Ping Wang
Orcid: 0000-0002-8854-2079Affiliations:
- Peking University, School of Software and Microelectronics / National Engineering Research Center for Software Engineering, Beijing, China
According to our database1,
Ping Wang
authored at least 166 papers
between 2012 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on zbmath.org
-
on orcid.org
On csauthors.net:
Bibliography
2024
Determining Mean First-Passage Time for Random Walks on Stochastic Uniform Growth Tree Networks.
IEEE Trans. Knowl. Data Eng., November, 2024
PTT: Piecewise Transformation Technique for Analyzing Numerical Data Under Local Differential Privacy.
IEEE Trans. Mob. Comput., October, 2024
ACM Trans. Knowl. Discov. Data, September, 2024
ACM Trans. Knowl. Discov. Data, June, 2024
Mining Glitch Tokens in Large Language Models via Gradient-based Discrete Optimization.
CoRR, 2024
Hypergraph Multi-modal Large Language Model: Exploiting EEG and Eye-tracking Modalities to Evaluate Heterogeneous Responses for Video Understanding.
Proceedings of the 32nd ACM International Conference on Multimedia, MM 2024, Melbourne, VIC, Australia, 28 October 2024, 2024
Proceedings of the 30th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2024
Proceedings of the IEEE International Conference on Web Services, 2024
Boundary-Aware Contrastive Learning for Single-Source Domain Generalization in Medical Image Segmentation.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2024
2023
Proc. ACM Meas. Anal. Comput. Syst., December, 2023
Structure Diversity and Mean Hitting Time for Random Walks on Stochastic Uniform Growth Tree Networks.
IEEE Trans. Knowl. Data Eng., August, 2023
MetaScenario: A Framework for Driving Scenario Data Description, Storage and Indexing.
IEEE Trans. Intell. Veh., February, 2023
HPAKE: Honey Password-Authenticated Key Exchange for Fast and Safer Online Authentication.
IEEE Trans. Inf. Forensics Secur., 2023
IEEE Trans. Dependable Secur. Comput., 2023
Proceedings of the ACM Web Conference 2023, 2023
Proceedings of the International Joint Conference on Neural Networks, 2023
Proceedings of the International Joint Conference on Neural Networks, 2023
ECANodule: Accurate Pulmonary Nodule Detection and Segmentation with Efficient Channel Attention.
Proceedings of the International Joint Conference on Neural Networks, 2023
Proceedings of the IEEE International Conference on Multimedia and Expo, 2023
Proceedings of the 9th International Conference on Computing and Artificial Intelligence, 2023
Proceedings of the IEEE International Conference on Acoustics, 2023
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2023
2022
IEEE Trans. Serv. Comput., 2022
DePo: Dynamically Offload Expensive Event Processing to the Edge of Cyber-Physical Systems.
IEEE Trans. Parallel Distributed Syst., 2022
Random Walks on Stochastic Generalized Vicsek Fractal Networks: Analytic Solution and Simulations.
IEEE Trans. Netw. Sci. Eng., 2022
A Method for Geodesic Distance on Subdivision of Trees With Arbitrary Orders and Their Applications.
IEEE Trans. Knowl. Data Eng., 2022
Platoon Trajectory Completion in a Mixed Traffic Environment Under Sparse Observation.
IEEE Trans. Intell. Transp. Syst., 2022
Platoon Trajectories Generation: A Unidirectional Interconnected LSTM-Based Car-Following Model.
IEEE Trans. Intell. Transp. Syst., 2022
ServiceRank: Root Cause Identification of Anomaly in Large-Scale Microservice Architectures.
IEEE Trans. Dependable Secur. Comput., 2022
IEEE Trans. Big Data, 2022
VECROsim: A Versatile Metric-oriented Microservice Fault Simulation System (Tools and Artifact Track).
Proceedings of the IEEE 33rd International Symposium on Software Reliability Engineering, 2022
Proceedings of the International Joint Conference on Neural Networks, 2022
Proceedings of the 6th International Conference on Medical and Health Informatics, 2022
Proceedings of the IEEE International Conference on Acoustics, 2022
Proceedings of the IEEE International Conference on Acoustics, 2022
Proceedings of the Findings of the Association for Computational Linguistics: EMNLP 2022, 2022
Abnormal Situation Simulation and Dynamic Causality Discovery in Urban Traffic Networks (Short Paper).
Proceedings of the 15th International Conference on Spatial Information Theory, 2022
Inferring Prototypes for Multi-Label Few-Shot Image Classification with Word Vector Guided Attention.
Proceedings of the Thirty-Sixth AAAI Conference on Artificial Intelligence, 2022
2021
Ontology-Based Event Modeling and High-Confidence Processing in IoT-Enabled High-Speed Train Control System.
J. Signal Process. Syst., 2021
IEEE Trans. Inf. Forensics Secur., 2021
Leveraging Network Functions Virtualization Orchestrators to Achieve Software-Defined Access Control in the Clouds.
IEEE Trans. Dependable Secur. Comput., 2021
Middleware for the Internet of Things: A survey on requirements, enabling technologies, and solutions.
J. Syst. Archit., 2021
PrePCT: Traffic congestion prediction in smart cities with relative position congestion tensor.
Neurocomputing, 2021
Randomized Response Mechanisms for Differential Privacy Data Analysis: Bounds and Applications.
CoRR, 2021
OPTT: Optimal Piecewise Transformation Technique for Analyzing Numerical Data under Local Differential Privacy.
CoRR, 2021
Determining Exact Solutions for Structural Parameters on Hierarchical Networks With Density Feature.
Comput. J., 2021
Proceedings of the 30th USENIX Security Symposium, 2021
Proceedings of the 30th USENIX Security Symposium, 2021
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2021
Proceedings of the ICMR '21: International Conference on Multimedia Retrieval, 2021
Proceedings of the ICMR '21: International Conference on Multimedia Retrieval, 2021
Faster, deeper, easier: crowdsourcing diagnosis of microservice kernel failure from user space.
Proceedings of the ISSTA '21: 30th ACM SIGSOFT International Symposium on Software Testing and Analysis, 2021
Proceedings of the International Joint Conference on Neural Networks, 2021
Proceedings of the IEEE International Conference on Acoustics, 2021
Proceedings of the IEEE International Conference on Acoustics, 2021
Proceedings of the IEEE International Conference on Acoustics, 2021
F-Net: Fusion Neural Network for Vehicle Trajectory Prediction in Autonomous Driving.
Proceedings of the IEEE International Conference on Acoustics, 2021
Proceedings of the IEEE International Conference on Acoustics, 2021
Proceedings of the IEEE 2nd International Conference on Digital Twins and Parallel Intelligence, 2021
Zero-shot Question Generation: Accelerate the Development of Domain-specific Dialogue System.
Proceedings of the 7th IEEE International Conference on Big Data Security on Cloud, 2021
2020
Efficient Multi-Factor User Authentication Protocol with Forward Secrecy for Real-Time Data Access in WSNs.
ACM Trans. Cyber Phys. Syst., 2020
Extract interpretability-accuracy balanced rules from artificial neural networks: A review.
Neurocomputing, 2020
BiTT: Bidirectional Tree Tagging for Joint Extraction of Overlapping Entities and Relations.
CoRR, 2020
Counterexample: scale-free networked graphs with invariable diameter and density feature.
CoRR, 2020
Understanding security failures of multi-factor authentication schemes for multi-server environments.
Comput. Secur., 2020
Proceedings of the WWW '20: The Web Conference 2020, Taipei, Taiwan, April 20-24, 2020, 2020
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2020
Proceedings of the 2020 IEEE International Conference on Web Services, 2020
Drug Drug Interaction Extraction from Chinese Biomedical Literature Using Distant Supervision.
Proceedings of the 2020 IEEE International Conference on Knowledge Graph, 2020
Few-Shot Text Classification with Edge-Labeling Graph Neural Network-Based Prototypical Network.
Proceedings of the 28th International Conference on Computational Linguistics, 2020
Proceedings of the 6th IEEE International Conference on Big Data Security on Cloud, 2020
Proceedings of the 14th IEEE International Conference on Big Data Science and Engineering, 2020
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020
2019
Motion Plan of Maritime Autonomous Surface Ships by Dynamic Programming for Collision Avoidance and Speed Optimization.
Sensors, 2019
Revisiting Anonymous Two-Factor Authentication Schemes for IoT-Enabled Devices in Cloud Computing Environments.
Secur. Commun. Networks, 2019
PbFG: Physique-based fuzzy granular modeling for non-invasive blood glucose monitoring.
Inf. Sci., 2019
Two-factor authentication in industrial Internet-of-Things: Attacks, evaluation and new construction.
Future Gener. Comput. Syst., 2019
Handshake between Fibonacci series and pure preferential attachment mechanism on a graph-model.
CoRR, 2019
Proceedings of the 28th USENIX Security Symposium, 2019
Proceedings of the 28th USENIX Security Symposium, 2019
Proceedings of the IEEE International Conference on Smart Cloud, 2019
Gate Decorator: Global Filter Pruning Method for Accelerating Deep Convolutional Neural Networks.
Proceedings of the Advances in Neural Information Processing Systems 32: Annual Conference on Neural Information Processing Systems 2019, 2019
Intelligent Dispatching and Coordinated Control Method at Railway Stations for Virtually Coupled Train Sets.
Proceedings of the 2019 IEEE Intelligent Transportation Systems Conference, 2019
Dynamic train formation and dispatching for rail transit based on virtually coupled train set.
Proceedings of the 2019 IEEE Intelligent Transportation Systems Conference, 2019
MS-Rank: Multi-Metric and Self-Adaptive Root Cause Diagnosis for Microservice Applications.
Proceedings of the 2019 IEEE International Conference on Web Services, 2019
Proceedings of the 2019 IEEE International Conference on Image Processing, 2019
Transfer and Collaborative Learning Method for Personalized Noninvasive Blood Glucose Measurement Modeling.
Proceedings of the IEEE International Conference on Acoustics, 2019
Secure Chaotic Maps-based Authentication Scheme for Real-Time Data Access In Internet of Things.
Proceedings of the 2019 International Conference on Cyber Security and Protection of Digital Services, 2019
Proceedings of the 6th IEEE International Conference on Cyber Security and Cloud Computing, 2019
Proceedings of the 6th IEEE International Conference on Cyber Security and Cloud Computing, 2019
Proceedings of the IEEE Fifth International Conference on Big Data Computing Service and Applications, 2019
NIV-NGM - A Novel Non-invasive Blood Glucose Monitoring Method based on Near-infrared Videos.
Proceedings of the 2019 IEEE International Conference on Bioinformatics and Biomedicine, 2019
2018
An Enhanced User Authentication Protocol Based on Elliptic Curve Cryptosystem in Cloud Computing Environment.
Wirel. Commun. Mob. Comput., 2018
Cryptanalysis and Security Enhancement of Three Authentication Schemes in Wireless Sensor Networks.
Wirel. Commun. Mob. Comput., 2018
J. Signal Process. Syst., 2018
Data and Decision Intelligence for Human-in-the-Loop Cyber-Physical Systems: Reference Model, Recent Progresses and Challenges.
J. Signal Process. Syst., 2018
J. Signal Process. Syst., 2018
Measuring Two-Factor Authentication Schemes for Real-Time Data Access in Industrial Wireless Sensor Networks.
IEEE Trans. Ind. Informatics, 2018
Toward Energy-Awareness Smart Building: Discover the Fingerprint of Your Electrical Appliances.
IEEE Trans. Ind. Informatics, 2018
Two Birds with One Stone: Two-Factor Authentication with Security Beyond Conventional Bound.
IEEE Trans. Dependable Secur. Comput., 2018
ACM Trans. Cyber Phys. Syst., 2018
On the Challenges in Designing Identity-Based Privacy-Preserving Authentication Schemes for Mobile Devices.
IEEE Syst. J., 2018
Secur. Commun. Networks, 2018
IEEE Internet Things J., 2018
Toward Ubiquitous Environment: An Scalable Framework for Autonomous Service Composition.
Proceedings of the 2018 IEEE SmartWorld, 2018
Proceedings of the Smart Computing and Communication - Third International Conference, 2018
Proceedings of the Smart Computing and Communication - Third International Conference, 2018
Proceedings of the Smart Computing and Communication - Third International Conference, 2018
Proceedings of the Smart Computing and Communication - Third International Conference, 2018
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018
FacGraph: Frequent Anomaly Correlation Graph Mining for Root Cause Diagnose in Micro-Service Architecture.
