Wenke Lee - Publications

Affiliations: 
Georgia Institute of Technology, Atlanta, GA 
Area:
Computer Science

16 high-probability publications. We are testing a new system for linking publications to authors. You can help! If you notice any inaccuracies, please sign in and mark papers as correct or incorrect matches. If you identify any major omissions or other inaccuracies in the publication list, please let us know.

Year Citation  Score
2020 Moothedath S, Sahabandu D, Allen J, Clark A, Bushnell L, Lee W, Poovendran R. A Game-Theoretic Approach for Dynamic Information Flow Tracking to Detect Multi-Stage Advanced Persistent Threats Ieee Transactions On Automatic Control. 1-1. DOI: 10.1109/Tac.2020.2976040  0.305
2016 Riegler J, Ebert A, Qin X, Shen Q, Wang M, Ameen M, Kodo K, Ong SG, Lee WH, Lee G, Neofytou E, Gold JD, Connolly AJ, Wu JC. Comparison of Magnetic Resonance Imaging and Serum Biomarkers for Detection of Human Pluripotent Stem Cell-Derived Teratomas. Stem Cell Reports. PMID 26777057 DOI: 10.1016/J.Stemcr.2015.12.008  0.412
2015 Zhu Z, Tang NL, Xu L, Qin X, Mao S, Song Y, Liu L, Li F, Liu P, Yi L, Chang J, Jiang L, Ng BK, Shi B, Zhang W, ... ... Lee WY, et al. Genome-wide association study identifies new susceptibility loci for adolescent idiopathic scoliosis in Chinese girls. Nature Communications. 6: 8355. PMID 26394188 DOI: 10.1038/ncomms9355  0.405
2014 Först M, Tobey RI, Bromberger H, Wilkins SB, Khanna V, Caviglia AD, Chuang YD, Lee WS, Schlotter WF, Turner JJ, Minitti MP, Krupin O, Xu ZJ, Wen JS, Gu GD, et al. Melting of charge stripes in vibrationally driven La(1.875)Ba(0.125)CuO4: assessing the respective roles of electronic and lattice order in frustrated superconductors. Physical Review Letters. 112: 157002. PMID 24785066 DOI: 10.1103/Physrevlett.112.157002  0.358
2014 Zhang J, Perdisci R, Lee W, Luo X, Sarfraz U. Building a Scalable System for Stealthy P2P-Botnet Detection Ieee Transactions On Information Forensics and Security. 9: 27-38. DOI: 10.1109/Tifs.2013.2290197  0.39
2009 Perdisci R, Ariu D, Fogla P, Giacinto G, Lee W. McPAD: A multiple classifier system for accurate payload-based anomaly detection Computer Networks. 53: 864-881. DOI: 10.1016/J.Comnet.2008.11.011  0.675
2008 Medard M, Fragouli C, Lee W, Maxion RA, Stolfo S, Tong L. Guest editorial special section on statistical methods for network security and forensics Ieee Transactions On Information Forensics and Security. 3: 345-346. DOI: 10.1109/Tifs.2008.928950  0.56
2008 Perdisci R, Lanzi A, Lee W. Classification of packed executables for accurate computer virus detection Pattern Recognition Letters. 29: 1941-1946. DOI: 10.1016/J.Patrec.2008.06.016  0.319
2007 Payne BD, Sailer R, Cáceres R, Perez R, Lee W. A layered approach to simplified access control in virtualized systems Operating Systems Review (Acm). 41: 12-19. DOI: 10.1145/1278901.1278905  0.625
2006 Fogla P, Lee W. q-gram matching using tree models Ieee Transactions On Knowledge and Data Engineering. 18: 433-447. DOI: 10.1109/Tkde.2006.66  0.662
2003 Zhang Y, Lee W, Huang Y. Intrusion detection techniques for mobile wireless networks Wireless Networks. 9: 545-556. DOI: 10.1023/A:1024600519144  0.526
2002 Lee W, Fan W, Miller M, Stolfo SJ, Zadok E. Toward cost-sensitive modeling for intrusion detection and response Journal of Computer Security. 10: 5-22. DOI: 10.3233/Jcs-2002-101-202  0.59
2002 Lee W. Applying data mining to intrusion detection: the quest for automation, efficiency, and credibility Sigkdd Explorations. 4: 35-42. DOI: 10.1145/772862.772868  0.393
2002 Cabrera JBD, Lewis L, Qin X, Lee W, Mehra RK. Proactive Intrusion Detection and Distributed Denial of Service Attacks—A Case Study in Security Management Journal of Network and Systems Management. 10: 225-254. DOI: 10.1023/A:1015910917349  0.365
2000 Lee W, Stolfo SJ. A framework for constructing features and models for intrusion detection systems Acm Transactions On Information and System Security. 3: 227-261. DOI: 10.1145/382912.382914  0.619
2000 Lee W, Stolfo SJ, Mok KW. Adaptive intrusion detection: A data mining approach Artificial Intelligence Review. 14: 533-567. DOI: 10.1023/A:1006624031083  0.597
Show low-probability matches.