Dr Sheng Wen

STAFF PROFILE

Position

Lecturer In Computer Science

Faculty

Faculty of Sci Eng & Built Env

Department

School of Info Technology

Campus

Melbourne Burwood Campus

Contact

sheng.wen@deakin.edu.au
+61 3 925 17627

Publications

Filter by

2016

An overview of Fog computing and its security issues

Prof Ivan Stojmenovic, Dr Sheng Wen, Dr Xinyi Huang, Dr Tom Luan

(2016), Vol. 28, pp. 2991-3005, Concurrency computation: practice and experience, London, Eng, C1

journal

Following targets for mobile tracking in wireless sensor networks

Wang Tianli, Dr Zheng Peng, Junbin Liang, Dr Sheng Wen, Zakirul Bhuiyan, Yigiao Cai, Jiannong Cao

(2016), Vol. 12, pp. 31.1-31.24, ACM transactions on sensor networks, New York, N.Y., C1

journal

On the race of worms and patches: modeling the spread of information in wireless sensor networks

Mohammad Sayad Haghighi, Dr Sheng Wen, Prof Yang Xiang, Barry Quinn, Prof Wanlei Zhou

(2016), Vol. 11, pp. 2854-2865, IEEE transactions on information forensics and security, Piscataway, N.J., C1

journal

Traceable identity-based group signature

Ke Gu, Lihao Yang, Yong Wang, Dr Sheng Wen

(2016), Vol. 50, pp. 193-226, RAIRO - Theoretical informatics and applications, Les Ulis, France, C1

journal

The inhibition and clearup of the mobile worms in wireless sensor networks

Tian Wang, Qun Wu, Dr Sheng Wen, Yiqiao Cai, Hui Tian, Yonghong Chen

(2016), Vol. 38, pp. 2202-2207, Journal of electronics and information technology, Beijing, China, C1

journal
2015

Detecting stepping stones by abnormal causality probability

Dr Sheng Wen, Mr Di Wu, Ping Li, Prof Yang Xiang, Prof Wanlei Zhou, Guiyi Wei

(2015), Vol. 8, pp. 1831-1844, Security and communication networks, London, Eng., C1

journal

K-Center: an approach on the multi-source identification of information diffusion

Miss Jiaojiao Jiang, Dr Sheng Wen, Dr Shui Yu, Mr Yang Xiang, Prof Wanlei Zhou

(2015), Vol. 10, pp. 2616-2626, IEEE transactions on information forensics and security, Piscataway, N.J., C1

journal

A sword with two edges: propagation studies on both positive and negative information in online social networks

Dr Sheng Wen, Mohammad Sayad Haghighi, Mr Chao Chen, Mr Yang Xiang, Prof Wanlei Zhou, Dr Weijia Jia

(2015), Vol. 64, pp. 640-653, IEEE transactions on computers, Piscataway, N.J., C1

journal

First-priority relation graph-based malicious users detection in mobile social networks

Li Xu, Lin Limei, Dr Sheng Wen

(2015), pp. 459-466, Network and system security : 9th international conference, NSS 2015, New York, NY, USA, November 3-5, 2015 proceedings, Berlin, Germany, B1

chapter

The relation between local and global influence of individuals in scale-free networks

Dr Sheng Wen, Miss Jiaojiao Jiang, Mr Kasra Majbouri Yazdi, Prof Yang Xiang, Prof Wanlei Zhou

(2015), pp. 80-84, SOCIALSEC 2015: Proceedings of the International Symposium on Security and Privacy in Social Networks and Big Data, Piscataway, N.J., E1

conference

Maximizing real-time streaming services based on a multi-servers networking framework

Wang Tianli, Yiqiao Cai, Dr Weijia Jia, Dr Sheng Wen, Guojun Wang, Hui Tian, Yonghong Chen, Bineng Zhong

(2015), Vol. 93, pp. 199-212, Computer networks, Amsterdam, The Netherlands, C1

journal

Mobility increases the risk of malware propagations in wireless networks

Dr Bo Liu, Prof Wanlei Zhou, Dr Longxiang Gao, Dr Sheng Wen, Dr Tom Luan

(2015), pp. 90-95, TrustCom 2015: Proceedings of the IEEE Trust, Security and Privacy in Computing and Communications 2015 International Conference, Piscataway, N. J., E1

conference

Identifying diffusion sources in large networks: a community structure based approach

Miss Jiaojiao Jiang, Mr Andi Zhou, Mr Kasra Majbouri Yazdi, Dr Sheng Wen, Dr Shui Yu, Mr Yang Xiang

(2015), pp. 302-309, TrustCom 2015: Proceedings of the IEEE Trust, Security and Privacy in Computing and Communications 2015 International Conference, Piscataway, N.J., E1

conference
2014

Are the popular users always important for information dissemination in online social networks?

Dr Sheng Wen, Miss Jiaojiao Jiang, Prof Yang Xiang, Dr Shui Yu, Prof Wanlei Zhou

(2014), Vol. 28, pp. 64-67, IEEE Network, Piscataway, N. J, C1

journal

Modeling and analysis on the propagation dynamics of modern email malware

Dr Sheng Wen, Wei Zhou, Dr Jun Zhang, Prof Yang Xiang, Prof Wanlei Zhou, Dr Weijia Jia, Cliff Zou

(2014), Vol. 11, pp. 361-374, IEEE Transactions on Dependable and Secure Computing, Piscataway, N.J., C1

journal

To shut them up or to clarify: restraining the spread of rumors in online social networks

Dr Sheng Wen, Miss Jiaojiao Jiang, Prof Yang Xiang, Dr Shui Yu, Prof Wanlei Zhou, Dr Weijia Jia

(2014), Vol. 25, pp. 3306-3316, IEEE transactions on parallel and distributed systems, Piscataway, NJ, C1

journal

Detection and defense of application-layer DDoS attacks in backbone web traffic

Wei Zhou, Dr Weijia Jia, Dr Sheng Wen, Prof Yang Xiang, Prof Wanlei Zhou

(2014), Vol. 38, pp. 36-46, Future generation computer systems, Amsterdam, Netherlands, C1

journal

Modeling the propagation of worms in networks: a survey

Ms Yini Wang, Dr Sheng Wen, Prof Yang Xiang, Prof Wanlei Zhou

(2014), Vol. 16, pp. 942-960, IEEE communications surveys and tutorials, Piscataway, NJ, C1

journal

Fog computing: a cloud to the ground support for smart things and machine-to-machine networks

Prof Ivan Stojmenovic, Dr Sheng Wen

(2014), pp. 117-122, ATNAC 2014 : Proceedings of the 2014 Australasian Telecommunication Networks and Applications Conference, Piscataway, N.J., E1

conference
2013

Modeling propagation dynamics of social network worms

Dr Sheng Wen, Wei Zhou, Dr Jun Zhang, Prof Yang Xiang, Prof Wanlei Zhou, Dr Weijia Jia

(2013), Vol. 24, pp. 1633-1643, IEEE transactions on parallel and distributed systems, Piscataway, N.J., C1

journal

Modeling and analysis for thwarting worm propagation in email networks

Dr Sheng Wen, Prof Yang Xiang, Prof Wanlei Zhou

(2013), pp. 763-769, Network and system security : 7th international conference, NSS 2013, Madrid, Spain, June 3-4, 2013, proceedings, Berlin, Germany, E1

conference

Detecting stepping stones by abnormal causality probability

Dr Sheng Wen, Ms Ping Li, Mr Di Wu, Prof Yang Xiang, Prof Wanlei Zhou

(2013), pp. 308-322, Cyberspace safety and security, Cham, Switzerland, B1

chapter
2012

Locating defense positions for thwarting the propagation of topological worms

Dr Sheng Wen, Wei Zhou, Ms Yini Wang, Prof Wanlei Zhou, Prof Yang Xiang

(2012), Vol. 16, pp. 560-563, IEEE Communications Letters, Piscataway, N.J., C1

journal

An analytical model on the propagation of modern email worms

Wei Zhou, Dr Sheng Wen, Ms Yini Wang, Prof Yang Xiang, Prof Wanlei Zhou

(2012), pp. 533-540, TrustCom 2012 : Proceedings of the 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, Piscataway, N.J., E1

conference
2011

Modeling worms propagation on probability

Ms Yini Wang, Dr Sheng Wen, Prof Yang Xiang

(2011), pp. 49-56, NSS 2011 : Proceedings of the 5th International Conference on Network and System Security, Milan, Italy, E1

conference

CAFS : a novel lightweight cache-based scheme for large-scale intrusion alert fusion

Dr Sheng Wen, Wei Zhou, Prof Yang Xiang, Prof Wanlei Zhou

(2011), Vol. 24, pp. 1137-1153, Concurrency computation : practice and experience, West Sussex, U. K., C1

journal

Eliminating errors in worm propagation models

Ms Yini Wang, Dr Sheng Wen, Mr Silvio Cesare, Prof Wanlei Zhou, Prof Yang Xiang

(2011), Vol. 15, pp. 1022-1024, IEEE Communications Letters, United States, C1

journal

The microcosmic model of worm propagation

Ms Yini Wang, Dr Sheng Wen, Mr Silvio Cesare, Prof Wanlei Zhou, Prof Yang Xiang

(2011), Vol. 54, pp. 1700-1720, The Computer Journal, Oxford, England, C1

journal

The probability model of peer-to-peer botnet propagation

Ms Yini Wang, Dr Sheng Wen, Wei Zhou, Prof Wanlei Zhou, Prof Yang Xiang

(2011), pp. 470-480, Algorithms and architectures for parallel processing : 11th International Conference, ICA3PP 2011, Melbourne, Australia, October 24-26, 2011 : proceedings, part I, Berlin, Germany, E1

conference
2010

CALD : surviving various application-layer DDoS attacks that mimic flash crowd

Dr Sheng Wen, Dr Weijia Jia, Wei Zhou, Prof Wanlei Zhou, Chuan Xu

(2010), pp. 247-254, NSS 2010 : Proceedings of the 4th International Conference on Network and System Security, Piscataway, N.J., E1

conference

A lightweight intrusion alert fusion system

Dr Sheng Wen, Prof Yang Xiang, Prof Wanlei Zhou

(2010), pp. 695-700, HPCC 2010 : Proceedings of the 12th IEEE International Conference on High Performance Computing and Communications, Piscataway, N.J., E1

conference

Grants

Industry and Other Funding

WeChat-based Social Networking Platform Prototype for facilitating connection between Australian and Chinese businesses.

Dr Sheng Wen

  • 2016: $18,181

Supervisions

No completed student supervisions to report