default search action
Junfeng Wang 0003
Person information
- affiliation: Sichuan University, School of Aeronautics and Astronautics / College of Computer Science, Chengdu, China
- affiliation (PhD 2004): University of Electronic Science and Technology of China, Chengdu, China
Other persons with the same name
- Junfeng Wang — disambiguation page
- Junfeng Wang 0001 — Shanghai Jiao Tong University, School of Electronic Information and Electrical Engineering, China (and 1 more)
- Junfeng Wang 0002 — Beijing Jiaotong University, State Key Laboratory of Rail Traffic Control and Safety, China
- Junfeng Wang 0004 — George Washington University, Department of Mechanical and Aerospace Engineering, USA (and 1 more)
- Junfeng Wang 0005 — Massachusetts Institute of Technology, Cambridge, MA, USA
- Junfeng Wang 0006 — Tianjin University of Technology, Tianjin, China (and 1 more)
- Junfeng Wang 0007 — Huazhong University of Science and Technology, Wuhan, China
- Junfeng Wang 0008 — Sichuan University, Chengdu, China (and 1 more)
- Junfeng Wang 0009 — Baidu, Beijing, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j60]Wenhan Ge, Junfeng Wang:
SeqMask: Behavior Extraction Over Cyber Threat Intelligence Via Multi-Instance Learning. Comput. J. 67(1): 253-273 (2024) - [j59]Jiaxuan Geng, Junfeng Wang, Zhiyang Fang, Yingjie Zhou, Di Wu, Wenhan Ge:
A survey of strategy-driven evasion methods for PE malware: Transformation, concealment, and attack. Comput. Secur. 137: 103595 (2024) - [j58]Xiansheng Cao, Junfeng Wang, Peng Wu, Zhiyang Fang:
VulMPFF: A Vulnerability Detection Method for Fusing Code Features in Multiple Perspectives. IET Inf. Secur. 2024: 1-15 (2024) - [j57]Shuangcheng Li, Zhangguo Tang, Huanzhou Li, Jian Zhang, Han Wang, Junfeng Wang:
GMADV: An android malware variant generation and classification adversarial training framework. J. Inf. Secur. Appl. 84: 103800 (2024) - [j56]Tingting Lu, Junfeng Wang:
DOMR: Toward Deep Open-World Malware Recognition. IEEE Trans. Inf. Forensics Secur. 19: 1455-1468 (2024) - [j55]Wenhan Ge, Zeyuan Cui, Junfeng Wang, Binhui Tang, Xiaohui Li:
MetaCluster: A Universal Interpretable Classification Framework for Cybersecurity. IEEE Trans. Inf. Forensics Secur. 19: 3829-3843 (2024) - 2023
- [j54]Binhui Tang, Xiaohui Li, Junfeng Wang, Wenhan Ge, Zhongkun Yu, Tongcan Lin:
STIOCS: Active learning-based semi-supervised training framework for IOC extraction. Comput. Electr. Eng. 112: 108981 (2023) - [j53]Zhongkun Yu, Junfeng Wang, Binhui Tang, Li Lu:
Tactics And Techniques Classification In Cyber Threat Intelligence. Comput. J. 66(8): 1870-1881 (2023) - [j52]Yinwei Wu, Meijin Li, Qi Zeng, Tao Yang, Junfeng Wang, Zhiyang Fang, Luyu Cheng:
DroidRL: Feature selection for android malware detection with reinforcement learning. Comput. Secur. 128: 103126 (2023) - [j51]Wenhan Ge, Junfeng Wang, Tongcan Lin, Binhui Tang, Xiaohui Li:
Explainable cyber threat behavior identification based on self-adversarial topic generation. Comput. Secur. 132: 103369 (2023) - [j50]Zihua Song, Junfeng Wang, Kaiyuan Yang, Jigang Wang:
HGIVul: Detecting inter-procedural vulnerabilities based on hypergraph convolution. Inf. Softw. Technol. 160: 107219 (2023) - [j49]Kaiyuan Yang, Junfeng Wang, Zihua Song:
Learning a holistic and comprehensive code representation for code summarization. J. Syst. Softw. 203: 111746 (2023) - 2022
- [j48]Meijin Li, Zhiyang Fang, Junfeng Wang, Luyu Cheng, Qi Zeng, Tao Yang, Yinwei Wu, Jiaxuan Geng:
A Systematic Overview of Android Malware Detection. Appl. Artif. Intell. 36(1) (2022) - [j47]Binhui Tang, Junfeng Wang, Zhongkun Yu, Bohan Chen, Wenhan Ge, Jian Yu, Tingting Lu:
Advanced Persistent Threat intelligent profiling technique: A survey. Comput. Electr. Eng. 103: 108261 (2022) - [j46]Tingting Lu, Junfeng Wang:
F2DC: Android malware classification based on raw traffic and neural networks. Comput. Networks 217: 109320 (2022) - [j45]Kaiyuan Yang, Junfeng Wang, Zhiyang Fang, Peng Wu, Zihua Song:
Enhancing software modularization via semantic outliers filtration and label propagation. Inf. Softw. Technol. 145: 106818 (2022) - [j44]Baoguo Yuan, Junfeng Wang, Peng Wu, Xianguo Qing:
IoT Malware Classification Based on Lightweight Convolutional Neural Networks. IEEE Internet Things J. 9(5): 3770-3783 (2022) - [j43]Qi Li, Mingyu Cheng, Junfeng Wang, Bowen Sun:
LSTM Based Phishing Detection for Big Email Data. IEEE Trans. Big Data 8(1): 278-288 (2022) - [i3]Yinwei Wu, Meijin Li, Junfeng Wang, Zhiyang Fang, Qi Zeng, Tao Yang, Luyu Cheng:
DroidRL: Reinforcement Learning Driven Feature Selection for Android Malware Detection. CoRR abs/2203.02719 (2022) - 2021
- [j42]Zhiyang Fang, Junfeng Wang, Jiaxuan Geng, Yingjie Zhou, Xuan Kan:
A3CMal: Generating adversarial samples to force targeted misclassification by reinforcement learning. Appl. Soft Comput. 109: 107505 (2021) - [j41]Farhan Ullah, Junfeng Wang, Muhammad Farhan, Masood Habib, Shehzad Khalid:
Software plagiarism detection in multiprogramming languages using machine learning approach. Concurr. Comput. Pract. Exp. 33(4) (2021) - [j40]Qi Li, Jiaxin Mi, Weishi Li, Junfeng Wang, Mingyu Cheng:
CNN-Based Malware Variants Detection Method for Internet of Things. IEEE Internet Things J. 8(23): 16946-16962 (2021) - [j39]Hongdi Zheng, Junfeng Wang, Jianping Zhang, Ruirui Li:
IRTS: An Intelligent and Reliable Transmission Scheme for Screen Updates Delivery in DaaS. ACM Trans. Multim. Comput. Commun. Appl. 17(3): 82:1-82:24 (2021) - [j38]Zhangguo Tang, Junfeng Wang, Huanzhou Li, Jian Zhang, Junhao Wang:
Cognitive Covert Traffic Synthesis Method Based on Generative Adversarial Network. Wirel. Commun. Mob. Comput. 2021: 9982351:1-9982351:14 (2021) - [i2]Haiqi Liu, Xiaojing Shen, Zhiguo Wang, Fanqin Meng, Junfeng Wang, Pramod K. Varshney:
Randomized Multiple Model Multiple Hypothesis Tracking. CoRR abs/2105.01379 (2021) - 2020
- [j37]Fanqin Meng, Xiaojing Shen, Zhiguo Wang, Haiqi Liu, Junfeng Wang, Yunmin Zhu, Pramod K. Varshney:
Multiple-source ellipsoidal localization using acoustic energy measurements. Autom. 112 (2020) - [j36]Baoguo Yuan, Junfeng Wang, Dong Liu, Wen Guo, Peng Wu, Xuhua Bao:
Byte-level malware classification based on markov images and deep learning. Comput. Secur. 92: 101740 (2020) - [j35]Farhan Ullah, Junfeng Wang, Muhammad Farhan, Sohail Jabbar, Muhammad Kashif Naseer, Muhammad Asif:
LSA Based Smart Assessment Methodology for SDN Infrastructure in IoT Environment. Int. J. Parallel Program. 48(2): 162-177 (2020) - [j34]Peng Wu, Dong Liu, Junfeng Wang, Baoguo Yuan, Wenyuan Kuang:
Detection of Fake IoT App Based on Multidimensional Similarity. IEEE Internet Things J. 7(8): 7021-7031 (2020) - [j33]Farhan Ullah, Junfeng Wang, Muhammad Farhan, Sohail Jabbar, Zhiming Wu, Shehzad Khalid:
Plagiarism detection in students' programming assignments based on semantics: multimedia e-learning based smart assessment methodology. Multim. Tools Appl. 79(13-14): 8581-8598 (2020)
2010 – 2019
- 2019
