Xuetao Wei
Xuetao Wei
Associate Professor, Southern University of Science and Technology
Verified email at
Cited by
Cited by
Profiledroid: Multi-layer profiling of android applications
X Wei, L Gomez, I Neamtiu, M Faloutsos
Proceedings of the 18th annual international conference on Mobile computing …, 2012
Permission evolution in the android ecosystem
X Wei, L Gomez, I Neamtiu, M Faloutsos
Proceedings of the 28th Annual Computer Security Applications Conference, 31-40, 2012
LSTM learning with Bayesian and Gaussian processing for anomaly detection in industrial IoT
D Wu, Z Jiang, X Xie, X Wei, W Yu, R Li
IEEE Transactions on Industrial Informatics 16 (8), 5244-5253, 2019
Malicious android applications in the enterprise: What do they do and how do we fix it?
X Wei, L Gomez, I Neamtiu, M Faloutsos
2012 IEEE 28th International Conference on Data Engineering Workshops, 251-254, 2012
Competing memes propagation on networks: A network science perspective
X Wei, NC Valler, BA Prakash, I Neamtiu, M Faloutsos, C Faloutsos
IEEE Journal on Selected Areas in Communications 31 (6), 1049-1060, 2013
Optimizing backup optical-network-units selection and backup fibers deployment in survivable hybrid wireless-optical broadband access networks
Y Liu, L Guo, X Wei
Journal of lightwave technology 30 (10), 1509-1523, 2012
Communication-efficient data aggregation tree construction for complex queries in IoT applications
B Yin, X Wei
IEEE Internet of Things Journal 6 (2), 3352-3363, 2018
Entelecheia: Detecting p2p botnets in their waiting stage
H Hang, X Wei, M Faloutsos, T Eliassi-Rad
2013 IFIP Networking Conference, 1-9, 2013
Competing memes propagation on networks: a case study of composite networks
X Wei, N Valler, BA Prakash, I Neamtiu, M Faloutsos, C Faloutsos
ACM SIGCOMM Computer Communication Review 42 (5), 5-12, 2012
Fingerprinting encrypted voice traffic on smart speakers with deep learning
C Wang, S Kennedy, H Li, K Hudson, G Atluri, X Wei, W Sun, B Wang
Proceedings of the 13th ACM Conference on Security and Privacy in Wireless …, 2020
Robust and integrated grooming for power-and port-cost-efficient design in IP over WDM networks
W Hou, L Guo, X Wei
Journal of Lightwave Technology 29 (20), 3035-3047, 2011
A collaborative privacy-preserving deep learning system in distributed mobile environment
M Liu, H Jiang, J Chen, A Badokhon, X Wei, MC Huang
2016 International Conference on Computational Science and Computational …, 2016
A cost efficient design of virtual infrastructures with joint node and link mapping
H Yu, V Anand, C Qiao, H Di, X Wei
Journal of Network and Systems Management 20, 97-115, 2012
On finding feasible solutions with shared backup resources for surviving double-link failures in path-protected WDM mesh networks
L Guo, L Li, J Cao, H Yu, X Wei
Journal of Lightwave Technology 25 (1), 287-296, 2007
DIMLOC: Enabling high-precision visible light localization under dimmable LEDs in smart buildings
X Liu, X Wei, L Guo
IEEE Internet of Things Journal 6 (2), 3912-3924, 2019
Turning the signal interference into benefits: Towards indoor self-powered visible light communication for IoT devices in industrial radio-hostile environments
X Liu, X Wei, L Guo, Y Liu, Q Song, A Jamalipour
IEEE Access 7, 24978-24989, 2019
A survey on HTTPS implementation by Android apps: issues and countermeasures
X Wei, M Wolf
Applied Computing and Informatics 13 (2), 101-117, 2017
EdgeLSTM: Towards deep and sequential edge computing for IoT applications
D Wu, H Xu, Z Jiang, W Yu, X Wei, J Lu
IEEE/ACM Transactions on Networking 29 (4), 1895-1908, 2021
Characterizing the behavior of handheld devices and its implications
X Wei, NC Valler, HV Madhyastha, I Neamtiu, M Faloutsos
Computer Networks 114, 1-12, 2017
Multi-granularity and robust grooming in power-and port-cost-efficient IP over WDM networks
W Hou, L Guo, X Wei, X Gong
Computer networks 56 (10), 2383-2399, 2012
The system can't perform the operation now. Try again later.
Articles 1–20