Mingzhong Wang
Cited by
Cited by
Search pattern leakage in searchable encryption: Attacks and new construction
C Liu, L Zhu, M Wang, Y Tan
Information Sciences 265, 176-188, 2014
LESPP: lightweight and efficient strong privacy preserving authentication scheme for secure VANET communication
M Wang, D Liu, L Zhu, Y Xu, F Wang
Computing 98 (7), 685-708, 2016
Trust‐based robust scheduling and runtime adaptation of scientific workflow
M Wang, K Ramamohanarao, J Chen
Concurrency and Computation: Practice and Experience 21 (16), 1982-1998, 2009
Classification of Encrypted Traffic with Second-Order Markov Chains and Application Attribute Bigrams
M Shen, M Wei, L Zhu, M Wang
IEEE Transactions on Information Forensics and Security 12 (8), 1830-1843, 2017
Linux 平台远程逻辑卷复制系统的设计
董欢庆, 李战怀, 林伟, 王明钟
计算机工程与应用 40 (18), 109-112, 2004
Computationally sound symbolic security reduction analysis of the group key exchange protocols using bilinear pairings
Z Zhang, L Zhu, L Liao, M Wang
Information Sciences 209 (November), 93-112, 2012
SEBAR: Social energy based routing scheme for mobile social delay tolerant networks
F Li, H Jiang, Y Wang, X Li, M Wang, T Abdeldjalil
2013 IEEE 32nd International Performance Computing and Communications …, 2013
Certificate-aware encrypted traffic classification using second-order markov chain
M Shen, M Wei, L Zhu, M Wang, F Li
2016 IEEE/ACM 24th International Symposium on Quality of Service (IWQoS), 1-10, 2016
Non-translational Alignment for Multi-relational Networks.
S Li, X Li, R Ye, M Wang, H Su, Y Ou
IJCAI, 4180-4186, 2018
A Vectorized Relational Graph Convolutional Network for Multi-Relational Network Alignment
R Ye, X Li, Y Fang, H Zang, M Wang
Proceedings of the 28th International Joint Conference on Artificial …, 2019
Threshold-based secure and privacy-preserving message verification in vanets
W Gao, M Wang, L Zhu, X Zhang
2014 IEEE 13th International Conference on Trust, Security and Privacy in …, 2014
王明钟, 李战怀, 董欢庆
微电子学与计算机 22 (005), 98-101, 2005
FollowMe if you can: a study of mobile crowd sensing with Pokémon go
M Wang
Proceedings of the Australasian Computer Science Week Multiconference, 1-9, 2017
ID list forwarding free confidentiality preserving data aggregation for wireless sensor networks
L Zhu, Z Yang, M Wang, M Li
International Journal of Distributed Sensor Networks 9 (5), 241261, 2013
GANE: A Generative Adversarial Network Embedding
H Hong, X Li, M Wang
IEEE transactions on neural networks and learning systems, 2019
Reasoning intra-dependency in commitments for robust scheduling
M Wang, K Ramamohanarao, J Chen
Proceedings of The 8th International Conference on Autonomous Agents and …, 2009
There’sa troll on the information bridge! An exploratory study of deviant online behaviour impacts on tourism cosmopolitanism
A Tham, M Wang
Tourism Recreation Research 42 (2), 258-272, 2017
Risk-aware intermediate dataset backup strategy in cloud-based data intensive workflows
M Wang, L Zhu, Z Zhang
Future Generation Computer Systems 55, 524-533, 2016
Self-adaptive anonymous communication scheme under SDN architecture
T Zeng, M Shen, M Wang, L Zhu, F Li
2015 IEEE 34th International Performance Computing and Communications …, 2015
Risk-aware checkpoint selection in cloud-based scientific workflow
M Wang, L Zhu, J Chen
2012 Second International Conference on Cloud and Green Computing, 137-144, 2012
The system can't perform the operation now. Try again later.
Articles 1–20