Don't follow me: Spam detection in twitter AH Wang 2010 international conference on security and cryptography (SECRYPT), 1-10, 2010 | 865 | 2010 |
Twitter spammer detection using data stream clustering Z Miller, B Dickinson, W Deitrick, W Hu, AH Wang Information Sciences 260, 64-73, 2014 | 449 | 2014 |
Detecting spam bots in online social networking sites: a machine learning approach AH Wang IFIP Annual Conference on Data and Applications Security and Privacy, 335-342, 2010 | 391 | 2010 |
Modeling and evaluating the survivability of an intrusion tolerant database system H Wang, P Liu Computer Security–ESORICS 2006, 207-224, 2006 | 43 | 2006 |
Machine learning for the detection of spam in twitter networks AH Wang e-Business and Telecommunications: 7th International Joint Conference, ICETE …, 2012 | 40 | 2012 |
Towards database firewalls K Bai, H Wang, P Liu Data and Applications Security XIX, 924-924, 2005 | 23 | 2005 |
A semi-markov survivability evaluation model for intrusion tolerant database systems AH Wang, S Yan, P Liu 2010 International Conference on Availability, Reliability and Security, 104-111, 2010 | 22 | 2010 |
Evaluating the survivability of Intrusion Tolerant Database systems and the impact of intrusion detection deficiencies H Wang, P Liu, L Li International Journal of Information and Computer Security 1 (3), 315-340, 2007 | 16 | 2007 |
Modeling of pollution in p2p file sharing systems Q Gu, K Bai, H Wang, P Liu, CH Chu 2006 3rd IEEE Consumer Communications and Networking Conference, CCNC 2006 …, 2006 | 14 | 2006 |
Quantitative survivability evaluation of three virtual machine-based server architectures Y Yang, Y Zhang, AH Wang, M Yu, W Zang, P Liu, S Jajodia Journal of network and computer applications 36 (2), 781-790, 2013 | 11 | 2013 |
Real-time data attack isolation for commercial database applications P Liu, H Wang, L Li Journal of network and computer applications 29 (4), 294-320, 2006 | 11 | 2006 |
Evaluating the impact of intrusion detection deficiencies on the cost-effectiveness of attack recovery H Wang, P Liu, L Li Information Security, 146-157, 2004 | 9 | 2004 |
Evaluating survivability and costs of three virtual machine based server architectures M Yu, AH Wang, W Zang, P Liu 2010 International Conference on Security and Cryptography (SECRYPT), 1-8, 2010 | 5 | 2010 |
Pairwise constrained clustering for sparse and high dimensional feature spaces S Yan, H Wang, D Lee, C Giles Advances in Knowledge Discovery and Data Mining, 620-627, 2009 | 5 | 2009 |
A Stochastic Model of the Damage Propagation in Database Systems. AH Wang, S Yan Security and Management, 3-9, 2009 | 3 | 2009 |
Costco: Robust content and structure constrained clustering of networked documents S Yan, D Lee, AH Wang Computational Linguistics and Intelligent Text Processing: 12th …, 2011 | 2 | 2011 |