Ming Wan

Orcid: 0000-0001-9195-8422

According to our database1, Ming Wan authored at least 69 papers between 1996 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Feature selection for multi-label learning based on variable-degree multi-granulation decision-theoretic rough sets.
Int. J. Approx. Reason., 2024

UniForensics: Face Forgery Detection via General Facial Representation.
CoRR, 2024

Multi-Physics Field Simulation and Optimization of Directional Sound Barrier Based on Finite Element Algorithm.
Proceedings of the International Conference on Computing, 2024

2023
Industrial Product Quality Analysis Based on Online Machine Learning.
Sensors, October, 2023

Function-Hiding Zero Predicate Inner Product Functional Encryption from Pairings.
Proceedings of the Information Security - 26th International Conference, 2023

PSL-Based Interpretable Generation Model for Recommendation.
Proceedings of the Web and Big Data. APWeb-WAIM 2023 International Workshops, 2023

Double-Optimized CS-BP Anomaly Prediction for Control Operation Data.
Proceedings of the Advanced Data Mining and Applications - 19th International Conference, 2023

2022
Anomaly detection for industrial control operations with optimized ABC-SVM and weighted function code correlation analysis.
J. Ambient Intell. Humaniz. Comput., 2022

Revisiting the Concrete Hardness of SelfTargetMSIS in CRYSTALS-Dilithium.
IACR Cryptol. ePrint Arch., 2022

Software-defined DDoS detection with information entropy analysis and optimized deep learning.
Future Gener. Comput. Syst., 2022

More Efficient Verifiable Functional Encryption.
Proceedings of the Provable and Practical Security, 2022

Insights on Cooperative Defense for Multiple Industrial Security Technologies.
Proceedings of the 12th International Conference on Communication and Network Security, 2022

DitDetector: Bimodal Learning based on Deceptive Image and Text for Macro Malware Detection.
Proceedings of the Annual Computer Security Applications Conference, 2022

2021
Extracting Function-Driven Tracing Characteristics for Optimized SVM Classification.
Mob. Inf. Syst., 2021

Optimization of security check efficiency in subway station based on Anylogic: A case study of Nanchang Metro.
J. Intell. Fuzzy Syst., 2021

Fully Secure Lattice-Based ABE from Noisy Linear Functional Encryption.
Proceedings of the Information Security and Cryptology - 17th International Conference, 2021

2020
SGS2Net: deep representation of facial expression by graph-preserving sparse coding.
J. Electronic Imaging, 2020

How to Determine the Early Warning Threshold Value of Meteorological Factors on Influenza through Big Data Analysis and Machine Learning.
Comput. Math. Methods Medicine, 2020

A Trust Routing Scheme based on Identification of Non-complete Cooperative Nodes in Mobile Peer-to-Peer Networks.
Proceedings of the 19th IEEE International Conference on Trust, 2020

Dynamic Adjusting ABC-SVM Anomaly Detection Based on Weighted Function Code Correlation.
Proceedings of the Machine Learning for Cyber Security - Third International Conference, 2020

Real-Time Self-defense Approach Based on Customized Netlink Connection for Industrial Linux-Based Devices.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2020

2019
Amended Kalman Filtering with Intermittent Measurements in Target Tracking.
J. Inf. Sci. Eng., 2019

Combining 3D Convolutional Neural Networks with Transfer Learning by Supervised Pre-Training for Facial Micro-Expression Recognition.
IEICE Trans. Inf. Syst., 2019

Production service system enabled by cloud-based smart resource hierarchy for a highly dynamic synchronized production process.
Adv. Eng. Informatics, 2019

A Novel Noise Filter Based on Multiple Voting.
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019

A Blockchain-Based IoT Workflow Management Approach.
Proceedings of the Big Data and Security - First International Conference, 2019

2018
Function-Aware Anomaly Detection Based on Wavelet Neural Network for Industrial Control Communication.
Secur. Commun. Networks, 2018

Software Defined Wi-V2G: A V2G Network Architecture.
IEEE Intell. Transp. Syst. Mag., 2018

Research on the energy balance algorithm of WSN based on topology control.
EURASIP J. Wirel. Commun. Netw., 2018

Length-Preserving Encryption Based on Single-Key Tweakable Block Cipher.
Proceedings of the Provable Security, 2018

Label Noise Detection Based on Tri-training.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

2017
Double Behavior Characteristics for One-Class Classification Anomaly Detection in Networked Control Systems.
IEEE Trans. Inf. Forensics Secur., 2017

Content-based deep communication control for networked control system.
Telecommun. Syst., 2017

Phase Switching Mechanism for WiFi-based Long Distance Networks in Industrial Real-Time Applications.
KSII Trans. Internet Inf. Syst., 2017

