Weichao Wang
Orcid: 0000-0002-1969-0705
According to our database1,
Weichao Wang
authored at least 94 papers
between 2003 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Investigation on Different Stator Structures of the Axial-Radial Flux Switched Reluctance Motors.
IEEE Trans. Ind. Electron., June, 2024
A Comprehensive Study of Multilingual Confidence Estimation on Large Language Models.
CoRR, 2024
IoTWarden: A Deep Reinforcement Learning Based Real-Time Defense System to Mitigate Trigger-Action IoT Attacks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2024
IoTHaven: An Online Defense System to Mitigate Remote Injection Attacks in Trigger-action IoT Platforms.
Proceedings of the 30th IEEE International Symposium on Local and Metropolitan Area Networks, 2024
UniRetriever: Multi-task Candidates Selection for Various Context-Adaptive Conversational Retrieval.
Proceedings of the 2024 Joint International Conference on Computational Linguistics, 2024
2023
IEEE Trans. Dependable Secur. Comput., 2023
Large Language Models as Source Planner for Personalized Knowledge-grounded Dialogue.
CoRR, 2023
PanGu-Σ: Towards Trillion Parameter Language Model with Sparse Heterogeneous Computing.
CoRR, 2023
Proceedings of the 32nd International Conference on Computer Communications and Networks, 2023
Improving Factual Consistency for Knowledge-Grounded Dialogue Systems via Knowledge Enhancement and Alignment.
Proceedings of the Findings of the Association for Computational Linguistics: EMNLP 2023, 2023
Large Language Models as Source Planner for Personalized Knowledge-grounded Dialogues.
Proceedings of the Findings of the Association for Computational Linguistics: EMNLP 2023, 2023
Towards a Domain-Agnostic Knowledge Graph-as-a-Service Infrastructure for Active Cyber Defense with Intelligent Agents.
Proceedings of the 52nd IEEE Applied Imagery Pattern Recognition Workshop, 2023
Towards Diverse, Relevant and Coherent Open-Domain Dialogue Generation via Hybrid Latent Variables.
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023
2022
Imitation learning based decision-making for autonomous vehicle control at traffic roundabouts.
Multim. Tools Appl., 2022
Toward cross-platform immersive visualization for indoor navigation and collaboration with augmented reality.
J. Vis., 2022
Informative and diverse emotional conversation generation with variational recurrent pointer-generator.
Frontiers Comput. Sci., 2022
Development and performance test of a vehicle-mounted total nitrogen content prediction system based on the fusion of near-infrared spectroscopy and image information.
Comput. Electron. Agric., 2022
IoTMonitor: A Hidden Markov Model-based Security System to Identify Crucial Attack Nodes in Trigger-action IoT Platforms.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2022
A Study of Real-time Information on User Behaviors during Search and Rescue (SAR) Training of Firefighters.
Proceedings of the 2022 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops, 2022
Proceedings of the IEEE International Performance, 2022
Proceedings of the 8th International Conference on Information Systems Security and Privacy, 2022
Modeling Complex Dialogue Mappings via Sentence Semantic Segmentation Guided Conditional Variational Auto-Encoder.
Proceedings of the Findings of the Association for Computational Linguistics: EMNLP 2022, 2022
2021
IEEE Trans. Netw. Sci. Eng., 2021
A New Coupled Elimination Method of Soil Moisture and Particle Size Interferences on Predicting Soil Total Nitrogen Concentration through Discrete NIR Spectral Band Data.
Remote. Sens., 2021
Learning to improve persona consistency in conversation generation with information augmentation.
Knowl. Based Syst., 2021
A comprehensive survey on data provenance: State-of-the-art approaches and their deployments for IoT security enforcement.
J. Comput. Secur., 2021
A Comprehensive Survey on the State-of-the-art Data Provenance Approaches for Security Enforcement.
CoRR, 2021
Proceedings of the VINCI 2021: The 14th International Symposium on Visual Information Communication and Interaction, Potsdam, Germany, September 6, 2021
Adaptive Model Predictive-Based Load Frequency Controller using Unscented Kalman Filter.
Proceedings of the 2021 IEEE PES Innovative Smart Grid Technologies, 2021
Adaptive Posterior Knowledge Selection for Improving Knowledge-Grounded Dialogue Generation.
Proceedings of the CIKM '21: The 30th ACM International Conference on Information and Knowledge Management, Virtual Event, Queensland, Australia, November 1, 2021
2020
Comput. Methods Programs Biomed., 2020
Proof of outsourced encryption: cross verification of security service level agreement.
CCF Trans. Netw., 2020
Proceedings of the WWW '20: The Web Conference 2020, Taipei, Taiwan, April 20-24, 2020, 2020
Proceedings of the Towards Autonomous Robotic Systems - 21st Annual Conference, 2020
EmoElicitor: An Open Domain Response Generation Model with User Emotional Reaction Awareness.
Proceedings of the Twenty-Ninth International Joint Conference on Artificial Intelligence, 2020
Proof of Network Security Services: Enforcement of Security SLA through Outsourced Network Testing.
Proceedings of the ICCNS 2020: The 10th International Conference on Communication and Network Security, 2020
2019
IEEE Trans. Mob. Comput., 2019
Proceedings of the IEEE International Conference of Vehicular Electronics and Safety, 2019
Proceedings of the 2019 IEEE International Conference on Communications, 2019
Proceedings of the 2019 Conference on Empirical Methods in Natural Language Processing and the 9th International Joint Conference on Natural Language Processing, 2019
Proof of Encryption: Enforcement of Security Service Level Agreement for Encryption Outsourcing.
Proceedings of the 2019 IEEE Conference on Dependable and Secure Computing, 2019
Proceedings of the IEEE Congress on Evolutionary Computation, 2019
2018
Proceedings of the 15th International Conference on Control, 2018
Personalized Microblog Sentiment Classification via Adversarial Cross-lingual Multi-task Learning.
Proceedings of the 2018 Conference on Empirical Methods in Natural Language Processing, Brussels, Belgium, October 31, 2018
2017
Proceedings of the 2017 IEEE International Conference on Pervasive Computing and Communications, 2017
Lightweight mutual authentication among sensors in body area networks through Physical Unclonable Functions.
Proceedings of the IEEE International Conference on Communications, 2017
Lightweight Key Management for Group Communication in Body Area Networks through Physical Unclonable Functions.
Proceedings of the Second IEEE/ACM International Conference on Connected Health: Applications, 2017
2016
Proceedings of the 24th IEEE/ACM International Symposium on Quality of Service, 2016
Proceedings of the 35th IEEE International Performance Computing and Communications Conference, 2016
Proceedings of the First IEEE International Conference on Connected Health: Applications, 2016
Proceedings of the 4th ACM International Workshop on Security in Cloud Computing, 2016
2015
Detection of Service Level Agreement (SLA) Violation in Memory Management in Virtual Machines.
Proceedings of the 24th International Conference on Computer Communication and Networks, 2015
2014
An investigation of collaborations between top Chinese universities: a new quantitative approach.
Scientometrics, 2014
Detecting Primary User Emulation Attacks in Cognitive Radio Networks via Physical Layer Network Coding.
J. Ubiquitous Syst. Pervasive Networks, 2014
2013
Proceedings of the Safe and Secure Software Reuse, 2013
Proceedings of the 22nd International Conference on Computer Communication and Networks, 2013
Rootkit detection on virtual machines through deep information extraction at hypervisor-level.
Proceedings of the IEEE Conference on Communications and Network Security, 2013
2012
Node localization through physical layer network coding: Bootstrap, security, and accuracy.
Ad Hoc Networks, 2012
Towards the attacker's view of protocol narrations (or, how to compile security protocols).
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012
2011
Inf. Vis., 2011
Fingerprinting large data sets through memory de-duplication technique in virtual machines.
Proceedings of the MILCOM 2011, 2011
Proceedings of the MILCOM 2011, 2011
Non-interactive OS fingerprinting through memory de-duplication technique in virtual machines.
Proceedings of the 30th IEEE International Performance Computing and Communications Conference, 2011
Proceedings of the 2011 International Joint Conference on Neural Networks, 2011
Proceedings of the IEEE Congress on Evolutionary Computation, 2011
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011
2010
Proceedings of the 7th International Symposium on Visualization for Cyber Security, 2010
Proceedings of the Information Security - 13th International Conference, 2010
Proceedings of the Global Communications Conference, 2010
Proceedings of the Global Communications Conference, 2010
Proceedings of the 2010 IEEE/IFIP International Conference on Dependable Systems and Networks, 2010
2009
A Surface Topology and Motion Compensation System for Microsurgery Guidance and Intervention Based on Common-Path Optical Coherence Tomography.
IEEE Trans. Biomed. Eng., 2009
Proceedings of the first ACM Cloud Computing Security Workshop, 2009
2008
Int. J. Secur. Networks, 2008
Proceedings of IEEE International Conference on Communications, 2008
2007
Stateless key distribution for secure intra and inter-group multicast in mobile wireless network.
Comput. Networks, 2007
2006
Wirel. Commun. Mob. Comput., 2006
IEEE Trans. Syst. Man Cybern. Part A, 2006
Wireless networking security: open issues in trust, management, interoperation and measurement.
Int. J. Secur. Networks, 2006
Proceedings of the 3rd International Workshop on Visualization for Computer Security, 2006
Proceedings of the 1st IEEE Symposium On Visual Analytics Science And Technology, 2006
Cooperative Co-evolutionary Approach Applied in Reactive Power Optimization of Power System.
Proceedings of the Advances in Natural Computation, Second International Conference, 2006
2005
Low-cost attacks against packet delivery, localization and time synchronization services in under-water sensor networks.
Proceedings of the 2005 ACM Workshop on Wireless Security, 2005
Proceedings of the 3rd ACM Workshop on Security of ad hoc and Sensor Networks, 2005
2004
Integrating Heterogeneous Wireless Technologies: A Cellular Aided Mobile Ad Hoc Network (CAMA).
Mob. Networks Appl., 2004
Proceedings of the 2004 ACM Workshop on Wireless Security, 2004
2003
On Security Study of Two Distance Vector Routing Protocols or Mobile Ad Hoc Networks.
Proceedings of the First IEEE International Conference on Pervasive Computing and Communications (PerCom'03), 2003
Proceedings of the First IEEE International Conference on Pervasive Computing and Communications (PerCom'03), 2003