Spremljaj
Ke Wang
Ke Wang
Harbin Institute of Technology, Shenzhen Graduate School
Preverjeni e-poštni naslov na hitsz.edu.cn
Naslov
Navedeno
Navedeno
Leto
Security issues and challenges for cyber physical system
EK Wang, Y Ye, X Xu, SM Yiu, LCK Hui, KP Chow
2010 IEEE/ACM Int'l Conference on Green Computing and Communications & Int'l …, 2010
2732010
Electrical control of charged carriers and excitons in atomically thin materials
K Wang, K De Greve, LA Jauregui, A Sushko, A High, Y Zhou, G Scuri, ...
Nature nanotechnology 13 (2), 128-132, 2018
1742018
PoRX: A reputation incentive scheme for blockchain consensus of IIoT
EK Wang, Z Liang, CM Chen, S Kumari, MK Khan
Future generation computer systems 102, 140-151, 2020
1542020
A provably secure certificateless public key encryption with keyword search
TY Wu, CM Chen, KH Wang, C Meng, EK Wang
Journal of the Chinese Institute of Engineers 42 (1), 20-28, 2019
1432019
A deep learning based medical image segmentation technique in Internet-of-Medical-Things domain
EK Wang, CM Chen, MM Hassan, A Almogren
Future Generation Computer Systems 108, 135-144, 2020
1022020
The positive piezoconductive effect in graphene
K Xu, K Wang, W Zhao, W Bao, E Liu, Y Ren, M Wang, Y Fu, J Zeng, Z Li, ...
Nature communications 6 (1), 8119, 2015
982015
Proof of X-repute blockchain consensus protocol for IoT systems
EK Wang, RP Sun, CM Chen, Z Liang, S Kumari, MK Khan
Computers & Security 95, 101871, 2020
722020
A dynamic trust framework for opportunistic mobile social networks
EK Wang, Y Li, Y Ye, SM Yiu, LCK Hui
IEEE Transactions on Network and Service Management 15 (1), 319-329, 2017
542017
Multilayer dense attention model for image caption
EK Wang, X Zhang, F Wang, TY Wu, CM Chen
IEEE Access 7, 66358-66368, 2019
532019
Detecting time synchronization attacks in cyber-physical systems with machine learning techniques
J Wang, W Tu, LCK Hui, SM Yiu, EK Wang
2017 IEEE 37th International Conference on Distributed Computing Systems …, 2017
512017
Multi-path dilated residual network for nuclei segmentation and detection
EK Wang, X Zhang, L Pan, C Cheng, A Dimitrakopoulou-Strauss, Y Li, ...
Cells 8 (5), 499, 2019
452019
Neural architecture search for robust networks in 6G-enabled massive IoT domain
K Wang, P Xu, CM Chen, S Kumari, M Shojafar, M Alazab
IEEE internet of things journal 8 (7), 5332-5339, 2020
432020
On the security of a three-party authenticated key agreement protocol based on chaotic maps. Data Sci
CM Chen, KH Wang, TY Wu, EK Wang
Pattern Recognit 1 (2), 1-10, 2017
412017
Forward privacy preservation in IoT-enabled healthcare systems
K Wang, CM Chen, Z Tie, M Shojafar, S Kumar, S Kumari
IEEE transactions on industrial informatics 18 (3), 1991-1999, 2021
392021
Weaving rewrite-based access control policies
AS de Oliveira, EK Wang, C Kirchner, H Kirchner
Proceedings of the 2007 ACM workshop on Formal methods in security …, 2007
372007
Intelligent monitor for typhoon in IoT system of smart city
EK Wang, F Wang, S Kumari, JH Yeh, CM Chen
The Journal of Supercomputing 77, 3024-3043, 2021
362021
A trusted consensus fusion scheme for decentralized collaborated learning in massive IoT domain
K Wang, CM Chen, Z Liang, MM Hassan, GML Sarne, L Fotia, G Fortino
Information Fusion 72, 100-109, 2021
312021
Automatic classification of CAD ECG signals with SDAE and bidirectional long short-term network
EK Wang, X Zhang, L Pan
IEEE access 7, 182873-182880, 2019
312019
A survey on cyber attacks against nonlinear state estimation in power systems of ubiquitous cities
J Wang, LCK Hui, SM Yiu, EK Wang, J Fang
Pervasive and Mobile Computing 39, 52-64, 2017
282017
Incentive evolutionary game model for opportunistic social networks
EK Wang, CM Chen, SM Yiu, MM Hassan, M Alrubaian, G Fortino
Future generation computer systems 102, 14-29, 2020
272020
Sistem trenutno ne more izvesti postopka. Poskusite znova pozneje.
Članki 1–20