default search action
Eric Ke Wang
Person information
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j33]Jiamu Xu, Xiaoxiang Liu, Xinyuan Zhang, Yain-Whar Si, Xiaofan Li, Zheng Shi, Eric Ke Wang, Xueyuan Gong:
X2-Softmax: Margin adaptive loss function for face recognition. Expert Syst. Appl. 249: 123791 (2024) - [j32]Xuming Han, Yali Chu, Eric Ke Wang, Limin Wang, Lin Yue, Weiping Ding:
TAILOR: InTer-feAture distinctIon fiLter fusiOn pRuning. Inf. Sci. 665: 120229 (2024) - [j31]Junhao Huang, Yuhui Deng, Eric Ke Wang, Zhangwei Li, Zhimin Tang, Weiping Ding:
UnbiasNet: Vehicle Re-Identification Oriented Unbiased Feature Enhancement by Using Causal Effect. IEEE Trans. Intell. Transp. Syst. 25(2): 1925-1937 (2024) - [j30]Eric Ke Wang, Zicong Chen, Mingjia Zhu, Zhetao Li, Jian Weng, Tianlong Gu:
Score-Based Counterfactual Generation for Interpretable Medical Image Classification and Lesion Localization. IEEE Trans. Medical Imaging 43(10): 3596-3607 (2024) - 2023
- [j29]Eric Ke Wang, Zicong Chen, Xilin Dang, Xuan Fan, Xuming Han, Chien-Ming Chen, Weiping Ding, Siu-Ming Yiu, Jian Weng:
Uncovering Hidden Vulnerabilities in Convolutional Neural Networks through Graph-based Adversarial Robustness Evaluation. Pattern Recognit. 143: 109745 (2023) - [j28]Eric Ke Wang, Zicong Chen, Mingjia Zhu, Siu-Ming Yiu, Chien-Ming Chen, Mohammad Mehedi Hassan, Stefano Izzo, Giancarlo Fortino:
Statistics-Physics-Based Interpretation of the Classification Reliability of Convolutional Neural Networks in Industrial Automation Domain. IEEE Trans. Ind. Informatics 19(2): 2165-2172 (2023) - [j27]Ship Peng Xu, Eric Ke Wang, Mohammad Mehedi Hassan, Chien-Ming Chen, Weiguo Lin, Md. Rafiul Hassan, Giancarlo Fortino:
Adversarial Robustness in Graph-Based Neural Architecture Search for Edge AI Transportation Systems. IEEE Trans. Intell. Transp. Syst. 24(8): 8465-8474 (2023) - 2022
- [j26]Eric Ke Wang, Juntao Yu, Chien-Ming Chen, Saru Kumari, Joel J. P. C. Rodrigues:
Data Augmentation for Internet of Things Dialog System. Mob. Networks Appl. 27(1): 158-171 (2022) - [j25]Eric Ke Wang, Chien-Ming Chen, Mohammad Shojafar, Zhuoyu Tie, Mamoun Alazab, Saru Kumari:
AFFIRM: Provably Forward Privacy for Searchable Encryption in Cooperative Intelligent Transportation System. IEEE Trans. Intell. Transp. Syst. 23(11): 22607-22618 (2022) - 2021
- [j24]Eric Ke Wang, Chien-Ming Chen, M. Shamim Hossain, Ghulam Muhammad, Sachin Kumar, Saru Kumari:
Transfer reinforcement learning-based road object detection in next generation IoT domain. Comput. Networks 193: 108078 (2021) - [j23]Eric Ke Wang, Chien-Ming Chen, Zuodong Liang, Mohammad Mehedi Hassan, Giuseppe M. L. Sarné, Lidia Fotia, Giancarlo Fortino:
A trusted consensus fusion scheme for decentralized collaborated learning in massive IoT domain. Inf. Fusion 72: 100-109 (2021) - [j22]Eric Ke Wang, Peng Xu, Chien-Ming Chen, Saru Kumari, Mohammad Shojafar, Mamoun Alazab:
Neural Architecture Search for Robust Networks in 6G-Enabled Massive IoT Domain. IEEE Internet Things J. 8(7): 5332-5339 (2021) - [j21]Eric Ke Wang, Ship Peng Xu, Chien-Ming Chen, SK Hafizul Islam, Mohammad Mehedi Hassan, Claudio Savaglio, Pasquale Pace, Gianluca Aloi:
A Trusted Consensus Scheme for Collaborative Learning in the Edge AI Computing Domain. IEEE Netw. 35(1): 204-210 (2021) - [j20]Chien-Ming Chen, Zhuoyu Tie, Eric Ke Wang, Muhammad Khurram Khan, Sachin Kumar, Saru Kumari:
Verifiable dynamic ranked search with forward privacy over encrypted cloud data. Peer-to-Peer Netw. Appl. 14(5): 2977-2991 (2021) - [j19]Eric Ke Wang, Ship Peng Xu, Chien-Ming Chen, Neeraj Kumar:
Neural-Architecture-Search-Based Multiobjective Cognitive Automation System. IEEE Syst. J. 15(2): 2918-2925 (2021) - [j18]Eric Ke Wang, Xi Liu, Chien-Ming Chen, Saru Kumari, Mohammad Shojafar, M. Shamim Hossain:
Voice-Transfer Attacking on Industrial Voice Control Systems in 5G-Aided IIoT Domain. IEEE Trans. Ind. Informatics 17(10): 7085-7092 (2021) - [j17]Eric Ke Wang, Fan Wang, Saru Kumari, Jyh-Haw Yeh, Chien-Ming Chen:
Intelligent monitor for typhoon in IoT system of smart city. J. Supercomput. 77(3): 3024-3043 (2021) - [c27]Chien-Ming Chen, Zhuoyu Tie, Eric Ke Wang, Kuo-Hui Yeh, Wensheng Gan, SK Hafizul Islam:
A Reinforced Dynamic Multi-keyword Ranked Search with Forward Privacy. DSC 2021: 1-8 - 2020
- [j16]Eric Ke Wang, Chien-Ming Chen, Fan Wang, Muhammad Khurram Khan, Saru Kumari:
Joint-learning segmentation in Internet of drones (IoD)-based monitor systems. Comput. Commun. 152: 54-62 (2020) - [j15]Eric Ke Wang, RuiPei Sun, Chien-Ming Chen, Zuodong Liang, Saru Kumari, Muhammad Khurram Khan:
Proof of X-repute blockchain consensus protocol for IoT systems. Comput. Secur. 95: 101871 (2020) - [j14]Eric Ke Wang, Chien-Ming Chen, Siu-Ming Yiu, Mohammad Mehedi Hassan, Majed A. AlRubaian, Giancarlo Fortino:
Incentive evolutionary game model for opportunistic social networks. Future Gener. Comput. Syst. 102: 14-29 (2020) - [j13]Eric Ke Wang, Zuodong Liang, Chien-Ming Chen, Saru Kumari, Muhammad Khurram Khan:
PoRX: A reputation incentive scheme for blockchain consensus of IIoT. Future Gener. Comput. Syst. 102: 140-151 (2020) - [j12]Eric Ke Wang, Chien-Ming Chen, Mohammad Mehedi Hassan, Ahmad Almogren:
A deep learning based medical image segmentation technique in Internet-of-Medical-Things domain. Future Gener. Comput. Syst. 108: 135-144 (2020) - [j11]Eric Ke Wang, Chien-Ming Chen, Dongning Zhao, Wai Hung Ip, Kai-Leung Yung:
A dynamic trust model in internet of things. Soft Comput. 24(8): 5773-5782 (2020)
2010 – 2019
- 2019
- [j10]Eric Ke Wang, Xun Zhang, Fan Wang, Tsu-Yang Wu, Chien-Ming Chen:
Multilayer Dense Attention Model for Image Caption. IEEE Access 7: 66358-66368 (2019) - [j9]Eric Ke Wang, Xun Zhang, Leyun Pan:
Automatic Classification of CAD ECG Signals With SDAE and Bidirectional Long Short-Term Network. IEEE Access 7: 182873-182880 (2019) - [c26]Zhuoyu Tie, Eric Ke Wang, Jyh-Haw Yeh, Chien-Ming Chen:
Forward Privacy Analysis of a Dynamic Searchable Encryption Scheme. ICGEC 2019: 474-480 - 2018
- [j8]Eric Ke Wang, Yueping Li, Yunming Ye, Siu-Ming Yiu, Lucas C. K. Hui:
A Dynamic Trust Framework for Opportunistic Mobile Social Networks. IEEE Trans. Netw. Serv. Manag. 15(1): 319-329 (2018) - 2017
- [j7]Xutao Li, Michael K. Ng, Yunming Ye, Eric Ke Wang, Xiaofei Xu:
Block linear discriminant analysis for visual tensor objects with frequency or time information. J. Vis. Commun. Image Represent. 49: 38-46 (2017) - [j6]Shaokai Wang, Eric Ke Wang, Xutao Li, Yunming Ye, Raymond Y. K. Lau, Xiaolin Du:
Multi-view learning via multiple graph regularized generative model. Knowl. Based Syst. 121: 153-162 (2017) - [j5]Jingxuan Wang, Lucas Chi Kwong Hui, Siu-Ming Yiu, Eric Ke Wang, Jun-bin Fang:
A survey on cyber attacks against nonlinear state estimation in power systems of ubiquitous cities. Pervasive Mob. Comput. 39: 52-64 (2017) - [c25]Tsu-Yang Wu, Weicheng Fang, Chien-Ming Chen, Eric Ke Wang:
Efficient Anonymous Password-Authenticated Key Exchange Scheme Using Smart Cards. ECC 2017: 79-87 - [c24]Jingxuan Wang, Wenting Tu, Lucas Chi Kwong Hui, Siu-Ming Yiu, Eric Ke Wang:
Detecting Time Synchronization Attacks in Cyber-Physical Systems with Machine Learning Techniques. ICDCS 2017: 2246-2251 - [c23]Tsu-Yang Wu, Bin Xiang, Guangjie Wang, Chien-Ming Chen, Eric Ke Wang:
Attacks and Solutions of a Mutual Authentication with Anonymity for Roaming Service with Smart Cards in Wireless Communications. ICGEC 2017: 191-198 - [c22]Xingmin Cui, Ruiyi He, Lucas C. K. Hui, Siu-Ming Yiu, Gang Zhou, Eric Ke Wang:
Reconstruction of Task Lists from Android Applications. ICISA 2017: 396-403 - [c21]Haijun Zhang, Shuang Wang, Eric Ke Wang, Yan Li, Yongjun Zhang, Dianhui Chu:
Recommending e-books by multi-layer clustering and locality reconstruction. INDIN 2017: 1056-1061 - [c20]Eric Ke Wang, Li Yan, Zhe Nie, Lucas Chi Kwong Hui:
Analyzing Selfish Behavior in Opportunistic Networks. ISPAN-FCST-ISCC 2017: 218-225 - 2016
- [c19]Jingxuan Wang, Lucas Chi Kwong Hui, Siu-Ming Yiu, Xingmin Cui, Eric Ke Wang, Jun-bin Fang:
A Survey on the Cyber Attacks Against Non-linear State Estimation in Smart Grids. ACISP (1) 2016: 40-56 - [c18]Eric Ke Wang, Zhe Nie, Zheng Du, Yuming Ye:
MDPRP: Markov Decision Process Based Routing Protocol for Mobile WSNs. GRMSE (1) 2016: 91-99 - [c17]Weifeng Li, Xutao Li, Yunming Ye, Yan Li, Eric Ke Wang:
A novel density peak based semi-supervised clustering algorithm. ICMLC 2016: 307-310 - 2015
- [j4]Eric Ke Wang, Zhenjie Cao, Tsu-Yang Wu, Chien-Ming Chen:
MAPMP: A Mutual Authentication Protocol for Mobile Payment. J. Inf. Hiding Multim. Signal Process. 6(4): 697-707 (2015) - [c16]Jeng-Shyang Pan, Tsu-Yang Wu, Chien-Ming Chen, Eric Ke Wang:
An Efficient Solution for Time-Bound Hierarchical Key Assignment Scheme. ICGEC (2) 2015: 3-9 - [c15]Jeng-Shyang Pan, Tsu-Yang Wu, Chien-Ming Chen, Eric Ke Wang:
Security Analysis of a Time-Bound Hierarchical Key Assignment Scheme. IIH-MSP 2015: 203-206 - [c14]Eric Ke Wang, Huan Liu, Gang Wang, Yuming Ye, Tsu-Yang Wu, Chien-Ming Chen:
Context recognition for adaptive hearing-aids. INDIN 2015: 1102-1107 - [c13]Eric Ke Wang, Chun-Wei Lin, Tsu-Yang Wu, Chien-Ming Chen, Yuming Ye:
Privacy Protection Framework in Social Networked Cars. MISNC 2015: 553-561 - 2014
- [j3]Eric Ke Wang, Yunming Ye:
A New Privacy-Preserving Scheme for Continuous Query in Location-Based Social Networking Services. Int. J. Distributed Sens. Networks 10 (2014) - [j2]Eric Ke Wang, Yuming Ye, Xiaofei Xu:
Location-Based Distributed Group Key Agreement Scheme for Vehicular Ad Hoc Network. Int. J. Distributed Sens. Networks 10 (2014) - [j1]Eric Ke Wang, Yuming Ye, Xiaofei Xu:
Lightweight Secure Directed Diffusion for Wireless Sensor Networks. Int. J. Distributed Sens. Networks 10 (2014) - [c12]Zhujin Zhang, Xiangxiang Zeng, Zhihua Chen, Eric Ke Wang:
A New Graphical Representation of Protein Sequences Based on Dual-Vector Model. BIC-TA 2014: 629-632 - [c11]Tsu-Yang Wu, Chengxiang Zhou, Eric Ke Wang, Jeng-Shyang Pan, Chien-Ming Chen:
Towards Time-Bound Hierarchical Key Management in Cloud Computing. ECC (1) 2014: 31-38 - [c10]Xinying Zheng, Chien-Ming Chen, Tsu-Yang Wu, Eric Ke Wang, Tsui-Ping Chung:
Another Improvement of RAPP: An Ultra-lightweight Authentication Protocol for RFID. ECC (1) 2014: 145-153 - [c9]Eric Ke Wang, Tsu-Yang Wu, Chien-Ming Chen, Yuming Ye, Zhujin Zhang, Futai Zou:
MDPAS: Markov Decision Process Based Adaptive Security for Sensors in Internet of Things. ICGEC 2014: 389-397 - [c8]Tsu-Yang Wu, Chengxiang Zhou, Chien-Ming Chen, Eric Ke Wang, Jeng-Shyang Pan:
Towards Time-Bound Hierarchical Key Assignment for Secure Data Access Control. MISNC 2014: 437-444 - 2010
- [c7]Eric Ke Wang, Yunming Ye, Xiaofei Xu, Siu-Ming Yiu, Lucas Chi Kwong Hui, Kam-Pui Chow:
Security Issues and Challenges for Cyber Physical System. GreenCom/CPSCom 2010: 733-738 - [c6]Eric Ke Wang, Yunming Ye:
An Efficient and Secure Key Establishment Scheme for Wireless Sensor Network. IITSI 2010: 511-516 - [i1]Eric Ke Wang, Lucas Chi Kwong Hui, Siu-Ming Yiu:
A new key establishment scheme for wireless sensor networks. CoRR abs/1004.0591 (2010)
2000 – 2009
- 2009
- [c5]Eric Ke Wang, Lucas Chi Kwong Hui, Siu-Ming Yiu:
A New Practical Scheme for Protecting Web Content. Security and Management 2009: 62-66 - [c4]Eric Ke Wang, Yi Jun He, Lucas Chi Kwong Hui, Siu-Ming Yiu:
A Practical SMS-based Mutual Authentication Protocol for Secure Online Banking. Security and Management 2009: 179-183 - 2008
- [c3]Eric Ke Wang, Lucas Chi Kwong Hui, Siu-Ming Yiu:
Authenticated Directed Diffusion. CANS 2008: 366-377 - 2007
- [c2]Anderson Santana de Oliveira, Eric Ke Wang, Claude Kirchner, Hélène Kirchner:
Weaving rewrite-based access control policies. FMSE 2007: 71-80 - 2006
- [c1]Eric Ke Wang, Joe Cho-Ki Yau, Lucas Chi Kwong Hui, Zoe Lin Jiang, Siu-Ming Yiu:
A Key-Recovery System for Long-term Encrypted Documents. EDOC Workshops 2006: 52
Coauthor Index
aka: Lucas Chi Kwong Hui
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-02 21:29 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint