Ke Wang 王 珂
I am a third year PhD student in Computer Science Department of Columbia University. Currently I am working in the Intrusion Detection System (IDS) Lab led by Prof. Salvatore J. Stolfo. Previously I got my MS from Cornell University and BS from University of Science and Technology of China (USTC) with honor, both in CS.
My resume is available in pdf or html.
My candidate exam paper list is here.
In Fall 2004, I'm teaching COMS3101-3 Programming Language -- Java. Class site is here.
I've been TA for Artificial Intelligence in Fall 2003.
I am interested in machine learning and data mining, especially their application in computer security problems like intrusion detection, user behavior modeling, spam blocking etc.
Gabriela F. Cretu, Janak J. Parekh, Ke Wang, Salvatore J. Stolfo "Intrusion and Anomaly Detection Model Exchange for Mobile Ad-Hoc Networks", to appear in CCNC06'. [ pdf ]
Sal Stolfo, Ke Wang, Wei-Jen. Li. "Fileprint Analysis for Malware Detection." Technical report, Columbia Univesrity, June 2005.[pdf]
Ke Wang, Gabriela Cretu, Sal Stolfo. "Anomalous Payload-based Worm Detection and Signature Generation", Recent Advance in Intrusion Detection (RAID), Sept. 2005. [pdf]
Michael Locasto, Ke Wang, Angelos Keromytis, Sal Stolfo. "FLIPS: Hybrid Adaptive Intrusion Prevention", Recent Advance in Intrusion Detection (RAID), Sept. 2005. [pdf]
Wei-Jen Li, Ke Wang, Salvotore J. Stolfo, "Fileprints: Identifying File Types by n-gram Analysis." IEEE Information Assurance Workshop, West Point, 2005 [ pdf ]
Salvatore J. Stolfo, Shlomo Hershkop, Linh H. Bui, Ryan Ferster, Ke Wang. "Anomaly Detection in Computer Security and an Application to File System Accesses". ISMIS 2005: 14-28
Ke Wang, Salvatore J. Stolfo. "Anomalous Payload-based Network Intrusion Detection", Recent Advance in Intrusion Detection (RAID), Sept. 2004.
Rui Kuang, Eugene Ie, Ke Wang, Kai Wang, Mahira Siddiqi, Yoav Freund and Christina Leslie. " Profile-based String Kernels for Remote Homology Detection and Motif Extraction ". Proc. of the Computational Systems Bioinformatics Conference (CSB of IEEE) 2004. Invited to Journal of Bioinformatics and Computational Biology. [pdf]
Salvatore J. Stolfo, Wei-Jen Li, Shlomo Hershkop, Ke Wang, Chia-Wei Hu, Olivier Nimeskern. "Detecting Viral Propagations Using Email Behavior Profiles". ACM Transactions on Internet Technology (TOIT), May 2004. [pdf]
Salvatore J. Stolfo, Shlomo Hershkop, Ke Wang, Olivier Nimeskern, Chia-Wei Hu. "A Behavior-Based Approach to Secure Email Systems". Int. Workshop on Mathematical Methods, Models and Architectures for Computer Networks Security (ACNS-2003), September 20-24, 2003, St. Petersburg, Russia. [pdf]
Salvatore J. Stolfo, Shlomo Hershkop, Ke Wang, Olivier Nimeskern, Chia-Wei Hu. "Behavior Profiling of Email". 1st NSF/NIJ Symposium on Intelligence & Security Informatics (ISI 2003). June 2-3, 2003, Tucson, Arizona. [pdf]
Emin Gun Sirer, Ke Wang. "An access control language for web services". 7th ACM Symposium on Access Control Models and Technologies (SACMAT). June, 2002. [pdf]
Last update: March 3, 05