Deployment optimization for a long-distance wireless backhaul network in industrial cyber physical systems.
Int. J. Distributed Sens. Networks, 2017

A power control and optimization method for burst bandwidth demand in heterogeneous industrial wireless networks.
Proceedings of the IECON 2017 - 43rd Annual Conference of the IEEE Industrial Electronics Society, Beijing, China, October 29, 2017

2016
Corrigendum to "Intrusion detection algorithm based on OCSVM in industrial control system".
Secur. Commun. Networks, 2016

Intrusion detection algorithm based on OCSVM in industrial control system.
Secur. Commun. Networks, 2016

Design and Implementation of Industrial Firewall for Modbus/TCP.
J. Comput., 2016

SRDA: A Secure Routing and Data Aggregation Approach for Wireless Smart Meter.
J. Commun., 2016

Modbus Communication Behavior Modeling and SVM Intrusion Detection Method.
Proceedings of the 6th International Conference on Communication and Network Security, 2016

2015
Industrial communication intrusion detection algorithm based on improved one-class SVM.
Proceedings of the 2015 World Congress on Industrial Control Systems Security, 2015

Research on self-learning method on generation and optimization of industrial firewall rules.
Proceedings of the 2015 Second International Conference on Information Security and Cyber Forensics, 2015

2014
Anomaly detection and response approach based on mapping requests.
Secur. Commun. Networks, 2014

2013
Blocking DoS Attack Traffic in Network with Locator/Identifier Separation.
J. Networks, 2013

2012
Locator/Identifier Separation: Comparison and Analysis on the Mitigation of Worm Propagation.
Int. J. Comput. Intell. Syst., 2012

2011
Research on Schedulability of Partition Scheduling for IMA.
Proceedings of the 4th International Symposium on Computational Intelligence and Design, 2011

2010
A fast information reproduction method for HTTP in WLAN.
Proceedings of the IEEE International Conference on Wireless Communications, 2010

2008
An Object-Based AOP Model and Its Implementation.
Proceedings of the PACIIA 2008, 2008

2004
Interactive Stereoscopic Rendering of Volumetric Environments.
IEEE Trans. Vis. Comput. Graph., 2004

2003
Quasi-Static Approximation for 6 Degrees-of-Freedom Haptic Rendering.
Proceedings of the 14th IEEE Visualization Conference, 2003

Ray Tracing Height Fields.
Proceedings of the 2003 Computer Graphics International (CGI 2003), 2003

2002
Automatic Centerline Extraction for Virtual Colonoscopy.
IEEE Trans. Medical Imaging, 2002

Fast and Reliable Space Leaping for Interactive Volume Rendering.
Proceedings of the 13th IEEE Visualization Conference, 2002

2001
Distance-Field-Based Skeletons for Virtual Navigation.
Proceedings of the 12th IEEE Visualization Conference, 2001

Accelerating Voxel-Based Terrain Rendering with Keyframe-Free Image-Based Rendering.
Proceedings of the 2nd IEEE TCVG / Eurographics International Workshop on Volume Graphics, 2001

2000
Interactive Stereoscopic Rendering of Voxel-based Terrain.
Proceedings of the Virtual Reality 2000 Conference, 2000

Image based rendering with stable frame rates.
Proceedings of the 11th IEEE Visualization Conference, 2000

3D digital cleansing using segmentation rays.
Proceedings of the 11th IEEE Visualization Conference, 2000

CEASAR: a smooth, accurate and robust centerline extraction algorithm.
Proceedings of the 11th IEEE Visualization Conference, 2000

Tree-branch-searching multiresolution approach to skeletonization for virtual endoscopy.
Proceedings of the Medical Imaging 2000: Image Processing, 2000

A Gradient Magnitude Based Region Growing Algorithm for Accurate Segmentation.
Proceedings of the 2000 International Conference on Image Processing, 2000

1999
Optimized Interpolation for Volume Ray Casting.
J. Graphics, GPU, & Game Tools, 1999

Virtual Flythrough over a Voxel-Based Terrain.
Proceedings of the IEEE Virtual Reality 1999 Conference, 1999

Volume Rendering Based Interactive Navigation within the Human Colon.
Proceedings of the 10th IEEE Visualization Conference, 1999

High Performance Presence-Accelerated Ray Casting.
Proceedings of the 10th IEEE Visualization Conference, 1999

1998
Boundary cell-based acceleration for volume ray casting.
Comput. Graph., 1998

1997
Interactive volume rendering for virtual colonoscopy.
Proceedings of the 8th IEEE Visualization Conference, 1997

1996
PC-based Quick Algorithm for Rendering Semi-Transparent Multi-Isosurfaces of Volumetric Data.
Proceedings of the Computer Graphics International Conference, 1996


  Loading...