Ping Wang

Orcid: 0000-0002-8854-2079

Affiliations:
  • Peking University, School of Software and Microelectronics / National Engineering Research Center for Software Engineering, Beijing, China


According to our database1, Ping Wang authored at least 165 papers between 2012 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Determining Mean First-Passage Time for Random Walks on Stochastic Uniform Growth Tree Networks.
IEEE Trans. Knowl. Data Eng., November, 2024

PTT: Piecewise Transformation Technique for Analyzing Numerical Data Under Local Differential Privacy.
IEEE Trans. Mob. Comput., October, 2024

Structural Properties on Scale-Free Tree Network with an Ultra-Large Diameter.
ACM Trans. Knowl. Discov. Data, September, 2024

EffCause: Discover Dynamic Causal Relationships Efficiently from Time-Series.
ACM Trans. Knowl. Discov. Data, June, 2024

Hypergraph Multi-modal Large Language Model: Exploiting EEG and Eye-tracking Modalities to Evaluate Heterogeneous Responses for Video Understanding.
Proceedings of the 32nd ACM International Conference on Multimedia, MM 2024, Melbourne, VIC, Australia, 28 October 2024, 2024

FaultInsight: Interpreting Hyperscale Data Center Host Faults.
Proceedings of the 30th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2024

G-Cause: Parameter-free Global Diagnosis for Hyperscale Web Service Infrastructures.
Proceedings of the IEEE International Conference on Web Services, 2024

Boundary-Aware Contrastive Learning for Single-Source Domain Generalization in Medical Image Segmentation.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2024

2023
HEAL: Performance Troubleshooting Deep inside Data Center Hosts.
Proc. ACM Meas. Anal. Comput. Syst., December, 2023

Structure Diversity and Mean Hitting Time for Random Walks on Stochastic Uniform Growth Tree Networks.
IEEE Trans. Knowl. Data Eng., August, 2023

MetaScenario: A Framework for Driving Scenario Data Description, Storage and Indexing.
IEEE Trans. Intell. Veh., February, 2023

HPAKE: Honey Password-Authenticated Key Exchange for Fast and Safer Online Authentication.
IEEE Trans. Inf. Forensics Secur., 2023

DyCause: Crowdsourcing to Diagnose Microservice Kernel Failure.
IEEE Trans. Dependable Secur. Comput., 2023

Type-II Apollonian Model.
CoRR, 2023

SoK: Acoustic Side Channels.
CoRR, 2023

Look Deep into the Microservice System Anomaly through Very Sparse Logs.
Proceedings of the ACM Web Conference 2023, 2023

A Sequence Tagging based Framework for Few-Shot Relation Extraction.
Proceedings of the International Joint Conference on Neural Networks, 2023

A Bidirectional Tree Tagging Scheme for Joint Medical Relation Extraction.
Proceedings of the International Joint Conference on Neural Networks, 2023

ECANodule: Accurate Pulmonary Nodule Detection and Segmentation with Efficient Channel Attention.
Proceedings of the International Joint Conference on Neural Networks, 2023

CTSSeg: Consistent Teacher-Student model for magnetic resonance image Segmentation.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2023

An Improved GAN-based Depth Estimation Network for Face Anti-Spoofing.
Proceedings of the 9th International Conference on Computing and Artificial Intelligence, 2023

Improved Wordpcfg for Passwords with Maximum Probability Segmentation.
Proceedings of the IEEE International Conference on Acoustics, 2023

Two-shot Video Object Segmentation.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2023

2022
Self-Adaptive Root Cause Diagnosis for Large-Scale Microservice Architecture.
IEEE Trans. Serv. Comput., 2022

DePo: Dynamically Offload Expensive Event Processing to the Edge of Cyber-Physical Systems.
IEEE Trans. Parallel Distributed Syst., 2022

Random Walks on Stochastic Generalized Vicsek Fractal Networks: Analytic Solution and Simulations.
IEEE Trans. Netw. Sci. Eng., 2022

A Method for Geodesic Distance on Subdivision of Trees With Arbitrary Orders and Their Applications.
IEEE Trans. Knowl. Data Eng., 2022

Platoon Trajectory Completion in a Mixed Traffic Environment Under Sparse Observation.
IEEE Trans. Intell. Transp. Syst., 2022

Platoon Trajectories Generation: A Unidirectional Interconnected LSTM-Based Car-Following Model.
IEEE Trans. Intell. Transp. Syst., 2022

ServiceRank: Root Cause Identification of Anomaly in Large-Scale Microservice Architectures.
IEEE Trans. Dependable Secur. Comput., 2022

Efficient Event Inference and Context-Awareness in Internet of Things Edge Systems.
IEEE Trans. Big Data, 2022

VECROsim: A Versatile Metric-oriented Microservice Fault Simulation System (Tools and Artifact Track).
Proceedings of the IEEE 33rd International Symposium on Software Reliability Engineering, 2022

When Dynamic Causality Comes to Graph-Temporal Neural Network.
Proceedings of the International Joint Conference on Neural Networks, 2022

Exploring a Universal Training Method for Medical Image Classification.
Proceedings of the 6th International Conference on Medical and Health Informatics, 2022

WordMarkov: A New Password Probability Model of Semantics.
Proceedings of the IEEE International Conference on Acoustics, 2022

Passtrans: An Improved Password Reuse Model Based on Transformer.
Proceedings of the IEEE International Conference on Acoustics, 2022

Adaptive Graph Convolutional Network for Knowledge Graph Entity Alignment.
Proceedings of the Findings of the Association for Computational Linguistics: EMNLP 2022, 2022

Abnormal Situation Simulation and Dynamic Causality Discovery in Urban Traffic Networks (Short Paper).
Proceedings of the 15th International Conference on Spatial Information Theory, 2022

Inferring Prototypes for Multi-Label Few-Shot Image Classification with Word Vector Guided Attention.
Proceedings of the Thirty-Sixth AAAI Conference on Artificial Intelligence, 2022

2021
Ontology-Based Event Modeling and High-Confidence Processing in IoT-Enabled High-Speed Train Control System.
J. Signal Process. Syst., 2021

Practical Threshold Multi-Factor Authentication.
IEEE Trans. Inf. Forensics Secur., 2021

Leveraging Network Functions Virtualization Orchestrators to Achieve Software-Defined Access Control in the Clouds.
IEEE Trans. Dependable Secur. Comput., 2021

Middleware for the Internet of Things: A survey on requirements, enabling technologies, and solutions.
J. Syst. Archit., 2021

PrePCT: Traffic congestion prediction in smart cities with relative position congestion tensor.
Neurocomputing, 2021

Randomized Response Mechanisms for Differential Privacy Data Analysis: Bounds and Applications.
CoRR, 2021

OPTT: Optimal Piecewise Transformation Technique for Analyzing Numerical Data under Local Differential Privacy.
CoRR, 2021

Scale-free tree network with an ultra-large diameter.
CoRR, 2021

Determining Exact Solutions for Structural Parameters on Hierarchical Networks With Density Feature.
Comput. J., 2021

Research on the Security of Visual Reasoning CAPTCHA.
Proceedings of the 30th USENIX Security Symposium, 2021

Incrementally Updateable Honey Password Vaults.
Proceedings of the 30th USENIX Security Symposium, 2021

RAGA: Relation-Aware Graph Attention Networks for Global Entity Alignment.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2021

Scene Text Recognition with Cascade Attention Network.
Proceedings of the ICMR '21: International Conference on Multimedia Retrieval, 2021

Aligning Visual Prototypes with BERT Embeddings for Few-Shot Learning.
Proceedings of the ICMR '21: International Conference on Multimedia Retrieval, 2021

Faster, deeper, easier: crowdsourcing diagnosis of microservice kernel failure from user space.
Proceedings of the ISSTA '21: 30th ACM SIGSOFT International Symposium on Software Testing and Analysis, 2021

Dyna-PTM: OD-enhanced GCN for Metro Passenger Flow Prediction.
Proceedings of the International Joint Conference on Neural Networks, 2021

Hierarchical Refined Attention for Scene Text Recognition.
Proceedings of the IEEE International Conference on Acoustics, 2021

Representative Local Feature Mining for Few-Shot Learning.
Proceedings of the IEEE International Conference on Acoustics, 2021

Few-Shot Image Classification with Multi-Facet Prototypes.
Proceedings of the IEEE International Conference on Acoustics, 2021

F-Net: Fusion Neural Network for Vehicle Trajectory Prediction in Autonomous Driving.
Proceedings of the IEEE International Conference on Acoustics, 2021

Improved Probabilistic Context-Free Grammars for Passwords Using Word Extraction.
Proceedings of the IEEE International Conference on Acoustics, 2021

Digital Twin and Its Application in Transportation Infrastructure.
Proceedings of the IEEE 2nd International Conference on Digital Twins and Parallel Intelligence, 2021

Zero-shot Question Generation: Accelerate the Development of Domain-specific Dialogue System.
Proceedings of the 7th IEEE International Conference on Big Data Security on Cloud, 2021

2020
Efficient Multi-Factor User Authentication Protocol with Forward Secrecy for Real-Time Data Access in WSNs.
ACM Trans. Cyber Phys. Syst., 2020

On-demand deployment for IoT applications.
J. Syst. Archit., 2020

Extract interpretability-accuracy balanced rules from artificial neural networks: A review.
Neurocomputing, 2020

Analytic formulae for random walks on stochastic uniform growth trees.
CoRR, 2020

BiTT: Bidirectional Tree Tagging for Joint Extraction of Overlapping Entities and Relations.
CoRR, 2020

Trapping problem on star-type graphs with applications.
CoRR, 2020

Counterexample: scale-free networked graphs with invariable diameter and density feature.
CoRR, 2020

Understanding security failures of multi-factor authentication schemes for multi-server environments.
Comput. Secur., 2020

AutoMAP: Diagnose Your Microservice-based Web Applications Automatically.
Proceedings of the WWW '20: The Web Conference 2020, Taipei, Taiwan, April 20-24, 2020, 2020

Real-Time Fine-Grained Freeway Traffic State Estimation Under Sparse Observation.
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2020

Lead Time-Aware Proactive Adaptation for Service-Oriented Systems.
Proceedings of the 2020 IEEE International Conference on Web Services, 2020

Drug Drug Interaction Extraction from Chinese Biomedical Literature Using Distant Supervision.
Proceedings of the 2020 IEEE International Conference on Knowledge Graph, 2020

Few-Shot Text Classification with Edge-Labeling Graph Neural Network-Based Prototypical Network.
Proceedings of the 28th International Conference on Computational Linguistics, 2020

Multi-label Classification for Clinical Text with Feature-level Attention.
Proceedings of the 6th IEEE International Conference on Big Data Security on Cloud, 2020

An Improved RFID-based Authentication Protocol for Rail Transit.
Proceedings of the 14th IEEE International Conference on Big Data Science and Engineering, 2020

K-BERT: Enabling Language Representation with Knowledge Graph.
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020

2019
Motion Plan of Maritime Autonomous Surface Ships by Dynamic Programming for Collision Avoidance and Speed Optimization.
Sensors, 2019

Revisiting Anonymous Two-Factor Authentication Schemes for IoT-Enabled Devices in Cloud Computing Environments.
Secur. Commun. Networks, 2019

PbFG: Physique-based fuzzy granular modeling for non-invasive blood glucose monitoring.
Inf. Sci., 2019

Two-factor authentication in industrial Internet-of-Things: Attacks, evaluation and new construction.
Future Gener. Comput. Syst., 2019

Dense graphs with scale-free feature.
CoRR, 2019

Handshake between Fibonacci series and pure preferential attachment mechanism on a graph-model.
CoRR, 2019

Random walks on Fibonacci treelike models: emergence of power law.
CoRR, 2019

An ensemble of random graphs with identical degree distribution.
CoRR, 2019

Probability Model Transforming Encoders Against Encoding Attacks.
Proceedings of the 28th USENIX Security Symposium, 2019

Birthday, Name and Bifacial-security: Understanding Passwords of Chinese Web Users.
Proceedings of the 28th USENIX Security Symposium, 2019

Efficient Spatial Big Data Storage and Query in HBase.
Proceedings of the IEEE International Conference on Smart Cloud, 2019

Gate Decorator: Global Filter Pruning Method for Accelerating Deep Convolutional Neural Networks.
Proceedings of the Advances in Neural Information Processing Systems 32: Annual Conference on Neural Information Processing Systems 2019, 2019

Intelligent Dispatching and Coordinated Control Method at Railway Stations for Virtually Coupled Train Sets.
Proceedings of the 2019 IEEE Intelligent Transportation Systems Conference, 2019

Dynamic train formation and dispatching for rail transit based on virtually coupled train set.
Proceedings of the 2019 IEEE Intelligent Transportation Systems Conference, 2019

MS-Rank: Multi-Metric and Self-Adaptive Root Cause Diagnosis for Microservice Applications.
Proceedings of the 2019 IEEE International Conference on Web Services, 2019

Adversarial Noise Layer: Regularize Neural Network by Adding Noise.
Proceedings of the 2019 IEEE International Conference on Image Processing, 2019

Transfer and Collaborative Learning Method for Personalized Noninvasive Blood Glucose Measurement Modeling.
Proceedings of the IEEE International Conference on Acoustics, 2019

Secure Chaotic Maps-based Authentication Scheme for Real-Time Data Access In Internet of Things.
Proceedings of the 2019 International Conference on Cyber Security and Protection of Digital Services, 2019

Light-Weight and Scalable Hierarchical-MVC Architecture for Cloud Web Applications.
Proceedings of the 6th IEEE International Conference on Cyber Security and Cloud Computing, 2019

Cryptanalysis of Two Chaotic Maps-Based Authentication Schemes in Edge Computing.
Proceedings of the 6th IEEE International Conference on Cyber Security and Cloud Computing, 2019

Password Expiration Strategy: A Perspective of Ecological Memory.
Proceedings of the IEEE Fifth International Conference on Big Data Computing Service and Applications, 2019

NIV-NGM - A Novel Non-invasive Blood Glucose Monitoring Method based on Near-infrared Videos.
Proceedings of the 2019 IEEE International Conference on Bioinformatics and Biomedicine, 2019

2018
An Enhanced User Authentication Protocol Based on Elliptic Curve Cryptosystem in Cloud Computing Environment.
Wirel. Commun. Mob. Comput., 2018

Cryptanalysis and Security Enhancement of Three Authentication Schemes in Wireless Sensor Networks.
Wirel. Commun. Mob. Comput., 2018

Model Based Energy Consumption Analysis of Wireless Cyber Physical Systems.
J. Signal Process. Syst., 2018

Data and Decision Intelligence for Human-in-the-Loop Cyber-Physical Systems: Reference Model, Recent Progresses and Challenges.
J. Signal Process. Syst., 2018

Breaking Three Remote user Authentication Systems for Mobile Devices.
J. Signal Process. Syst., 2018

Measuring Two-Factor Authentication Schemes for Real-Time Data Access in Industrial Wireless Sensor Networks.
IEEE Trans. Ind. Informatics, 2018

Toward Energy-Awareness Smart Building: Discover the Fingerprint of Your Electrical Appliances.
IEEE Trans. Ind. Informatics, 2018

Two Birds with One Stone: Two-Factor Authentication with Security Beyond Conventional Bound.
IEEE Trans. Dependable Secur. Comput., 2018

Long-Term Event Processing over Data Streams in Cyber-Physical Systems.
ACM Trans. Cyber Phys. Syst., 2018

On the Challenges in Designing Identity-Based Privacy-Preserving Authentication Schemes for Mobile Devices.
IEEE Syst. J., 2018

An Alternative Method for Understanding User-Chosen Passwords.
Secur. Commun. Networks, 2018

Redundant Reader Elimination in Large-Scale Distributed RFID Networks.
IEEE Internet Things J., 2018

Adversarial Noise Layer: Regularize Neural Network By Adding Noise.
CoRR, 2018

Toward Ubiquitous Environment: An Scalable Framework for Autonomous Service Composition.
Proceedings of the 2018 IEEE SmartWorld, 2018

Fast Implementation for SM4 Cipher Algorithm Based on Bit-Slice Technology.
Proceedings of the Smart Computing and Communication - Third International Conference, 2018

RBD: A Reference Railway Big Data System Model.
Proceedings of the Smart Computing and Communication - Third International Conference, 2018

Regional Estimation Prior Network for Crowd Analyzing.
Proceedings of the Smart Computing and Communication - Third International Conference, 2018

Travel-Time Prediction Methods: A Review.
Proceedings of the Smart Computing and Communication - Third International Conference, 2018

A Security Analysis of Honeywords.
Proceedings of the 25th Annual Network and Distributed System Security Symposium, 2018

FacGraph: Frequent Anomaly Correlation Graph Mining for Root Cause Diagnose in Micro-Service Architecture.
Proceedings of the 37th IEEE International Performance Computing and Communications Conference, 2018

Revisiting Anonymous Two-Factor Authentication Schemes for Multi-server Environment.
Proceedings of the Information and Communications Security - 20th International Conference, 2018

Revisiting Anonymous Two-Factor Authentication Schemes for Cloud Computing.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

CloudRanger: Root Cause Identification for Cloud Native Systems.
Proceedings of the 18th IEEE/ACM International Symposium on Cluster, 2018

2017
Zipf's Law in Passwords.
IEEE Trans. Inf. Forensics Secur., 2017

On the consistency of event processing: A semantic approach.
Knowl. Based Syst., 2017

Discover the fingerprint of electrical appliance: Online appliance behavior learning and detection in smart homes.
Proceedings of the 2017 IEEE SmartWorld, 2017

A Controller/Architecture Co-design Framework for Wireless Cyber-Physical Systems.
Proceedings of the 2017 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2017

Event Description and Detection in Cyber-Physical Systems: An Ontology-Based Language and Approach.
Proceedings of the 23rd IEEE International Conference on Parallel and Distributed Systems, 2017

MODE: A Context-Aware IoT Middleware Supporting On-Demand Deployment for Mobile Devices.
Proceedings of the 23rd IEEE International Conference on Parallel and Distributed Systems, 2017

LogDC: Problem Diagnosis for Declartively-Deployed Cloud Applications with Log.
Proceedings of the 14th IEEE International Conference on e-Business Engineering, 2017

Cloud Migration: Layer Partition and Integration.
Proceedings of the IEEE International Conference on Edge Computing, 2017

Understanding Human-Chosen PINs: Characteristics, Distribution and Security.
Proceedings of the 2017 ACM on Asia Conference on Computer and Communications Security, 2017

Intelligent Transportation System(ITS): Concept, Challenge and Opportunity.
Proceedings of the 2017 IEEE 3rd International Conference on Big Data Security on Cloud (BigDataSecurity), 2017

Breaking Two Remote User Authentication Systems for Mobile Devices.
Proceedings of the 2017 IEEE 3rd International Conference on Big Data Security on Cloud (BigDataSecurity), 2017

BpMC: A novel algorithm retrieving multilayered tissue bio-optical properties for non-invasive blood glucose measurement.
Proceedings of the 2017 IEEE International Conference on Bioinformatics and Biomedicine, 2017

2016
On the Implications of Zipf's Law in Passwords.
Proceedings of the Computer Security - ESORICS 2016, 2016

fuzzyPSM: A New Password Strength Meter Using Fuzzy Probabilistic Context-Free Grammars.
Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2016

Targeted Online Password Guessing: An Underestimated Threat.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016

The Request for Better Measurement: A Comparative Evaluation of Two-Factor Authentication Schemes.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

A Novel Pattern Based Dynamic Service Composition Framework.
Proceedings of the IEEE International Conference on Services Computing, 2016

2015
Anonymous Two-Factor Authentication in Distributed Systems: Certain Goals Are Beyond Attainment.
IEEE Trans. Dependable Secur. Comput., 2015

Graph Similarity based Cloud Migration Service Composition Pattern Discovery.
Int. J. Web Serv. Res., 2015

Preserving privacy for free: Efficient and provably secure two-factor authentication scheme with user anonymity.
Inf. Sci., 2015

Efficient Multipattern Event Processing Over High-Speed Train Data Streams.
IEEE Internet Things J., 2015

On the Usability of Two-Factor Authentication.
IACR Cryptol. ePrint Arch., 2015

The Emperor's New Password Creation Policies.
IACR Cryptol. ePrint Arch., 2015

OntoEvent: An Ontology-Based Event Description Language for Semantic Complex Event Processing.
Proceedings of the Web-Age Information Management - 16th International Conference, 2015

From Complex Event Processing to Cognitive Event Processing: Approaches, Challenges, and Opportunities.
Proceedings of the 2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom), 2015

Class-based delta-encoding for high-speed train data stream.
Proceedings of the 34th IEEE International Performance Computing and Communications Conference, 2015

A Cloud-Based High-Speed Rail Information Service Platform Architecture.
Proceedings of the Ninth International Conference on Frontier of Computer Science and Technology, 2015

The Emperor's New Password Creation Policies: An Evaluation of Leading Web Services and the Effect of Role in Resisting Against Online Guessing.
Proceedings of the Computer Security - ESORICS 2015, 2015

LTCEP: Efficient Long-Term Event Processing for Internet of Things Data Streams.
Proceedings of the IEEE International Conference on Data Science and Data Intensive Systems, 2015

2014
Anonymous Two-Factor Authentication: Certain Goals Are Beyond Attainment.
IACR Cryptol. ePrint Arch., 2014

Offline Dictionary Attack on Password Authentication Schemes using Smart Cards.
IACR Cryptol. ePrint Arch., 2014

Zipf's Law in Passwords.
IACR Cryptol. ePrint Arch., 2014

On the anonymity of two-factor authentication schemes for wireless sensor networks: Attacks, principle and solutions.
Comput. Networks, 2014

Understanding security failures of two-factor authentication schemes for real-time applications in hierarchical wireless sensor networks.
Ad Hoc Networks, 2014

Improved privacy-preserving authentication scheme for roaming service in mobile networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2014

A Framework for Streaming Service Composition.
Proceedings of the IEEE 79th Vehicular Technology Conference, 2014

Ontology-Based Semantic Modeling and Evaluation for Internet of Things Applications.
Proceedings of the 2014 IEEE International Conference on Internet of Things, 2014

Service Composition Pattern Generation for Cloud Migration: A Graph Similarity Analysis Approach.
Proceedings of the 2014 IEEE International Conference on Web Services, 2014

2013
Power-Aware Cloud Computing Infrastructure for Latency-Sensitive Internet-of-Things Services.
Proceedings of the 15th International Conference on Computer Modelling and Simulation, 2013

A novel distributed algorithm for redundant reader elimination in RFID networks.
Proceedings of the 2013 IEEE International Conference on RFID-Technologies and Applications, 2013

Data Management for Internet of Things: Challenges, Approaches and Opportunities.
Proceedings of the 2013 IEEE International Conference on Green Computing and Communications (GreenCom) and IEEE Internet of Things (iThings) and IEEE Cyber, 2013

2012
User-driven cloud transportation system for smart driving.
Proceedings of the 4th IEEE International Conference on Cloud Computing Technology and Science Proceedings, 2012


  Loading...