Suivre
Mingzhong Wang
Mingzhong Wang
Adresse e-mail validée de usc.edu.au
Titre
Citée par
Citée par
Année
Search pattern leakage in searchable encryption: Attacks and new construction
C Liu, L Zhu, M Wang, Y Tan
Information Sciences 265, 176-188, 2014
2892014
A Vectorized Relational Graph Convolutional Network for Multi-Relational Network Alignment
R Ye, X Li, Y Fang, H Zang, M Wang
Proceedings of the 28th International Joint Conference on Artificial …, 2019
2342019
Classification of Encrypted Traffic with Second-Order Markov Chains and Application Attribute Bigrams
M Shen, M Wei, L Zhu, M Wang
IEEE Transactions on Information Forensics and Security 12 (8), 1830-1843, 2017
2002017
LESPP: lightweight and efficient strong privacy preserving authentication scheme for secure VANET communication
M Wang, D Liu, L Zhu, Y Xu, F Wang
Computing 98 (7), 685-708, 2016
1162016
Trust‐based robust scheduling and runtime adaptation of scientific workflow
M Wang, K Ramamohanarao, J Chen
Concurrency and Computation: Practice and Experience 21 (16), 1982-1998, 2009
862009
Certificate-aware encrypted traffic classification using second-order markov chain
M Shen, M Wei, L Zhu, M Wang, F Li
2016 IEEE/ACM 24th International Symposium on Quality of Service (IWQoS), 1-10, 2016
562016
Next and Next New POI Recommendation via Latent Behavior Pattern Inference
X Li, D Han, J He, L Liao, M Wang
ACM Transactions on Information Systems (TOIS) 37 (4), 1-28, 2019
472019
Technology Entrepreneurship in Developing Countries: Role of Telepresence Robots in Healthcare
M Wang, C Pan, PK Ray
IEEE Engineering Management Review 49 (1), 20-26, 2021
432021
CHA: Categorical Hierarchy-based Attention for Next POI Recommendation
H Zang, D Han, X Li, Z Wan, M Wang
ACM Transactions on Information Systems (TOIS) 40 (1), 1-22, 2021
382021
GANE: A Generative Adversarial Network Embedding
H Hong, X Li, M Wang
IEEE transactions on neural networks and learning systems 31 (7), 2325 - 2335, 2020
362020
Crowdsourcing Incentives for Multi-Hop Urban Parcel Delivery Network
H Hong, X Li, D He, Y Zhang, M Wang
IEEE Access 7, 26268-26277, 2019
332019
Linux 平台远程逻辑卷复制系统的设计
董欢庆, 李战怀, 林伟, 王明钟
计算机工程与应用 40 (18), 109-112, 2004
322004
Non-translational Alignment for Multi-relational Networks.
S Li, X Li, R Ye, M Wang, H Su, Y Ou
IJCAI, 4180-4186, 2018
262018
SimSR: Simple Distance-Based State Representations for Deep Reinforcement Learning
H Zang, X Li, M Wang
Proceedings of the AAAI Conference on Artificial Intelligence 36 (8), 8997-9005, 2022
182022
Inferring Continuous Latent Preference on Transition Intervals for Next Point-of-Interest Recommendation
J He, X Li, L Liao, M Wang
European Conference on Machine Learning and Principles and Practice of …, 2018
162018
Computationally sound symbolic security reduction analysis of the group key exchange protocols using bilinear pairings
Z Zhang, L Zhu, L Liao, M Wang
Information Sciences 209 (November), 93-112, 2012
152012
Threshold-based secure and privacy-preserving message verification in vanets
W Gao, M Wang, L Zhu, X Zhang
2014 IEEE 13th International Conference on Trust, Security and Privacy in …, 2014
142014
SEBAR: Social energy based routing scheme for mobile social delay tolerant networks
F Li, H Jiang, Y Wang, X Li, M Wang, T Abdeldjalil
2013 IEEE 32nd International Performance Computing and Communications …, 2013
142013
Context-Aware Safe Medication Recommendations with Molecular Graph and DDI Graph Embedding
Q Chen, X Li, K Geng, M Wang
Proceedings of the AAAI Conference on Artificial Intelligence 37 (6), 7053-7060, 2023
122023
Off-Policy Differentiable Logic Reinforcement Learning
L Zhang, X Li, M Wang, A Tian
Joint European Conference on Machine Learning and Knowledge Discovery in …, 2021
122021
Le système ne peut pas réaliser cette opération maintenant. Veuillez réessayer plus tard.
Articles 1–20