default search action
Ping Wang 0003
Person information
- affiliation: Peking University, School of Software and Microelectronics / National Engineering Research Center for Software Engineering, Beijing, China
Other persons with the same name
- Ping Wang — disambiguation page
- Ping Wang 0001 — York University, Department of Electrical Engineering and Computer Science, Toronto, Canada (and 2 more)
- Ping Wang 0002 — PLA University of Science and Technology, College of Defense Engineering, Nanjing, China
- Ping Wang 0004 — Tongji University, Department of Information and Communication Engineering, Shanghai, China (and 1 more)
- Ping Wang 0005 — Shenzhen University, College of Information Engineering, China (and 1 more)
- Ping Wang 0006 — Nanyang Technological University, School of Electrical and Electronic Engineering, Singapore (and 2 more)
- Ping Wang 0007 — Kun Shan University, Department of Information Management, Taiwan (and 1 more)
- Ping Wang 0008 — Chongqing University of Posts and Telecommunications, Key Laboratory of Industrial Internet of Things and Networked Control, China (and 1 more)
- Ping Wang 0009 — Xi'an Jiaotong University, School of Electronic and Information Engineering, China
- Ping Wang 0010 — Zhengzhou Science and Technology Institute, China
- Ping Wang 0011 — Jilin University, Department of Control Science and Engineering, Changchun, China
- Ping Wang 0012 — Georgia Institute of Technology, Atlanta, GA, USA
- Ping Wang 0013 — University of Southampton, UK
- Ping Wang 0014 — Chinese Academy of Sciences, Institute of Electrical Engineering, Key Laboratory of Power Electronics and Electric Drive, Beijing, China
- Ping Wang 0015 — Tianjin University, School of Electrical and Information Engineering, China
- Ping Wang 0016 — Shandong University of Finance and Economics, Department of Computer Science and Technology, Jinan, China
- Ping Wang 0017 — Sun Yat-sen University, Shenzhen, China (and 4 more)
- Ping Wang 0018 — National University of Defense Technology, Intelligence Science College, Changsha, China
- Ping Wang 0019 — North China Electric Power University, Hebei Provincial Key Laboratory of Power Transmission Equipment Security Defense, Baoding, China
- Ping Wang 0020 — Chinese Academy of Sciences, Institute of Geographic Sciences and Natural Resources Research, Beijing, China
- Ping Wang 0021 — Xidian University, School of Telecommunications Engineering, State Key Laboratory of Integrated Service Networks, Xi'an, China
- Ping Wang 0022 — Texas A&M University, Deptartment of Electrical and Computer Engineering; TX, USA
- Ping Wang 0023 — St. Francis Xavier University, Department of Mathematics, Statistics and Computer Science, Antigonish, NS, Canada
- Ping Wang 0024 — Stevens Institute of Technology, Hoboken, NJ, USA (and 1 more)
- Ping Wang 0025 — University of Queensland, Brisbane, Australia (and 2 more)
- Ping Wang 0026 — Zhejiang University, Department of Biomedical Engineering, Cancer Center, Hangzhou, China (and 1 more)
- Ping Wang 0027 — Xidian University, School of Computer Science and Technology, Institute of Software Engineering, Xi'an, China
- Ping Wang 0028 — Wuhan University, School of Information Management, Centre for Studies of Information Resources, Hubei, China
- Ping Wang 0029 — Westlake University, Hangzhou, China (and 2 more)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j51]Yicheng Pan, Yifan Zhang, Xinrui Jiang, Meng Ma, Ping Wang:
EffCause: Discover Dynamic Causal Relationships Efficiently from Time-Series. ACM Trans. Knowl. Discov. Data 18(5): 105:1-105:21 (2024) - [j50]Fei Ma, Ping Wang:
Structural Properties on Scale-Free Tree Network with an Ultra-Large Diameter. ACM Trans. Knowl. Discov. Data 18(8): 200:1-200:26 (2024) - [j49]Fei Ma, Ping Wang:
Determining Mean First-Passage Time for Random Walks on Stochastic Uniform Growth Tree Networks. IEEE Trans. Knowl. Data Eng. 36(11): 5940-5953 (2024) - [j48]Fei Ma, Renbo Zhu, Ping Wang:
PTT: Piecewise Transformation Technique for Analyzing Numerical Data Under Local Differential Privacy. IEEE Trans. Mob. Comput. 23(10): 9518-9531 (2024) - [c99]Chenbin Zhang, Zhiqiang Hu, Shuyu Dai, Qingyuan He, Defeng Liu, Kun Yan, Ping Wang:
Boundary-Aware Contrastive Learning for Single-Source Domain Generalization in Medical Image Segmentation. ICME 2024: 1-6 - [c98]Xinrui Jiang, Yang Zhang, Tingzhu Bi, Xiangzhuang Shen, Yu Zhang, Yicheng Pan, Meng Ma, Linlin Han, Feng Wang, Xian Liu, Ping Wang:
G-Cause: Parameter-free Global Diagnosis for Hyperscale Web Service Infrastructures. ICWS 2024: 1003-1014 - [c97]Tingzhu Bi, Yang Zhang, Yicheng Pan, Yu Zhang, Meng Ma, Xinrui Jiang, Linlin Han, Feng Wang, Xian Liu, Ping Wang:
FaultInsight: Interpreting Hyperscale Data Center Host Faults. KDD 2024: 141-152 - [c96]Minghui Wu, Chenxu Zhao, Anyang Su, Donglin Di, Tianyu Fu, Da An, Min He, Ya Gao, Meng Ma, Kun Yan, Ping Wang:
Hypergraph Multi-modal Large Language Model: Exploiting EEG and Eye-tracking Modalities to Evaluate Heterogeneous Responses for Video Understanding. ACM Multimedia 2024: 7316-7325 - [c95]Yicheng Pan, Yang Zhang, Tingzhu Bi, Linlin Han, Yu Zhang, Meng Ma, Xiangzhuang Shen, Xinrui Jiang, Feng Wang, Xian Liu, Ping Wang:
HEAL: Performance Troubleshooting Deep inside Data Center Hosts. SIGMETRICS/Performance (Abstracts) 2024: 41-42 - [i30]Minghui Wu, Chenxu Zhao, Anyang Su, Donglin Di, Tianyu Fu, Da An, Min He, Ya Gao, Meng Ma, Kun Yan, Ping Wang:
Hypergraph Multi-modal Large Language Model: Exploiting EEG and Eye-tracking Modalities to Evaluate Heterogeneous Responses for Video Understanding. CoRR abs/2407.08150 (2024) - [i29]Zihui Wu, Haichang Gao, Ping Wang, Shudong Zhang, Zhaoxiang Liu, Shiguo Lian:
Mining Glitch Tokens in Large Language Models via Gradient-based Discrete Optimization. CoRR abs/2410.15052 (2024) - 2023
- [j47]Yicheng Pan, Yang Zhang, Tingzhu Bi, Linlin Han, Yu Zhang, Meng Ma, Xiangzhuang Shen, Xinrui Jiang, Feng Wang, Xian Liu, Ping Wang:
HEAL: Performance Troubleshooting Deep inside Data Center Hosts. Proc. ACM Meas. Anal. Comput. Syst. 7(3): 54:1-54:24 (2023) - [j46]Yicheng Pan, Meng Ma, Xinrui Jiang, Ping Wang:
DyCause: Crowdsourcing to Diagnose Microservice Kernel Failure. IEEE Trans. Dependable Secur. Comput. 20(6): 4763-4777 (2023) - [j45]Wenting Li, Ping Wang, Kaitai Liang:
HPAKE: Honey Password-Authenticated Key Exchange for Fast and Safer Online Authentication. IEEE Trans. Inf. Forensics Secur. 18: 1596-1609 (2023) - [j44]Cheng Chang, Dongpu Cao, Long Chen, Kui Su, Kuifeng Su, Yuelong Su, Fei-Yue Wang, Jue Wang, Ping Wang, Junqing Wei, Gansha Wu, Xiangbin Wu, Huile Xu, Nanning Zheng, Li Li:
MetaScenario: A Framework for Driving Scenario Data Description, Storage and Indexing. IEEE Trans. Intell. Veh. 8(2): 1156-1175 (2023) - [j43]Fei Ma, Ping Wang, Xudong Luo, Renbo Zhu:
Structure Diversity and Mean Hitting Time for Random Walks on Stochastic Uniform Growth Tree Networks. IEEE Trans. Knowl. Data Eng. 35(8): 8572-8583 (2023) - [c94]Kun Yan, Xiao Li, Fangyun Wei, Jinglu Wang, Chenbin Zhang, Ping Wang, Yan Lu:
Two-shot Video Object Segmentation. CVPR 2023: 2257-2267 - [c93]Wenting Li, Jiahong Yang, Haibo Cheng, Ping Wang, Kaitai Liang:
Improved Wordpcfg for Passwords with Maximum Probability Segmentation. ICASSP 2023: 1-5 - [c92]Zongjie Zhang, Haibo Cheng, Wenting Li, Ping Wang:
An Improved GAN-based Depth Estimation Network for Face Anti-Spoofing. ICCAI 2023: 323-328 - [c91]Chenbin Zhang, Qingyuan He, Kun Yan, Meng Ma, Defeng Liu, Ping Wang:
CTSSeg: Consistent Teacher-Student model for magnetic resonance image Segmentation. ICME 2023: 2351-2356 - [c90]Deng Luo, Qingyuan He, Meng Ma, Kun Yan, Defeng Liu, Ping Wang:
ECANodule: Accurate Pulmonary Nodule Detection and Segmentation with Efficient Channel Attention. IJCNN 2023: 1-8 - [c89]Xukun Luo, Weijie Liu, Meng Ma, Ping Wang:
A Bidirectional Tree Tagging Scheme for Joint Medical Relation Extraction. IJCNN 2023: 1-8 - [c88]Xukun Luo, Ping Wang:
A Sequence Tagging based Framework for Few-Shot Relation Extraction. IJCNN 2023: 1-8 - [c87]Xinrui Jiang, Yicheng Pan, Meng Ma, Ping Wang:
Look Deep into the Microservice System Anomaly through Very Sparse Logs. WWW 2023: 2970-2978 - [i28]Kun Yan, Xiao Li, Fangyun Wei, Jinglu Wang, Chenbin Zhang, Ping Wang, Yan Lu:
Two-shot Video Object Segmentation. CoRR abs/2303.12078 (2023) - [i27]Ping Wang, Shishir Nagaraja, Aurélien Bourquard, Haichang Gao, Jeff Yan:
SoK: Acoustic Side Channels. CoRR abs/2308.03806 (2023) - [i26]Fei Ma, Jinzhi Ouyang, Ping Wang, Haobin Shi, Wei Pan:
Type-II Apollonian Model. CoRR abs/2312.15248 (2023) - 2022
- [j42]Meng Ma, Ping Wang:
Efficient Event Inference and Context-Awareness in Internet of Things Edge Systems. IEEE Trans. Big Data 8(3): 658-670 (2022) - [j41]Meng Ma, Weilan Lin, Disheng Pan, Ping Wang:
ServiceRank: Root Cause Identification of Anomaly in Large-Scale Microservice Architectures. IEEE Trans. Dependable Secur. Comput. 19(5): 3087-3100 (2022) - [j40]Yangxin Lin, Ping Wang, Yang Zhou, Fan Ding, Chen Wang, Huachun Tan:
Platoon Trajectories Generation: A Unidirectional Interconnected LSTM-Based Car-Following Model. IEEE Trans. Intell. Transp. Syst. 23(3): 2071-2081 (2022) - [j39]Yang Zhou, Yangxin Lin, Soyoung Ahn, Ping Wang, Xin Wang:
Platoon Trajectory Completion in a Mixed Traffic Environment Under Sparse Observation. IEEE Trans. Intell. Transp. Syst. 23(9): 16217-16226 (2022) - [j38]Fei Ma, Ping Wang, Xudong Luo:
A Method for Geodesic Distance on Subdivision of Trees With Arbitrary Orders and Their Applications. IEEE Trans. Knowl. Data Eng. 34(5): 2063-2075 (2022) - [j37]Fei Ma, Ping Wang, Xudong Luo:
Random Walks on Stochastic Generalized Vicsek Fractal Networks: Analytic Solution and Simulations. IEEE Trans. Netw. Sci. Eng. 9(3): 1335-1345 (2022) - [j36]Meng Ma, Jingbin Zhang, Ping Wang:
DePo: Dynamically Offload Expensive Event Processing to the Edge of Cyber-Physical Systems. IEEE Trans. Parallel Distributed Syst. 33(9): 2120-2132 (2022) - [j35]Meng Ma, Weilan Lin, Disheng Pan, Ping Wang:
Self-Adaptive Root Cause Diagnosis for Large-Scale Microservice Architecture. IEEE Trans. Serv. Comput. 15(3): 1399-1410 (2022) - [c86]Kun Yan, Chenbin Zhang, Jun Hou, Ping Wang, Zied Bouraoui, Shoaib Jameel, Steven Schockaert:
Inferring Prototypes for Multi-Label Few-Shot Image Classification with Word Vector Guided Attention. AAAI 2022: 2991-2999 - [c85]Yadi Wang, Yicheng Pan, Meng Ma, Ping Wang:
Abnormal Situation Simulation and Dynamic Causality Discovery in Urban Traffic Networks (Short Paper). COSIT 2022: 22:1-22:7 - [c84]Renbo Zhu, Xukun Luo, Meng Ma, Ping Wang:
Adaptive Graph Convolutional Network for Knowledge Graph Entity Alignment. EMNLP (Findings) 2022: 6011-6021 - [c83]Jiahong Xie, Haibo Cheng, Rong Zhu, Ping Wang, Kaitai Liang:
WordMarkov: A New Password Probability Model of Semantics. ICASSP 2022: 3034-3038 - [c82]Xiaoxi He, Haibo Cheng, Jiahong Xie, Ping Wang, Kaitai Liang:
Passtrans: An Improved Password Reuse Model Based on Transformer. ICASSP 2022: 3044-3048 - [c81]Han Ding, Kun Yan, Zheyan Tu, Ping Wang:
Exploring a Universal Training Method for Medical Image Classification. ICMHI 2022: 1-8 - [c80]Haowei Wang, Yicheng Pan, Meng Ma, Ping Wang:
When Dynamic Causality Comes to Graph-Temporal Neural Network. IJCNN 2022: 1-9 - [c79]Tingzhu Bi, Yicheng Pan, Xinrui Jiang, Meng Ma, Ping Wang:
VECROsim: A Versatile Metric-oriented Microservice Fault Simulation System (Tools and Artifact Track). ISSRE 2022: 297-308 - [i25]Xukun Luo, Ping Wang:
A Sequence Tagging based Framework for Few-Shot Relation Extraction. CoRR abs/2208.08053 (2022) - 2021
- [j34]Fei Ma, Ping Wang:
Determining Exact Solutions for Structural Parameters on Hierarchical Networks With Density Feature. Comput. J. 64(9): 1412-1424 (2021) - [j33]Mengting Bai, Yangxin Lin, Meng Ma, Ping Wang, Lihua Duan:
PrePCT: Traffic congestion prediction in smart cities with relative position congestion tensor. Neurocomputing 444: 147-157 (2021) - [j32]Jingbin Zhang, Meng Ma, Ping Wang, Xiao-dong Sun:
Middleware for the Internet of Things: A survey on requirements, enabling technologies, and solutions. J. Syst. Archit. 117: 102098 (2021) - [j31]Montida Pattaranantakul, Ruan He, Zonghua Zhang, Ahmed Meddahi, Ping Wang:
Leveraging Network Functions Virtualization Orchestrators to Achieve Software-Defined Access Control in the Clouds. IEEE Trans. Dependable Secur. Comput. 18(1): 372-383 (2021) - [j30]Wenting Li, Haibo Cheng, Ping Wang, Kaitai Liang:
Practical Threshold Multi-Factor Authentication. IEEE Trans. Inf. Forensics Secur. 16: 3573-3588 (2021) - [j29]Meng Ma, Yangxin Lin, Ping Wang, Lihua Duan, Ling Liu:
Ontology-Based Event Modeling and High-Confidence Processing in IoT-Enabled High-Speed Train Control System. J. Signal Process. Syst. 93(2-3): 155-167 (2021) - [c78]Lei Zhang, Meng Ma, Ping Wang:
Zero-shot Question Generation: Accelerate the Development of Domain-specific Dialogue System. BigDataSecurity 2021: 123-128 - [c77]Yan Gao, Shuyue Qian, Zihan Li, Ping Wang, Feiyue Wang, Qing He:
Digital Twin and Its Application in Transportation Infrastructure. DTPI 2021: 298-301 - [c76]Kun Yan, Lingbo Liu, Jun Hou, Ping Wang:
Representative Local Feature Mining for Few-Shot Learning. ICASSP 2021: 1730-1734 - [c75]Kun Yan, Zied Bouraoui, Ping Wang, Shoaib Jameel, Steven Schockaert:
Few-Shot Image Classification with Multi-Facet Prototypes. ICASSP 2021: 1740-1744 - [c74]Haibo Cheng, Wenting Li, Ping Wang, Kaitai Liang:
Improved Probabilistic Context-Free Grammars for Passwords Using Word Extraction. ICASSP 2021: 2690-2694 - [c73]Jue Wang, Ping Wang, Chao Zhang, Kuifeng Su, Jun Li:
F-Net: Fusion Neural Network for Vehicle Trajectory Prediction in Autonomous Driving. ICASSP 2021: 4095-4099 - [c72]Min Zhang, Meng Ma, Ping Wang:
Hierarchical Refined Attention for Scene Text Recognition. ICASSP 2021: 4175-4179 - [c71]Congjie He, Haowei Wang, Xinrui Jiang, Meng Ma, Ping Wang:
Dyna-PTM: OD-enhanced GCN for Metro Passenger Flow Prediction. IJCNN 2021: 1-9 - [c70]Yicheng Pan, Meng Ma, Xinrui Jiang, Ping Wang:
Faster, deeper, easier: crowdsourcing diagnosis of microservice kernel failure from user space. ISSTA 2021: 646-657 - [c69]Kun Yan, Zied Bouraoui, Ping Wang, Shoaib Jameel, Steven Schockaert:
Aligning Visual Prototypes with BERT Embeddings for Few-Shot Learning. ICMR 2021: 367-375 - [c68]Min Zhang, Meng Ma, Ping Wang:
Scene Text Recognition with Cascade Attention Network. ICMR 2021: 385-393 - [c67]Renbo Zhu, Meng Ma, Ping Wang:
RAGA: Relation-Aware Graph Attention Networks for Global Entity Alignment. PAKDD (1) 2021: 501-513 - [c66]Haibo Cheng, Wenting Li, Ping Wang, Chao-Hsien Chu, Kaitai Liang:
Incrementally Updateable Honey Password Vaults. USENIX Security Symposium 2021: 857-874 - [c65]Yipeng Gao, Haichang Gao, Sainan Luo, Yang Zi, Shudong Zhang, Wenjie Mao, Ping Wang, Yulong Shen, Jeff Yan:
Research on the Security of Visual Reasoning CAPTCHA. USENIX Security Symposium 2021: 3291-3308 - [i24]Fei Ma, Ping Wang:
Scale-free tree network with an ultra-large diameter. CoRR abs/2101.02320 (2021) - [i23]Kun Yan, Zied Bouraoui, Ping Wang, Shoaib Jameel, Steven Schockaert:
Few-shot Image Classification with Multi-Facet Prototypes. CoRR abs/2102.00801 (2021) - [i22]Renbo Zhu, Meng Ma, Ping Wang:
RAGA: Relation-aware Graph Attention Networks for Global Entity Alignment. CoRR abs/2103.00791 (2021) - [i21]Kun Yan, Zied Bouraoui, Ping Wang, Shoaib Jameel, Steven Schockaert:
Aligning Visual Prototypes with BERT Embeddings for Few-Shot Learning. CoRR abs/2105.10195 (2021) - [i20]Kun Yan, Chenbin Zhang, Jun Hou, Ping Wang, Zied Bouraoui, Shoaib Jameel, Steven Schockaert:
Inferring Prototypes for Multi-Label Few-Shot Image Classification with Word Vector Guided Attention. CoRR abs/2112.01037 (2021) - [i19]Fei Ma, Renbo Zhu, Ping Wang:
OPTT: Optimal Piecewise Transformation Technique for Analyzing Numerical Data under Local Differential Privacy. CoRR abs/2112.04745 (2021) - [i18]Fei Ma, Ping Wang:
Randomized Response Mechanisms for Differential Privacy Data Analysis: Bounds and Applications. CoRR abs/2112.07397 (2021) - 2020
- [j28]Ding Wang, Xizhe Zhang, Zijian Zhang, Ping Wang:
Understanding security failures of multi-factor authentication schemes for multi-server environments. Comput. Secur. 88 (2020) - [j27]Congjie He, Meng Ma, Ping Wang:
Extract interpretability-accuracy balanced rules from artificial neural networks: A review. Neurocomputing 387: 346-358 (2020) - [j26]Jingbin Zhang, Meng Ma, Wei He, Ping Wang:
On-demand deployment for IoT applications. J. Syst. Archit. 111: 101794 (2020) - [j25]Ding Wang, Ping Wang, Chenyu Wang:
Efficient Multi-Factor User Authentication Protocol with Forward Secrecy for Real-Time Data Access in WSNs. ACM Trans. Cyber Phys. Syst. 4(3): 30:1-30:26 (2020) - [c64]Weijie Liu, Peng Zhou, Zhe Zhao, Zhiruo Wang, Qi Ju, Haotang Deng, Ping Wang:
K-BERT: Enabling Language Representation with Knowledge Graph. AAAI 2020: 2901-2908 - [c63]Rong Zhu, Xiaoxi He, Jiahong Xie, Zongjie Zhang, Ping Wang:
An Improved RFID-based Authentication Protocol for Rail Transit. BigDataSE 2020: 65-72 - [c62]Disheng Pan, Xizi Zheng, Weijie Liu, Mengya Li, Meng Ma, Ying Zhou, Li Yang, Ping Wang:
Multi-label Classification for Clinical Text with Feature-level Attention. BigDataSecurity/HPSC/IDS 2020: 186-191 - [c61]Chen Lyu, Weijie Liu, Ping Wang:
Few-Shot Text Classification with Edge-Labeling Graph Neural Network-Based Prototypical Network. COLING 2020: 5547-5552 - [c60]Jingzhuo Zhang, Weijie Liu, Ping Wang:
Drug Drug Interaction Extraction from Chinese Biomedical Literature Using Distant Supervision. ICKG 2020: 593-598 - [c59]Jingbin Zhang, Meng Ma, Ping Wang:
Lead Time-Aware Proactive Adaptation for Service-Oriented Systems. ICWS 2020: 481-488 - [c58]Yangxin Lin, Yang Zhou, Shengyue Yao, Fan Ding, Ping Wang:
Real-Time Fine-Grained Freeway Traffic State Estimation Under Sparse Observation. ECML/PKDD (1) 2020: 561-577 - [c57]Meng Ma, Jingmin Xu, Yuan Wang, Pengfei Chen, Zonghua Zhang, Ping Wang:
AutoMAP: Diagnose Your Microservice-based Web Applications Automatically. WWW 2020: 246-258 - [i17]Fei Ma, Xiaomin Wang, Ping Wang:
Counterexample: scale-free networked graphs with invariable diameter and density feature. CoRR abs/2001.03525 (2020) - [i16]Fei Ma, Ping Wang:
Trapping problem on star-type graphs with applications. CoRR abs/2002.11713 (2020) - [i15]Xukun Luo, Weijie Liu, Meng Ma, Ping Wang:
BiTT: Bidirectional Tree Tagging for Joint Extraction of Overlapping Entities and Relations. CoRR abs/2008.13339 (2020) - [i14]Fei Ma, Ping Wang:
Analytic formulae for random walks on stochastic uniform growth trees. CoRR abs/2010.14815 (2020)
2010 – 2019
- 2019
- [j24]Wenting Li, Ping Wang:
Two-factor authentication in industrial Internet-of-Things: Attacks, evaluation and new construction. Future Gener. Comput. Syst. 101: 694-708 (2019) - [j23]Weijie Liu, Anpeng Huang, Ping Wang, Chao-Hsien Chu:
PbFG: Physique-based fuzzy granular modeling for non-invasive blood glucose monitoring. Inf. Sci. 497: 56-76 (2019) - [j22]Ping Wang, Bin Li, Hongjin Shi, Yaosheng Shen, Ding Wang:
Revisiting Anonymous Two-Factor Authentication Schemes for IoT-Enabled Devices in Cloud Computing Environments. Secur. Commun. Networks 2019: 2516963:1-2516963:13 (2019) - [j21]Xiongfei Geng, Yongcai Wang, Ping Wang, Baochen Zhang:
Motion Plan of Maritime Autonomous Surface Ships by Dynamic Programming for Collision Avoidance and Speed Optimization. Sensors 19(2): 434 (2019) - [c56]Weijie Liu, Guangyu Wang, Anpeng Huang, Ping Wang:
NIV-NGM - A Novel Non-invasive Blood Glucose Monitoring Method based on Near-infrared Videos. BIBM 2019: 953-957 - [c55]Yiming Zhao, Wenting Li, Zijian Zhang, Ping Wang:
Password Expiration Strategy: A Perspective of Ecological Memory. BigDataService 2019: 167-172 - [c54]Meng Ma, Jun Yang, Ping Wang, Weijie Liu, Jingzhuo Zhang:
Light-Weight and Scalable Hierarchical-MVC Architecture for Cloud Web Applications. CSCloud/EdgeCom 2019: 40-45 - [c53]Wenting Li, Ping Wang:
Cryptanalysis of Two Chaotic Maps-Based Authentication Schemes in Edge Computing. CSCloud/EdgeCom 2019: 157-162 - [c52]Wenting Li, Haibo Cheng, Ping Wang:
Secure Chaotic Maps-based Authentication Scheme for Real-Time Data Access In Internet of Things. Cyber Security 2019: 1-8 - [c51]Weijie Liu, Anpeng Huang, Ping Wang, Hebin Yao:
Transfer and Collaborative Learning Method for Personalized Noninvasive Blood Glucose Measurement Modeling. ICASSP 2019: 1179-1183 - [c50]Zhonghui You, Jinmian Ye, Kunming Li, Zenglin Xu, Ping Wang:
Adversarial Noise Layer: Regularize Neural Network by Adding Noise. ICIP 2019: 909-913 - [c49]Meng Ma, Weilan Lin, Disheng Pan, Ping Wang:
MS-Rank: Multi-Metric and Self-Adaptive Root Cause Diagnosis for Microservice Applications. ICWS 2019: 60-67 - [c48]Ling Liu, Ping Wang, Wei Wei, Qing Li, Bo Zhang:
Intelligent Dispatching and Coordinated Control Method at Railway Stations for Virtually Coupled Train Sets. ITSC 2019: 607-612 - [c47]Ling Liu, Ping Wang, Ying Wang, Wei Wei, Zhoufan Wang:
Dynamic train formation and dispatching for rail transit based on virtually coupled train set. ITSC 2019: 2823-2828 - [c46]Zhonghui You, Kun Yan, Jinmian Ye, Meng Ma, Ping Wang:
Gate Decorator: Global Filter Pruning Method for Accelerating Deep Convolutional Neural Networks. NeurIPS 2019: 2130-2141 - [c45]Ping Wang, Fanhua Xu, Meng Ma, Lihua Duan:
Efficient Spatial Big Data Storage and Query in HBase. SmartCloud 2019: 149-155 - [c44]Ding Wang, Ping Wang, Debiao He, Yuan Tian:
Birthday, Name and Bifacial-security: Understanding Passwords of Chinese Web Users. USENIX Security Symposium 2019: 1537-1555 - [c43]Haibo Cheng, Zhixiong Zheng, Wenting Li, Ping Wang, Chao-Hsien Chu:
Probability Model Transforming Encoders Against Encoding Attacks. USENIX Security Symposium 2019: 1573-1590 - [i13]Fei Ma, Xiaoming Wang, Ping Wang:
An ensemble of random graphs with identical degree distribution. CoRR abs/1904.11208 (2019) - [i12]Fei Ma, Ping Wang, Bing Yao:
Random walks on Fibonacci treelike models: emergence of power law. CoRR abs/1904.11314 (2019) - [i11]Fei Ma, Ding Wang, Ping Wang, Bing Yao:
Handshake between Fibonacci series and pure preferential attachment mechanism on a graph-model. CoRR abs/1905.03039 (2019) - [i10]Weijie Liu, Peng Zhou, Zhe Zhao, Zhiruo Wang, Qi Ju, Haotang Deng, Ping Wang:
K-BERT: Enabling Language Representation with Knowledge Graph. CoRR abs/1909.07606 (2019) - [i9]Zhonghui You, Kun Yan, Jinmian Ye, Meng Ma, Ping Wang:
Gate Decorator: Global Filter Pruning Method for Accelerating Deep Convolutional Neural Networks. CoRR abs/1909.08174 (2019) - [i8]Yangxin Lin, Ping Wang, Yang Zhou, Fan Ding, Chen Wang, Huachun Tan:
Platoon trajectories generation: A unidirectional interconnected LSTM-based car following model. CoRR abs/1910.11843 (2019) - [i7]Fei Ma, Xiaomin Wang, Ping Wang, Xudong Luo:
Dense graphs with scale-free feature. CoRR abs/1912.08923 (2019) - 2018
- [j20]Meng Ma, Ping Wang, Chao-Hsien Chu:
Redundant Reader Elimination in Large-Scale Distributed RFID Networks. IEEE Internet Things J. 5(2): 884-894 (2018) - [j19]Zhixiong Zheng, Haibo Cheng, Zijian Zhang, Yiming Zhao, Ping Wang:
An Alternative Method for Understanding User-Chosen Passwords. Secur. Commun. Networks 2018: 6160125:1-6160125:12 (2018) - [j18]Ding Wang, Haibo Cheng, Debiao He, Ping Wang:
On the Challenges in Designing Identity-Based Privacy-Preserving Authentication Schemes for Mobile Devices. IEEE Syst. J. 12(1): 916-925 (2018) - [j17]Ping Wang, Meng Ma, Chao-Hsien Chu:
Long-Term Event Processing over Data Streams in Cyber-Physical Systems. ACM Trans. Cyber Phys. Syst. 2(2): 14:1-14:23 (2018) - [j16]Ding Wang, Ping Wang:
Two Birds with One Stone: Two-Factor Authentication with Security Beyond Conventional Bound. IEEE Trans. Dependable Secur. Comput. 15(4): 708-722 (2018) - [j15]Meng Ma, Weilan Lin, Jingbin Zhang, Ping Wang, Yuchen Zhou, Xiaoxing Liang:
Toward Energy-Awareness Smart Building: Discover the Fingerprint of Your Electrical Appliances. IEEE Trans. Ind. Informatics 14(4): 1458-1468 (2018) - [j14]Ding Wang, Wenting Li, Ping Wang:
Measuring Two-Factor Authentication Schemes for Real-Time Data Access in Industrial Wireless Sensor Networks. IEEE Trans. Ind. Informatics 14(9): 4081-4092 (2018) - [j13]Meng Ma, Weilan Lin, Disheng Pan, Yangxin Lin, Ping Wang, Yuchen Zhou, Xiaoxing Liang:
Data and Decision Intelligence for Human-in-the-Loop Cyber-Physical Systems: Reference Model, Recent Progresses and Challenges. J. Signal Process. Syst. 90(8-9): 1167-1178 (2018) - [j12]Wenting Li, Yaosheng Shen, Ping Wang:
Breaking Three Remote user Authentication Systems for Mobile Devices. J. Signal Process. Syst. 90(8-9): 1179-1190 (2018) - [j11]Ping Wang, Jing Liu, Jinlong Lin, Chao-Hsien Chu:
Model Based Energy Consumption Analysis of Wireless Cyber Physical Systems. J. Signal Process. Syst. 90(8-9): 1191-1204 (2018) - [j10]Chenyu Wang, Ke Ding, Bin Li, Yiming Zhao, Guoai Xu, Yanhui Guo, Ping Wang:
An Enhanced User Authentication Protocol Based on Elliptic Curve Cryptosystem in Cloud Computing Environment. Wirel. Commun. Mob. Comput. 2018: 3048697:1-3048697:13 (2018) - [j9]Wenting Li, Bin Li, Yiming Zhao, Ping Wang, Fushan Wei:
Cryptanalysis and Security Enhancement of Three Authentication Schemes in Wireless Sensor Networks. Wirel. Commun. Mob. Comput. 2018: 8539674:1-8539674:11 (2018) - [c42]Ping Wang, Jingmin Xu, Meng Ma, Weilan Lin, Disheng Pan, Yuan Wang, Pengfei Chen:
CloudRanger: Root Cause Identification for Cloud Native Systems. CCGrid 2018: 492-502 - [c41]Yaosheng Shen, Ding Wang, Ping Wang:
Revisiting Anonymous Two-Factor Authentication Schemes for Cloud Computing. ICCCS (2) 2018: 134-146 - [c40]Ping Wang, Zijian Zhang, Ding Wang:
Revisiting Anonymous Two-Factor Authentication Schemes for Multi-server Environment. ICICS 2018: 805-816 - [c39]Weilan Lin, Meng Ma, Disheng Pan, Ping Wang:
FacGraph: Frequent Anomaly Correlation Graph Mining for Root Cause Diagnose in Micro-Service Architecture. IPCCC 2018: 1-8 - [c38]Ding Wang, Haibo Cheng, Ping Wang, Jeff Yan, Xinyi Huang:
A Security Analysis of Honeywords. NDSS 2018 - [c37]Mengting Bai, Yangxin Lin, Meng Ma, Ping Wang:
Travel-Time Prediction Methods: A Review. SmartCom 2018: 67-77 - [c36]Jingbin Zhang, Meng Ma, Ping Wang:
Fast Implementation for SM4 Cipher Algorithm Based on Bit-Slice Technology. SmartCom 2018: 104-113 - [c35]Ping He, Meng Ma, Ping Wang:
Regional Estimation Prior Network for Crowd Analyzing. SmartCom 2018: 251-260 - [c34]Weilan Lin, Fanhua Xu, Meng Ma, Ping Wang:
RBD: A Reference Railway Big Data System Model. SmartCom 2018: 261-270 - [c33]Jingbin Zhang, Peikai Zheng, Meng Ma, Ping Wang:
Toward Ubiquitous Environment: An Scalable Framework for Autonomous Service Composition. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2018: 611-618 - [i6]Zhonghui You, Jinmian Ye, Kunming Li, Ping Wang:
Adversarial Noise Layer: Regularize Neural Network By Adding Noise. CoRR abs/1805.08000 (2018) - 2017
- [j8]Meng Ma, Ping Wang:
On the consistency of event processing: A semantic approach. Knowl. Based Syst. 137: 29-41 (2017) - [j7]Ding Wang, Haibo Cheng, Ping Wang, Xinyi Huang, Gaopeng Jian:
Zipf's Law in Passwords. IEEE Trans. Inf. Forensics Secur. 12(11): 2776-2791 (2017) - [c32]Weijie Liu, Anpeng Huang, Ping Wang:
BpMC: A novel algorithm retrieving multilayered tissue bio-optical properties for non-invasive blood glucose measurement. BIBM 2017: 451-456 - [c31]Wenting Li, Qianchen Gu, Yiming Zhao, Ping Wang:
Breaking Two Remote User Authentication Systems for Mobile Devices. BigDataSecurity/HPSC/IDS 2017: 37-42 - [c30]Yangxin Lin, Ping Wang, Meng Ma:
Intelligent Transportation System(ITS): Concept, Challenge and Opportunity. BigDataSecurity/HPSC/IDS 2017: 167-172 - [c29]Jing Liu, Ping Wang, Jinlong Lin, Chao-Hsien Chu:
Model Based Energy Consumption Analysis of Wireless Cyber Physical Systems. BigDataSecurity/HPSC/IDS 2017: 219-224 - [c28]Ding Wang, Qianchen Gu, Xinyi Huang, Ping Wang:
Understanding Human-Chosen PINs: Characteristics, Distribution and Security. AsiaCCS 2017: 372-385 - [c27]Zhitao Wan, Lihua Duan, Ping Wang:
Cloud Migration: Layer Partition and Integration. EDGE 2017: 150-157 - [c26]Jingmin Xu, Pengfei Chen, Lin Yang, Fanjing Meng, Ping Wang:
LogDC: Problem Diagnosis for Declartively-Deployed Cloud Applications with Log. ICEBE 2017: 282-287 - [c25]Meng Ma, Ling Liu, Yangxin Lin, Disheng Pan, Ping Wang:
Event Description and Detection in Cyber-Physical Systems: An Ontology-Based Language and Approach. ICPADS 2017: 1-8 - [c24]Wei He, Jingbin Zhang, Meng Ma, Ping Wang:
MODE: A Context-Aware IoT Middleware Supporting On-Demand Deployment for Mobile Devices. ICPADS 2017: 81-88 - [c23]Jing Liu, Ping Wang, Jinlong Lin, Chao-Hsien Chu:
A Controller/Architecture Co-design Framework for Wireless Cyber-Physical Systems. iThings/GreenCom/CPSCom/SmartData 2017: 76-84 - [c22]Meng Ma, Weilan Lin, Jingbin Zhang, Ping Wang, Yuchen Zhou, Xiaoxing Liang:
Discover the fingerprint of electrical appliance: Online appliance behavior learning and detection in smart homes. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2017: 1-8 - 2016
- [c21]Zhitao Wan, Ping Wang:
A Novel Pattern Based Dynamic Service Composition Framework. SCC 2016: 235-242 - [c20]Ding Wang, Qianchen Gu, Haibo Cheng, Ping Wang:
The Request for Better Measurement: A Comparative Evaluation of Two-Factor Authentication Schemes. AsiaCCS 2016: 475-486 - [c19]Ding Wang, Zijian Zhang, Ping Wang, Jeff Yan, Xinyi Huang:
Targeted Online Password Guessing: An Underestimated Threat. CCS 2016: 1242-1254 - [c18]Ding Wang, Debiao He, Haibo Cheng, Ping Wang:
fuzzyPSM: A New Password Strength Meter Using Fuzzy Probabilistic Context-Free Grammars. DSN 2016: 595-606 - [c17]Ding Wang, Ping Wang:
On the Implications of Zipf's Law in Passwords. ESORICS (1) 2016: 111-131 - 2015
- [j6]Meng Ma, Ping Wang, Chao-Hsien Chu, Ling Liu:
