Follow
Mingzhong Wang
Title
Cited by
Cited by
Year
Search pattern leakage in searchable encryption: Attacks and new construction
C Liu, L Zhu, M Wang, Y Tan
Information Sciences 265, 176-188, 2014
2632014
A Vectorized Relational Graph Convolutional Network for Multi-Relational Network Alignment
R Ye, X Li, Y Fang, H Zang, M Wang
Proceedings of the 28th International Joint Conference on Artificial …, 2019
2022019
Classification of Encrypted Traffic with Second-Order Markov Chains and Application Attribute Bigrams
M Shen, M Wei, L Zhu, M Wang
IEEE Transactions on Information Forensics and Security 12 (8), 1830-1843, 2017
1772017
LESPP: lightweight and efficient strong privacy preserving authentication scheme for secure VANET communication
M Wang, D Liu, L Zhu, Y Xu, F Wang
Computing 98 (7), 685-708, 2016
1102016
Trust‐based robust scheduling and runtime adaptation of scientific workflow
M Wang, K Ramamohanarao, J Chen
Concurrency and Computation: Practice and Experience 21 (16), 1982-1998, 2009
852009
Certificate-aware encrypted traffic classification using second-order markov chain
M Shen, M Wei, L Zhu, M Wang, F Li
2016 IEEE/ACM 24th International Symposium on Quality of Service (IWQoS), 1-10, 2016
472016
Next and Next New POI Recommendation via Latent Behavior Pattern Inference
X Li, D Han, J He, L Liao, M Wang
ACM Transactions on Information Systems (TOIS) 37 (4), 1-28, 2019
432019
Technology Entrepreneurship in Developing Countries: Role of Telepresence Robots in Healthcare
M Wang, C Pan, PK Ray
IEEE Engineering Management Review 49 (1), 20-26, 2021
362021
GANE: A Generative Adversarial Network Embedding
H Hong, X Li, M Wang
IEEE transactions on neural networks and learning systems 31 (7), 2325 - 2335, 2020
352020
Crowdsourcing Incentives for Multi-Hop Urban Parcel Delivery Network
H Hong, X Li, D He, Y Zhang, M Wang
IEEE Access 7, 26268-26277, 2019
322019
Linux 平台远程逻辑卷复制系统的设计
董欢庆, 李战怀, 林伟, 王明钟
计算机工程与应用 40 (18), 109-112, 2004
322004
CHA: Categorical Hierarchy-based Attention for Next POI Recommendation
H Zang, D Han, X Li, Z Wan, M Wang
ACM Transactions on Information Systems (TOIS) 40 (1), 1-22, 2021
272021
Non-translational Alignment for Multi-relational Networks.
S Li, X Li, R Ye, M Wang, H Su, Y Ou
IJCAI, 4180-4186, 2018
242018
Inferring Continuous Latent Preference on Transition Intervals for Next Point-of-Interest Recommendation
J He, X Li, L Liao, M Wang
European Conference on Machine Learning and Principles and Practice of …, 2018
152018
Computationally sound symbolic security reduction analysis of the group key exchange protocols using bilinear pairings
Z Zhang, L Zhu, L Liao, M Wang
Information Sciences 209 (November), 93-112, 2012
152012
SEBAR: Social energy based routing scheme for mobile social delay tolerant networks
F Li, H Jiang, Y Wang, X Li, M Wang, T Abdeldjalil
2013 IEEE 32nd International Performance Computing and Communications …, 2013
142013
Threshold-based secure and privacy-preserving message verification in vanets
W Gao, M Wang, L Zhu, X Zhang
2014 IEEE 13th International Conference on Trust, Security and Privacy in …, 2014
132014
SimSR: Simple Distance-Based State Representations for Deep Reinforcement Learning
H Zang, X Li, M Wang
Proceedings of the AAAI Conference on Artificial Intelligence 36 (8), 8997-9005, 2022
122022
Off-Policy Differentiable Logic Reinforcement Learning
L Zhang, X Li, M Wang, A Tian
Joint European Conference on Machine Learning and Knowledge Discovery in …, 2021
112021
There’sa troll on the information bridge! An exploratory study of deviant online behaviour impacts on tourism cosmopolitanism
A Tham, M Wang
Tourism Recreation Research 42 (2), 258-272, 2017
112017
The system can't perform the operation now. Try again later.
Articles 1–20