Eric Ke Wang

Orcid: 0000-0003-2460-7758

According to our database1, Eric Ke Wang authored at least 61 papers between 2006 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Score-Based Counterfactual Generation for Interpretable Medical Image Classification and Lesion Localization.
IEEE Trans. Medical Imaging, October, 2024

UnbiasNet: Vehicle Re-Identification Oriented Unbiased Feature Enhancement by Using Causal Effect.
IEEE Trans. Intell. Transp. Syst., February, 2024

TAILOR: InTer-feAture distinctIon fiLter fusiOn pRuning.
Inf. Sci., 2024

X2-Softmax: Margin adaptive loss function for face recognition.
Expert Syst. Appl., 2024

2023
Uncovering Hidden Vulnerabilities in Convolutional Neural Networks through Graph-based Adversarial Robustness Evaluation.
Pattern Recognit., November, 2023

Adversarial Robustness in Graph-Based Neural Architecture Search for Edge AI Transportation Systems.
IEEE Trans. Intell. Transp. Syst., August, 2023

Statistics-Physics-Based Interpretation of the Classification Reliability of Convolutional Neural Networks in Industrial Automation Domain.
IEEE Trans. Ind. Informatics, 2023

2022
AFFIRM: Provably Forward Privacy for Searchable Encryption in Cooperative Intelligent Transportation System.
IEEE Trans. Intell. Transp. Syst., 2022

Data Augmentation for Internet of Things Dialog System.
Mob. Networks Appl., 2022

2021
Intelligent monitor for typhoon in IoT system of smart city.
J. Supercomput., 2021

Voice-Transfer Attacking on Industrial Voice Control Systems in 5G-Aided IIoT Domain.
IEEE Trans. Ind. Informatics, 2021

Neural-Architecture-Search-Based Multiobjective Cognitive Automation System.
IEEE Syst. J., 2021

Verifiable dynamic ranked search with forward privacy over encrypted cloud data.
Peer-to-Peer Netw. Appl., 2021

A Trusted Consensus Scheme for Collaborative Learning in the Edge AI Computing Domain.
IEEE Netw., 2021

Neural Architecture Search for Robust Networks in 6G-Enabled Massive IoT Domain.
IEEE Internet Things J., 2021

A trusted consensus fusion scheme for decentralized collaborated learning in massive IoT domain.
Inf. Fusion, 2021

Transfer reinforcement learning-based road object detection in next generation IoT domain.
Comput. Networks, 2021

A Reinforced Dynamic Multi-keyword Ranked Search with Forward Privacy.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2021

2020
A dynamic trust model in internet of things.
Soft Comput., 2020

PoRX: A reputation incentive scheme for blockchain consensus of IIoT.
Future Gener. Comput. Syst., 2020

Incentive evolutionary game model for opportunistic social networks.
Future Gener. Comput. Syst., 2020

A deep learning based medical image segmentation technique in Internet-of-Medical-Things domain.
Future Gener. Comput. Syst., 2020

Proof of X-repute blockchain consensus protocol for IoT systems.
Comput. Secur., 2020

Joint-learning segmentation in Internet of drones (IoD)-based monitor systems.
Comput. Commun., 2020

2019
Multilayer Dense Attention Model for Image Caption.
IEEE Access, 2019

Automatic Classification of CAD ECG Signals With SDAE and Bidirectional Long Short-Term Network.
IEEE Access, 2019

Forward Privacy Analysis of a Dynamic Searchable Encryption Scheme.
Proceedings of the Genetic and Evolutionary Computing, 2019

2018
A Dynamic Trust Framework for Opportunistic Mobile Social Networks.
IEEE Trans. Netw. Serv. Manag., 2018

2017
A survey on cyber attacks against nonlinear state estimation in power systems of ubiquitous cities.
Pervasive Mob. Comput., 2017

Multi-view learning via multiple graph regularized generative model.
Knowl. Based Syst., 2017

Block linear discriminant analysis for visual tensor objects with frequency or time information.
J. Vis. Commun. Image Represent., 2017

Analyzing Selfish Behavior in Opportunistic Networks.
Proceedings of the 14th International Symposium on Pervasive Systems, 2017

Recommending e-books by multi-layer clustering and locality reconstruction.
Proceedings of the 15th IEEE International Conference on Industrial Informatics, 2017

Reconstruction of Task Lists from Android Applications.
Proceedings of the Information Science and Applications 2017, 2017

Attacks and Solutions of a Mutual Authentication with Anonymity for Roaming Service with Smart Cards in Wireless Communications.
Proceedings of the Genetic and Evolutionary Computing, 2017

Detecting Time Synchronization Attacks in Cyber-Physical Systems with Machine Learning Techniques.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

Efficient Anonymous Password-Authenticated Key Exchange Scheme Using Smart Cards.
Proceedings of the Fourth Euro-China Conference on Intelligent Data Analysis and Applications, 2017

2016
A novel density peak based semi-supervised clustering algorithm.
Proceedings of the International Conference on Machine Learning and Cybernetics, 2016

MDPRP: Markov Decision Process Based Routing Protocol for Mobile WSNs.
Proceedings of the Geo-Spatial Knowledge and Intelligence, 2016

A Survey on the Cyber Attacks Against Non-linear State Estimation in Smart Grids.
Proceedings of the Information Security and Privacy - 21st Australasian Conference, 2016

2015
MAPMP: A Mutual Authentication Protocol for Mobile Payment.
J. Inf. Hiding Multim. Signal Process., 2015

Privacy Protection Framework in Social Networked Cars.
Proceedings of the Multidisciplinary Social Networks Research, 2015

Context recognition for adaptive hearing-aids.
Proceedings of the 13th IEEE International Conference on Industrial Informatics, 2015

Security Analysis of a Time-Bound Hierarchical Key Assignment Scheme.
Proceedings of the 2015 International Conference on Intelligent Information Hiding and Multimedia Signal Processing, 2015

An Efficient Solution for Time-Bound Hierarchical Key Assignment Scheme.
Proceedings of the Genetic and Evolutionary Computing, 2015

2014
Lightweight Secure Directed Diffusion for Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2014

Location-Based Distributed Group Key Agreement Scheme for Vehicular Ad Hoc Network.
Int. J. Distributed Sens. Networks, 2014

A New Privacy-Preserving Scheme for Continuous Query in Location-Based Social Networking Services.
Int. J. Distributed Sens. Networks, 2014

Towards Time-Bound Hierarchical Key Assignment for Secure Data Access Control.
Proceedings of the Multidisciplinary Social Networks Research - International Conference, 2014

MDPAS: Markov Decision Process Based Adaptive Security for Sensors in Internet of Things.
Proceedings of the Genetic and Evolutionary Computing, 2014

Another Improvement of RAPP: An Ultra-lightweight Authentication Protocol for RFID.
Proceedings of the Intelligent Data analysis and its Applications, Volume I, 2014

Towards Time-Bound Hierarchical Key Management in Cloud Computing.
Proceedings of the Intelligent Data analysis and its Applications, Volume I, 2014

A New Graphical Representation of Protein Sequences Based on Dual-Vector Model.
Proceedings of the Bio-Inspired Computing - Theories and Applications, 2014

2010
A new key establishment scheme for wireless sensor networks
CoRR, 2010

An Efficient and Secure Key Establishment Scheme for Wireless Sensor Network.
Proceedings of the Third International Symposium on Intelligent Information Technology and Security Informatics, 2010

Security Issues and Challenges for Cyber Physical System.
Proceedings of the 2010 IEEE/ACM Int'l Conference on Green Computing and Communications, 2010

2009
A New Practical Scheme for Protecting Web Content.
Proceedings of the 2009 International Conference on Security & Management, 2009

A Practical SMS-based Mutual Authentication Protocol for Secure Online Banking.
Proceedings of the 2009 International Conference on Security & Management, 2009

2008
Authenticated Directed Diffusion.
Proceedings of the Cryptology and Network Security, 7th International Conference, 2008

2007
Weaving rewrite-based access control policies.
Proceedings of the 2007 ACM workshop on Formal methods in security engineering, 2007

2006
A Key-Recovery System for Long-term Encrypted Documents.
Proceedings of the Tenth IEEE International Enterprise Distributed Object Computing Conference (EDOC 2006), 2006


  Loading...