- [j32]Fanqin Meng, Haiqi Liu, Xiaojing Shen, Junfeng Wang:
Optimal Prediction and Update for Box Set-Membership Filter. IEEE Access 7: 41636-41646 (2019) - [j31]Zhiyang Fang, Junfeng Wang, Boya Li, Siqi Wu, Yingjie Zhou, Haiying Huang:
Evading Anti-Malware Engines With Deep Reinforcement Learning. IEEE Access 7: 48867-48879 (2019) - [j30]Farhan Ullah, Junfeng Wang, Sohail Jabbar, Fadi Al-Turjman, Mamoun Alazab:
Source Code Authorship Attribution Using Hybrid Approach of Program Dependence Graph and Deep Learning Model. IEEE Access 7: 141987-141999 (2019) - [j29]Qi Li, Weishi Li, Junfeng Wang, Mingyu Cheng:
A SQL Injection Detection Method Based on Adaptive Deep Forest. IEEE Access 7: 145385-145394 (2019) - [j28]Zhiyang Fang, Junfeng Wang, Jiaxuan Geng, Xuan Kan:
Feature Selection for Malware Detection Based on Reinforcement Learning. IEEE Access 7: 176177-176187 (2019) - [j27]Tingting Lu, Junfeng Wang:
Data-flow bending: On the effectiveness of data-flow integrity. Comput. Secur. 84: 365-375 (2019) - [j26]Qin Luo, Junfeng Wang, Shengli Liu:
AeroMRP: A Multipath Reliable Transport Protocol for Aeronautical Ad Hoc Networks. IEEE Internet Things J. 6(2): 3399-3410 (2019) - [j25]Xingguo Li, Dong Liu, Haiying Huang, Junfeng Wang:
Research on large data intelligent search engine based on multilayer perceptive botnet algorithm. J. Intell. Fuzzy Syst. 37(3): 3425-3434 (2019) - [j24]Hongdi Zheng, Dong Liu, Junfeng Wang, Jie Liang:
A QoE-perceived screen updates transmission scheme in desktop virtualization environment. Multim. Tools Appl. 78(12): 16755-16781 (2019) - [j23]Qi Li, Fang Wang, Junfeng Wang, Weishi Li:
LSTM-Based SQL Injection Detection Method for Intelligent Transportation System. IEEE Trans. Veh. Technol. 68(5): 4182-4191 (2019) - [i1]Fanqin Meng, Xiaojing Shen, Zhiguo Wang, Haiqi Liu, Junfeng Wang, Yunmin Zhu, Pramod K. Varshney:
Multiple-Source Ellipsoidal Localization Using Acoustic Energy Measurements. CoRR abs/1911.07180 (2019) - 2018
- [j22]Peng Wu, Junfeng Wang, Bin Tian:
Software Homology Detection With Software Motifs Based on Function-Call Graph. IEEE Access 6: 19007-19017 (2018) - [j21]Baoguo Yuan, Junfeng Wang, Zhiyang Fang, Li Qi:
A New Software Birthmark based on Weight Sequences of Dynamic Control Flow Graph for Plagiarism Detection. Comput. J. 61(8): 1202-1215 (2018) - [j20]Qin Luo, Junfeng Wang:
FRUDP: A Reliable Data Transport Protocol for Aeronautical Ad Hoc Networks. IEEE J. Sel. Areas Commun. 36(2): 257-267 (2018) - [j19]Xiaohui Li, Junfeng Wang:
Elastically Reliable Video Transport Protocol Over Lossy Satellite Links. IEEE J. Sel. Areas Commun. 36(5): 1097-1108 (2018) - [j18]Shaojie Qiao, Nan Han, Junfeng Wang, Rong-Hua Li, Louis Alberto Gutierrez, Xindong Wu:
Predicting Long-Term Trajectories of Connected Vehicles via the Prefix-Projection Technique. IEEE Trans. Intell. Transp. Syst. 19(7): 2305-2315 (2018) - [j17]Feng Dong, Junfeng Wang, Qi Li, Guoai Xu, Shaodong Zhang:
Defect Prediction in Android Binary Executables Using Deep Neural Network. Wirel. Pers. Commun. 102(3): 2261-2285 (2018) - 2017
- [j16]Dan Wang, Junfeng Wang, Yihua Du, Peng Tang:
Adaptive Solitary Pulmonary Nodule Segmentation for Digital Radiography Images Based on Random Walks and Sequential Filter. IEEE Access 5: 1460-1468 (2017) - [j15]Yao Du, Junfeng Wang, Qi Li:
An Android Malware Detection Approach Using Community Structures of Weighted Function Call Graphs. IEEE Access 5: 17478-17486 (2017) - [j14]Chengze Li, Haoyu Wang, Junfeng Wang, Qi Li, Jianbo Yu, Jingyi Guo, Guoai Xu, Yanhui Guo:
CRSPR: PageRank for Android Apps. IEEE Access 5: 18004-18015 (2017) - [j13]Xiaohui Li, Junfeng Wang, Lixiang Liu:
Online autogenerated congestion control for high-speed transfer over high BDP networks. IET Commun. 11(15): 2336-2344 (2017) - [j12]Qin Luo, Junfeng Wang:
Multiple QoS Parameters-Based Routing for Civil Aeronautical Ad Hoc Networks. IEEE Internet Things J. 4(3): 804-814 (2017) - 2016
- [j11]Xiaohui Li, Junfeng Wang:
A Generous Cooperative Routing Protocol for Vehicle-to-Vehicle Networks. KSII Trans. Internet Inf. Syst. 10(11): 5322-5342 (2016) - [j10]Xiaohui Li, Junfeng Wang, Li Han, Yingjie Zhou, Sunyoung Han:
Adaptive low-priority transfer for high bandwidth and delay product networks. Wirel. Commun. Mob. Comput. 16(17): 3056-3069 (2016) - 2015
- [j9]Qin Luo, Junfeng Wang, Xiaoqing Wang, Ke Wu:
Aero-Sim: An NS-2 Based Simulator for Aeronautical Ad Hoc Networks. KSII Trans. Internet Inf. Syst. 9(7): 2548-2567 (2015) - [j8]Yao Du, Xiaoqing Wang, Junfeng Wang:
A static Android malicious code detection method based on multi-source fusion. Secur. Commun. Networks 8(17): 3238-3246 (2015) - 2014
- [j7]Min Wang, Junfeng Wang, Sunyoung Han:
Adaptive congestion control framework and a simple implementation on high bandwidth-delay product networks. Comput. Networks 64: 308-321 (2014) - [c6]Shimin Sun, Li Han, Sungchol Cho, Sunyoung Han, Junfeng Wang, Béatrice Paillassa:
Performance optimization of media distribution in overlay networks using OpenFlow. ICOIN 2014: 276-281 - [c5]Wanqiu Lou, Yingjie Zhou, Peng Sheng, Junfeng Wang:
An improved least square support vector regression algorithm for traffic flow forecasting. ITSC 2014: 2379-2384 - 2013
- [j6]Min Wang, Junfeng Wang, Xuan Mou, Sunyoung Han:
On-the-fly Data Compression for Efficient TCP Transmission. KSII Trans. Internet Inf. Syst. 7(3): 471-489 (2013) - [j5]Chundong She, Ping Yi, Junfeng Wang, Hongshen Yang:
Intrusion Detection for Black Hole and Gray Hole in MANETs. KSII Trans. Internet Inf. Syst. 7(7): 1721-1736 (2013) - 2012
- [j4]Wei Dong, Junfeng Wang, Minhuan Huang, Jian Tang, Hongxia Zhou:
A Rerouting Controlled ISL Handover Protocol For LEO Satellite Networks. KSII Trans. Internet Inf. Syst. 6(10): 2620-2631 (2012) - 2011
- [j3]Wei Dong, Junfeng Wang, Minhuan Huang, Jian Tang, Hongxia Zhou:
ATCS: An adaptive TCP coding scheme for satellite IP networks. KSII Trans. Internet Inf. Syst. 5(5): 1013-1027 (2011) - [c4]Zhiyang Fang, Junfeng Wang, Dafu Liu, Chundong She:
Web-Based Software Reliability Analysis and Measurement System. ICAIC (4) 2011: 664-670 - [c3]Wei Dong, Junfeng Wang, Juan Zhang:
A Zone-Diffusion Based Routing Protocol for LEO Satellite Networks. WASA 2011: 400-409 - 2010
- [c2]Siquan Hu, Haiou Wang, Chundong She, Junfeng Wang:
A Semantic Middleware of Grain Storage Internet. CCTA (4) 2010: 71-77 - [c1]Siquan Hu, Haiou Wang, Chundong She, Junfeng Wang:
AgOnt: Ontology for Agriculture Internet of Things. CCTA (1) 2010: 131-137
2000 – 2009
- 2008
- [j2]Junfeng Wang, Chundong She, Jin Liu:
Transmission Systems Constellation inference for polar LEO satellite networks by delay probing. Eur. Trans. Telecommun. 19(3): 285-297 (2008) - [j1]Junfeng Wang, Jin Liu, Chundong She:
Segment-based adaptive hyper-Erlang model for long-tailed network traffic approximation. J. Supercomput. 45(3): 296-312 (2008)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-23 19:32 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint