关注
Ming-Hung Wang
Ming-Hung Wang
在 cs.ccu.edu.tw 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
SDUDP: A reliable UDP-Based transmission protocol over SDN
MH Wang, LW Chen, PW Chi, CL Lei
IEEE Access 5, 5904-5916, 2017
432017
Boosting election prediction accuracy by crowd wisdom on social forums
MH Wang, CL Lei
2016 13th IEEE Annual Consumer Communications & Networking Conference (CCNC …, 2016
182016
SDN Storage: A Stream-based Storage System over Software-defined Networks
MH Wang, PW Chi, JW Guo, CL Lei
2016 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), 2016
102016
How to hide the real receiver under the cover receiver: Cp-abe with policy deniability
PW Chi, MH Wang, HJ Shiu
IEEE Access 8, 89866-89881, 2020
72020
Detecting potential cyber armies of election campaigns based on behavioral analysis
MH Wang, NL Nguyen, CR Dow
Complex Networks and Their Applications VII: Volume 2 Proceedings The 7th …, 2019
72019
Infection categorization using deep autoencoder
MH Wang, MH Tsai, WC Yang, CL Lei
IEEE INFOCOM 2018-IEEE Conference on Computer Communications Workshops …, 2018
62018
Estimating ideological scores of Facebook pages: an empirical study in Taiwan
MH Wang, ACH Chang, KT Chen, CL Lei
The Computer Journal 60 (11), 1675-1686, 2017
62017
Measuring qoe/qos of large scale p2p iptv service
NF Huang, MH Wang, TC Wang, SS Peng
2011 13th Asia-Pacific Network Operations and Management Symposium, 1-8, 2011
62011
Learning to recognize sockpuppets in online political discussions
NL Nguyen, MH Wang, CR Dow
IEEE Systems Journal 16 (2), 1873-1884, 2021
52021
Understanding malicious accounts in online political discussions: A multilayer network approach
NL Nguyen, MH Wang, YC Dai, CR Dow
Sensors 21 (6), 2183, 2021
52021
Positioning and Categorizing Mass Media Using Reaction Emojis on Facebook
MH Wang
The Computer Journal 64 (3), 451-461, 2021
52021
Understanding potential cyber-armies in elections: a study of Taiwan
MH Wang, NL Nguyen, S Dai, PW Chi, CR Dow
Sustainability 12 (6), 2248, 2020
52020
A lightweight compound defense framework against injection attacks in iiot
PW Chi, MH Wang
2018 IEEE Conference on Dependable and Secure Computing (DSC), 1-8, 2018
52018
SDN Migration: An Efficient Approach to Integrate OpenFlow Networks with STP-Enabled Networks
PW Chi, MH Wang, JW Guo, CL Lei
2016 International Computer Symposium (ICS), 148-153, 2016
52016
Analyzing image-based political propaganda in referendum campaigns: from elements to strategies
MH Wang, WY Chang, KH Kuo, KY Tsai
EPJ Data Science 12 (1), 29, 2023
42023
The evolution of rumors on a closed social networking platform during COVID-19: algorithm development and content study
AW Wang, JY Lan, MH Wang, C Yu
JMIR Medical Informatics 9 (11), e30467, 2021
42021
SandboxNet: An Online Malicious SDN Application Detection Framework for SDN Networking
PW Chi, MH Wang, Y Zheng
2020 International Computer Symposium (ICS), 397-402, 2020
32020
Privacy-preserving broker-abe scheme for multiple cloud-assisted cyber physical systems
PW Chi, MH Wang
Sensors 19 (24), 5463, 2019
32019
Blurring political leanings of messages on social networks using deniable steganography
MH Wang, PW Chi
IEEE Access 7, 87692-87703, 2019
32019
Automatic test pattern generator for fuzzing based on finite state machine
MH Wang, HC Wang, YR Chen, CL Lei
Security and Communication Networks 2017 (1), 7819590, 2017
32017
系统目前无法执行此操作,请稍后再试。
文章 1–20