default search action
Wenrui Ma
Person information
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j10]Ruitong Liu, Yanbin Wang, Zhenhao Guo, Haitao Xu, Zhan Qin, Wenrui Ma, Fan Zhang:
TransURL: Improving malicious URL detection with multi-layer Transformer encoding and multi-scale pyramid features. Comput. Networks 253: 110707 (2024) - [j9]Congming Wei, Guangze Hong, An Wang, Jing Wang, Shaofei Sun, Yaoling Ding, Liehuang Zhu, Wenrui Ma:
Time Is Not Enough: Timing Leakage Analysis on Cryptographic Chips via Plaintext-Ciphertext Correlation in Non-Timing Channel. IEEE Trans. Inf. Forensics Secur. 19: 8544-8558 (2024) - [j8]Ziming Zhao, Zhaoxuan Li, Xiaofei Xie, Jiongchi Yu, Fan Zhang, Rui Zhang, Binbin Chen, Xiangyang Luo, Ming Hu, Wenrui Ma:
FOSS: Towards Fine-Grained Unknown Class Detection Against the Open-Set Attack Spectrum With Variable Legitimate Traffic. IEEE/ACM Trans. Netw. 32(5): 3945-3960 (2024) - [c7]Chiraag Kaushik, Ran Liu, Chi-Heng Lin, Amrit Khera, Matthew Y. Jin, Wenrui Ma, Vidya Muthukumar, Eva L. Dyer:
Balanced Data, Imbalanced Spectra: Unveiling Class Disparities with Spectral Imbalance. ICML 2024 - [i6]Chiraag Kaushik, Ran Liu, Chi-Heng Lin, Amrit Khera, Matthew Y. Jin, Wenrui Ma, Vidya Muthukumar, Eva L. Dyer:
Balanced Data, Imbalanced Spectra: Unveiling Class Disparities with Spectral Imbalance. CoRR abs/2402.11742 (2024) - [i5]Yujie Li, Yanbin Wang, Haitao Xu, Bin Liu, Jianguo Sun, Zhenhao Guo, Wenrui Ma:
Struggle with Adversarial Defense? Try Diffusion. CoRR abs/2404.08273 (2024) - [i4]Ruitong Liu, Yanbin Wang, Haitao Xu, Bin Liu, Jianguo Sun, Zhenhao Guo, Wenrui Ma:
Source Code Vulnerability Detection: Combining Code Language Models and Code Property Graphs. CoRR abs/2404.14719 (2024) - [i3]Congming Wei, Guangze Hong, An Wang, Jing Wang, Shaofei Sun, Yaoling Ding, Liehuang Zhu, Wenrui Ma:
Time is not enough: Timing Leakage Analysis on Cryptographic Chips via Plaintext-Ciphertext Correlation in Non-timing Channel. IACR Cryptol. ePrint Arch. 2024: 1168 (2024) - 2023
- [j7]Wenrui Ma, Zuhua Xu, Jun Zhao, Shuangxi Zhang, Zhijiang Shao:
Quasi-Newton extremum seeking control based on incremental recursive identification. Comput. Chem. Eng. 171: 108137 (2023) - [c6]Yanbin Wang, Weifan Zhu, Haitao Xu, Zhan Qin, Kui Ren, Wenrui Ma:
A Large-Scale Pretrained Deep Model for Phishing URL Detection. ICASSP 2023: 1-5 - [c5]Wenrui Ma, Ying Cong, Haitao Xu, Fan Zhang, Zhao Li, Siqi Ren:
Investigating Fraud and Misconduct in Legitimate Internet Economy based on Customer Complaints. TrustCom 2023: 394-403 - [i2]Ruitong Liu, Yanbin Wang, Zhenhao Guo, Haitao Xu, Zhan Qin, Wenrui Ma, Fan Zhang:
PyraTrans: Attention-Enriched Pyramid Transformer for Malicious URL Detection. CoRR abs/2312.00508 (2023) - [i1]Yujie Li, Yanbin Wang, Haitao Xu, Zhenhao Guo, Fan Zhang, Ruitong Liu, Wenrui Ma:
Fed-urlBERT: Client-side Lightweight Federated Transformers for URL Threat Analysis. CoRR abs/2312.03636 (2023) - 2021
- [j6]Kin Wa Kwan, Runni Wu, Wenrui Ma, Alfonso H. W. Ngan:
Novel Stimuli-Responsive Turbostratic Oxides/Hydroxides for Material-Driven Robots. Adv. Intell. Syst. 3(10): 2000215 (2021) - [c4]Wenrui Ma, Haitao Xu:
A Study of the Partnership Between Advertisers and Publishers. PAM 2021: 564-580 - 2020
- [j5]Lei Zuo, Ye Zhang, Maode Yan, Wenrui Ma:
Distributed Integrated Sliding Mode-Based Nonlinear Vehicle Platoon Control with Quadratic Spacing Policy. Complex. 2020: 4949520:1-4949520:9 (2020)
2010 – 2019
- 2019
- [j4]Lei Zuo, Maode Yan, Yaoren Guo, Wenrui Ma:
An Improved KF-RBF Based Estimation Algorithm for Coverage Control with Unknown Density Function. Complex. 2019: 6268127:1-6268127:11 (2019) - [j3]Lei Zuo, Wenrui Ma, Maode Yan, Panpan Yang:
High precision tracking control for a sequence of way-points using dynamic unicycles. J. Frankl. Inst. 356(10): 5104-5121 (2019) - [j2]Wenrui Ma, Jonathan Beltran, Deng Pan, Niki Pissinou:
Placing Traffic-Changing and Partially-Ordered NFV Middleboxes via SDN. IEEE Trans. Netw. Serv. Manag. 16(4): 1303-1317 (2019) - 2017
- [j1]Wenrui Ma, Jonathan Beltran, Zhenglin Pan, Deng Pan, Niki Pissinou:
SDN-Based Traffic Aware Placement of NFV Middleboxes. IEEE Trans. Netw. Serv. Manag. 14(3): 528-542 (2017) - [c3]Wenrui Ma, Oscar Sandoval, Jonathan Beltran, Deng Pan, Niki Pissinou:
Traffic aware placement of interdependent NFV middleboxes. INFOCOM 2017: 1-9 - 2015
- [c2]Wenrui Ma, Carlos Medina, Deng Pan:
Traffic-Aware Placement of NFV Middleboxes. GLOBECOM 2015: 1-6 - 2014
- [c1]Isaac Vawter, Deng Pan, Wenrui Ma:
Emulation Performance Study of Traffic-Aware Policy Enforcement in Software Defined Networks. MASS 2014: 775-780
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 21:31 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint