Mingzhong Wang

Orcid: 0000-0002-6533-8104

According to our database1, Mingzhong Wang authored at least 52 papers between 2007 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
MetaCARD: Meta-Reinforcement Learning with Task Uncertainty Feedback via Decoupled Context-Aware Reward and Dynamics Components.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

Improving GNN Calibration with Discriminative Ability: Insights and Strategies.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

2023
Differentiable Logic Policy for Interpretable Deep Reinforcement Learning: A Study From an Optimization Perspective.
IEEE Trans. Pattern Anal. Mach. Intell., October, 2023

Relation-aware Graph Convolutional Networks for Multi-relational Network Alignment.
ACM Trans. Intell. Syst. Technol., April, 2023

Towards Control-Centric Representations in Reinforcement Learning from Images.
CoRR, 2023

Good Better Best: Self-Motivated Imitation Learning for noisy Demonstrations.
CoRR, 2023

ENF Based Digital Multimedia Forensics: Survey, Application, Challenges and Future Work.
IEEE Access, 2023

WaveForM: Graph Enhanced Wavelet Learning for Long Sequence Forecasting of Multivariate Time Series.
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023

Context-Aware Safe Medication Recommendations with Molecular Graph and DDI Graph Embedding.
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023

2022
CHA: Categorical Hierarchy-based Attention for Next POI Recommendation.
ACM Trans. Inf. Syst., 2022

A fixed-point rotation-based feature selection method for micro-expression recognition.
Pattern Recognit. Lett., 2022

SimSR: Simple Distance-Based State Representations for Deep Reinforcement Learning.
Proceedings of the Thirty-Sixth AAAI Conference on Artificial Intelligence, 2022

2021
On improving knowledge graph facilitated simple question answering system.
Neural Comput. Appl., 2021

SimSR: Simple Distance-based State Representation for Deep Reinforcement Learning.
CoRR, 2021

Off-Policy Differentiable Logic Reinforcement Learning.
Proceedings of the Machine Learning and Knowledge Discovery in Databases. Research Track, 2021

2020
GANE: A Generative Adversarial Network Embedding.
IEEE Trans. Neural Networks Learn. Syst., 2020

Universal Value Iteration Networks: When Spatially-Invariant Is Not Universal.
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020

2019
Next and Next New POI Recommendation via Latent Behavior Pattern Inference.
ACM Trans. Inf. Syst., 2019

FollowMe: a mobile crowd sensing platform for spatial-temporal data sharing.
Int. J. High Perform. Comput. Netw., 2019

Crowdsourcing Incentives for Multi-Hop Urban Parcel Delivery Network.
IEEE Access, 2019

A Vectorized Relational Graph Convolutional Network for Multi-Relational Network Alignment.
Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence, 2019

2018
Inferring Continuous Latent Preference on Transition Intervals for Next Point-of-Interest Recommendation.
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2018

Non-translational Alignment for Multi-relational Networks.
Proceedings of the Twenty-Seventh International Joint Conference on Artificial Intelligence, 2018

2017
Classification of Encrypted Traffic With Second-Order Markov Chains and Application Attribute Bigrams.
IEEE Trans. Inf. Forensics Secur., 2017

Harsh parenting and problematic Internet use in Chinese adolescents: Child emotional dysregulation as mediator and child forgiveness as moderator.
Comput. Hum. Behav., 2017

FollowMe if you can: a study of mobile crowd sensing with Pokémon go.
Proceedings of the Australasian Computer Science Week Multiconference, 2017

2016
Risk-aware intermediate dataset backup strategy in cloud-based data intensive workflows.
Future Gener. Comput. Syst., 2016

LESPP: lightweight and efficient strong privacy preserving authentication scheme for secure VANET communication.
Computing, 2016

Certificate-aware encrypted traffic classification using Second-Order Markov Chain.
Proceedings of the 24th IEEE/ACM International Symposium on Quality of Service, 2016

Joint Optimization of Flow Latency in Routing and Scheduling for Software Defined Networks.
Proceedings of the 25th International Conference on Computer Communication and Networks, 2016

2015
Reasoning task dependencies for robust service selection in data intensive workflows.
Computing, 2015

Latency-aware routing with bandwidth assignment for Software Defined Networks.
Proceedings of the 34th IEEE International Performance Computing and Communications Conference, 2015

Self-adaptive anonymous communication scheme under SDN architecture.
Proceedings of the 34th IEEE International Performance Computing and Communications Conference, 2015

Privacy-Preserving Anomaly Detection Across Multi-domain for Software Defined Networks.
Proceedings of the Trusted Systems - 7th International Conference, 2015

2014
Search pattern leakage in searchable encryption: Attacks and new construction.
Inf. Sci., 2014

Threshold-Based Secure and Privacy-Preserving Message Verification in VANETs.
Proceedings of the 13th IEEE International Conference on Trust, 2014

2013
Content integrity and non-repudiation preserving audio-hiding scheme based on robust digital signature.
Secur. Commun. Networks, 2013

ASCDS: a smartphone confidential data storage scheme.
Int. J. Wirel. Mob. Comput., 2013

ID List Forwarding Free Confidentiality Preserving Data Aggregation for Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2013

Search Pattern Leakage in Searchable Encryption: Attacks and New Constructions.
IACR Cryptol. ePrint Arch., 2013

Trust-based workflow refactoring for concurrent scheduling in service-oriented environment.
Concurr. Comput. Pract. Exp., 2013

SEBAR: Social Energy Based Routing scheme for mobile social Delay Tolerant Networks.
Proceedings of the IEEE 32nd International Performance Computing and Communications Conference, 2013

2012
Computationally sound symbolic security reduction analysis of the group key exchange protocols using bilinear pairings.
Inf. Sci., 2012

Dependency-based Risk Evaluation for Robust Workflow Scheduling.
Proceedings of the 26th IEEE International Parallel and Distributed Processing Symposium Workshops & PhD Forum, 2012

Risk-Aware Checkpoint Selection in Cloud-Based Scientific Workflow.
Proceedings of the 2012 Second International Conference on Cloud and Green Computing, 2012

Workflow Refactoring for Concurrent Task Execution.
Proceedings of the 2012 Second International Conference on Cloud and Green Computing, 2012

2009
ARTS: Agent-Oriented Robust Transactional System.
PhD thesis, 2009

Trust-based robust scheduling and runtime adaptation of scientific workflow.
Concurr. Comput. Pract. Exp., 2009

Reasoning intra-dependency in commitments for robust scheduling.
Proceedings of the 8th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2009), 2009

2008
Robust Scheduling and Runtime Adaptation of Multi-agent Plan Execution.
Proceedings of the 2008 IEEE/WIC/ACM International Conference on Intelligent Agent Technology, 2008

2007
Utilizing BDI Features for Transactional Agent Execution.
Proceedings of the 2007 IEEE/WIC/ACM International Conference on Intelligent Agent Technology, 2007

ARTS: agent-oriented robust transactional system.
Proceedings of the 6th International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS 2007), 2007


  Loading...