Kai Wang
Orcid: 0000-0003-3044-9047Affiliations:
- Tsinghua University, Research Institute of Information Technology, Beijing, China
- Yantai University, School of Computer and Control Engineering, China
- China Electronics Technology Group 41st Research Institute, Qingdao, China (2014 - 2015)
- Beijing Jiaotong University, School of Electronic and Information Engineering, China (PhD 2014)
According to our database1,
Kai Wang
authored at least 38 papers
between 2012 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2025
KDRSFL: A knowledge distillation resistance transfer framework for defending model inversion attacks in split federated learning.
Future Gener. Comput. Syst., 2025
2024
Computation Cost-Driven Offloading Strategy Based on Reinforcement Learning for Consumer Devices.
IEEE Trans. Consumer Electron., February, 2024
Comput. Networks, 2024
2023
ACM Trans. Intell. Syst. Technol., December, 2023
Process-Oriented heterogeneous graph learning in GNN-Based ICS anomalous pattern recognition.
Pattern Recognit., September, 2023
Analysis of Recent Deep-Learning-Based Intrusion Detection Methods for In-Vehicle Network.
IEEE Trans. Intell. Transp. Syst., February, 2023
2022
Knowl. Based Syst., 2022
Anomaly detection for industrial control operations with optimized ABC-SVM and weighted function code correlation analysis.
J. Ambient Intell. Humaniz. Comput., 2022
Global-local integration for GNN-based anomalous device state detection in industrial control systems.
Expert Syst. Appl., 2022
PRAD: Unsupervised KPI Anomaly Detection by Joint Prediction and Reconstruction of Multivariate Time Series.
Proceedings of the IEEE Smartworld, 2022
2021
PA-Cache: Evolving Learning-Based Popularity- Aware Content Caching in Edge Networks.
IEEE Trans. Netw. Serv. Manag., 2021
High-Order Mean-Field Approximations for Adaptive Susceptible-Infected-Susceptible Model in Finite-Size Networks.
Complex., 2021
Adaptive and Lightweight Abnormal Node Detection via Biological Immune Game in Mobile Multimedia Networks.
Algorithms, 2021
2020
Wirel. Commun. Mob. Comput., 2020
IEEE Syst. J., 2020
Inf. Sci., 2020
Comput. Secur., 2020
Dynamic Adjusting ABC-SVM Anomaly Detection Based on Weighted Function Code Correlation.
Proceedings of the Machine Learning for Cyber Security - Third International Conference, 2020
2019
Betweenness Centrality Based Software Defined Routing: Observation from Practical Internet Datasets.
ACM Trans. Internet Techn., 2019
Inf. Sci., 2019
Emerging Technologies, Infrastructures, and Applications for Video Streaming over Future Communication Networks.
Int. J. Digit. Multim. Broadcast., 2019
2018
Wirel. Commun. Mob. Comput., 2018
IEEE Netw., 2018
IEEE Netw., 2018
Internet Technol. Lett., 2018
Int. J. Sens. Networks, 2018
On the urgency of implementing Interest NACK into CCN: from the perspective of countering advanced interest flooding attacks.
IET Networks, 2018
InterestFence: Countering Interest Flooding Attacks by Using Hash-Based Security Labels.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018
2017
KSII Trans. Internet Inf. Syst., 2017
2016
Proceedings of the 2016 IEEE International Conferences on Big Data and Cloud Computing (BDCloud), 2016
2014
Soft Comput., 2014
Secur. Commun. Networks, 2014
Int. J. Commun. Syst., 2014
2013
RDAI: Router-Based Data Aggregates Identification Mechanism for Named Data Networking.
Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013
Decoupling malicious Interests from Pending Interest Table to mitigate Interest Flooding Attacks.
Proceedings of the Workshops Proceedings of the Global Communications Conference, 2013
2012
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012