Cheng Wang

Orcid: 0000-0002-4752-0316

Affiliations:
  • Tongji University, Department of Computer Science and Engineering, Shanghai, China


According to our database1, Cheng Wang authored at least 141 papers between 2009 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
DRL-Based VNF Cooperative Scheduling Framework With Priority-Weighted Delay.
IEEE Trans. Mob. Comput., December, 2024

MetaGA: Metalearning With Graph-Attention for Improved Long-Tail Item Recommendation.
IEEE Trans. Comput. Soc. Syst., October, 2024

Leveraging Adversarial Augmentation on Imbalance Data for Online Trading Fraud Detection.
IEEE Trans. Comput. Soc. Syst., April, 2024

Enabling Graph Neural Networks for Semi-Supervised Risk Prediction in Online Credit Loan Services.
ACM Trans. Intell. Syst. Technol., February, 2024

Detecting Evolving Fraudulent Behavior in Online Payment Services: Open-Category and Concept-Drift.
IEEE Trans. Serv. Comput., 2024

Approaching the Information-Theoretic Limit of Privacy Disclosure With Utility Guarantees.
IEEE Trans. Inf. Forensics Secur., 2024

Collaborative Prediction in Anti-Fraud System Over Multiple Credit Loan Platforms.
IEEE Trans. Dependable Secur. Comput., 2024

2023
Using Tabu Search to Avoid Concave Obstacles for Source Location.
IEEE Trans. Intell. Transp. Syst., November, 2023

PSO-Based Sparse Source Location in Large-Scale Environments With a UAV Swarm.
IEEE Trans. Intell. Transp. Syst., May, 2023

LongArms: Fraud Prediction in Online Lending Services Using Sparse Knowledge Graph.
IEEE Trans. Big Data, April, 2023

Incorporating Prior Knowledge in Local Differentially Private Data Collection for Frequency Estimation.
IEEE Trans. Big Data, April, 2023

The Opportunity in Difficulty: A Dynamic Privacy Budget Allocation Mechanism for Privacy-Preserving Multi-dimensional Data Collection.
ACM Trans. Manag. Inf. Syst., March, 2023

Locally differentially private high-dimensional data synthesis.
Sci. China Inf. Sci., January, 2023

Enabling Fraud Prediction on Preliminary Data Through Information Density Booster.
IEEE Trans. Inf. Forensics Secur., 2023

CAeSaR: An Online Payment Anti-Fraud Integration System With Decision Explainability.
IEEE Trans. Dependable Secur. Comput., 2023

A multi-graph neural group recommendation model with meta-learning and multi-teacher distillation.
Knowl. Based Syst., 2023

Scaling Laws of Network Traffic Load: A Theoretical Explanation of Metcalfe's Law.
CoRR, 2023

Behavioral Authentication for Security and Safety.
CoRR, 2023

On the Expressive Power of Behavior Structure.
CoRR, 2023

OpenDrift: Online Evolving Fraud Detection for Open-Category and Concept-Drift Transactions.
Proceedings of the IEEE International Conference on Web Services, 2023

Hard Anomaly Detection: An Adversarial Data Augmentation Solution.
Proceedings of the IEEE International Conference on Data Mining, 2023

2022
Comparative Convolutional Dynamic Multi-Attention Recommendation Model.
IEEE Trans. Neural Networks Learn. Syst., 2022

DDoS Mitigation Based on Space-Time Flow Regularities in IoV: A Feature Adaption Reinforcement Learning Approach.
IEEE Trans. Intell. Transp. Syst., 2022

Wrongdoing Monitor: A Graph-Based Behavioral Anomaly Detection in Cyber Security.
IEEE Trans. Inf. Forensics Secur., 2022

Representing Fine-Grained Co-Occurrences for Behavior-Based Fraud Detection in Online Payment Services.
IEEE Trans. Dependable Secur. Comput., 2022

Composite Behavioral Modeling for Identity Theft Detection in Online Social Networks.
IEEE Trans. Comput. Soc. Syst., 2022

Implicit privacy preservation: a framework based on data generation.
Secur. Saf., 2022

Crowd-Learning: A Behavior-Based Verification Method in Software-Defined Vehicular Networks With MEC Framework.
IEEE Internet Things J., 2022

2021
Protecting Privacy of Location-Based Services in Road Networks.
IEEE Trans. Intell. Transp. Syst., 2021

LAW: Learning Automatic Windows for Online Payment Fraud Detection.
IEEE Trans. Dependable Secur. Comput., 2021

Fundamental Limits of Data Utility: A Case Study for Data-Driven Identity Authentication.
IEEE Trans. Comput. Soc. Syst., 2021

ReMEMBeR: Ranking Metric Embedding-Based Multicontextual Behavior Profiling for Online Banking Fraud Detection.
IEEE Trans. Comput. Soc. Syst., 2021

A Credible Individual Behavior Profiling Method for Online Payment Fraud Detection.
Proceedings of the DSDE '21: 2021 4th International Conference on Data Storage and Data Engineering, 2021

Learning Transaction Cohesiveness for Online Payment Fraud Detection.
Proceedings of the CONF-CDS 2021: The 2nd International Conference on Computing and Data Science, 2021

2019
Correlated Matrix Factorization for Recommendation with Implicit Feedback.
IEEE Trans. Knowl. Data Eng., 2019

iLogBook: Enabling Text-Searchable Event Query Using Sparse Vehicle-Mounted GPS Data.
IEEE Trans. Intell. Transp. Syst., 2019

Estimating Travel Speed of a Road Section Through Sparse Crowdsensing Data.
IEEE Trans. Intell. Transp. Syst., 2019

Fusing Behavioral Projection Models for Identity Theft Detection in Online Social Networks.
IEEE Trans. Comput. Soc. Syst., 2019

Multimodal Representation Learning for Recommendation in Internet of Things.
IEEE Internet Things J., 2019

An Efficient Passenger-Hunting Recommendation Framework With Multitask Deep Learning.
IEEE Internet Things J., 2019

APP: Augmented Proactive Perception for Driving Hazards with Sparse GPS Trace.
Proceedings of the Twentieth ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2019

Thinking Like a Fraudster: Detecting Fraudulent Transactions via Statistical Sequential Features.
Proceedings of the Financial Cryptography and Data Security, 2019

Transport complexity of data dissemination in large-scale online social networks.
Proceedings of the ACM Turing Celebration Conference - China, 2019

2018
A Novel Method on Information Recommendation via Hybrid Similarity.
IEEE Trans. Syst. Man Cybern. Syst., 2018

Discovering Canonical Correlations between Topical and Topological Information in Document Networks.
IEEE Trans. Knowl. Data Eng., 2018

Fast Variable Structure Stochastic Automaton for Discovering and Tracking Spatiotemporal Event Patterns.
IEEE Trans. Cybern., 2018

SDCoR: Software Defined Cognitive Routing for Internet of Vehicles.
IEEE Internet Things J., 2018

Composite Behavioral Modeling for Identity Theft Detection in Online Social Networks.
CoRR, 2018

Centron: Cooperative neighbor discovery in mobile Ad-hoc networks.
Comput. Networks, 2018

Wireless Vehicular Check-in Protocol at Urban Road Intersection.
IEEE Access, 2018

Private information retrieval in vehicular location-based services.
Proceedings of the 4th IEEE World Forum on Internet of Things, 2018

Replay Attack: A Prevalent Pattern of Fraudulent Online Transactions.
Proceedings of the 5th IEEE International Conference on Cyber Security and Cloud Computing, 2018

2017
Exploiting Traveling Information for Data Forwarding in Community-Characterized Vehicular Networks.
IEEE Trans. Veh. Technol., 2017

Improved Rule Installation for Real-Time Query Service in Software-Defined Internet of Vehicles.
IEEE Trans. Intell. Transp. Syst., 2017

User Association for Load Balancing in Vehicular Networks: An Online Reinforcement Learning Approach.
IEEE Trans. Intell. Transp. Syst., 2017

Symmetrical Hierarchical Stochastic Searching on the Line in Informative and Deceptive Environments.
IEEE Trans. Cybern., 2017

Approximate Simulation Budget Allocation for Subset Ranking.
IEEE Trans. Control. Syst. Technol., 2017

Approximately Optimal Computing Budget Allocation for Selection of the Best and Worst Designs.
IEEE Trans. Autom. Control., 2017

Re-identification of Vehicular Location-Based Metadata.
EAI Endorsed Trans. Security Safety, 2017

RTS: road topology-based scheme for traffic condition estimation via vehicular crowdsensing.
Concurr. Comput. Pract. Exp., 2017

Modeling Data Transport Capacity of Mobile Networks for Mobile Social Services.
IEEE Access, 2017

Modeling Data Correlations in Recommendation.
IEEE Access, 2017

Mining Coherent Topics With Pre-Learned Interest Knowledge in Twitter.
IEEE Access, 2017

Modeling Document Networks with Tree-Averaged Copula Regularization.
Proceedings of the Tenth ACM International Conference on Web Search and Data Mining, 2017

Identity Theft Detection in Mobile Social Networks Using Behavioral Semantics.
Proceedings of the 2017 IEEE International Conference on Smart Computing, 2017

From Footprint to Friendship: Modeling User Followership in Mobile Social Networks from Check-in Data.
Proceedings of the 40th International ACM SIGIR Conference on Research and Development in Information Retrieval, 2017

Multi-perspective Hierarchical Dirichlet Process for Geographical Topic Modeling.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2017

On Complementary Effect of Blended Behavioral Analysis for Identity Theft Detection in Mobile Social Networks.
Proceedings of the Mobile Ad-hoc and Sensor Networks - 13th International Conference, 2017

Improving the Gain of Visual Perceptual Behaviour on Topic Modeling for Text Recommendation.
Proceedings of the 2017 ACM on Conference on Information and Knowledge Management, 2017

Incorporating the Latent Link Categories in Relational Topic Modeling.
Proceedings of the 2017 ACM on Conference on Information and Knowledge Management, 2017

Your Body Defines Your Fall Detection System: A Somatotype-Based Feature Selection Method.
Proceedings of the Fifth International Conference on Advanced Cloud and Big Data, 2017

2016
BackPos: High Accuracy Backscatter Positioning System.
IEEE Trans. Mob. Comput., 2016

Incorporation of Optimal Computing Budget Allocation for Ordinal Optimization Into Learning Automata.
IEEE Trans Autom. Sci. Eng., 2016

一种基于社区分类的社交网络用户推荐方法 (Novel Method on Community-based User Recommendation on Social Network).
计算机科学, 2016

Estimating travel speed via sparse vehicular crowdsensing data.
Proceedings of the 3rd IEEE World Forum on Internet of Things, 2016

Multi-level topical text categorization with wikipedia.
Proceedings of the 9th International Conference on Utility and Cloud Computing, 2016

Unique on the Road: Re-identification of Vehicular Location-Based Metadata.
Proceedings of the Security and Privacy in Communication Networks, 2016

Modeling Interest-Driven Data Dissemination in Online Social Networks.
Proceedings of the 12th International Conference on Mobile Ad-Hoc and Sensor Networks, 2016

Conflict-Aware Network State Updates in SDN.
Proceedings of the 12th International Conference on Mobile Ad-Hoc and Sensor Networks, 2016

2015
Space-Crossing: Community-Based Data Forwarding in Mobile Social Networks Under the Hybrid Communication Architecture.
IEEE Trans. Wirel. Commun., 2015

Shelving Interference and Joint Identification in Large-Scale RFID Systems.
IEEE Trans. Parallel Distributed Syst., 2015

Capacity Scaling of Wireless Social Networks.
IEEE Trans. Parallel Distributed Syst., 2015

LASS: Local-Activity and Social-Similarity Based Data Forwarding in Mobile Social Networks.
IEEE Trans. Parallel Distributed Syst., 2015

Small Cluster in Cyber Physical Systems: Network Topology, Interdependence and Cascading Failures.
IEEE Trans. Parallel Distributed Syst., 2015

Perceiving the Slightest Tag Motion beyond Localization.
IEEE Trans. Mob. Comput., 2015

Unlocking Smart Phone through Handwaving Biometrics.
IEEE Trans. Mob. Comput., 2015

Fast and Epsilon-Optimal Discretized Pursuit Learning Automata.
IEEE Trans. Cybern., 2015

Characterization of Cascading Failures in Interdependent Cyber-Physical Systems.
IEEE Trans. Computers, 2015

General Capacity for Deterministic Dissemination in Wireless Ad Hoc Networks.
CoRR, 2015

Rule Optimization for Real-Time Query Service in Software-Defined Internet of Vehicles.
CoRR, 2015

STC: Coarse-Grained Vehicular Data Based Travel Speed Sensing by Leveraging Spatial-Temporal Correlation.
CoRR, 2015

ERUPT: A Role-based Neighbor Discovery Protocol for Mobile Social Applications.
Ad Hoc Sens. Wirel. Networks, 2015

Cascading Failures in Smart Grid: Joint Effect of Load Propagation and Interdependence.
IEEE Access, 2015

Scaling Laws of Social-Broadcast Capacity for Mobile Ad Hoc Social Networks.
Proceedings of the 12th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2015

New tight upper bounds on the capacity for general deterministic dissemination in wireless ad hoc networks.
Proceedings of the 34th IEEE International Performance Computing and Communications Conference, 2015

Traffic condition estimation using vehicular crowdsensing data.
Proceedings of the 34th IEEE International Performance Computing and Communications Conference, 2015

Anti-counterfeiting via federated RFID tags' fingerprints and geometric relationships.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

Approximately Optimal Computing-Budget Allocation for subset ranking.
Proceedings of the IEEE International Conference on Robotics and Automation, 2015

Adopting WirelessHART for In-vehicle-Networking.
Proceedings of the 17th IEEE International Conference on High Performance Computing and Communications, 2015

Incorporation of ordinal optimization into learning automata for high learning efficiency.
Proceedings of the IEEE International Conference on Automation Science and Engineering, 2015

2014
A Framework for Amazon EC2 Bidding Strategy under SLA Constraints.
IEEE Trans. Parallel Distributed Syst., 2014

The Impact of Rate Adaptation on Capacity-Delay Tradeoffs in Mobile Ad Hoc Networks.
IEEE Trans. Mob. Comput., 2014

Last-Position Elimination-Based Learning Automata.
IEEE Trans. Cybern., 2014

Aggregation Capacity of Wireless Sensor Networks: Extended Network Case.
IEEE Trans. Computers, 2014

Market-Based Sensor Relocation by Robot Team in Wireless Sensor Networks.
Ad Hoc Sens. Wirel. Networks, 2014

Modeling data dissemination in online social networks: a geographical perspective on bounding network traffic load.
Proceedings of the Fifteenth ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2014

Wise counting: fast and efficient batch authentication for large-scale RFID systems.
Proceedings of the Fifteenth ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2014

Improving data forwarding in Mobile Social Networks with infrastructure support: A space-crossing community approach.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

2013
Asymptotic throughput for large-scale wireless networks with general node density.
Wirel. Networks, 2013

Scaling Laws of Cognitive Ad Hoc Networks over General Primary Network Models.
IEEE Trans. Parallel Distributed Syst., 2013

Balancing System Survivability and Cost of Smart Grid Via Modeling Cascading Failures.
IEEE Trans. Emerg. Top. Comput., 2013

Modelling Capacity Scaling of Wireless Social Networks by A Population-Based Social Formation Model
CoRR, 2013

