- conference
-
ACTS: extracting Android app topological signature through graphlet sampling
Wei Peng, Tianchong Gao, Devkishen Sisodia, Tanay Kumar Saha, Feng Li, and Mohammad Al Hasan
IEEE conference on communications and network security (CNS), 2016.
[paper] [bib]
-
temporal coverage based content distribution in heterogeneous smart device networks
Wei Peng, Feng Li, and Xukai Zou
IEEE international conference on communications (ICC), 2015.
[paper] [bib] [slides]
-
a moving-target defense strategy for cloud-based services with heterogeneous and dynamic attack surfaces
Wei Peng, Feng Li, Chin-Tser Huang, and Xukai Zou
IEEE international conference on communications (ICC), 2014.
[paper] [bib] [slides]
-
the virtue of patience: offloading topical cellular content through opportunistic links
Wei Peng, Feng Li, Xukai Zou, and Jie Wu
IEEE international conference on mobile ad-hoc and sensor systems (MASS), 2013.
[paper] [bib] [slides]
-
T-dominance: prioritized defense deployment for BYOD security
Wei Peng, Feng Li, Keesook J Han, Xukai Zou, and Jie Wu
IEEE conference on communications and network security (CNS), 2013.
[paper] [bib] [slides]
-
smartphone strategic sampling in defending enterprise network security
Feng Li, Wei Peng, Chin-Tser Huang, and Xukai Zou
IEEE international conference on communications (ICC), 2013.
[paper] [bib]
-
Seed and Grow: an attack against anonymized social networks
Wei Peng, Feng Li, Xukai Zou, and Jie Wu
IEEE communications society conference on sensor, mesh and ad hoc communications and networks (SECON), 2012.
[paper] [bib] [slides]
-
a privacy-preserving social-aware incentive system for word-of-mouth advertisement dissemination on smart mobile devices
Wei Peng, Feng Li, Xukai Zou, and Jie Wu
IEEE communications society conference on sensor, mesh and ad hoc communications and networks (SECON), 2012.
[paper] [bib] [slides]
-
behavioral detection and containment of proximity malware
in delay tolerant networks
Wei Peng, Feng Li, Xukai Zou, and Jie Wu
IEEE international conference on mobile ad-hoc and sensor systems (MASS), 2011.
[paper] [bib] [slides]
- journal
-
behavioral malware detection in delay tolerant networks
Wei Peng, Feng Li, Xukai Zou, and Jie Wu
IEEE transactions on parallel and distributed systems (TPDS), 2014.
[article] [supplementary doc] [bib]
-
a two-stage deanonymization attack against anonymized social networks
Wei Peng, Feng Li, Xukai Zou, and Jie Wu
IEEE transactions on computers (TC), 2014.
[article] [bib]
-
minimizing energy consumptions in wireless sensor networks via two-modal transmission
Yao Liang and Wei Peng
ACM SIGCOMM computer communication review (CCR), Vol. 40, No. 1, pp. 12-18, 2010.
[article] [bib]
- book chapter
-
moving-target defense for cloud infrastructure: lessons from
botnets
Wei Peng, Feng Li, Keesook J. Han, and Xukai Zou
high performance semantic cloud auditing and applications (New York: Springer Verlag, 2014).
-
literature research
-
find a publication venue
-
good readings
-
keep it real: the Linux kernel
-
information sources
-
fun