Kai Wang

Orcid: 0000-0003-3044-9047

Affiliations:
  • Tsinghua University, Research Institute of Information Technology, Beijing, China
  • Yantai University, School of Computer and Control Engineering, China
  • China Electronics Technology Group 41st Research Institute, Qingdao, China (2014 - 2015)
  • Beijing Jiaotong University, School of Electronic and Information Engineering, China (PhD 2014)


According to our database1, Kai Wang authored at least 33 papers between 2012 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
GNN-based Advanced Feature Integration for ICS Anomaly Detection.
ACM Trans. Intell. Syst. Technol., December, 2023

Process-Oriented heterogeneous graph learning in GNN-Based ICS anomalous pattern recognition.
Pattern Recognit., September, 2023

Analysis of Recent Deep-Learning-Based Intrusion Detection Methods for In-Vehicle Network.
IEEE Trans. Intell. Transp. Syst., February, 2023

2022
Heterogeneous graph neural network for attribute completion.
Knowl. Based Syst., 2022

Anomaly detection for industrial control operations with optimized ABC-SVM and weighted function code correlation analysis.
J. Ambient Intell. Humaniz. Comput., 2022

Global-local integration for GNN-based anomalous device state detection in industrial control systems.
Expert Syst. Appl., 2022

2021
PA-Cache: Evolving Learning-Based Popularity- Aware Content Caching in Edge Networks.
IEEE Trans. Netw. Serv. Manag., 2021

High-Order Mean-Field Approximations for Adaptive Susceptible-Infected-Susceptible Model in Finite-Size Networks.
Complex., 2021

Adaptive and Lightweight Abnormal Node Detection via Biological Immune Game in Mobile Multimedia Networks.
Algorithms, 2021

2020
An Edge IDS Based on Biological Immune Principles for Dynamic Threat Detection.
Wirel. Commun. Mob. Comput., 2020

Analyzing NDN NACK on Interest Flooding Attack via SIS Epidemic Model.
IEEE Syst. J., 2020

Shape-optimizing mesh warping method for stereoscopic panorama stitching.
Inf. Sci., 2020

InterestFence: Simple but efficient way to counter interest flooding attack.
Comput. Secur., 2020

Dynamic Adjusting ABC-SVM Anomaly Detection Based on Weighted Function Code Correlation.
Proceedings of the Machine Learning for Cyber Security - Third International Conference, 2020

2019
Betweenness Centrality Based Software Defined Routing: Observation from Practical Internet Datasets.
ACM Trans. Internet Techn., 2019

Graph structure and statistical properties of Ethereum transaction relationships.
Inf. Sci., 2019

Securing Data With Blockchain and AI.
IEEE Access, 2019

2018
Software-Defined Collaborative Offloading for Heterogeneous Vehicular Networks.
Wirel. Commun. Mob. Comput., 2018

Hyperconnected Network: A Decentralized Trusted Computing and Networking Paradigm.
IEEE Netw., 2018

Enabling Collaborative Edge Computing for Software Defined Vehicular Networks.
IEEE Netw., 2018

Accuracy or delay? A game in detecting interest flooding attacks.
Internet Technol. Lett., 2018

A novel task recommendation model for mobile crowdsourcing systems.
Int. J. Sens. Networks, 2018

On the urgency of implementing Interest NACK into CCN: from the perspective of countering advanced interest flooding attacks.
IET Networks, 2018

InterestFence: Countering Interest Flooding Attacks by Using Hash-Based Security Labels.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018

2017
Evaluating and Mitigating Malicious Data Aggregates in Named Data Networking.
KSII Trans. Internet Inf. Syst., 2017

Operators of preference composition for CP-nets.
Expert Syst. Appl., 2017

2016
A Task Recommendation Model for Mobile Crowdsourcing Systems Based on Dwell-Time.
Proceedings of the 2016 IEEE International Conferences on Big Data and Cloud Computing (BDCloud), 2016

2014
Cooperative-Filter: countering Interest flooding attacks in named data networking.
Soft Comput., 2014

Detecting and mitigating interest flooding attacks in content-centric network.
Secur. Commun. Networks, 2014

Modeling denial-of-service against pending interest table in named data networking.
Int. J. Commun. Syst., 2014

2013
RDAI: Router-Based Data Aggregates Identification Mechanism for Named Data Networking.
Proceedings of the Seventh International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2013

Decoupling malicious Interests from Pending Interest Table to mitigate Interest Flooding Attacks.
Proceedings of the Workshops Proceedings of the Global Communications Conference, 2013

2012
ILSRO: Identifier/Location Split-Based Route Optimization for PMIPv6.
Proceedings of the Sixth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing, 2012


  Loading...