Mingzhong Wang
Title
Cited by
Cited by
Year
Search pattern leakage in searchable encryption: Attacks and new construction
C Liu, L Zhu, M Wang, Y Tan
Information Sciences 265, 176-188, 2014
1872014
Classification of Encrypted Traffic with Second-Order Markov Chains and Application Attribute Bigrams
M Shen, M Wei, L Zhu, M Wang
IEEE Transactions on Information Forensics and Security 12 (8), 1830-1843, 2017
882017
LESPP: lightweight and efficient strong privacy preserving authentication scheme for secure VANET communication
M Wang, D Liu, L Zhu, Y Xu, F Wang
Computing 98 (7), 685-708, 2016
842016
Trust‐based robust scheduling and runtime adaptation of scientific workflow
M Wang, K Ramamohanarao, J Chen
Concurrency and Computation: Practice and Experience 21 (16), 1982-1998, 2009
702009
A Vectorized Relational Graph Convolutional Network for Multi-Relational Network Alignment
R Ye, X Li, Y Fang, H Zang, M Wang
Proceedings of the 28th International Joint Conference on Artificial …, 2019
522019
Linux 平台远程逻辑卷复制系统的设计
董欢庆, 李战怀, 林伟, 王明钟
计算机工程与应用 40 (18), 109-112, 2004
322004
Certificate-aware encrypted traffic classification using second-order markov chain
M Shen, M Wei, L Zhu, M Wang, F Li
2016 IEEE/ACM 24th International Symposium on Quality of Service (IWQoS), 1-10, 2016
262016
Next and Next New POI Recommendation via Latent Behavior Pattern Inference
X Li, D Han, J He, L Liao, M Wang
ACM Transactions on Information Systems (TOIS) 37 (4), 1-28, 2019
182019
GANE: A Generative Adversarial Network Embedding
H Hong, X Li, M Wang
IEEE transactions on neural networks and learning systems 31 (7), 2325 - 2335, 2020
162020
Computationally sound symbolic security reduction analysis of the group key exchange protocols using bilinear pairings
Z Zhang, L Zhu, L Liao, M Wang
Information Sciences 209 (November), 93-112, 2012
162012
Non-translational Alignment for Multi-relational Networks.
S Li, X Li, R Ye, M Wang, H Su, Y Ou
IJCAI, 4180-4186, 2018
152018
SEBAR: Social energy based routing scheme for mobile social delay tolerant networks
F Li, H Jiang, Y Wang, X Li, M Wang, T Abdeldjalil
2013 IEEE 32nd International Performance Computing and Communications …, 2013
142013
Crowdsourcing Incentives for Multi-Hop Urban Parcel Delivery Network
H Hong, X Li, D He, Y Zhang, M Wang
IEEE Access 7, 26268-26277, 2019
112019
Inferring Continuous Latent Preference on Transition Intervals for Next Point-of-Interest Recommendation
J He, X Li, L Liao, M Wang
European Conference on Machine Learning and Principles and Practice of …, 2018
102018
Threshold-based secure and privacy-preserving message verification in vanets
W Gao, M Wang, L Zhu, X Zhang
2014 IEEE 13th International Conference on Trust, Security and Privacy in …, 2014
102014
Risk-aware intermediate dataset backup strategy in cloud-based data intensive workflows
M Wang, L Zhu, Z Zhang
Future Generation Computer Systems 55, 524-533, 2016
82016
基于层次结构的远程数据复制系统
王明钟, 李战怀, 董欢庆
微电子学与计算机 22 (005), 98-101, 2005
82005
FollowMe if you can: a study of mobile crowd sensing with Pokémon go
M Wang
Proceedings of the Australasian Computer Science Week Multiconference, 1-9, 2017
72017
ID list forwarding free confidentiality preserving data aggregation for wireless sensor networks
L Zhu, Z Yang, M Wang, M Li
International Journal of Distributed Sensor Networks 9 (5), 241261, 2013
62013
Utilizing BDI features for transactional agent execution
M Wang, K Ramamohanarao, A Unruh
2007 IEEE/WIC/ACM International Conference on Intelligent Agent Technology …, 2007
62007
The system can't perform the operation now. Try again later.
Articles 1–20