发表学术论文70余篇,包括多篇中国计算机学会推荐的顶级期刊和会议论文,主要发表在:
IEEE Transactions on Dependable and Secure Computing, IEEE Transactions on Information Forensics and Security, IEEE Internet of Things Journal等顶级国际期刊
ACM CCS , DSN , ESORICS , ICWS 等顶级国际会议
电子学报等核心国内期刊
| 论文题目 | 作者 | 期刊名称 |
| 2021年 | ||
| Scene Text Recognition with Cascade Attention Network | M. Zhang, M. Ma, P. Wang*. | ACM International Conference on Multimedia Retrieval |
| Faster, Deeper, Easier: Crowdsourcing Diagnosis of Microservice Kernel Failure from User Space | Y. Pan, M. Ma, X. Jiang, P. Wang* | ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA) |
| Hierarchical Refined Attention For Scene Text Recognition | M. Zhang, M. Ma*, P. Wang*. | IEEE International Conference on Acoustics, Speech and Signal Processing |
| Improved Probabilistic Context-free Grammars for Passwords Using Word Extraction | Haibo Cheng, Wenting Li, Ping Wang*, Kaitai Liang | IEEE International Conference on Acoustics, Speech and Signal Processing |
| RAGA: Relation-aware Graph Attention Networks for Global Entity Alignment | R. Zhu, M. Ma, P. Wang*. | Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD) |
| Middleware for the Internet of Things: A survey on requirements, enabling technologies, and solutions | Jingbin Zhang, Meng Ma*, Ping Wang*, Xiao-dong Sun | Journal of Systems Architecture |
| Random walks on the generalized Vicsek fractal | F. Ma, X.M. Wang, P. Wang, X.D. Luo | EPL |
| Power-law graphs with small diameter: Framework, structural properties,and average trapping time |
F. Ma, P. Wang | Physical Review E |
| 2020年 | ||
| Random growth networks with exponential degree distribution |
F. Ma, X.D. Luo, P. Wang, R.B. Zhu | Chaos |
| An Improved RFID-based Authentication Protocol for Rail Transit | R.Zhu, X-X.He, J-H.Xie,Z-J.Zhang, P.Wang* | The 14th IEEE International Conference on Big Data Science and Engineering (IEEE BigDataSE 2020) |
| Platoon trajectories generation: A unidirectional interconnected LSTM-based car-following model | Yangxin Lin, Ping Wang, Yang Zhou, Fan Ding, Chen Wang, Huachun Tan | IEEE Transaction on Intelligent Transportation System |
| PrePCT: Traffic Congestion Prediction in Smart Cities with Relative Position Congestion Tensor | M-T. Bai, Y-X. Lin, M. Ma*, P. Wang, L-H. Duan* | Neurocomputing |
| Real-time Fine-grained Freeway Traffic State Estimation under Sparse Observation | Yangxin Lin, Yang Zhou, Shengyue Yao, Fan Ding, and Ping Wang | European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases (ECML-PKDD) |
| Drug Drug Interaction Extraction from Chinese Biomedical Literature using Distant Supervision | Jingzhuo Zhang, Weijie Liu, Ping Wang | IEEE International Conference on Knowledge Graph (ICKG) |
| Determining exact solutions for structural parameters on hierarchical networks with density feature | F. Ma, P. Wang* | Computer Journal |
| A Method for Geodesic Distance on Subdivision of Trees with Arbitrary Orders and Their Applications | F. Ma, P. Wang*, X.D. Luo | IEEE Transactions on Knowledge and Data Engineering |
| Random walks on tree with applications | F. Ma, P. Wang* | Physical Review E |
| On-demand deployment for IoT applications | J. Zhang, M. Ma, W. He, P. Wang. | Journal of Systems Architecture |
| Lead Time-Aware Proactive Adaptation for Service-Oriented Systems | J. Zhang, M. Ma, P. Wang. | IEEE International Conference on Web Services (ICWS) |
| Self-Adaptive Root Cause Diagnosis for Large-Scale Microservice Architecture | M. Ma, W-L. Lin, D-S. Pan, P. Wang* | IEEE Transactions on Services Computing |
| Dense networks with scale-free feature | F. Ma, X.M. Wang, P. Wang*, X.D. Luo | Physical Review E |
| Ontology-based Event Modeling and High-Confidence Processing in IoT-Enabled High-Speed Train Control System | M. Ma, Y-X. Lin, P. Wang*, L-H. Duan*, L. Liu | Journal of Signal Processing Systems |
| Multi-label Classification for Clinical Text with Feature-level Attention | D-S. Pan, X-Z. Zheng, W-J. Liu, M-Y. Li, M. Ma, Z. Ying*, L. Yang, P. Wang* | IEEE International Conference on High Performance and Smart Computing |
| Extract Interpretability-Accuracy balanced Rules from Artificial Neural Networks: A Review | C-J. He, M. Ma*, P. Wang* | Neurocomputing |
| AutoMAP: Diagnose Your Microservice-based Web Applications Automatically | M. Ma, P. Wang*, J-M. Xu, Y. Wang and P-F. Chen | TheWebConf (WWW) |
| Efficient Multi-Factor User Authentication Protocol with Forward Secrecy for Real-Time Data Access in WSNs | Ding Wang, Ping Wang, Chenyu Wang | ACM Transactions on Cyber-Physical Systems |
| K-BERT: Enabling Language Representation with Knowledge Graph | Weijie Liu, Peng Zhou, Zhe Zhao, Zhiruo Wang, Qi Ju, Haotang Deng, Ping Wang* | AAAI |
| Scale-free networks with invariable diameter and density feature: Counterexamples | F Ma, X.M. Wang, P Wang*. | Physical Review E |
| 2019年 | ||
| Two-factor authentication in industrial Internet-of-Things: Attacks, evaluation and new construction | Wenting Li, and Ping Wang* | Future Generation Computer Systems |
| Dynamic Train Formation and Dispatching for Rail Transit Based on Virtually Coupled Train Set | Ling Liu, Ping Wang*, Ying Wang, Wei Wei, Zhoufan Wang | IEEE INTELLIGENT TRANSPORTATION SYSTEMS CONFERENCE 2019 |
| Intelligent Dispatching and Coordinated Control Method at Railway Stations for Virtually Coupled Train Sets | Ling Liu, Ping Wang*, Wei Wei, Qing Li, Bo ZHANG | IEEE INTELLIGENT TRANSPORTATION SYSTEMS CONFERENCE 2019 |
| NIV-NGM – A Novel Non-invasive Blood Glucose Monitoring Method based on Near-infrared Videos | Weijie Liu, Guangyu Wang, Anpeng Huang∗ and Ping Wang∗ | IEEE International Conference on Bioinformatics and Biomedicine |
| Efficient Spatial Big Data Storage and Query in Hbase | P. Wang, F-H. Xu, M. Ma*, L-H. Duan* | SmartCloud |
| PbFG: Physique-based Fuzzy Granular Modeling for Non-invasive Blood Glucose Monitoring | Weijie Liu, A. Huang , P. Wang*, and C.H. Chu | Information Sciences |
| Gate Decorator: Global Filter Pruning Method for Accelerating Deep Convolutional Neural Networks | Z-H. You, K. Yan, J-M. Ye, M. Ma, P. Wang | NeurIPS |
| Understanding security failures of multi-factor authentication schemes for multi-server environments | Ding Wang, Xizhe Zhang, Zijian Zhang, Ping Wang | Computers & Security |
| Generating Fibonacci-model as evolution of networks with vertex-velocity and time-memory | Fei Ma, Ping Wang, Bing Yao | Physica A |
| Birthday, Name and Bifacial-security: Understanding Passwords of Chinese Web Users | Ding Wang, Ping Wang, Debiao He, Yuan Tian | USENIX Security |
| Probability Model Transforming Encoders Against Encoding Attacks | Haibo Cheng, Zhixiong Zheng, Wenting Li, Ping Wang and Chao-Hsien Chu | USENIX Security |
| 交通行程时间预测方法研究 | 柏梦婷,林杨欣,马萌,王平 | 软件学报 |
| Revisiting Anonymous Two-Factor Authentication Schemes for IoT-enabled devices in Cloud Computing Environments | Ping Wang, Bin Li, Hongjin Shi, Yaosheng Shen, Ding Wang | Security and Communication Networks |
| Efficient Event Inference and Context-Awareness in Internet of Things Edge Systems | M. Ma and P. Wang | IEEE Transactions on Big Data |
| Transfer and Collaborative Learning Method for Personalized Noninvasive Blood Glucose Measurement Modeling (EI: 20192907202352) | W. Liu, A. Huang , P. Wang*, and H. Yao | IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) |
| ADVERSARIAL NOISE LAYER: REGULARIZE NEURAL NETWORK BY ADDING NOISE | Zhonghui You, Jinmian Ye, Kunming Li, Zenglin Xu, Ping Wang | ICIP |
| Light-weight and Scalable Hierarchical-MVC Architecture for Cloud Web Applications | M. Ma, J. Yang, P. Wang*, W-J. Liu, and J-Z. Zhang | CSCloud |
| Cryptanalysis of Two Chaotic Maps-Based Authentication Schemes in Edge Computing | Wenting Li, and Ping Wang* | CSCloud |
| MS-Rank: Multi-Metric and Self-Adaptive Root Cause Diagnosis for Microservice Applications | M. Ma, W-L. Lin, D-S. Pan, P. Wan | ICWS |
| Password Expiration Strategy: A Perspective of Ecological Memory | Yiming Zhao, Wenting Li, Zijian Zhang, Ping Wang | BigDataService |
| Secure Chaotic Maps-based Authentication Scheme for Real-Time Data Access In Internet of Things | Wenting Li, Haibo Cheng, and Ping Wang* | 2019 International Conference on Cyber Security and Protection of Digital Services (Cyber Security) |
| Motion Plan of Maritime Autonomous Surface Ships by Dynamic Programming for Collision Avoidance and Speed Optimizatio | Xiongfei Geng, Yongcai Wang, Ping Wang, Baochen Zhang | Sensors |
| 2018年 | ||
| 无线传感器网络环境下多因素身份认证协议的内部人员攻击研究 | 李文婷, 汪定, 王平 | 软件学报 |
| Regional Estimation Prior Network for Crowd Analyzing | P. He, M. Ma, P. Wang | International Conference on Smart Computing and Communication (SmartCom) |
| Travel-Time Prediction Methods: A Review | M-T. Bai, M. Ma, P. Wang, Y-X. Lin | International Conference on Smart Computing and Communication (SmartCom) |
| Fast Implementation for SM4 Cipher Algorithm Based on Bit-Slice Technology | J-B. Zhang, M. Ma, P. Wang | International Conference on Smart Computing and Communication (SmartCom) |
| RBD: A Reference Railway Big Data System Model | W-L. Lin, F-H. Xu, M. Ma, P. Wang | International Conference on Smart Computing and Communication (SmartCom) |
| FacGraph: Frequent Anomaly Correlation Graph Mining for Root Cause Diagnose in Micro-Service Architecture | W-L. Lin, M. Ma, D-S. Pan, and P. Wang | IEEE International Performance Computing and Communications Conference (IPCCC) |
| Revisiting Anonymous Two-Factor Authentication Schemes for Multi-Server Environment | Ping Wang, Zijian Zhang, Ding Wang | International Conference on Information and Communications Security (ICICS) |
| Toward Ubiquitous Environment: An Scalable Framework for Autonomous Service Composition | J-B. Zhang, P-K. Zheng, M. Ma, P. Wang | IEEE International Conference on Ubiquitous Intelligence and Computing (UIC) |
| Coordinated Control Method of Virtually Coupled Train Formation Based on Multi Agent Systems | Ling LIU, Ping WANG, Bo ZHANG, Wei WEI | The Second International Conference on Smart Vehicular Technology, Transportation, Communication and Applications |
| Cryptanalysis and Security Enhancement of Three Authentication Schemes in Wireless Sensor Networks | W. Li, B. Li, Y. Zhao, and P. Wang | Wireless Communications and Mobile Computing |
| Measuring Two-Factor Authentication Schemes for Real-Time Data Access in Industrial Wireless Sensor Networks | Ding Wang, Wenting Li, Ping Wang | IEEE Transaction on Industrial Informatics |
| Long-Term Event Processing over Data Streams in Cyber-Physical Systems | Ping Wang, Meng Ma, Chao-Hsien Chu | ACM Transactions on Cyber-Physical Systems |
| Redundant Reader Elimination in Large-Scale Distributed RFID Networks | Meng Ma, Ping Wang, Chao-Hsien Chu | IEEE Internet of Things Journal |
| CloudRanger: Root Cause Identification for Cloud Native Systems | Ping Wang, Jingmin Xu, Meng Ma, Weilan Lin, Disheng Pan, Yuan Wang, Pengfei Chen | IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGrid) |
| An alternative method for understanding user-chosen password | Zhixiong Zheng, Haibo Cheng, Yiming Zhao, Zijian Zhang, Ping Wang | Security and Communication Networks |
| 2017年 | ||
| Event Description and Detection in Cyber-Physical Systems: An Ontology-Based Language and Approach | Meng Ma, Ling Liu, Yangxin Lin, Disheng Pan, Ping Wang | IEEE International Conference on Parallel and Distributed Systems (ICPADS) |
| MODE: A Context-aware IoT Middleware Supporting On-Demand Deployment for Mobile Devices | Wei He, Jingbin Zhang, Meng Ma, Ping Wang | IEEE International Conference on Parallel and Distributed Systems (ICPADS) |
| A Security Analysis of Honeywords | Ding Wang, Haibo Cheng, Ping Wang, Jeff Yan, Xinyi Huang | 2018 25th Network and Distributed System Security Symposium (NDSS 2018) |
| Towards Energy-Awareness Smart Building: Discover the Fingerprint of Your Electrical Appliances | Meng Ma, Weilan Lin, Jingbin Zhang, Ping Wang, Yuchen Zhou, Xiaoxing Liang | IEEE Transaction on Industrial Informatics |
| BpMC: A Novel Algorithm Revealing Multilayer-Tissue Bio-Optical Parameter Profiles for Non-invasive Blood Glucose Measurement | Liu Weijie, Anpeng Huang, Ping Wang | IEEE International Conference on Bioinformatics and Biomedicine |
| LogDC: Problem Diagnosis for Declartively-deployed Cloud Applications with Log | Jingmin Xu, Pengfei Chen, Lin Yang, Ping Wang | IEEE International Conference on e-Business Engineering (ICEBE) |
| Data and Decision Intelligence for Human-in-the-Loop Cyber-Physical Systems: Reference Model, Recent Progresses and Challenges | Meng Ma, Weilan Lin, Disheng Pan, Yangxin Lin, Ping Wang, Yuchen Zhou, Xiaoxing Liang | Journal of Signal Processing Systems |
| Model Based Energy Consumption Analysis of Wireless Cyber Physical Systems | Ping Wang, Jing Liu, Jinlong Lin, Chao-hsien Chu | Journal of Signal Processing Systems |
| Breaking three remote user authentication systems for mobile devices | Wenting Li, Yaosheng shen, Ping Wang | Journal of Signal Processing Systems |
| 对三个多服务器环境下匿名身份认证协议的安全性分析 | Ding Wang, Wenting Li, Ping Wang | 软件学报 |
| On the Consistency of Event Processing: A Semantic Approach | Meng Ma, Ping Wang | Knowledge-Based Systems |
| Discover the Fingerprint of Electrical Appliance: Online Appliance Behavior Learning and Detection in Smart Homes | Meng Ma, Weilan Lin, Jingbin Zhang, Ping Wang, Yuchen Zhou, Xiaoxing Liang | IEEE International Conference on Ubiquitous Intelligence and Computing (UIC) |
| Zipf's Law in Passwords | Ding Wang, Haibo Cheng, Ping Wang, Xinyi Huang, Gaopeng Jian | IEEE Transactions on Information Forensics and Security |
| Lightweight And Adaptive Service Api Performance Monitoring In Highly Dynamic Cloud Environment | Jingmin Xu, Ping Wang, Pengfei Chen, Yuan Wang | IEEE International Conference on Services Computing |
| Cloud Migration: Layer Partition And Integration | Zhitao Wan, Lihua Duan, Ping Wang | IEEE International Conference on Edge Computing |
| A Controller/Architecture Co-design Framework for Wireless Cyber-Physical Systems | Jing Liu, Ping Wang, JinLong Lin, Chao-Hsien Chu | IEEE International Conference on Cyber, Physical and Social Computing Conference |
| Model Based Energy Consumption Analysis of Wireless Cyber Physical Systems | Jing Liu, Ping Wang, JinLong Lin, Chao-Hsien Chu | IEEE International Conference on High Performance and Smart Computing |
| Real time Scheduling for Wireless Mesh Networked Control Systems | Jing Liu, Ping Wang, JinLong Lin | IEEE International Conference on Communication Software and Networks |
| Breaking two remote user authentication systems for mobile devices | Wenting Li, Qianchen Gu, Yiming Zhao, Ping Wang | 3rd IEEE International Conference on Big Data Security on Cloud (BigDataSecurity) |
| Intelligent Transportation System (ITS): Concept, Challenge and Opportunity | Yangxin Lin, Ping Wang, Meng Ma | IEEE International Conference on High Performance and Smart Computing |
| Data and Decision Intelligence for Internet of Things: Putting Human in the Loop | Meng Ma, Weilan Lin, Disheng Pan, Ping Wang, Yuchen Zhou, Xiaoxing Liang | IEEE International Conference on High Performance and Smart Computing |
| Understanding Human-Chosen PINs: Characteristics, Distribution and Security | Ding Wang, Qianchen Gu, Xinyi Huang, Ping Wang | 12th ACM ASIA Conference on Computer and Communications Security (ACM ASIACCS 2017) |
| 2016年 | ||
| Targeted Online Password Guessing: An Underestimated Threat. | Ding Wang, Zijian Zhang, Ping Wang, Jeff Yan , Xinyi Huang | ACM Conference on Computer and Communications Security |
| On the Implications of Zipf's Law in Passwords. | Ding Wang, Ping Wang | European Symposium on Research in Computer Security |
| 口令齐普夫分布的启示 | 汪定, 顾乾辰, 王平 | 中国密码学会2016年会论文集 |
| A Novel Pattern Based Dynamic Service Composition Framework | Zhitao Wan, Ping Wang | International Conference on Service Computing |
| 口令安全研究进展 | 王平,汪定,黄欣沂 | 计算机研究与发展 |
| fuzzyPSM: A New Password Strength Meter Using Fuzzy Probabilistic Context-Free Grammars | Ding Wang, Debiao He, Haibo Cheng, Ping Wang | 46th IEEE/IFIP International Conference on Dependable Systems and Networks (DSN 2016) |
| Two Birds with One Stone: Two-Factor Authentication with Security Beyond Conventional Bound | Ding Wang, Ping Wang | IEEE Transactions on Dependable and Secure Computing |
| Software Design of Onboard DMI of Train Control System for High Speed Railways | Ling Liu, Ping Wang, Youbing Zhang, Guozhen Zhang | The International Conference on Computer Technology and Software Engineering (CTSE2016) |
| The Request for Better Measurement: A Comparative Evaluation of Two-Factor Authentication Schemes | Ding Wang, Qianchen Gu, Haibo Cheng, Ping Wang | 11th ACM Asia Conference on Computer and Communications Security (AISACCS 2016) |
| On the Challenges in Designing Identity-based Privacy-Preserving Authentication Schemes for Mobile Device | Ding Wang, Haibo Cheng, Debiao He, Ping Wang | IEEE Systems Journal |
| 2015年 | ||
| Class-Based Delta-Encoding for High-Speed Train Data Stream | Y.-X. Lin, P. Wang, J. -L. Lin, M. Ma, and L. Ma | 2015 IEEE International Performance Computing and Communications Conference (IPCCC) |
| LTCEP: Efficient Long-Term Event Processing for Internet of Things Data Streams | M. Ma, P. Wang, and C.-H. Chu | 2015 IEEE International Conference on Internet of Things (iThings) |
| Real-Time Big Data Processing Framework: Challenges and Solutions | Zhigao Zheng, Ping Wang, Jing Liu, Shengli Sun | Applied Mathematics & Information Sciences |
| 理解中国用户口令: 特征、安全和启示. | 汪定, 程海波, 顾乾辰, 王平 | 中国密码学会2015年会论文集 |
| The Emperor's New Password Creation Policies: An Evaluation of Leading Web Services and the Effect of Role in Resisting Against Online Guessing | Ding Wang, Ping Wang | Proc. of the 20th European Symposium on Research in Computer Security (ESORICS 2015) |
| From Complex Event Processing to Cognitive Event Processing | J. Yang, M. Ma, P. Wang and L. Liu | 2015 IEEE International Conference on Ubiquitous Intelligence and Computing |
| A Cloud-based High-Speed Rail Information Service Platform Architecture | S.-X. Du, M. Ma, P. Wang, J. -L. Lin and L. Ma | 2015 Ninth International Conference on Frontier of Computer Science and Technology |
| Efficient Multi-Pattern Event Processing over High-Speed Train Data Streams | M. Ma, P. Wang, C.-H. Chu, and L. Liu | IEEE Internet of Things Journal |
| Anonymous Two-Factor Authentication in Distributed Systems: Certain Goals Are Beyond Attainment | Ding Wang, Debiao He, Ping Wang, Chao-Hsien Chu | IEEE Transactions on Dependable and Secure Computing |
| OntoEvent: An Ontology-Based Event Description Language for Semantic Complex Event Processing | M. Ma, P. Wang, J. Yang and C. Li | 2015 International Conference on Web-Age Information Management |
| Graph Similarity based Cloud Migration Service Composition Pattern Discovery | Zhitao Wan, Ping Wang, Lihua Duan, Fan Jing Meng, Jing Min Xu, | International Journal of Web Services Research (IJWSR) |
| Preserving Privacy for Free: Efficient and Provably Secure Two-Factor Authentication Scheme with User Anonymity | Ding Wang, Nan Wang, Ping Wang, Sihan Qing | Information Sciences |
| 基于RSA的网关口令认证协议的分析与改进 | 汪定, 王平, 雷鸣 | 电子学报 |
| 可证明安全的基于RSA的远程用户口令认证协议 | 汪定, 王平, 李增鹏, 马春光 | 系统工程理论与实践 |
| 2014年 | ||
| On the Anonymity of Two-Factor Authentication Schemes for Wireless Sensor Networks: Attacks, Principle and Solutions | Ding Wang, Ping Wang | Computer Networks |
| Understanding security failures of two-factor authentication schemes for real-time applications in hierarchical wireless sensor networks | Ding Wang, Ping Wang. | Ad Hoc Networks |
| On the Usability of Two-Factor Authentication | Ding Wang, Ping Wang | International Conference on Security and Privacy in Communication Networks (SecureComm 2014) |
| Ontology-based Semantic Modeling and Evaluation for Internet of Things Applications | M. Ma, P. Wang, and C.-H. Chu | 2014 IEEE International Conference on Internet of Things (iThings) |
| Time-Weighted Uncertain Nearest Neighbor Collaborative Filtering Algorithm | Zhigao Zheng,Jing Liu,Ping Wang, Shengli Sun | TELKOMNIKA Indonesian Journal of Electrical Engineering |
| 时间加权不确定近邻协同过滤算法 | 郑志高,刘京,王平,孙圣 | 计算机科学 |
| Service Composition Pattern Generation for Cloud Migration: a Graph Similarity Analysis Approach | Zhitao Wan, Fan Jing Meng, Jing Min Xu, Ping Wang | 21st International Conference on Web Services (ICWS) |
| A Framework for Streaming Service Composition | Zhiao Wan, Ping Wang | IEEE 79th Vehicular Technology Conference |
| A Survey and Taxonomy of Cloud Migration | Zhiao Wan, Ping Wang | 2014 International Conference on Service Science (ICSS) |
| Improved Privacy-Preserving Authentication Scheme for Roaming Service in Mobile Networks | Ding Wang, Ping Wang, Jing Liu | 2014 IEEE Wireless Communications and Networking Conference |
| 2013年 | ||
| Offline Dictionary Attack on Password Authentication Schemes using Smart Cards | Ding Wang, Ping Wang | 16th Information Security Conference |
| A novel distributed algorithm for redundant reader elimination in RFID networks | M. Ma, P. Wang, and C.-H. Chu | 2013 IEEE International Conference on RFID-Technologies and Applications (RFID-TA) |
| Data Management for Internet of Things: Challenges, Approaches and Opportunities | M. Ma, P. Wang, and C.-H. Chu | 2013 IEEE International Conference on Internet of Things (iThings) |
| RTDP系统网络体系结构及其关键技术 | 孙圣力,郑志高,王平,刘京 | 北京邮电大学学报 |
| Power-Aware Cloud Computing Infrastructure for Latency-Sensitive Internet-of-Things Services | Zhitao Wan, Ping Wang, Jing Liu, Wei Tang | 2013 UKSim 15th International Conference on Computer Modelling and Simulation (UKSim) |
| A Novel Algorithm for Video Zooming | CAO Xixin,LIU Jing,WU Shuai,ZHANG Qihui,LIN Jinlong,WANG Ping | 北大学报(理科英文版) Acta Scientiarum Naturalium Universitatis Pekinensis |
| 2012年 | ||
| User-driven cloud transportation system for smart driving | M. Ma, C.-H. Chu, P. Wang, and Y. Huang | 2012 IEEE International Conference on Cloud Computing Technology and Science (CloudCom) |
| Many-core processor based pseudo-stateful traffic multiplier | Zhitao Wan, Ping Wang | Journal of Simulation: Systems, Science and Technology |
| An Open, Flexible and Multilevel Data Storing and Processing Platform for Very Large Scale Sensor Network | Jing LIU; Jing CHEN; Li PENG; Xixin CAO; RenChun LIAN; Ping WANG | 2012 The 14th International Conference on Communication Technology (ICACT) |
| A Variable Structure Compensation Fuzzy Neural Network and Identification | Jing LIU; Yalu CAO; Ping WANG; Li PENG; RenChun Lian; Xixin CAO | 2012 The 14th International Conference on Communication Technology (ICACT) |
