Mao, Weixuan
61  results:
Search for persons X
?
1

A Location Recommendation Model Based on User Behavior and ..:

, In: Lecture Notes in Computer Science; Internet of Things – ICIOT 2023,
Mao, Weixuan ; Wen, Ruwang ; Cheng, Zhengxiang... - p. 18-30 , 2024
 
?
2

Secure and Fast Query Approach for High-Precision Multi-dim..:

, In: Edge Computing – EDGE 2023; Lecture Notes in Computer Science,
Cheng, Zhengxiang ; Mao, Weixuan ; Wen, Ruwang... - p. 69-81 , 2024
 
?
3

DNS Tunnel Detection for Low Throughput Data Exfiltration v..:

, In: ICC 2023 - IEEE International Conference on Communications,
Liu, Xiaoyu ; Mao, Weixuan ; Wang, Anqi... - p. 2331-2337 , 2023
 
?
4

HMGR: A Hybrid Model for Geolocation Recommendation:

, In: Big Data – BigData 2023; Lecture Notes in Computer Science,
Wen, Ruwang ; Cheng, Zhengxiang ; Mao, Weixuan... - p. 48-62 , 2023
 
?
5

Linking User Identities Across Social Networks via Frequenc..:

, In: 2023 IFIP Networking Conference (IFIP Networking),
Xue, Hui ; Sun, Bo ; Mao, Weixuan - p. 1-8 , 2023
 
?
6

Spatial Density-based User Identity Linkage across Social N..:

, In: 2022 IEEE International Conference on Big Data (Big Data),
Xue, Hui ; Sun, Bo ; Mao, Weixuan... - p. 656-664 , 2022
 
?
7

Identifying vulnerabilities of SSL/TLS certificate verifica..:

Wang, Yingjie ; Xu, Guangquan ; Liu, Xing...
Journal of Systems and Software.  167 (2020)  - p. 110609 , 2020
 
?
10

DCDroid : automated detection of SSL/TLS certificate ver..:

, In: Proceedings of the ACM Turing Celebration Conference - China,
Wang, Yingjie ; Liu, Xing ; Mao, Weixuan. - p. 1-9 , 2019
 
?
11

Learning edge weights in file co-occurrence graphs for malw..:

Mao, Weixuan ; Cai, Zhongmin ; Zeng, Bo.
Data Mining and Knowledge Discovery.  33 (2018)  1 - p. 168-203 , 2018
 
?
12

Malware Detection via Graph Based Access Behavioral Descrip..:

, In: Advances in Intelligent Systems and Computing; Recent Developments in Mechatronics and Intelligent Robotics,
Zhao, Zhihui ; Wang, Minle ; Mao, Weixuan. - p. 1247-1253 , 2018
 
?
15

Centrality metrics of importance in access behaviors and ma..:

, In: Proceedings of the 30th Annual Computer Security Applications Conference,
Mao, Weixuan ; Cai, Zhongmin ; Guan, Xiaohong. - p. 376-385 , 2014
 
1-15