default search action
Songjie Wei
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j10]Dong Yang, Wei Chen, Songjie Wei:
DTFA: Adversarial attack with discrete cosine transform noise and target features on deep neural networks. IET Image Process. 17(5): 1464-1477 (2023) - [j9]Dong Yang, Ze Liu, Songjie Wei:
Interactive Learning for Network Anomaly Monitoring and Detection with Human Guidance in the Loop. Sensors 23(18): 7803 (2023) - [c24]Dong Yang, Can Zhou, Songjie Wei:
A Light-Weighted Model of GRU + CNN Hybrid for Network Intrusion Detection. ICIC (5) 2023: 314-326 - 2022
- [c23]Zedong Zhang, Hao-Tong Shen, Songjie Wei:
Network Anomaly Detection based on Traffic Clustering with Group-Entropy Similarity. ISNCC 2022: 1-5 - 2021
- [j8]Songjie Wei, Zedong Zhang, Shasha Li, Pengfei Jiang:
Calibrating Network Traffic with One-Dimensional Convolutional Neural Network with Autoencoder and Independent Recurrent Neural Network for Mobile Malware Detection. Secur. Commun. Networks 2021: 6695858:1-6695858:10 (2021) - [j7]Sajjad Bagheri Baba Ahmadi, Gongxuan Zhang, Songjie Wei, Lynda Boukela:
An intelligent and blind image watermarking scheme based on hybrid SVD transforms using human visual system characteristics. Vis. Comput. 37(2): 385-409 (2021) - [c22]Shasha Li, Xiaodong Bai, Songjie Wei:
Blockchain-based Crowdsourcing Task Management and Solution Verification Method. CSE 2021: 108-115 - 2020
- [j6]Pengfei Jiang, Songjie Wei:
基于深度森林与CWGAN-GP的移动应用网络行为分类与评估 (Classification and Evaluation of Mobile Application Network Behavior Based on Deep Forest and CWGAN-GP). 计算机科学 47(1): 287-292 (2020) - [j5]Sajjad Bagheri Baba Ahmadi, Gongxuan Zhang, Songjie Wei:
Robust and hybrid SVD-based image watermarking schemes. Multim. Tools Appl. 79(1-2): 1075-1117 (2020) - [c21]Weilong Lv, Songjie Wei, Shasha Li, Minghui Yu:
Verifiable Blockchain Redacting Method for a Trusted Consortium with Distributed Chameleon Hash Authority. CSoNet 2020: 295-306 - [c20]Wei Yang, Hailong Zhang, Yansong Gao, Anmin Fu, Songjie Wei:
Side-Channel Leakage Detection Based on Constant Parameter Channel Model. ICCD 2020: 553-560
2010 – 2019
- 2019
- [j4]Chanying Huang, Songjie Wei, Anmin Fu:
An Efficient Privacy-Preserving Attribute-Based Encryption with Hidden Policy for Cloud Storage. J. Circuits Syst. Comput. 28(11): 1950186:1-1950186:18 (2019) - [c19]Jiahe Wang, Songjie Wei, Haozhe Liu:
Decentralized Identity Authentication with Trust Distributed in Blockchain Backbone. ICBC 2019: 202-210 - [c18]Erik Joseph Seidel, Songjie Wei:
'The ZNSL Network': A Novel Approach to Virtual Networking. ISNCC 2019: 1-4 - 2018
- [j3]Songjie Wei, Shuai Li, Peilong Liu, Meilin Liu:
BAVP: Blockchain-Based Access Verification Protocol in LEO Constellation Using IBE Keys. Secur. Commun. Networks 2018: 7202806:1-7202806:14 (2018) - [c17]Chanying Huang, Songjie Wei, Kedong Yan, Gongxuan Zhang, Anmin Fu:
A Privacy-Preserving Attribute-Based Authentication Scheme for Cloud Computing. APSIPA 2018: 260-265 - [c16]Bing Mo, Kuiren Su, Songjie Wei, Cai Liu, Jianping Guo:
A Solution for Internet of Things based on Blockchain Technology. SOLI 2018: 112-117 - [c15]Songjie Wei, Pengfei Jiang, Qiuzhuang Yuan, Jiahe Wang:
Mobile Application Network Behavior Detection and Evaluation with WGAN and Bi-LSTM. TENCON 2018: 44-49 - 2017
- [c14]Qianrong Luo, Songjie Wei, Hao Cheng, Milin Ren:
A cooperative framework for region crowdedness sensing in VANETs. ICCC 2017: 1-6 - [c13]Songjie Wei, Hao Cheng, Meilin Liu, Milin Ren:
Optimal Strategy Routing in LEO Satellite Network Based on Cooperative Game Theory. SINC 2017: 159-172 - [c12]Songjie Wei, Qianqian Wu, Milin Ren:
Relacha: Using Associative Meaning for Image Captcha Understandability. SpaCCS 2017: 353-367 - [c11]Shuai Li, Meilin Liu, Songjie Wei:
A Distributed Authentication Protocol Using Identity-Based Encryption and Blockchain for LEO Network. SpaCCS 2017: 446-460 - [c10]Songjie Wei, Qianrong Luo, Hao Cheng, Erik Joseph Seidel:
Cluster Based VDTN Routing Algorithm with Multi-attribute Decision Making. WorldCIST (2) 2017: 332-342 - 2016
- [c9]Hao Cheng, Meilin Liu, Songjie Wei, Bilei Zhou:
A Distributed Algorithm for Self-adaptive Routing in LEO Satellite Network. SINC 2016: 274-286 - 2015
- [j2]Songjie Wei, Ling Yang:
基于分层API调用的Android恶意代码静态描述方法 (Android Malware Characterization Based on Static Analysis of Hierarchical API Usage). 计算机科学 42(1): 155-158 (2015) - 2010
- [j1]Songjie Wei, Alefiya Hussain, Jelena Mirkovic, Calvin Ko:
Tools for worm experimentation on the DETER testbed. Int. J. Commun. Networks Distributed Syst. 5(1/2): 151-171 (2010)
2000 – 2009
- 2009
- [c8]Songjie Wei, Subrata Mazumdar:
Web-based administration of grid credentials for identity and authority delegation. Integrated Network Management 2009: 775-789 - [c7]Songjie Wei, Calvin Ko, Jelena Mirkovic, Alefiya Hussain:
Tools for worm experimentation on the DETER testbed. TRIDENTCOM 2009: 1-10 - 2008
- [c6]Songjie Wei, Jelena Mirkovic:
Correcting congestion-based error in network telescope's observations of worm dynamics. Internet Measurement Conference 2008: 125-130 - 2007
- [c5]Jelena Mirkovic, Songjie Wei, Alefiya Hussain, Brett Wilson, Roshan K. Thomas, Stephen Schwab, Sonia Fahmy, Roman Chertov, Peter L. Reiher:
DDoS Benchmarks and Experimenter's Workbench for the DETER Testbed. TRIDENTCOM 2007: 1-7 - 2006
- [c4]Songjie Wei, Jelena Mirkovic, Ezra Kissel:
Profiling and Clustering Internet Hosts. DMIN 2006: 269-275 - [c3]Songjie Wei, Jelena Mirkovic:
A realistic simulation of internet-scale events. VALUETOOLS 2006: 28 - [c2]Songjie Wei, Jelena Mirkovic:
Building Reputations for Internet Clients. STM 2006: 17-30 - 2005
- [c1]Songjie Wei, Jelena Mirkovic, D. Martin Swany:
Distributed Worm Simulation with a Realistic Internet Model. PADS 2005: 71-79
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-08 20:11 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint