Follow
Wei Chen
Wei Chen
Verified email at njupt.edu.cn
Title
Cited by
Cited by
Year
Defending against TCP SYN flooding attacks under different types of IP spoofing
W Chen, DY Yeung
International Conference on Networking, International Conference on Systems …, 2006
1182006
物联网安全特征与关键技术
杨庚, 许建, 陈伟, 祁正华, 王海勇
南京邮电大学学报: 自然科学版 30 (004), 20-29, 2010
1092010
Building auto-encoder intrusion detection system based on random forest feature selection
XK Li, W Chen, Q Zhang, L Wu
Computers & Security 95, 101851, 2020
932020
An active detecting method against SYN flooding attack
B Xiao, W Chen, Y He, EHM Sha
11th International Conference on Parallel and Distributed Systems (ICPADS'05 …, 2005
612005
A novel approach to detecting DDoS attacks at an early stage
B Xiao, W Chen, Y He
The Journal of Supercomputing 36 (3), 235-248, 2006
482006
An autonomous defense against SYN flooding attacks: Detect and throttle attacks at the victim side independently
B Xiao, W Chen, Y He
Journal of Parallel and Distributed Computing 68 (4), 456-470, 2008
432008
一种轻量级的拒绝服务攻击检测方法
陈伟, 何炎祥, 彭文灵
计算机学报 29 (8), 1392-1400, 2006
33*2006
Throttling spoofed SYN flooding traffic at the source
W Chen, DY Yeung
Telecommunication Systems 33 (1), 47-65, 2006
252006
A crowd-sourcing indoor localization algorithm via optical camera on a smartphone assisted by wi-fi fingerprint RSSI
W Chen, W Wang, Q Li, Q Chang, H Hou
Sensors 16 (3), 410, 2016
212016
A novel clustering and KWNN-based strategy for Wi-Fi fingerprint indoor localization
W Chen, Q Chang, H Hou, W Wang
2015 4th International Conference on Computer Science and Network Technology …, 2015
212015
Predictive value of left atrial appendage lobes on left atrial thrombus or spontaneous echo contrast in patients with non-valvular atrial fibrillation
F Wang, M Zhu, X Wang, W Zhang, Y Su, Y Lu, X Pan, D Gao, X Zhang, ...
BMC cardiovascular disorders 18 (1), 1-11, 2018
182018
Scalable indoor localization via mobile crowdsourcing and gaussian process
Q Chang, Q Li, Z Shi, W Chen, W Wang
Sensors 16 (3), 381, 2016
172016
Defending against jamming attacks in wireless local area networks
W Chen, D Chen, G Sun, Y Zhang
International Conference on Autonomic and Trusted Computing, 519-528, 2007
152007
Ontology based cooperative intrusion detection system
Y He, W Chen, M Yang, W Peng
IFIP International Conference on Network and Parallel Computing, 419-426, 2004
132004
无线传感器网络安全
杨庚, 陈伟, 曹晓梅
科学出版社, 2010
122010
An adaptive push-styled command and control mechanism in mobile botnets
W Chen, P Gong, L Yu, G Yang
Wuhan University Journal of Natural Sciences 18 (5), 427-434, 2013
112013
CloudBot: Advanced mobile botnets using ubiquitous cloud technologies
W Chen, X Luo, C Yin, B Xiao, MH Au, Y Tang
Pervasive and Mobile Computing 41, 270-285, 2017
102017
Security characteristic and technology in the Internet of Things
Y Geng, X Jian, C Wei, Q Zheng-Hua, W Hai-Yong
Journal of Nanjing University of Posts and Telecommunications (Natural …, 2010
102010
无线钓鱼接入点攻击与检测技术研究综述
陈伟, 顾杨, 李晨阳, 吴震雄
武汉大学学报: 理学版, 13-23, 2014
82014
Detecting SYN flooding attacks near innocent side
Y He, W Chen, B Xiao
International Conference on Mobile Ad-Hoc and Sensor Networks, 443-452, 2005
82005
The system can't perform the operation now. Try again later.
Articles 1–20