Ming-Hung Wang

Orcid: 0000-0002-5680-4003

According to our database1, Ming-Hung Wang authored at least 52 papers between 2009 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
CrowdDC: Ranking From Crowdsourced Paired Comparison With Divide-and-Conquer.
IEEE Trans. Comput. Soc. Syst., April, 2024

A Software-Defined Networking-Driven Reliable Transmission Architecture for Enhancing Real-Time Video Streaming Quality.
IEEE Multim., 2024

Advancing Stance Detection of Political Fan Pages: A Multimodal Approach.
Proceedings of the Companion Proceedings of the ACM on Web Conference 2024, 2024

DRM-SN: Detecting Reused Multimedia Content on Social Networks.
Proceedings of the 7th IEEE International Conference on Multimedia Information Processing and Retrieval, 2024

Sockpuppets Detection Using Markov-Driven Graph Convolutional Networks with Ensemble Learning.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2024

CCADM: A Continuous Collection Scheme for Anonymous Data Management.
Proceedings of the 19th Asia Joint Conference on Information Security, 2024

2023
Analyzing image-based political propaganda in referendum campaigns: from elements to strategies.
EPJ Data Sci., December, 2023

Characterizing Behaviors of Sockpuppets in Online Political Discourses.
J. Inf. Sci. Eng., May, 2023

CrowDC: A Divide-and-Conquer Approach for Paired Comparisons in Crowdsourcing.
CoRR, 2023

From 5-Stars to Real Insight: Geospatial Detection of Campaigned Reviews with Google Maps and Mobility Data.
Proceedings of the Technologies and Applications of Artificial Intelligence, 2023

Take Expert Advice Judiciously: Combining Groupwise Calibrated Model Probabilities with Expert Predictions.
Proceedings of the ECAI 2023 - 26th European Conference on Artificial Intelligence, September 30 - October 4, 2023, Kraków, Poland, 2023

A Revocation Key-based Approach Towards Efficient Federated Unlearning.
Proceedings of the 18th Asia Joint Conference on Information Security, 2023

2022
Learning to Recognize Sockpuppets in Online Political Discussions.
IEEE Syst. J., 2022

SandboxNet: A Learning-Based Malicious Application Detection Framework in SDN Networks.
J. Inf. Sci. Eng., 2022

Fast Variation-aware Circuit Sizing Approach for Analog Design with ML-Assisted Evolutionary Algorithm.
Proceedings of the 27th Asia and South Pacific Design Automation Conference, 2022

2021
Understanding Malicious Accounts in Online Political Discussions: A Multilayer Network Approach.
Sensors, 2021

Deniable search of encrypted cloud-storage data.
J. Inf. Secur. Appl., 2021

Effects of Transport Network Slicing on 5G Applications.
Future Internet, 2021

The Evolution of Rumors on a Closed Platform during COVID-19.
CoRR, 2021

Positioning and Categorizing Mass Media Using Reaction Emojis on Facebook.
Comput. J., 2021

2020
How to Hide the Real Receiver Under the Cover Receiver: CP-ABE With Policy Deniability.
IEEE Access, 2020

SandboxNet: An Online Malicious SDN Application Detection Framework for SDN Networking.
Proceedings of the International Computer Symposium, 2020

POSTER: How Do Suspicious Accounts Participate in Online Political Discussions? A Preliminary Study in Taiwan.
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020

2019
Privacy-Preserving Broker-ABE Scheme for Multiple Cloud-Assisted Cyber Physical Systems.
Sensors, 2019

MigrateSDN: efficient approach to integrate OpenFlow networks with STP-enabled networks.
Int. J. Comput. Sci. Eng., 2019

Blurring Political Leanings of Messages on Social Networks Using Deniable Steganography.
IEEE Access, 2019

Understanding Mass Media Using Facebook Like Activities.
Proceedings of the 2019 Truth and Trust Online Conference (TTO 2019), 2019

2018
SocialDNA: A Novel Approach for Distinguishing Notable Articles and Authors through Social Events.
J. Inf. Sci. Eng., 2018

PIM-compliant SDN-enabled IP multicast service.
Proceedings of the 2018 IEEE/IFIP Network Operations and Management Symposium, 2018

Uncovering Internal Threats Based on Open-Source Intelligence.
Proceedings of the New Trends in Computer Technologies and Applications, 2018

Dynamic Key Management Scheme in IoT.
Proceedings of the New Trends in Computer Technologies and Applications, 2018

Infection categorization using deep autoencoder.
Proceedings of the IEEE INFOCOM 2018, 2018

A Lightweight Compound Defense Framework Against Injection Attacks in IIoT.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2018

Detecting Potential Cyber Armies of Election Campaigns Based on Behavioral Analysis.
Proceedings of the Complex Networks and Their Applications VII, 2018

2017
Automatic Test Pattern Generator for Fuzzing Based on Finite State Machine.
Secur. Commun. Networks, 2017

Estimating Ideological Scores of Facebook Pages: An Empirical Study in Taiwan.
Comput. J., 2017

SDUDP: A Reliable UDP-Based Transmission Protocol Over SDN.
IEEE Access, 2017

23.9 An 8-channel 4.5Gb 180GB/s 18ns-row-latency RAM for the last level cache.
Proceedings of the 2017 IEEE International Solid-State Circuits Conference, 2017

2016
SDN storage: A stream-based storage system over software-defined networks.
Proceedings of the IEEE Conference on Computer Communications Workshops, 2016

PathMon: Path-specific traffic monitoring in OpenFlow-enabled networks.
Proceedings of the Eighth International Conference on Ubiquitous and Future Networks, 2016

Boosting election prediction accuracy by crowd wisdom on social forums.
Proceedings of the 13th IEEE Annual Consumer Communications & Networking Conference, 2016

SDNort: A Software Defined Network Testing Framework Using Openflow.
Proceedings of the 11th Asia Joint Conference on Information Security, 2016

2015
Modelling Polarity of Articles and Identifying Influential Authors through Social Movements.
Proceedings of the 2015 IEEE International Conference on Systems, 2015

2014
Personalized Smart TV System Developed Using a Service Composition Platform.
Proceedings of the 12th International Conference on Advances in Mobile Computing and Multimedia, 2014

Forecasting the Impacts of Articles and Authors on the Social Forum during Emergencies.
Proceedings of the Intelligent Systems and Applications, 2014

KPAT: A kernel and protocol analysis tool for embedded networking devices.
Proceedings of the IEEE International Conference on Communications, 2014

2013
Is Somebody Watching Your Facebook Newsfeed?
CoRR, 2013

Boosting OCR Accuracy Using Crowdsourcing.
Proceedings of the Human Computation and Crowdsourcing: Works in Progress and Demonstration Abstracts, 2013

Understanding Potential MicrotaskWorkers for Paid Crowdsourcing.
Proceedings of the Human Computation and Crowdsourcing: Works in Progress and Demonstration Abstracts, 2013

2011
Privacy Crisis Due to Crisis Response on the Web.
Proceedings of the IEEE 10th International Conference on Trust, 2011

ARMS: An agent-based real-time monitoring system for large scale P2P video streaming platforms.
Proceedings of the IEEE 17th Asia-Pacific Conference on Communications, 2011

2009
An Adaptable Threshold Decision Method.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009


  Loading...