005
232005
A semi-markov survivability evaluation model for intrusion tolerant database systems
AH Wang, S Yan, P Liu
2010 International Conference on Availability, Reliability and Security, 104-111, 2010
222010
Evaluating the survivability of Intrusion Tolerant Database systems and the impact of intrusion detection deficiencies
H Wang, P Liu, L Li
International Journal of Information and Computer Security 1 (3), 315-340, 2007
162007
Modeling of pollution in p2p file sharing systems
Q Gu, K Bai, H Wang, P Liu, CH Chu
2006 3rd IEEE Consumer Communications and Networking Conference, CCNC 2006 …, 2006
142006
Real-time data attack isolation for commercial database applications
P Liu, H Wang, L Li
Journal of network and computer applications 29 (4), 294-320, 2006
132006
Quantitative survivability evaluation of three virtual machine-based server architectures
Y Yang, Y Zhang, AH Wang, M Yu, W Zang, P Liu, S Jajodia
Journal of network and computer applications 36 (2), 781-790, 2013
102013
Evaluating the impact of intrusion detection deficiencies on the cost-effectiveness of attack recovery
H Wang, P Liu, L Li
Information Security, 146-157, 2004
92004
Pairwise constrained clustering for sparse and high dimensional feature spaces
S Yan, H Wang, D Lee, C Giles
Advances in Knowledge Discovery and Data Mining, 620-627, 2009
62009
Evaluating survivability and costs of three virtual machine based server architectures
M Yu, AH Wang, W Zang, P Liu
2010 International Conference on Security and Cryptography (SECRYPT), 1-8, 2010
52010
Costco: Robust content and structure constrained clustering of networked documents
S Yan, D Lee, AH Wang
Computational Linguistics and Intelligent Text Processing: 12th …, 2011
22011
A Stochastic Model of the Damage Propagation in Database Systems.
AH Wang, S Yan
Security and Management, 3-9, 2009
22009
The system can't perform the operation now. Try again later.
Articles 1–16