What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Junfeng Wang
Google Scholar
ORCID:
0000-0003-1699-2270
10
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/tifs
CorreFlow: A Covert Fingerprinting Modulation for Flow Correlation in Open Heterogeneous Networks.
Yue Chen
Xiaohui Li
Junfeng Wang
Wenhan Ge
Lingfeng Tan
2025
journals/tifs
WF-TFC: An Open-World Few-Shot Anonymous Website Fingerprinting via Time-Frequency Consistency.
Xiaolan Zhu
Junfeng Wang
Wenhan Ge
Yizhao Huang
Tingting Lu
2024
journals/compsec
A survey of strategy-driven evasion methods for PE malware: Transformation, concealment, and attack.
Jiaxuan Geng
Junfeng Wang
Zhiyang Fang
Yingjie Zhou
Di Wu
Wenhan Ge
2024
journals/istr
GMADV: An android malware variant generation and classification adversarial training framework.
Shuangcheng Li
Zhangguo Tang
Huanzhou Li
Jian Zhang
Han Wang
Junfeng Wang
2024
journals/tifs
MetaCluster: A Universal Interpretable Classification Framework for Cybersecurity.
Wenhan Ge
Zeyuan Cui
Junfeng Wang
Binhui Tang
Xiaohui Li
2024
journals/tifs
DOMR: Toward Deep Open-World Malware Recognition.
Tingting Lu
Junfeng Wang
2023
journals/compsec
DroidRL: Feature selection for android malware detection with reinforcement learning.
Yinwei Wu
Meijin Li
Qi Zeng
Tao Yang
Junfeng Wang
Zhiyang Fang
Luyu Cheng
2023
journals/compsec
Explainable cyber threat behavior identification based on self-adversarial topic generation.
Wenhan Ge
Junfeng Wang
Tongcan Lin
Binhui Tang
Xiaohui Li
2020
journals/compsec
Byte-level malware classification based on markov images and deep learning.
Baoguo Yuan
Junfeng Wang
Dong Liu
Wen Guo
Peng Wu
Xuhua Bao
2019
journals/compsec
Data-flow bending: On the effectiveness of data-flow integrity.
Tingting Lu
Junfeng Wang
Coauthors
Baoguo Yuan
(1)
Binhui Tang
(2)
Di Wu
(1)
Dong Liu
(1)
Han Wang
(1)
Huanzhou Li
(1)
Jian Zhang
(1)
Jiaxuan Geng
(1)
Junfeng Wang
(10)
Lingfeng Tan
(1)
Luyu Cheng
(1)
Meijin Li
(1)
Peng Wu
(1)
Qi Zeng
(1)
Shuangcheng Li
(1)
Tao Yang
(1)
Tingting Lu
(3)
Tongcan Lin
(1)
Wen Guo
(1)
Wenhan Ge
(5)
Xiaohui Li
(3)
Xiaolan Zhu
(1)
Xuhua Bao
(1)
Yingjie Zhou
(1)
Yinwei Wu
(1)
Yizhao Huang
(1)
Yue Chen
(1)
Zeyuan Cui
(1)
Zhangguo Tang
(1)
Zhiyang Fang
(2)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to