Mingzhong Wang
Title
Cited by
Cited by
Year
Search pattern leakage in searchable encryption: Attacks and new construction
C Liu, L Zhu, M Wang, Y Tan
Information Sciences 265, 176-188, 2014
1362014
LESPP: lightweight and efficient strong privacy preserving authentication scheme for secure VANET communication
M Wang, D Liu, L Zhu, Y Xu, F Wang
Computing 98 (7), 685-708, 2016
662016
Trust‐based robust scheduling and runtime adaptation of scientific workflow
M Wang, K Ramamohanarao, J Chen
Concurrency and Computation: Practice and Experience 21 (16), 1982-1998, 2009
552009
Classification of Encrypted Traffic with Second-Order Markov Chains and Application Attribute Bigrams
M Shen, M Wei, L Zhu, M Wang
IEEE Transactions on Information Forensics and Security 12 (8), 1830-1843, 2017
472017
Linux 平台远程逻辑卷复制系统的设计
董欢庆, 李战怀, 林伟, 王明钟
计算机工程与应用 40 (18), 109-112, 2004
322004
Computationally sound symbolic security reduction analysis of the group key exchange protocols using bilinear pairings
Z Zhang, L Zhu, L Liao, M Wang
Information Sciences 209 (November), 93-112, 2012
162012
SEBAR: Social energy based routing scheme for mobile social delay tolerant networks
F Li, H Jiang, Y Wang, X Li, M Wang, T Abdeldjalil
2013 IEEE 32nd International Performance Computing and Communications …, 2013
142013
Certificate-aware encrypted traffic classification using second-order markov chain
M Shen, M Wei, L Zhu, M Wang, F Li
2016 IEEE/ACM 24th International Symposium on Quality of Service (IWQoS), 1-10, 2016
132016
Non-translational Alignment for Multi-relational Networks.
S Li, X Li, R Ye, M Wang, H Su, Y Ou
IJCAI, 4180-4186, 2018
102018
A Vectorized Relational Graph Convolutional Network for Multi-Relational Network Alignment
R Ye, X Li, Y Fang, H Zang, M Wang
Proceedings of the 28th International Joint Conference on Artificial …, 2019
92019
Threshold-based secure and privacy-preserving message verification in vanets
W Gao, M Wang, L Zhu, X Zhang
2014 IEEE 13th International Conference on Trust, Security and Privacy in …, 2014
82014
基于层次结构的远程数据复制系统
王明钟, 李战怀, 董欢庆
微电子学与计算机 22 (005), 98-101, 2005
82005
FollowMe if you can: a study of mobile crowd sensing with Pokémon go
M Wang
Proceedings of the Australasian Computer Science Week Multiconference, 1-9, 2017
72017
ID list forwarding free confidentiality preserving data aggregation for wireless sensor networks
L Zhu, Z Yang, M Wang, M Li
International Journal of Distributed Sensor Networks 9 (5), 241261, 2013
62013
GANE: A Generative Adversarial Network Embedding
H Hong, X Li, M Wang
IEEE transactions on neural networks and learning systems, 2019
52019
Reasoning intra-dependency in commitments for robust scheduling
M Wang, K Ramamohanarao, J Chen
Proceedings of The 8th International Conference on Autonomous Agents and …, 2009
52009
There’sa troll on the information bridge! An exploratory study of deviant online behaviour impacts on tourism cosmopolitanism
A Tham, M Wang
Tourism Recreation Research 42 (2), 258-272, 2017
42017
Risk-aware intermediate dataset backup strategy in cloud-based data intensive workflows
M Wang, L Zhu, Z Zhang
Future Generation Computer Systems 55, 524-533, 2016
42016
Self-adaptive anonymous communication scheme under SDN architecture
T Zeng, M Shen, M Wang, L Zhu, F Li
2015 IEEE 34th International Performance Computing and Communications …, 2015
42015
Risk-aware checkpoint selection in cloud-based scientific workflow
M Wang, L Zhu, J Chen
2012 Second International Conference on Cloud and Green Computing, 137-144, 2012
42012
The system can't perform the operation now. Try again later.
Articles 1–20