Personal information

Cybersecurity

Activities

Education and qualifications (1)

Institute of Information Engineering: Beijing, CN

Education
Source: Self-asserted source
Qiang Wang

Works (10)

Prism: Real-Time Privacy Protection Against Temporal Network Traffic Analyzers

IEEE Transactions on Information Forensics and Security
2023 | Journal article
Contributors: Wenhao Li; Xiao-Yu Zhang; Huaifeng Bao; Binbin Yang; Zhaoxuan Li; Haichao Shi; Qiang Wang
Source: check_circle
Crossref

PackGenome: Automatically Generating Robust YARA Rules for Accurate Malware Packer Detection

2023-11-15 | Conference paper
Contributors: Shijia Li; Jiang Ming; Pengda Qiu; Qiyuan Chen; Lanqing Liu; Huaifeng Bao; Qiang Wang; Chunfu Jia
Source: check_circle
Crossref
grade
Preferred source (of 2)‎

ProGraph: Robust Network Traffic Identification With Graph Propagation

IEEE/ACM Transactions on Networking
2023-06 | Journal article
Contributors: Wenhao Li; Xiao-Yu Zhang; Huaifeng Bao; Haichao Shi; Qiang Wang
Source: check_circle
Crossref

High-Efficient and Few-shot Adaptive Encrypted Traffic Classification with Deep Tree

MILCOM 2022-2022 IEEE Military Communications Conference (MILCOM)
2022 | Conference paper
Contributors: Wang, Qiang; Li, Wenhao; Bao, Huaifeng; Tang, Zixian; Wang, Wen; Liu, Feng; Ying, Lingyun
Source: Self-asserted source
Qiang Wang

ProGraph: Robust Network Traffic Identification With Graph Propagation

IEEE/ACM Transactions on Networking
2022 | Journal article
Contributors: Li, Wenhao; Zhang, Xiao-Yu; Bao, Huaifeng; Shi, Haichao; Wang, Qiang
Source: Self-asserted source
Qiang Wang

Robust network traffic identification with graph matching

Computer Networks
2022 | Journal article
Contributors: Li, Wenhao; Zhang, Xiao-Yu; Bao, Huaifeng; Wang, Qiang; Li, Zhaoxuan
Source: check_circle
Web of Science Researcher Profile Sync

Robust network traffic identification with graph matching

Computer Networks
2022 | Journal article
Contributors: Li, Wenhao; Zhang, Xiao-Yu; Bao, Huaifeng; Wang, Qiang; Li, Zhaoxuan
Source: Self-asserted source
Qiang Wang

HSLF: HTTP header sequence based LSH fingerprints for application traffic classification

Computational Science--ICCS 2021: 21st International Conference, Krakow, Poland, June 16--18, 2021, Proceedings, Part I
2021 | Conference paper
Contributors: Tang, Zixian; Wang, Qiang; Li, Wenhao; Bao, Huaifeng; Liu, Feng; Wang, Wen
Source: Self-asserted source
Qiang Wang

Mining Trojan Detection Based on Multi-dimensional Static Features

Lecture Notes in Computer Science
2021 | Journal article
Contributors: Tang, Zixian; Wang, Qiang; Li, Wenhao; Bao, Huaifeng; Liu, Feng; Wang, Wen
Source: check_circle
Web of Science Researcher Profile Sync

Mining Trojan Detection Based on Multi-dimensional Static Features

Science of Cyber Security: Third International Conference, SciSec 2021, Virtual Event, August 13--15, 2021, Revised Selected Papers 4
2021 | Conference paper
Contributors: Tang, Zixian; Wang, Qiang; Li, Wenhao; Bao, Huaifeng; Liu, Feng; Wang, Wen
Source: Self-asserted source
Qiang Wang

Peer review (12 reviews for 5 publications/grants)

Review activity for Computer networks. (5)
Review activity for High-confidence computing. (1)
Review activity for IEEE internet of things journal. (2)
Review activity for IEEE transactions on dependable and secure computing. (3)
Review activity for IEEE transactions on information forensics and security. (1)