Kai Wang
Orcid: 0000-0003-3044-9047Affiliations:
- Tsinghua University, Research Institute of Information Technology, Beijing, China
- Yantai University, School of Computer and Control Engineering, China
- China Electronics Technology Group 41st Research Institute, Qingdao, China (2014 - 2015)
- Beijing Jiaotong University, School of Electronic and Information Engineering, China (PhD 2014)
According to our database1,
Kai Wang
authored at least 48 papers
between 2012 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2025
IEEE Trans. Netw. Serv. Manag., June, 2025
Anomaly Detection via Semantically Conjugate View Learning on Industrial Temporal Data.
IEEE Internet Things J., June, 2025
ATHENA: An In-vehicle CAN Intrusion Detection Framework Based on Physical Characteristics of Vehicle Systems.
CoRR, March, 2025
TFLAG:Towards Practical APT Detection via Deviation-Aware Learning on Temporal Provenance Graph.
CoRR, January, 2025
An original model for multi-target learning of logical rules for knowledge graph reasoning.
Appl. Intell., January, 2025
Optimizing Consistency in Distributed Data Services: The CP-Raft Protocol for High-Performance and Fault-Tolerant Replication.
IEEE Trans. Serv. Comput., 2025
Graph Optimization via Decoupled Edge Tuning for Efficient Industrial Anomaly Detection.
IEEE Trans. Netw. Sci. Eng., 2025
KERMIT: Knowledge graph completion of enhanced relation modeling with inverse transformation.
Knowl. Based Syst., 2025
KDRSFL: A knowledge distillation resistance transfer framework for defending model inversion attacks in split federated learning.
Future Gener. Comput. Syst., 2025
2024
Energy-Efficient and Privacy-Preserved Incentive Mechanism for Mobile Edge Computing-Assisted Federated Learning in Healthcare System.
IEEE Trans. Netw. Serv. Manag., August, 2024
Computation Cost-Driven Offloading Strategy Based on Reinforcement Learning for Consumer Devices.
IEEE Trans. Consumer Electron., February, 2024
Comput. Networks, 2024
Power Allocation and Client Selection For Privacy-Preserving Federated Learning in IoMT.
Proceedings of the 2024 IEEE Global Communications Conference, 2024
2023
ACM Trans. Intell. Syst. Technol., December, 2023
Process-Oriented heterogeneous graph learning in GNN-Based ICS anomalous pattern recognition.
Pattern Recognit., September, 2023
Analysis of Recent Deep-Learning-Based Intrusion Detection Methods for In-Vehicle Network.
IEEE Trans. Intell. Transp. Syst., February, 2023
2022
Knowl. Based Syst., 2022
Anomaly detection for industrial control operations with optimized ABC-SVM and weighted function code correlation analysis.
J. Ambient Intell. Humaniz. Comput., 2022
Global-local integration for GNN-based anomalous device state detection in industrial control systems.
Expert Syst. Appl., 2022
PRAD: Unsupervised KPI Anomaly Detection by Joint Prediction and Reconstruction of Multivariate Time Series.
Proceedings of the IEEE Smartworld, 2022
2021
PA-Cache: Evolving Learning-Based Popularity- Aware Content Caching in Edge Networks.
IEEE Trans. Netw. Serv. Manag., 2021
High-Order Mean-Field Approximations for Adaptive Susceptible-Infected-Susceptible Model in Finite-Size Networks.
Complex., 2021
Adaptive and Lightweight Abnormal Node Detection via Biological Immune Game in Mobile Multimedia Networks.
Algorithms, 2021
2020
Wirel. Commun. Mob. Comput., 2020
IEEE Syst. J., 2020
Inf. Sci., 2020
Comput. Secur., 2020
Dynamic Adjusting ABC-SVM Anomaly Detection Based on Weighted Function Code Correlation.
Proceedings of the Machine Learning for Cyber Security - Third International Conference, 2020
2019
Betweenness Centrality Based Software Defined Routing: Observation from Practical Internet Datasets.
ACM Trans. Internet Techn., 2019
Inf. Sci., 2019
Emerging Technologies, Infrastructures, and Applications for Video Streaming over Future Communication Networks.
Int. J. Digit. Multim. Broadcast., 2019
2018
Wirel. Commun. Mob. Comput., 2018
IEEE Netw., 2018
IEEE Netw., 2018
Internet Technol. Lett., 2018
Int. J. Sens. Networks, 2018
On the urgency of implementing Interest NACK into CCN: from the perspective of countering advanced interest flooding attacks.
IET Networks, 2018
InterestFence: Countering Interest Flooding Attacks by Using Hash-Based Security Labels.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018
2017
KSII Trans. Internet Inf. Syst., 2017
2016
Proceedings of the 2016 IEEE International Conferences on Big Data and Cloud Computing (BDCloud), 2016
2014
Soft Comput., 2014
Secur. Commun. Networks, 2014
Int. J. Commun. Syst., 2014
2013
RDAI: Router-Based Data Aggregates Identification Mechanism for Named Data Networking.
Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013
Decoupling malicious Interests from Pending Interest Table to mitigate Interest Flooding Attacks.
Proceedings of the Workshops Proceedings of the Global Communications Conference, 2013
2012
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012