Xingkai Wang

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Bibliography

2025
MVOC: A Lighter Multi-Client Verifiable Outsourced Computation for Malicious Lightweight Clients.
IEEE Trans. Dependable Secur. Comput., 2025

Type-Alias Analysis: Enabling LLVM IR with Accurate Types.
Proc. ACM Softw. Eng., 2025

Understanding and Co-designing Photo-based Reminiscence with Older Adults.
Proc. ACM Hum. Comput. Interact., 2025

Res-FPN-SqueezeNet Segmentation Architecture for Enhanced Identification of Concrete Cracks within a Deep-Learning Framework.
J. Comput. Civ. Eng., 2025

Tailored information display: Effects of background colour and line spacing on visual search across different character types - An eye-tracking study.
Displays, 2025

MUDGUARD: Taming Malicious Majorities in Federated Learning using Privacy-preserving Byzantine-robust Clustering.
Proceedings of the Abstracts of the 2025 ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems, 2025

Enterprise Threat Detection with Explainable AI for Cloud-Network Convergence.
Proceedings of the 33rd IEEE International Conference on Network Protocols, 2025

2024
Ambush From All Sides: Understanding Security Threats in Open-Source Software CI/CD Pipelines.
IEEE Trans. Dependable Secur. Comput., 2024

SciSafeEval: A Comprehensive Benchmark for Safety Alignment of Large Language Models in Scientific Tasks.
CoRR, 2024

Let Real Images be as a Judger, Spotting Fake Images Synthesized with Generative Models.
CoRR, 2024

DMAAUTH: A Lightweight Pointer Integrity-based Secure Architecture to Defeat DMA Attacks.
Proceedings of the 33rd USENIX Security Symposium, 2024

2023
A review on multimodal zero-shot learning.
WIREs Data. Mining. Knowl. Discov., 2023

A novel motion coordination method for variable-sized multi-mobile robots.
Frontiers Inf. Technol. Electron. Eng., 2023

Universally Composable Key-Insulated and Privacy-Preserving Signature Scheme with Publicly Derived Public Key.
Proceedings of the Information Security and Cryptology - 19th International Conference, 2023

2022
Context2Vector: Accelerating security event triage via context representation learning.
Inf. Softw. Technol., 2022

Collision and Deadlock Avoidance in Multi-Robot Systems Based on Glued Nodes.
IEEE CAA J. Autom. Sinica, 2022

BRIEF but Powerful: Byzantine-Robust and Privacy-Preserving Federated Learning via Model Segmentation and Secure clustering.
CoRR, 2022

Lighter is Better: A Lighter Multi-client Verifiable Outsourced Computation with Hybrid Homomorphic Encryption.
Proceedings of the Computer Security - ESORICS 2022, 2022

2021
A Collision Avoidance Algorithm for Idle Robots in Multi-robot System.
Proceedings of the IEEE International Conference on Networking, Sensing and Control, 2021

A Hybrid Algorithm to Solve Periodic Vehicle Dispatching Problem with Heterogeneous Vehicles in Logistics Transportation.
Proceedings of the IEEE International Conference on Networking, Sensing and Control, 2021

Research on Coupled Task Allocation and Scheduling of Multi-type Robots.
Proceedings of the IEEE International Conference on Networking, Sensing and Control, 2021

A Real Time Vehicle Scheduling Strategy in Container Terminals.
Proceedings of the IEEE International Conference on Networking, Sensing and Control, 2021

A new flexible multi-AGVs scheduling model with pre-waiting time in an intelligent manufacturing system.
Proceedings of the IEEE International Conference on Networking, Sensing and Control, 2021

A Dynamic Joint Real-time Scheduling Strategy of Truck and Yard Crane in Container Terminals.
Proceedings of the IEEE International Conference on Networking, Sensing and Control, 2021

A Two-Stage Congestion-Aware Routing Method for Automated Guided Vehicles in Warehouses.
Proceedings of the IEEE International Conference on Networking, Sensing and Control, 2021

2020
Joint Deep Network With Auxiliary Semantic Learning for Popular Recommendation.
IEEE Access, 2020

Forward Secure Dynamic Searchable Symmetric Encryption with Lighter Storage.
Proceedings of the ICCSP 2020: 4th International Conference on Cryptography, 2020

An Improved ID3 classification algorithm for solving the backbone of proposition formulae.
Proceedings of the IEEE Intl Conf on Dependable, 2020

2019
Top-N-Targets-Balanced Recommendation Based on Attentional Sequence-to-Sequence Learning.
IEEE Access, 2019

2017
Efficient Asymmetric Index Encapsulation Scheme for Anonymous Content Centric Networking.
Secur. Commun. Networks, 2017


  Loading...