Efficient Multipattern Event Processing Over High-Speed Train Data Streams. IEEE Internet Things J. 2(4): 295-309 (2015) - [j5]Ding Wang, Nan Wang, Ping Wang, Sihan Qing:
Preserving privacy for free: Efficient and provably secure two-factor authentication scheme with user anonymity. Inf. Sci. 321: 162-178 (2015) - [j4]Zhitao Wan, Ping Wang, Lihua Duan, Fan Jing Meng, Jing Min Xu:
Graph Similarity based Cloud Migration Service Composition Pattern Discovery. Int. J. Web Serv. Res. 12(2): 26-46 (2015) - [j3]Ding Wang, Debiao He, Ping Wang, Chao-Hsien Chu:
Anonymous Two-Factor Authentication in Distributed Systems: Certain Goals Are Beyond Attainment. IEEE Trans. Dependable Secur. Comput. 12(4): 428-442 (2015) - [c16]Meng Ma, Ping Wang, Chao-Hsien Chu:
LTCEP: Efficient Long-Term Event Processing for Internet of Things Data Streams. DSDIS 2015: 548-555 - [c15]Ding Wang, Ping Wang:
The Emperor's New Password Creation Policies: An Evaluation of Leading Web Services and the Effect of Role in Resisting Against Online Guessing. ESORICS (2) 2015: 456-477 - [c14]Shixian Du, Meng Ma, Ping Wang, Jinlong Lin, Lin Ma, Ling Liu:
A Cloud-Based High-Speed Rail Information Service Platform Architecture. FCST 2015: 285-291 - [c13]Yangxin Lin, Ping Wang, Jinlong Lin, Meng Ma, Ling Liu, Lin Ma:
Class-based delta-encoding for high-speed train data stream. IPCCC 2015: 1-8 - [c12]Jun Yang, Meng Ma, Ping Wang, Ling Liu:
From Complex Event Processing to Cognitive Event Processing: Approaches, Challenges, and Opportunities. UIC/ATC/ScalCom 2015: 1432-1438 - [c11]Meng Ma, Ping Wang, Jun Yang, Chao Li:
OntoEvent: An Ontology-Based Event Description Language for Semantic Complex Event Processing. WAIM 2015: 448-451 - [i5]Ding Wang, Ping Wang:
The Emperor's New Password Creation Policies. IACR Cryptol. ePrint Arch. 2015: 825 (2015) - [i4]Ding Wang, Ping Wang:
On the Usability of Two-Factor Authentication. IACR Cryptol. ePrint Arch. 2015: 1131 (2015) - 2014
- [j2]Ding Wang, Ping Wang:
Understanding security failures of two-factor authentication schemes for real-time applications in hierarchical wireless sensor networks. Ad Hoc Networks 20: 1-15 (2014) - [j1]Ding Wang, Ping Wang:
On the anonymity of two-factor authentication schemes for wireless sensor networks: Attacks, principle and solutions. Comput. Networks 73: 41-57 (2014) - [c10]Zhitao Wan, Fan Jing Meng, Jing Min Xu, Ping Wang:
Service Composition Pattern Generation for Cloud Migration: A Graph Similarity Analysis Approach. ICWS 2014: 321-328 - [c9]Meng Ma, Ping Wang, Chao-Hsien Chu:
Ontology-Based Semantic Modeling and Evaluation for Internet of Things Applications. iThings/GreenCom/CPSCom 2014: 24-30 - [c8]Ding Wang, Ping Wang:
On the Usability of Two-Factor Authentication. SecureComm (1) 2014: 141-150 - [c7]Zhitao Wan, Ping Wang:
A Framework for Streaming Service Composition. VTC Spring 2014: 1-5 - [c6]Ding Wang, Ping Wang, Jing Liu:
Improved privacy-preserving authentication scheme for roaming service in mobile networks. WCNC 2014: 3136-3141 - [i3]Ding Wang, Ping Wang, Debiao He:
Anonymous Two-Factor Authentication: Certain Goals Are Beyond Attainment. IACR Cryptol. ePrint Arch. 2014: 135 (2014) - [i2]Ding Wang, Ping Wang:
Offline Dictionary Attack on Password Authentication Schemes using Smart Cards. IACR Cryptol. ePrint Arch. 2014: 208 (2014) - [i1]Ding Wang, Gaopeng Jian, Ping Wang:
Zipf's Law in Passwords. IACR Cryptol. ePrint Arch. 2014: 631 (2014) - 2013
- [c5]Meng Ma, Ping Wang, Chao-Hsien Chu:
Data Management for Internet of Things: Challenges, Approaches and Opportunities. GreenCom/iThings/CPScom 2013: 1144-1151 - [c4]Ding Wang, Ping Wang:
Offline Dictionary Attack on Password Authentication Schemes Using Smart Cards. ISC 2013: 221-237 - [c3]Meng Ma, Ping Wang, Chao-Hsien Chu:
A novel distributed algorithm for redundant reader elimination in RFID networks. RFID-TA 2013: 1-6 - [c2]Zhitao Wan, Ping Wang, Jing Liu, Wei Tang:
Power-Aware Cloud Computing Infrastructure for Latency-Sensitive Internet-of-Things Services. UKSim 2013: 617-621 - 2012
- [c1]Meng Ma, Yu Huang, Chao-Hsien Chu, Ping Wang:
User-driven cloud transportation system for smart driving. CloudCom 2012: 658-665
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-19 23:09 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint