Profiledroid: Multi-layer profiling of android applications X Wei, L Gomez, I Neamtiu, M Faloutsos Proceedings of the 18th annual international conference on Mobile computing …, 2012 | 305 | 2012 |
Permission evolution in the android ecosystem X Wei, L Gomez, I Neamtiu, M Faloutsos Proceedings of the 28th Annual Computer Security Applications Conference, 31-40, 2012 | 266 | 2012 |
LSTM learning with Bayesian and Gaussian processing for anomaly detection in industrial IoT D Wu, Z Jiang, X Xie, X Wei, W Yu, R Li IEEE Transactions on Industrial Informatics 16 (8), 5244-5253, 2019 | 243 | 2019 |
Malicious android applications in the enterprise: What do they do and how do we fix it? X Wei, L Gomez, I Neamtiu, M Faloutsos 2012 IEEE 28th International Conference on Data Engineering Workshops, 251-254, 2012 | 114 | 2012 |
Competing memes propagation on networks: A network science perspective X Wei, NC Valler, BA Prakash, I Neamtiu, M Faloutsos, C Faloutsos IEEE Journal on Selected Areas in Communications 31 (6), 1049-1060, 2013 | 113 | 2013 |
Optimizing backup optical-network-units selection and backup fibers deployment in survivable hybrid wireless-optical broadband access networks Y Liu, L Guo, X Wei Journal of lightwave technology 30 (10), 1509-1523, 2012 | 83 | 2012 |
Communication-efficient data aggregation tree construction for complex queries in IoT applications B Yin, X Wei IEEE Internet of Things Journal 6 (2), 3352-3363, 2018 | 80 | 2018 |
Entelecheia: Detecting p2p botnets in their waiting stage H Hang, X Wei, M Faloutsos, T Eliassi-Rad 2013 IFIP Networking Conference, 1-9, 2013 | 78 | 2013 |
Competing memes propagation on networks: a case study of composite networks X Wei, N Valler, BA Prakash, I Neamtiu, M Faloutsos, C Faloutsos ACM SIGCOMM Computer Communication Review 42 (5), 5-12, 2012 | 62 | 2012 |
Fingerprinting encrypted voice traffic on smart speakers with deep learning C Wang, S Kennedy, H Li, K Hudson, G Atluri, X Wei, W Sun, B Wang Proceedings of the 13th ACM Conference on Security and Privacy in Wireless …, 2020 | 57 | 2020 |
Robust and integrated grooming for power-and port-cost-efficient design in IP over WDM networks W Hou, L Guo, X Wei Journal of Lightwave Technology 29 (20), 3035-3047, 2011 | 52 | 2011 |
A collaborative privacy-preserving deep learning system in distributed mobile environment M Liu, H Jiang, J Chen, A Badokhon, X Wei, MC Huang 2016 International Conference on Computational Science and Computational …, 2016 | 46 | 2016 |
A cost efficient design of virtual infrastructures with joint node and link mapping H Yu, V Anand, C Qiao, H Di, X Wei Journal of Network and Systems Management 20, 97-115, 2012 | 44 | 2012 |
On finding feasible solutions with shared backup resources for surviving double-link failures in path-protected WDM mesh networks L Guo, L Li, J Cao, H Yu, X Wei Journal of Lightwave Technology 25 (1), 287-296, 2007 | 44 | 2007 |
DIMLOC: Enabling high-precision visible light localization under dimmable LEDs in smart buildings X Liu, X Wei, L Guo IEEE Internet of Things Journal 6 (2), 3912-3924, 2019 | 39 | 2019 |
Turning the signal interference into benefits: Towards indoor self-powered visible light communication for IoT devices in industrial radio-hostile environments X Liu, X Wei, L Guo, Y Liu, Q Song, A Jamalipour IEEE Access 7, 24978-24989, 2019 | 34 | 2019 |
A survey on HTTPS implementation by Android apps: issues and countermeasures X Wei, M Wolf Applied Computing and Informatics 13 (2), 101-117, 2017 | 32 | 2017 |
EdgeLSTM: Towards deep and sequential edge computing for IoT applications D Wu, H Xu, Z Jiang, W Yu, X Wei, J Lu IEEE/ACM Transactions on Networking 29 (4), 1895-1908, 2021 | 31 | 2021 |
Characterizing the behavior of handheld devices and its implications X Wei, NC Valler, HV Madhyastha, I Neamtiu, M Faloutsos Computer Networks 114, 1-12, 2017 | 28 | 2017 |
Multi-granularity and robust grooming in power-and port-cost-efficient IP over WDM networks W Hou, L Guo, X Wei, X Gong Computer networks 56 (10), 2383-2399, 2012 | 25 | 2012 |