default search action
Ke Wang 0009
Person information
- affiliation: Columbia University, New York, NY, USA
Other persons with the same name
- Ke Wang — disambiguation page
- Ke Wang 0001 — Simon Fraser University, Burnaby, BC, Canada (and 1 more)
- Ke Wang 0002 — Harbin Institute of Technology, Department of Mathematics, Weihai, China (and 1 more)
- Ke Wang 0003 — Hong Kong University of Science and Technology, Jockey Club Institute for Advanced Study, Hong Kong (and 2 more)
- Ke Wang 0004 — Shanghai University, School of Management, China (and 1 more)
- Ke Wang 0005 — Beijing University of Technology, College of Electronic and Control Engineering, China (and 2 more)
- Ke Wang 0006 — National University of Singapore, NUS Graduate School for Integrative Sciences and Engineering, Singapore
- Ke Wang 0007 — RMIT University, School of Engineering, Melbourne, Australia (and 1 more)
- Ke Wang 0008 — Chang'an University, School of Highway, Xi'an, China
- Ke Wang 0010 — PLA University of Science and Technology, Department of Satellite Communications, Nanjing, China
- Ke Wang 0011 — University of Virginia, Department of Computer Science, Charlottesville, VA, USA
- Ke Wang 0012 — Intel (and 1 more)
- Ke Wang 0013 — Beijing University of Posts and Telecommunications, School of Information and Communication Engineering / MoE Key Laboratory of Universal Wireless Communications, China
- Ke Wang 0014 — Chinese Academy of Sciences, Institute of Electrical Engineering, Key Laboratory of Power Electronics and Electric Drive, Beijing, China
- Ke Wang 0015 — China Electric Power Research Institute, Electric Automation Department, Nanjing, China
- Ke Wang 0016 — Zhejiang University, Institute of Remote Sensing and Information System Application / College of Environmental and Resource Sciences, Hangzhou, China
- Ke Wang 0017 — Chongqing University, State Key Laboratory of Mechanical Transmission, China
- Ke Wang 0018 — Xian University of Architecture and Technology, School of Management, China
- Ke Wang 0019 — Nanjing University of Aeronautics and Astronautics, School of Electronic and Information Engineering, China
- Ke Wang 0020 — University of Glasgow, School of Engineering, UK
- Ke Wang 0021 — University of North Carolina, Department of Computer Science, Chapel Hill, NC, USA
- Ke Wang 0023 — China University of Geosciences, Wuhan, China (and 1 more)
- Ke Wang 0024 — Chongqing University, College of Computer Science, China
- Ke Wang 0025 — Zhejiang University of Technology, College of Information Engineering, China
- Ke Wang 0026 — Shanghai University, School of Mechatronic Engineering and Automation, China
- Ke Wang 0027 — Shandong University of Science and Technology, College of Geomatics, Qingdao, China
- Ke Wang 0028 — Harbin Institute of Technology, State Key Laboratory of Robotics and System, Harbin, China
- Ke Wang 0029 — Harbin Institute of Technology, Instrument Science and Technology, China
- Ke Wang 0030 — George Washington University, Department of Electrical and Computer Engineering, Washington, DC, USA
- Ke Wang 0031 — Sichuan University, College of Mathematics, Chengdu, China
- Ke Wang 0032 — Hohai University, State Key Laboratory of Hydrology-Water Resources and Hydraulic Engineering, Nanjing, China
- Ke Wang 0033 — Tsinghua University, Department of Electronic Engineering, Beijing, China
- Ke Wang 0034 — Zhejiang University, Institute of VLSI Design, China
- Ke Wang 0035 — University of California Santa Barbara, Department of Statistics and Applied Probability, CA, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2000 – 2009
- 2007
- [c12]Niels Provos, Dean McNamee, Panayiotis Mavrommatis, Ke Wang, Nagendra Modadugu:
The Ghost in the Browser: Analysis of Web-based Malware. HotBots 2007 - [p1]Salvatore J. Stolfo, Ke Wang, Wei-Jen Li:
Towards Stealthy Malware Detection. Malware Detection 2007: 231-249 - 2006
- [j1]Salvatore J. Stolfo, Shlomo Hershkop, Chia-Wei Hu, Wei-Jen Li, Olivier Nimeskern, Ke Wang:
Behavior-based modeling and its application to Email analysis. ACM Trans. Internet Techn. 6(2): 187-221 (2006) - [c11]Gabriela F. Cretu, Janak J. Parekh, Ke Wang, Salvatore J. Stolfo:
Intrusion and anomaly detection model exchange for mobile ad-hoc networks. CCNC 2006: 635-639 - [c10]Ke Wang, Janak J. Parekh, Salvatore J. Stolfo:
Anagram: A Content Anomaly Detector Resistant to Mimicry Attack. RAID 2006: 226-248 - [c9]Janak J. Parekh, Ke Wang, Salvatore J. Stolfo:
Privacy-preserving payload-based correlation for accurate malicious traffic detection. LSAD@SIGCOMM 2006: 99-106 - [c8]Niels Provos, Joe McClain, Ke Wang:
Search worms. WORM 2006: 1-8 - 2005
- [c7]Salvatore J. Stolfo, Shlomo Hershkop, Linh H. Bui, Ryan Ferster, Ke Wang:
Anomaly Detection in Computer Security and an Application to File System Accesses. ISMIS 2005: 14-28 - [c6]Michael E. Locasto, Ke Wang, Angelos D. Keromytis, Salvatore J. Stolfo:
FLIPS: Hybrid Adaptive Intrusion Prevention. RAID 2005: 82-101 - [c5]Ke Wang, Gabriela F. Cretu, Salvatore J. Stolfo:
Anomalous Payload-Based Worm Detection and Signature Generation. RAID 2005: 227-246 - 2004
- [c4]Ke Wang, Salvatore J. Stolfo:
Anomalous Payload-Based Network Intrusion Detection. RAID 2004: 203-222 - 2003
- [c3]Salvatore J. Stolfo, Shlomo Hershkop, Ke Wang, Olivier Nimeskern:
EMT/MET: Systems for Modeling and Detecting Errant Email. DISCEX (2) 2003: 290- - [c2]Salvatore J. Stolfo, Shlomo Hershkop, Ke Wang, Olivier Nimeskern, Chia-Wei Hu:
Behavior Profiling of Email. ISI 2003: 74-90 - [c1]Salvatore J. Stolfo, Shlomo Hershkop, Ke Wang, Olivier Nimeskern, Chia-Wei Hu:
A Behavior-Based Approach to Securing Email Systems. MMM-ACNS 2003: 57-81
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-15 19:29 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint