Search pattern leakage in searchable encryption: Attacks and new construction C Liu, L Zhu, M Wang, Y Tan Information Sciences 265, 176-188, 2014 | 289 | 2014 |
A Vectorized Relational Graph Convolutional Network for Multi-Relational Network Alignment R Ye, X Li, Y Fang, H Zang, M Wang Proceedings of the 28th International Joint Conference on Artificial …, 2019 | 234 | 2019 |
Classification of Encrypted Traffic with Second-Order Markov Chains and Application Attribute Bigrams M Shen, M Wei, L Zhu, M Wang IEEE Transactions on Information Forensics and Security 12 (8), 1830-1843, 2017 | 200 | 2017 |
LESPP: lightweight and efficient strong privacy preserving authentication scheme for secure VANET communication M Wang, D Liu, L Zhu, Y Xu, F Wang Computing 98 (7), 685-708, 2016 | 116 | 2016 |
Trust‐based robust scheduling and runtime adaptation of scientific workflow M Wang, K Ramamohanarao, J Chen Concurrency and Computation: Practice and Experience 21 (16), 1982-1998, 2009 | 86 | 2009 |
Certificate-aware encrypted traffic classification using second-order markov chain M Shen, M Wei, L Zhu, M Wang, F Li 2016 IEEE/ACM 24th International Symposium on Quality of Service (IWQoS), 1-10, 2016 | 56 | 2016 |
Next and Next New POI Recommendation via Latent Behavior Pattern Inference X Li, D Han, J He, L Liao, M Wang ACM Transactions on Information Systems (TOIS) 37 (4), 1-28, 2019 | 47 | 2019 |
Technology Entrepreneurship in Developing Countries: Role of Telepresence Robots in Healthcare M Wang, C Pan, PK Ray IEEE Engineering Management Review 49 (1), 20-26, 2021 | 43 | 2021 |
CHA: Categorical Hierarchy-based Attention for Next POI Recommendation H Zang, D Han, X Li, Z Wan, M Wang ACM Transactions on Information Systems (TOIS) 40 (1), 1-22, 2021 | 38 | 2021 |
GANE: A Generative Adversarial Network Embedding H Hong, X Li, M Wang IEEE transactions on neural networks and learning systems 31 (7), 2325 - 2335, 2020 | 36 | 2020 |
Crowdsourcing Incentives for Multi-Hop Urban Parcel Delivery Network H Hong, X Li, D He, Y Zhang, M Wang IEEE Access 7, 26268-26277, 2019 | 33 | 2019 |
Linux 平台远程逻辑卷复制系统的设计 董欢庆, 李战怀, 林伟, 王明钟 计算机工程与应用 40 (18), 109-112, 2004 | 32 | 2004 |
Non-translational Alignment for Multi-relational Networks. S Li, X Li, R Ye, M Wang, H Su, Y Ou IJCAI, 4180-4186, 2018 | 26 | 2018 |
SimSR: Simple Distance-Based State Representations for Deep Reinforcement Learning H Zang, X Li, M Wang Proceedings of the AAAI Conference on Artificial Intelligence 36 (8), 8997-9005, 2022 | 18 | 2022 |
Inferring Continuous Latent Preference on Transition Intervals for Next Point-of-Interest Recommendation J He, X Li, L Liao, M Wang European Conference on Machine Learning and Principles and Practice of …, 2018 | 16 | 2018 |
Computationally sound symbolic security reduction analysis of the group key exchange protocols using bilinear pairings Z Zhang, L Zhu, L Liao, M Wang Information Sciences 209 (November), 93-112, 2012 | 15 | 2012 |
Threshold-based secure and privacy-preserving message verification in vanets W Gao, M Wang, L Zhu, X Zhang 2014 IEEE 13th International Conference on Trust, Security and Privacy in …, 2014 | 14 | 2014 |
SEBAR: Social energy based routing scheme for mobile social delay tolerant networks F Li, H Jiang, Y Wang, X Li, M Wang, T Abdeldjalil 2013 IEEE 32nd International Performance Computing and Communications …, 2013 | 14 | 2013 |
Context-Aware Safe Medication Recommendations with Molecular Graph and DDI Graph Embedding Q Chen, X Li, K Geng, M Wang Proceedings of the AAAI Conference on Artificial Intelligence 37 (6), 7053-7060, 2023 | 12 | 2023 |
Off-Policy Differentiable Logic Reinforcement Learning L Zhang, X Li, M Wang, A Tian Joint European Conference on Machine Learning and Knowledge Discovery in …, 2021 | 12 | 2021 |