Physarum-inspired routing protocol for energy harvesting wireless sensor networks W Tang, K Zhang, D Jiang Telecommunication Systems 67, 745-762, 2018 | 31 | 2018 |
A second-order diffusion model for influence maximization in social networks W Tang, G Luo, Y Wu, L Tian, X Zheng, Z Cai IEEE Transactions on Computational Social Systems 6 (4), 702-714, 2019 | 29 | 2019 |
Learning disentangled user representation with multi-view information fusion on social networks W Tang, B Hui, L Tian, G Luo, Z He, Z Cai Information Fusion 74, 77-86, 2021 | 28 | 2021 |
Job scheduling to minimize total completion time on multiple edge servers X Fang, Z Cai, W Tang, G Luo, J Luo, R Bi, H Gao IEEE Transactions on Network Science and Engineering 7 (4), 2245-2255, 2019 | 23 | 2019 |
Raucg: Retrieval-augmented unsupervised counter narrative generation for hate speech S Jiang, W Tang, X Chen, R Tanga, H Wang, W Wang arXiv preprint arXiv:2310.05650, 2023 | 13 | 2023 |
Detecting offensive language based on graph attention networks and fusion features Z Miao, X Chen, H Wang, R Tang, Z Yang, T Huang, W Tang IEEE Transactions on Computational Social Systems 11 (1), 1493-1505, 2023 | 12 | 2023 |
Susceptible user search for defending opinion manipulation W Tang, L Tian, X Zheng, G Luo, Z He Future Generation Computer Systems 115, 531-541, 2021 | 11 | 2021 |
A novel task allocation algorithm in mobile crowdsensing with spatial privacy preservation W Tang, Q Jin, X Zheng, G Luo, G Duan, A Chen Wireless Communications and Mobile Computing 2019 (1), 3154917, 2019 | 8 | 2019 |
Interaction matters: Encrypted traffic classification via status-based interactive behavior graph Y Li, X Chen, W Tang, Y Zhu, Z Han, Y Yue Applied Soft Computing 155, 111423, 2024 | 4 | 2024 |
Cost optimization in security-aware service function chain deployment with diverse vendors D Zheng, X Liu, W Tang, H Xu, X Cao GLOBECOM 2023-2023 IEEE Global Communications Conference, 2093-2098, 2023 | 4 | 2023 |
Relay selection based on social relationship prediction and information leakage reduction for mobile social networks X Xing, G Sun, Y Jin, W Tang, X Cheng Mathematical Foundations of Computing 1 (4), 369-382, 2018 | 3 | 2018 |
Analyzing topics in social media for improving digital twinning based product development W Tang, L Tian, X Zheng, K Yan Digital Communications and Networks 10 (2), 273-281, 2024 | 2 | 2024 |
Histogram publication over numerical values under local differential privacy X Zheng, K Yan, J Duan, W Tang, L Tian Wireless Communications and Mobile Computing 2021 (1), 8886255, 2021 | 2 | 2021 |
Budgeted persuasion on user opinions via varying susceptibility W Tang, X Xu, G Luo, Z He, K Zhan 2020 IEEE 39th International Performance Computing and Communications …, 2020 | 2 | 2020 |
Comprehensive vulnerability aspect extraction Q Li, W Tang, X Chen, S Feng, L Wang Applied Intelligence 54 (3), 2881-2899, 2024 | 1 | 2024 |
ReZG: Retrieval-augmented zero-shot counter narrative generation for hate speech S Jiang, W Tang, X Chen, R Tang, H Wang, W Wang Neurocomputing 620, 129140, 2025 | | 2025 |
Towards cost optimization in security-aware service function chaining and embedding over multi-vendor edge networks C Wang, D Zheng, X Liu, W Tang, H Xu, X Cao Computer Networks 257, 111002, 2025 | | 2025 |
NCCMF: Non-Collaborative Continuous Monitoring Framework for Container-Based Cloud Runtime Status. T Zheng, W Tang, X Chen, C Shen Computers, Materials & Continua 81 (1), 2024 | | 2024 |
Anomaly Detection Under Normality-Shifted IoT Scenario: Filter, Detection, and Adaption M Pan, W Tang, Z He, B Chen International Conference on Wireless Artificial Intelligent Computing …, 2024 | | 2024 |
Few-shot Website Fingerprinting with Distribution Calibration C Luo, W Tang, Q Wang, D Zheng IEEE Transactions on Dependable and Secure Computing, 2024 | | 2024 |