Dr Sheng Wen

STAFF PROFILE

Position

Lecturer In Computer Science

Faculty

Faculty of Sci Eng & Built Env

Department

School of Info Technology

Campus

Melbourne Burwood Campus

Contact

sheng.wen@deakin.edu.au
+61 3 925 17627

Publications

Filter by

2017

Investigating the deceptive information in Twitter spam

C Chen, S Wen, J Zhang, Y Xiang, J Oliver, A Alelaiwi, M Hassan

(2017), Vol. 72, pp. 319-326, Future generation computer systems, Amsterdam, The Netherlands, C1

journal

The structure of communities in scale-free networks

J Jiang, S Wen, S Yu, Y Xiang, W Zhou, H Hassan

(2017), Vol. 29, pp. 1-16, Concurrency and computation: practice and experience, Chichester, Eng., C1

journal
2016

An overview of Fog computing and its security issues

I Stojmenovic, S Wen, X Huang, H Luan

(2016), Vol. 28, pp. 2991-3005, Concurrency computation: practice and experience, London, Eng., C1

journal

Efficient and secure attribute-based signature for monotone predicates

K Gu, W Jia, G Wang, S Wen

(2016), pp. 1-21, Acta informatica, Berlin, Germany, C1

journal

Following targets for mobile tracking in wireless sensor networks

T Wang, Z Peng, J Liang, S Wen, M Bhuiyan, Y Cai, J Cao

(2016), Vol. 12, pp. 31.1-31.24, ACM transactions on sensor networks, New York, N.Y., C1

journal

On the race of worms and patches: modeling the spread of information in wireless sensor networks

M Sayad Haghighi, S Wen, Y Xiang, B Quinn, W Zhou

(2016), Vol. 11, pp. 2854-2865, IEEE transactions on information forensics and security, Piscataway, N.J., C1

journal

Traceable identity-based group signature

K Gu, L Yang, Y Wang, S Wen

(2016), Vol. 50, pp. 193-226, RAIRO - Theoretical informatics and applications, Les Ulis, France, C1

journal

The inhibition and clearup of the mobile worms in wireless sensor networks

T Wang, Q Wu, S Wen, Y Cai, H Tian, Y Chen

(2016), Vol. 38, pp. 2202-2207, Journal of electronics and information technology, [Beijing, China], C1

journal
2015

A sword with two edges: Propagation studies on both positive and negative information in online social networks

S Wen, M Haghighi, C Chen, Y Xiang, W Zhou, W Jia

(2015), Vol. 64, pp. 640-653, IEEE transactions on computers, Piscataway, N.J., C1

journal

Detecting stepping stones by abnormal causality probability

S Wen, D Wu, P Li, Y Xiang, W Zhou, G Wei

(2015), Vol. 8, pp. 1831-1844, Security and communication networks, London, Eng., C1

journal

K-Center: an approach on the multi-source identification of information diffusion

J Jiang, S Wen, S Yu, Y Xiang, W Zhou

(2015), Vol. 10, pp. 2616-2626, IEEE transactions on information forensics and security, Piscataway, N.J., C1

journal

Maximizing real-time streaming services based on a multi-servers networking framework

T Wang, Y Cai, W Jia, S Wen, G Wang, H Tian, Y Chen, B Zhong

(2015), Vol. 93, pp. 199-212, Computer networks, Amsterdam, The Netherlands, C1

journal

First-priority relation graph-based malicious users detection in mobile social networks

L Xu, L Lin, S Wen

(2015), Vol. 9408, pp. 459-466, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), blah, B1

chapter

The relation between local and global influence of individuals in scale-free networks

S Wen, J Jiang, K Majbouri Yazdi, Y Xiang, W Zhou

(2015), pp. 80-84, SOCIALSEC 2015: Proceedings of the International Symposium on Security and Privacy in Social Networks and Big Data, Hangzhou, China, E1

conference

Mobility increases the risk of malware propagations in wireless networks

B Liu, W Zhou, L Gao, S Wen, H Luan

(2015), Vol. 1, pp. 90-95, TrustCom 2015: Proceedings of the IEEE Trust, Security and Privacy in Computing and Communications 2015 International Conference, Helsinki, Finland, E1

conference

Identifying diffusion sources in large networks: a community structure based approach

J Jiang, A Zhou, K Majbouri Yazdi, S Wen, S Yu, Y Xiang

(2015), Vol. 1, pp. 302-309, TrustCom 2015: Proceedings of the IEEE Trust, Security and Privacy in Computing and Communications 2015 International Conference, Helsinki, Finland, E1

conference
2014

Modeling and analysis on the propagation dynamics of modern email malware

S Wen, W Zhou, J Zhang, Y Xiang, W Zhou, W Jia, C C Zou

(2014), Vol. 11, pp. 361-374, IEEE Transactions on Dependable and Secure Computing, Piscataway, N.J., C1

journal

Detection and defense of application-layer DDoS attacks in backbone web traffic

W Zhou, W Jia, S Wen, Y Xiang, W Zhou

(2014), Vol. 38, pp. 36-46, Future generation computer systems, Amsterdam, Netherlands, C1

journal

Modeling the propagation of worms in networks: a survey

Y Wang, S Wen, Y Xiang, W Zhou

(2014), Vol. 16, pp. 942-960, IEEE communications surveys and tutorials, Piscataway, NJ, C1

journal

Are the popular users always important for information dissemination in online social networks?