Proceedings of the 37th IEEE International Performance Computing and Communications Conference, 2018
Proceedings of the Information and Communications Security - 20th International Conference, 2018
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018
Proceedings of the 18th IEEE/ACM International Symposium on Cluster, 2018
2017
Knowl. Based Syst., 2017
Discover the fingerprint of electrical appliance: Online appliance behavior learning and detection in smart homes.
Proceedings of the 2017 IEEE SmartWorld, 2017
Proceedings of the 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2017
Event Description and Detection in Cyber-Physical Systems: An Ontology-Based Language and Approach.
Proceedings of the 23rd IEEE International Conference on Parallel and Distributed Systems, 2017
MODE: A Context-Aware IoT Middleware Supporting On-Demand Deployment for Mobile Devices.
Proceedings of the 23rd IEEE International Conference on Parallel and Distributed Systems, 2017
Proceedings of the 14th IEEE International Conference on e-Business Engineering, 2017
Proceedings of the IEEE International Conference on Edge Computing, 2017
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017
Proceedings of the 2017 IEEE 3rd International Conference on Big Data Security on Cloud (BigDataSecurity), 2017
Proceedings of the 2017 IEEE 3rd International Conference on Big Data Security on Cloud (BigDataSecurity), 2017
BpMC: A novel algorithm retrieving multilayered tissue bio-optical properties for non-invasive blood glucose measurement.
Proceedings of the 2017 IEEE International Conference on Bioinformatics and Biomedicine, 2017
2016
Proceedings of the Computer Security - ESORICS 2016, 2016
fuzzyPSM: A New Password Strength Meter Using Fuzzy Probabilistic Context-Free Grammars.
Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2016
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
The Request for Better Measurement: A Comparative Evaluation of Two-Factor Authentication Schemes.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016
Proceedings of the IEEE International Conference on Services Computing, 2016
2015
Anonymous Two-Factor Authentication in Distributed Systems: Certain Goals Are Beyond Attainment.
IEEE Trans. Dependable Secur. Comput., 2015
Int. J. Web Serv. Res., 2015
Preserving privacy for free: Efficient and provably secure two-factor authentication scheme with user anonymity.
Inf. Sci., 2015
IEEE Internet Things J., 2015
OntoEvent: An Ontology-Based Event Description Language for Semantic Complex Event Processing.
Proceedings of the Web-Age Information Management - 16th International Conference, 2015
From Complex Event Processing to Cognitive Event Processing: Approaches, Challenges, and Opportunities.
Proceedings of the 2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom), 2015
Proceedings of the 34th IEEE International Performance Computing and Communications Conference, 2015
Proceedings of the Ninth International Conference on Frontier of Computer Science and Technology, 2015
The Emperor's New Password Creation Policies: An Evaluation of Leading Web Services and the Effect of Role in Resisting Against Online Guessing.
Proceedings of the Computer Security - ESORICS 2015, 2015
Proceedings of the IEEE International Conference on Data Science and Data Intensive Systems, 2015
2014
IACR Cryptol. ePrint Arch., 2014
IACR Cryptol. ePrint Arch., 2014
On the anonymity of two-factor authentication schemes for wireless sensor networks: Attacks, principle and solutions.
Comput. Networks, 2014
Understanding security failures of two-factor authentication schemes for real-time applications in hierarchical wireless sensor networks.
Ad Hoc Networks, 2014
Improved privacy-preserving authentication scheme for roaming service in mobile networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2014
Proceedings of the IEEE 79th Vehicular Technology Conference, 2014
Proceedings of the 2014 IEEE International Conference on Internet of Things, 2014
Service Composition Pattern Generation for Cloud Migration: A Graph Similarity Analysis Approach.
Proceedings of the 2014 IEEE International Conference on Web Services, 2014
2013
Power-Aware Cloud Computing Infrastructure for Latency-Sensitive Internet-of-Things Services.
Proceedings of the 15th International Conference on Computer Modelling and Simulation, 2013
Proceedings of the 2013 IEEE International Conference on RFID-Technologies and Applications, 2013
Proceedings of the 2013 IEEE International Conference on Green Computing and Communications (GreenCom) and IEEE Internet of Things (iThings) and IEEE Cyber, 2013
2012
Proceedings of the 4th IEEE International Conference on Cloud Computing Technology and Science Proceedings, 2012