Multicast capacity scaling for inhomogeneous mobile ad hoc networks.
Ad Hoc Networks, 2013

MINT: maximizing information propagation in predictable delay-tolerant network.
Proceedings of the Fourteenth ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2013

2012
SelectCast: Scalable Data Aggregation Scheme in Wireless Sensor Networks.
IEEE Trans. Parallel Distributed Syst., 2012

Multicast Capacity Scaling Laws for Multihop Cognitive Networks.
IEEE Trans. Mob. Comput., 2012

Scaling Laws of Multicast Capacity for Power-Constrained Wireless Networks under Gaussian Channel Model.
IEEE Trans. Computers, 2012

Capacity and delay tradeoffs in mobile networks under Gaussian channel model.
Proceedings of the 9th IEEE International Conference on Mobile Ad-Hoc and Sensor Systems, 2012

On minimum delay duty-cycling protocol in sustainable sensor network.
Proceedings of the 20th IEEE International Conference on Network Protocols, 2012

2011
Impact of deployment size on the asymptotic capacity for wireless ad hoc networks under Gaussian channel model.
Wirel. Networks, 2011

Multicast Throughput for Hybrid Wireless Networks under Gaussian Channel Model.
IEEE Trans. Mob. Comput., 2011

On multicast throughput scaling of hybrid wireless networks with general node density.
Comput. Networks, 2011

A real-time rescue system: Towards practical implementation of robotic sensor network.
Proceedings of the 8th Annual IEEE Communications Society Conference on Sensor, 2011

TelosCAM: Identifying Burglar through Networked Sensor-Camera Mates with Privacy Protection.
Proceedings of the 32nd IEEE Real-Time Systems Symposium, 2011

Reader Activation Scheduling in Multi-reader RFID Systems: A Study of General Case.
Proceedings of the 25th IEEE International Symposium on Parallel and Distributed Processing, 2011

Season: Shelving interference and joint identification in large-scale RFID systems.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

General capacity scaling of wireless networks.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

Aggregation capacity of wireless sensor networks: Extended network case.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

2010
Multicast throughput for large scale cognitive networks.
Wirel. Networks, 2010

Multicast capacity and delay trade-offs in <i>ad hoc</i> networks with random iid mobility model.
Wirel. Commun. Mob. Comput., 2010

Capacity and delay in mobile ad hoc networks under Gaussian channel model.
ACM SIGMOBILE Mob. Comput. Commun. Rev., 2010

Improved asymptotic multicast throughput for random extended networks.
Comput. Commun., 2010

SFL: Energy-Aware Spline Function Localization Scheme for Wireless Sensor Networks.
Proceedings of the Sixth International Conference on Mobile Ad-hoc and Sensor Networks, 2010

Multicast capacity scaling for cognitive networks: General extended primary network.
Proceedings of the IEEE 7th International Conference on Mobile Adhoc and Sensor Systems, 2010

DREAM: On the reaction delay in large scale wireless networks with mobile sensors.
Proceedings of the 18th International Workshop on Quality of Service, 2010

Revisting Tag Collision Problem in RFID Systems.
Proceedings of the 39th International Conference on Parallel Processing, 2010

Utilizing RF Interference to Enable Private Estimation in RFID Systems.
Proceedings of the 16th IEEE International Conference on Parallel and Distributed Systems, 2010

2009
Achievable multicast throughput for homogeneous wireless ad hoc networks.
Proceedings of the 2009 IEEE Wireless Communications and Networking Conference, 2009

Multicast capacity for multi-hop multi-channel multi-radio wireless networks.
Proceedings of the 12th International Symposium on Modeling Analysis and Simulation of Wireless and Mobile Systems, 2009

Multicast Capacity of Multihop Cognitive Networks.
Proceedings of the IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, 2009

Scaling Laws on Multicast Capacity of Large Scale Wireless Networks.
Proceedings of the INFOCOM 2009. 28th IEEE International Conference on Computer Communications, 2009


  Loading...