S Wen, J Jiang, Y Xiang, S Yu, W Zhou

(2014), Vol. 28, pp. 64-67, IEEE Network, Piscataway, N. J, C1

journal

To shut them up or to clarify: restraining the spread of rumors in online social networks

S Wen, J Jiang, Y Xiang, S Yu, W Zhou, W Jia

(2014), Vol. 25, pp. 3306-3316, IEEE transactions on parallel and distributed systems, Piscataway, NJ, C1

journal

Fog computing: a cloud to the ground support for smart things and machine-to-machine networks

I Stojmenovic, S Wen

(2014), pp. 117-122, ATNAC 2014 : Proceedings of the 2014 Australasian Telecommunication Networks and Applications Conference, Melbourne, Victoria, E1

conference
2013

Modeling propagation dynamics of social network worms

S Wen, W Zhou, J Zhang, Y Xiang, W Zhou, W Jia

(2013), Vol. 24, pp. 1633-1643, IEEE transactions on parallel and distributed systems, Piscataway, N.J., C1

journal

Modeling and analysis for thwarting worm propagation in email networks

S Wen, Y Xiang, W Zhou

(2013), pp. 763-769, Network and system security : 7th international conference, NSS 2013, Madrid, Spain, June 3-4, 2013, proceedings, Madrid, Spain, E1

conference

Detecting stepping stones by abnormal causality probability

S Wen, P Li, D Wu, Y Xiang, W Zhou

(2013), pp. 308-322, Cyberspace safety and security, Cham, Switzerland, B1

chapter
2012

Locating defense positions for thwarting the propagation of topological worms

S Wen, W Zhou, Y Wang, W Zhou, Y Xiang

(2012), Vol. 16, pp. 560-563, IEEE Communications Letters, Piscataway, N.J., C1

journal

An analytical model on the propagation of modern email worms

W Zhou, S Wen, Y Wang, Y Xiang, W Zhou

(2012), pp. 533-540, TrustCom 2012 : Proceedings of the 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Liverpool, England, E1

conference
2011

CAFS : a novel lightweight cache-based scheme for large-scale intrusion alert fusion

S Wen, W Zhou, Y Xiang, W Zhou

(2011), Vol. 24, pp. 1137-1153, Concurrency computation : practice and experience, West Sussex, U. K., C1

journal

Eliminating errors in worm propagation models

Y Wang, S Wen, S Cesare, W Zhou, Y Xiang

(2011), Vol. 15, pp. 1022-1024, IEEE Communications Letters, United States, C1

journal

The microcosmic model of worm propagation

Y Wang, S Wen, S Cesare, W Zhou, Y Xiang

(2011), Vol. 54, pp. 1700-1720, The Computer Journal, Oxford, England, C1

journal

Modeling worms propagation on probability

Y Wang, S Wen, Y Xiang

(2011), pp. 49-56, NSS 2011 : Proceedings of the 5th International Conference on Network and System Security, Milan, Italy, E1

conference

The probability model of peer-to-peer botnet propagation

Y Wang, S Wen, W Zhou, W Zhou, Y Xiang

(2011), pp. 470-480, Algorithms and Architectures for Parallel Processing Conference, Melbourne, Victoria, E1

conference
2010

A lightweight intrusion alert fusion system

S Wen, Y Xiang, W Zhou

(2010), pp. 695-700, HPCC 2010 : Proceedings of the 12th IEEE International Conference on High Performance Computing and Communications, Melbourne, Vic., E1

conference

CALD : surviving various application-layer DDoS attacks that mimic flash crowd

S Wen, W Jia, W Zhou, W Zhou, C Xu

(2010), pp. 247-254, NSS 2010 : Proceedings of the 4th International Conference on Network and System Security, Melbourne, Vic., E1

conference

Grants

Other Public Sector Funding

Adversarial Machine Learning for Cyber

Dr Jun Zhang, Prof Dinh Phung, Dr Sheng Wen, Dr Ben Rubinstein

  • 2017: $5,604

Industry and Other Funding

WeChat-based Social Networking Platform Prototype for facilitating connection between Australian and Chinese businesses.

Dr Sheng Wen

  • 2016: $18,181

Supervisions

No completed student supervisions to report