Mingzhong Wang

According to our database1, Mingzhong Wang
  • authored at least 28 papers between 2007 and 2017.
  • has a "Dijkstra number"2 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2017
Classification of Encrypted Traffic With Second-Order Markov Chains and Application Attribute Bigrams.
IEEE Trans. Information Forensics and Security, 2017

Harsh parenting and problematic Internet use in Chinese adolescents: Child emotional dysregulation as mediator and child forgiveness as moderator.
Computers in Human Behavior, 2017

FollowMe if you can: a study of mobile crowd sensing with Pokémon go.
Proceedings of the Australasian Computer Science Week Multiconference, 2017

2016
Risk-aware intermediate dataset backup strategy in cloud-based data intensive workflows.
Future Generation Comp. Syst., 2016

LESPP: lightweight and efficient strong privacy preserving authentication scheme for secure VANET communication.
Computing, 2016

Certificate-aware encrypted traffic classification using Second-Order Markov Chain.
Proceedings of the 24th IEEE/ACM International Symposium on Quality of Service, 2016

Joint Optimization of Flow Latency in Routing and Scheduling for Software Defined Networks.
Proceedings of the 25th International Conference on Computer Communication and Networks, 2016

2015
Reasoning task dependencies for robust service selection in data intensive workflows.
Computing, 2015

Latency-aware routing with bandwidth assignment for Software Defined Networks.
Proceedings of the 34th IEEE International Performance Computing and Communications Conference, 2015

Self-adaptive anonymous communication scheme under SDN architecture.
Proceedings of the 34th IEEE International Performance Computing and Communications Conference, 2015

Privacy-Preserving Anomaly Detection Across Multi-domain for Software Defined Networks.
Proceedings of the Trusted Systems - 7th International Conference, 2015

2014
Search pattern leakage in searchable encryption: Attacks and new construction.
Inf. Sci., 2014

Threshold-Based Secure and Privacy-Preserving Message Verification in VANETs.
Proceedings of the 13th IEEE International Conference on Trust, 2014

2013
Content integrity and non-repudiation preserving audio-hiding scheme based on robust digital signature.
Security and Communication Networks, 2013

ID List Forwarding Free Confidentiality Preserving Data Aggregation for Wireless Sensor Networks.
IJDSN, 2013

Search Pattern Leakage in Searchable Encryption: Attacks and New Constructions.
IACR Cryptology ePrint Archive, 2013

Trust-based workflow refactoring for concurrent scheduling in service-oriented environment.
Concurrency and Computation: Practice and Experience, 2013

SEBAR: Social Energy Based Routing scheme for mobile social Delay Tolerant Networks.
Proceedings of the IEEE 32nd International Performance Computing and Communications Conference, 2013

2012
Computationally sound symbolic security reduction analysis of the group key exchange protocols using bilinear pairings.
Inf. Sci., 2012

Dependency-based Risk Evaluation for Robust Workflow Scheduling.
Proceedings of the 26th IEEE International Parallel and Distributed Processing Symposium Workshops & PhD Forum, 2012

Risk-Aware Checkpoint Selection in Cloud-Based Scientific Workflow.
Proceedings of the 2012 Second International Conference on Cloud and Green Computing, 2012

Workflow Refactoring for Concurrent Task Execution.
Proceedings of the 2012 Second International Conference on Cloud and Green Computing, 2012

2009
ARTS: Agent-Oriented Robust Transactional System.
PhD thesis, 2009

Trust-based robust scheduling and runtime adaptation of scientific workflow.
Concurrency and Computation: Practice and Experience, 2009

Reasoning intra-dependency in commitments for robust scheduling.
Proceedings of the 8th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2009), 2009

2008
Robust Scheduling and Runtime Adaptation of Multi-agent Plan Execution.
Proceedings of the 2008 IEEE/WIC/ACM International Conference on Intelligent Agent Technology, 2008

2007
Utilizing BDI Features for Transactional Agent Execution.
Proceedings of the 2007 IEEE/WIC/ACM International Conference on Intelligent Agent Technology, 2007

ARTS: agent-oriented robust transactional system.
Proceedings of the 6th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2007), 2007


  Loading...