关注
Mingzhong Wang
Mingzhong Wang
在 usc.edu.au 的电子邮件经过验证
标题
引用次数
引用次数
年份
Search pattern leakage in searchable encryption: Attacks and new construction
C Liu, L Zhu, M Wang, Y Tan
Information Sciences 265, 176-188, 2014
2572014
A Vectorized Relational Graph Convolutional Network for Multi-Relational Network Alignment
R Ye, X Li, Y Fang, H Zang, M Wang
Proceedings of the 28th International Joint Conference on Artificial …, 2019
1882019
Classification of Encrypted Traffic with Second-Order Markov Chains and Application Attribute Bigrams
M Shen, M Wei, L Zhu, M Wang
IEEE Transactions on Information Forensics and Security 12 (8), 1830-1843, 2017
1692017
LESPP: lightweight and efficient strong privacy preserving authentication scheme for secure VANET communication
M Wang, D Liu, L Zhu, Y Xu, F Wang
Computing 98 (7), 685-708, 2016
1082016
Trustbased robust scheduling and runtime adaptation of scientific workflow
M Wang, K Ramamohanarao, J Chen
Concurrency and Computation: Practice and Experience 21 (16), 1982-1998, 2009
842009
Certificate-aware encrypted traffic classification using second-order markov chain
M Shen, M Wei, L Zhu, M Wang, F Li
2016 IEEE/ACM 24th International Symposium on Quality of Service (IWQoS), 1-10, 2016
462016
Next and Next New POI Recommendation via Latent Behavior Pattern Inference
X Li, D Han, J He, L Liao, M Wang
ACM Transactions on Information Systems (TOIS) 37 (4), 1-28, 2019
432019
Technology Entrepreneurship in Developing Countries: Role of Telepresence Robots in Healthcare
M Wang, C Pan, PK Ray
IEEE Engineering Management Review 49 (1), 20-26, 2021
332021
GANE: A Generative Adversarial Network Embedding
H Hong, X Li, M Wang
IEEE transactions on neural networks and learning systems 31 (7), 2325 - 2335, 2020
322020
Linux 平台远程逻辑卷复制系统的设计
董欢庆, 李战怀, 林伟, 王明钟
计算机工程与应用 40 (18), 109-112, 2004
322004
Crowdsourcing Incentives for Multi-Hop Urban Parcel Delivery Network
H Hong, X Li, D He, Y Zhang, M Wang
IEEE Access 7, 26268-26277, 2019
302019
CHA: Categorical Hierarchy-based Attention for Next POI Recommendation
H Zang, D Han, X Li, Z Wan, M Wang
ACM Transactions on Information Systems (TOIS) 40 (1), 1-22, 2021
272021
Non-translational Alignment for Multi-relational Networks.
S Li, X Li, R Ye, M Wang, H Su, Y Ou
IJCAI, 4180-4186, 2018
222018
Inferring Continuous Latent Preference on Transition Intervals for Next Point-of-Interest Recommendation
J He, X Li, L Liao, M Wang
European Conference on Machine Learning and Principles and Practice of …, 2018
152018
Computationally sound symbolic security reduction analysis of the group key exchange protocols using bilinear pairings
Z Zhang, L Zhu, L Liao, M Wang
Information Sciences 209 (November), 93-112, 2012
152012
SEBAR: Social energy based routing scheme for mobile social delay tolerant networks
F Li, H Jiang, Y Wang, X Li, M Wang, T Abdeldjalil
2013 IEEE 32nd International Performance Computing and Communications …, 2013
142013
Threshold-based secure and privacy-preserving message verification in vanets
W Gao, M Wang, L Zhu, X Zhang
2014 IEEE 13th International Conference on Trust, Security and Privacy in …, 2014
122014
There’sa troll on the information bridge! An exploratory study of deviant online behaviour impacts on tourism cosmopolitanism
A Tham, M Wang
Tourism Recreation Research 42 (2), 258-272, 2017
112017
Off-Policy Differentiable Logic Reinforcement Learning
L Zhang, X Li, M Wang, A Tian
Joint European Conference on Machine Learning and Knowledge Discovery in …, 2021
102021
Risk-aware intermediate dataset backup strategy in cloud-based data intensive workflows
M Wang, L Zhu, Z Zhang
Future Generation Computer Systems 55, 524-533, 2016
102016
系统目前无法执行此操作,请稍后再试。
文章 1–20