Weichao Wang

Orcid: 0000-0002-1969-0705

According to our database1, Weichao Wang authored at least 92 papers between 2003 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Investigation on Different Stator Structures of the Axial-Radial Flux Switched Reluctance Motors.
IEEE Trans. Ind. Electron., June, 2024

UniRetriever: Multi-task Candidates Selection for Various Context-Adaptive Conversational Retrieval.
CoRR, 2024

A Comprehensive Study of Multilingual Confidence Estimation on Large Language Models.
CoRR, 2024

IoTWarden: A Deep Reinforcement Learning Based Real-time Defense System to Mitigate Trigger-action IoT Attacks.
CoRR, 2024

2023
Machine Learning Based Resilience Testing of an Address Randomization Cyber Defense.
IEEE Trans. Dependable Secur. Comput., 2023

Large Language Models as Source Planner for Personalized Knowledge-grounded Dialogue.
CoRR, 2023

SELF: Language-Driven Self-Evolution for Large Language Model.
CoRR, 2023

PanGu-Σ: Towards Trillion Parameter Language Model with Sparse Heterogeneous Computing.
CoRR, 2023

Protection of Network Security Selector Secrecy in Outsourced Network Testing.
Proceedings of the 32nd International Conference on Computer Communications and Networks, 2023

Improving Factual Consistency for Knowledge-Grounded Dialogue Systems via Knowledge Enhancement and Alignment.
Proceedings of the Findings of the Association for Computational Linguistics: EMNLP 2023, 2023

Large Language Models as Source Planner for Personalized Knowledge-grounded Dialogues.
Proceedings of the Findings of the Association for Computational Linguistics: EMNLP 2023, 2023


Towards Diverse, Relevant and Coherent Open-Domain Dialogue Generation via Hybrid Latent Variables.
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023

2022
Imitation learning based decision-making for autonomous vehicle control at traffic roundabouts.
Multim. Tools Appl., 2022

Toward cross-platform immersive visualization for indoor navigation and collaboration with augmented reality.
J. Vis., 2022

Informative and diverse emotional conversation generation with variational recurrent pointer-generator.
Frontiers Comput. Sci., 2022

Development and performance test of a vehicle-mounted total nitrogen content prediction system based on the fusion of near-infrared spectroscopy and image information.
Comput. Electron. Agric., 2022

IoTMonitor: A Hidden Markov Model-based Security System to Identify Crucial Attack Nodes in Trigger-action IoT Platforms.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2022

A Study of Real-time Information on User Behaviors during Search and Rescue (SAR) Training of Firefighters.
Proceedings of the 2022 IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops, 2022

PaWLA: PPG-based Weight Lifting Assessment.
Proceedings of the IEEE International Performance, 2022

Incentivisation of Outsourced Network Testing: View from Platform Perspective.
Proceedings of the 8th International Conference on Information Systems Security and Privacy, 2022

Modeling Complex Dialogue Mappings via Sentence Semantic Segmentation Guided Conditional Variational Auto-Encoder.
Proceedings of the Findings of the Association for Computational Linguistics: EMNLP 2022, 2022

2021
Privacy-Preserving Participant Grouping for Mobile Social Sensing Over Edge Clouds.
IEEE Trans. Netw. Sci. Eng., 2021

A New Coupled Elimination Method of Soil Moisture and Particle Size Interferences on Predicting Soil Total Nitrogen Concentration through Discrete NIR Spectral Band Data.
Remote. Sens., 2021

Learning to improve persona consistency in conversation generation with information augmentation.
Knowl. Based Syst., 2021

A comprehensive survey on data provenance: State-of-the-art approaches and their deployments for IoT security enforcement.
J. Comput. Secur., 2021

A Comprehensive Survey on the State-of-the-art Data Provenance Approaches for Security Enforcement.
CoRR, 2021

Cross-Platform Immersive Visualization and Navigation with Augmented Reality.
Proceedings of the VINCI 2021: The 14th International Symposium on Visual Information Communication and Interaction, Potsdam, Germany, September 6, 2021

Adaptive Model Predictive-Based Load Frequency Controller using Unscented Kalman Filter.
Proceedings of the 2021 IEEE PES Innovative Smart Grid Technologies, 2021

Adaptive Posterior Knowledge Selection for Improving Knowledge-Grounded Dialogue Generation.
Proceedings of the CIKM '21: The 30th ACM International Conference on Information and Knowledge Management, Virtual Event, Queensland, Australia, November 1, 2021

2020
Encryption-free data transmission and hand-over in two-tier body area networks.
Comput. Methods Programs Biomed., 2020

Proof of outsourced encryption: cross verification of security service level agreement.
CCF Trans. Netw., 2020

A Cue Adaptive Decoder for Controllable Neural Response Generation.
Proceedings of the WWW '20: The Web Conference 2020, Taipei, Taiwan, April 20-24, 2020, 2020

Deep Learning-Based Decision Making for Autonomous Vehicle at Roundabout.
Proceedings of the Towards Autonomous Robotic Systems - 21st Annual Conference, 2020

EmoElicitor: An Open Domain Response Generation Model with User Emotional Reaction Awareness.
Proceedings of the Twenty-Ninth International Joint Conference on Artificial Intelligence, 2020

Proof of Network Security Services: Enforcement of Security SLA through Outsourced Network Testing.
Proceedings of the ICCNS 2020: The 10th International Conference on Communication and Network Security, 2020

2019
Dynamic Participant Selection for Large-Scale Mobile Crowd Sensing.
IEEE Trans. Mob. Comput., 2019

LoopFix: an approach to automatic repair of buggy loops.
J. Syst. Softw., 2019

Multi-Grid based decision making at Roundabout for Autonomous Vehicles.
Proceedings of the IEEE International Conference of Vehicular Electronics and Safety, 2019

Equipment Contention Attack in Cloud Manufacturing Environments and Its Defense.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

Answer-guided and Semantic Coherent Question Generation in Open-domain Conversation.
Proceedings of the 2019 Conference on Empirical Methods in Natural Language Processing and the 9th International Joint Conference on Natural Language Processing, 2019

Proof of Encryption: Enforcement of Security Service Level Agreement for Encryption Outsourcing.
Proceedings of the 2019 IEEE Conference on Dependable and Secure Computing, 2019

Inverted-file R-tree Index Nodes Clustering Based on Multi-objective Optimization.
Proceedings of the IEEE Congress on Evolutionary Computation, 2019

2018
Middle School Students' Social Media Use.
J. Educ. Technol. Soc., 2018

Camera Based Decision Making at Roundabouts for Autonomous Vehicles.
Proceedings of the 15th International Conference on Control, 2018

Personalized Microblog Sentiment Classification via Adversarial Cross-lingual Multi-task Learning.
Proceedings of the 2018 Conference on Empirical Methods in Natural Language Processing, Brussels, Belgium, October 31, 2018

2017
Scalable privacy-preserving participant selection in mobile crowd sensing.
Proceedings of the 2017 IEEE International Conference on Pervasive Computing and Communications, 2017

Lightweight mutual authentication among sensors in body area networks through Physical Unclonable Functions.
Proceedings of the IEEE International Conference on Communications, 2017

Lightweight Key Management for Group Communication in Body Area Networks through Physical Unclonable Functions.
Proceedings of the Second IEEE/ACM International Conference on Connected Health: Applications, 2017

2016
Enhancing participant selection through caching in mobile crowd sensing.
Proceedings of the 24th IEEE/ACM International Symposium on Quality of Service, 2016

Optimizing content delivery in ICN networks by the supply chain model.
Proceedings of the 35th IEEE International Performance Computing and Communications Conference, 2016

Lightweight Detection of On-Body Sensor Impersonator in Body Area Networks.
Proceedings of the First IEEE International Conference on Connected Health: Applications, 2016

Lightweight Examination of DLL Environments in Virtual Machines to Detect Malware.
Proceedings of the 4th ACM International Workshop on Security in Cloud Computing, 2016

2015
Detection of Service Level Agreement (SLA) Violation in Memory Management in Virtual Machines.
Proceedings of the 24th International Conference on Computer Communication and Networks, 2015

2014
An investigation of collaborations between top Chinese universities: a new quantitative approach.
Scientometrics, 2014

Detecting Primary User Emulation Attacks in Cognitive Radio Networks via Physical Layer Network Coding.
J. Ubiquitous Syst. Pervasive Networks, 2014

2013
An Action-Stack Based Selective-Undo Method in Feature Model Customization.
Proceedings of the Safe and Secure Software Reuse, 2013

Preserving Data Query Privacy in Mobile Mashups through Mobile Cloud Computing.
Proceedings of the 22nd International Conference on Computer Communication and Networks, 2013

Rootkit detection on virtual machines through deep information extraction at hypervisor-level.
Proceedings of the IEEE Conference on Communications and Network Security, 2013

2012
Node localization through physical layer network coding: Bootstrap, security, and accuracy.
Ad Hoc Networks, 2012

Towards the attacker's view of protocol narrations (or, how to compile security protocols).
Proceedings of the 7th ACM Symposium on Information, Compuer and Communications Security, 2012

2011
3D Digital Legos for Teaching Security Protocols.
IEEE Trans. Learn. Technol., 2011

Sybil Attack Detection through Global Topology Pattern Visualization.
Inf. Vis., 2011

Fingerprinting large data sets through memory de-duplication technique in virtual machines.
Proceedings of the MILCOM 2011, 2011

Non-normalizable functions: A new method to generate metamorphic malware.
Proceedings of the MILCOM 2011, 2011

Non-interactive OS fingerprinting through memory de-duplication technique in virtual machines.
Proceedings of the 30th IEEE International Performance Computing and Communications Conference, 2011

Computational intelligence methods for helicopter loads estimation.
Proceedings of the 2011 International Joint Conference on Neural Networks, 2011

Evolutionary computation methods for helicopter loads estimation.
Proceedings of the IEEE Congress on Evolutionary Computation, 2011

Rethinking about guessing attacks.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

2010
Interactive detection of network anomalies via coordinated multiple views.
Proceedings of the 7th International Symposium on Visualization for Cyber Security, 2010

Deciding Recognizability under Dolev-Yao Intruder Model.
Proceedings of the Information Security - 13th International Conference, 2010

Rethinking about Type-Flaw Attacks.
Proceedings of the Global Communications Conference, 2010

Node Localization in Wireless Networks through Physical Layer Network Coding.
Proceedings of the Global Communications Conference, 2010

Detecting Sybil nodes in wireless networks with physical layer network coding.
Proceedings of the 2010 IEEE/IFIP International Conference on Dependable Systems and Networks, 2010

2009
A Surface Topology and Motion Compensation System for Microsurgery Guidance and Intervention Based on Common-Path Optical Coherence Tomography.
IEEE Trans. Biomed. Eng., 2009

Secure and efficient access to outsourced data.
Proceedings of the first ACM Cloud Computing Security Workshop, 2009

2008
Visualisation of wormholes in underwater sensor networks: a distributed approach.
Int. J. Secur. Networks, 2008

Secure Group-Based Information Sharing in Mobile Ad Hoc Networks.
Proceedings of IEEE International Conference on Communications, 2008

2007
Interactive wormhole detection and evaluation.
Inf. Vis., 2007

Stateless key distribution for secure intra and inter-group multicast in mobile wireless network.
Comput. Networks, 2007

2006
Defending against wormhole attacks in mobile ad hoc networks.
Wirel. Commun. Mob. Comput., 2006

Trust-based privacy preservation for peer-to-peer data sharing.
IEEE Trans. Syst. Man Cybern. Part A, 2006

Wireless networking security: open issues in trust, management, interoperation and measurement.
Int. J. Secur. Networks, 2006

Visualization assisted detection of sybil attacks in wireless networks.
Proceedings of the 3rd International Workshop on Visualization for Computer Security, 2006

Interactive Wormhole Detection in Large Scale Wireless Networks.
Proceedings of the 1st IEEE Symposium On Visual Analytics Science And Technology, 2006

Cooperative Co-evolutionary Approach Applied in Reactive Power Optimization of Power System.
Proceedings of the Advances in Natural Computation, Second International Conference, 2006

2005
Low-cost attacks against packet delivery, localization and time synchronization services in under-water sensor networks.
Proceedings of the 2005 ACM Workshop on Wireless Security, 2005

Key distribution and update for secure inter-group multicast communication.
Proceedings of the 3rd ACM Workshop on Security of ad hoc and Sensor Networks, 2005

2004
Integrating Heterogeneous Wireless Technologies: A Cellular Aided Mobile Ad Hoc Network (CAMA).
Mob. Networks Appl., 2004

Visualization of wormholes in sensor networks.
Proceedings of the 2004 ACM Workshop on Wireless Security, 2004

2003
On Security Study of Two Distance Vector Routing Protocols or Mobile Ad Hoc Networks.
Proceedings of the First IEEE International Conference on Pervasive Computing and Communications (PerCom'03), 2003

Study of Distance Vector Routing Protocols for Mobile Ad Hoc Networks.
Proceedings of the First IEEE International Conference on Pervasive Computing and Communications (PerCom'03), 2003


  Loading...