default search action
Cheng Wang 0001
Person information
- affiliation: Tongji University, Department of Computer Science and Engineering, Shanghai, China
Other persons with the same name
- Cheng Wang — disambiguation page
- Cheng Wang 0002 — NEC Laboratories Europe GmbH, Heidelberg, Germany (and 1 more)
- Cheng Wang 0003 — Xiamen University, Fujian Key Laboratory of Sensing and Computing for Smart Cities, China (and 1 more)
- Cheng Wang 0004 — Beijing Jiaotong University, State Key Laboratory of Rail Traffic Control and Safety, China
- Cheng Wang 0005 — Chinese Academy of Sciences, Pervasive Computing Research Center, Beijing, China
- Cheng Wang 0006 — China Academy of Space Technology, Qian Xuesen Laboratory of Space Technology, Beijing, China (and 1 more)
- Cheng Wang 0007 — Wuhan University, GNSS Research Center, China
- Cheng Wang 0008 — Beijing University of Posts and Telecommunications, School of Electronic Engineering, China (and 1 more)
- Cheng Wang 0009 — Massachusetts Institute of Technology, Department of Electrical Engineering and Computer Science, Cambridge, MA, USA
- Cheng Wang 0010 — Wayne State University, Department of Sociology, Detroit, MI, USA (and 1 more)
- Cheng Wang 0011 — Tongji University, School of Mathematical Sciences, Shanghai, China
- Cheng Wang 0012 — Nanjing University of Science and Technology, School of Automation, China (and 2 more)
- Cheng Wang 0013 — Intel Corporation, Programming Systems Lab, Santa Clara, CA, USA
- Cheng Wang 0014 — Pennsylvania State University, Philadelphia, PA, USA
- Cheng Wang 0015 — University of Massachusetts, Department of Mathematics, North Dartmouth, MA, USA
- Cheng Wang 0016 — Chinese Academy of Sciences, Institute of Remote Sensing and Digital Earth, Key Laboratory of Digital Earth Science, Beijing, China (and 1 more)
- Cheng Wang 0017 — North China Electric Power University, State Key Laboratory of Alternate Electrical Power System with Renewable Energy Sources, Beijing, China
- Cheng Wang 0018 — Tianjin Normal University, College of Electronic and Communication Engineering, Department of Artificial Intelligence, China (and 2 more)
- Cheng Wang 0019 — Purdue University, Department of Computer Sciences, West Lafayette, IN, USA
- Cheng Wang 0020 — Huaqiao University, College of Computer Science and Technology, Xiamen, China (and 1 more)
- Cheng Wang 0021 — University of Hong Kong, Department of Computer Science, Hong Kong
- Cheng Wang 0022 — Shanghai Jiao Tong University, School of Mathematical Sciences, MOE-LSC, China
- Cheng Wang 0023 — University of Edinburgh, UK (and 1 more)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j84]Cheng Wang, Hao Tang, Hangyu Zhu, Junhan Zheng, Changjun Jiang:
Behavioral authentication for security and safety. Secur. Saf. 3: 2024003 (2024) - [j83]Teng Hu, Cheng Wang, Qing Yang, Xue Chen, Rui Li:
Leveraging Adversarial Augmentation on Imbalance Data for Online Trading Fraud Detection. IEEE Trans. Comput. Soc. Syst. 11(2): 1602-1614 (2024) - [j82]Bingjun Qin, Zhenhua Huang, Zhengyang Wu, Cheng Wang, Yunwen Chen:
MetaGA: Metalearning With Graph-Attention for Improved Long-Tail Item Recommendation. IEEE Trans. Comput. Soc. Syst. 11(5): 6544-6556 (2024) - [j81]Cheng Wang, Hao Tang, Hangyu Zhu, Changjun Jiang:
Collaborative Prediction in Anti-Fraud System Over Multiple Credit Loan Platforms. IEEE Trans. Dependable Secur. Comput. 21(4): 3580-3596 (2024) - [j80]Qing Yang, Cheng Wang, Haifeng Yuan, Jipeng Cui, Teng Hu, Xue Chen, Changjun Jiang:
Approaching the Information-Theoretic Limit of Privacy Disclosure With Utility Guarantees. IEEE Trans. Inf. Forensics Secur. 19: 3339-3352 (2024) - [j79]Hao Tang, Cheng Wang, Jianguo Zheng, Changjun Jiang:
Enabling Graph Neural Networks for Semi-Supervised Risk Prediction in Online Credit Loan Services. ACM Trans. Intell. Syst. Technol. 15(1): 13:1-13:24 (2024) - [j78]Jiamin Yao, Junli Wang, Cheng Wang, Chungang Yan:
DRL-Based VNF Cooperative Scheduling Framework With Priority-Weighted Delay. IEEE Trans. Mob. Comput. 23(12): 11375-11388 (2024) - [j77]Hangyu Zhu, Cheng Wang, Songyao Chai:
Detecting Evolving Fraudulent Behavior in Online Payment Services: Open-Category and Concept-Drift. IEEE Trans. Serv. Comput. 17(5): 2180-2193 (2024) - 2023
- [j76]Xue Chen, Cheng Wang, Qing Yang, Teng Hu, Changjun Jiang:
Locally differentially private high-dimensional data synthesis. Sci. China Inf. Sci. 66(1) (2023) - [j75]Weizhen Zhou, Zhenhua Huang, Cheng Wang, Yunwen Chen:
A multi-graph neural group recommendation model with meta-learning and multi-teacher distillation. Knowl. Based Syst. 276: 110731 (2023) - [j74]Xue Chen, Cheng Wang, Jipeng Cui, Qing Yang, Teng Hu, Changjun Jiang:
Incorporating Prior Knowledge in Local Differentially Private Data Collection for Frequency Estimation. IEEE Trans. Big Data 9(2): 499-511 (2023) - [j73]Cheng Wang, Hangyu Zhu, Ruixin Hu, Rui Li, Changjun Jiang:
LongArms: Fraud Prediction in Online Lending Services Using Sparse Knowledge Graph. IEEE Trans. Big Data 9(2): 758-772 (2023) - [j72]Cheng Wang, Songyao Chai, Hangyu Zhu, Changjun Jiang:
CAeSaR: An Online Payment Anti-Fraud Integration System With Decision Explainability. IEEE Trans. Dependable Secur. Comput. 20(3): 2565-2577 (2023) - [j71]Hangyu Zhu, Cheng Wang:
Enabling Fraud Prediction on Preliminary Data Through Information Density Booster. IEEE Trans. Inf. Forensics Secur. 18: 5706-5720 (2023) - [j70]Junqi Zhang, Yehao Lu, Yunzhe Wu, Cheng Wang, Di Zang, Abdullah Abusorrah, Mengchu Zhou:
PSO-Based Sparse Source Location in Large-Scale Environments With a UAV Swarm. IEEE Trans. Intell. Transp. Syst. 24(5): 5249-5258 (2023) - [j69]Junqi Zhang, Huan Liu, Peng Zu, Mengshi Zhao, Cheng Wang, Aiiad Albeshri, Abdullah Abusorrah, MengChu Zhou:
Using Tabu Search to Avoid Concave Obstacles for Source Location. IEEE Trans. Intell. Transp. Syst. 24(11): 11720-11732 (2023) - [j68]Xue Chen, Cheng Wang, Qing Yang, Teng Hu, Changjun Jiang:
The Opportunity in Difficulty: A Dynamic Privacy Budget Allocation Mechanism for Privacy-Preserving Multi-dimensional Data Collection. ACM Trans. Manag. Inf. Syst. 14(1): 8:1-8:24 (2023) - [c53]Teng Hu, Cheng Wang, Qing Yang, Xue Chen:
Hard Anomaly Detection: An Adversarial Data Augmentation Solution. ICDM (Workshops) 2023: 1065-1075 - [c52]Cheng Wang, Songyao Chai, Hangyu Zhu:
OpenDrift: Online Evolving Fraud Detection for Open-Category and Concept-Drift Transactions. ICWS 2023: 605-614 - [i9]Cheng Wang, Hangyu Zhu, Yuhang Lin, Changjun Jiang:
On the Expressive Power of Behavior Structure. CoRR abs/2312.01652 (2023) - [i8]Cheng Wang, Hao Tang, Hangyu Zhu, Junhan Zheng, Changjun Jiang:
Behavioral Authentication for Security and Safety. CoRR abs/2312.03429 (2023) - [i7]Cheng Wang, Yi Wang, Changjun Jiang:
Scaling Laws of Network Traffic Load: A Theoretical Explanation of Metcalfe's Law. CoRR abs/2312.11110 (2023) - 2022
- [j67]Zhong Li, Xueting Yang, Cheng Wang, Ke Ma, Changjun Jiang:
Crowd-Learning: A Behavior-Based Verification Method in Software-Defined Vehicular Networks With MEC Framework. IEEE Internet Things J. 9(2): 1622-1639 (2022) - [j66]Qing Yang, Cheng Wang, Teng Hu, Xue Chen, Changjun Jiang:
Implicit privacy preservation: a framework based on data generation. Secur. Saf. 1: 2022008 (2022) - [j65]Cheng Wang, Hangyu Zhu, Bo Yang:
Composite Behavioral Modeling for Identity Theft Detection in Online Social Networks. IEEE Trans. Comput. Soc. Syst. 9(2): 428-439 (2022) - [j64]Cheng Wang, Hangyu Zhu:
Representing Fine-Grained Co-Occurrences for Behavior-Based Fraud Detection in Online Payment Services. IEEE Trans. Dependable Secur. Comput. 19(1): 301-315 (2022) - [j63]Cheng Wang, Hangyu Zhu:
Wrongdoing Monitor: A Graph-Based Behavioral Anomaly Detection in Cyber Security. IEEE Trans. Inf. Forensics Secur. 17: 2703-2718 (2022) - [j62]Zhong Li, Yubo Kong, Cheng Wang, Changjun Jiang:
DDoS Mitigation Based on Space-Time Flow Regularities in IoV: A Feature Adaption Reinforcement Learning Approach. IEEE Trans. Intell. Transp. Syst. 23(3): 2262-2278 (2022) - [j61]Juan Ni, Zhenhua Huang, Chang Yu, Dongdong Lv, Cheng Wang:
Comparative Convolutional Dynamic Multi-Attention Recommendation Model. IEEE Trans. Neural Networks Learn. Syst. 33(8): 3510-3521 (2022) - 2021
- [j60]Qing Yang, Cheng Wang, Changqi Wang, Teng Hu, Changjun Jiang:
Fundamental Limits of Data Utility: A Case Study for Data-Driven Identity Authentication. IEEE Trans. Comput. Soc. Syst. 8(2): 398-409 (2021) - [j59]Jipeng Cui, Chungang Yan, Cheng Wang:
ReMEMBeR: Ranking Metric Embedding-Based Multicontextual Behavior Profiling for Online Banking Fraud Detection. IEEE Trans. Comput. Soc. Syst. 8(3): 643-654 (2021) - [j58]Cheng Wang, Changqi Wang, Hangyu Zhu, Jipeng Cui:
LAW: Learning Automatic Windows for Online Payment Fraud Detection. IEEE Trans. Dependable Secur. Comput. 18(5): 2122-2135 (2021) - [j57]Zheng Tan, Cheng Wang, Chungang Yan, Mengchu Zhou, Changjun Jiang:
Protecting Privacy of Location-Based Services in Road Networks. IEEE Trans. Intell. Transp. Syst. 22(10): 6435-6448 (2021) - [c51]Jipeng Cui, Chungang Yan, Cheng Wang:
Learning Transaction Cohesiveness for Online Payment Fraud Detection. CONF-CDS 2021: 37:1-37:5 - [c50]Jipeng Cui, Chungang Yan, Cheng Wang:
A Credible Individual Behavior Profiling Method for Online Payment Fraud Detection. DSDE 2021: 22-30
2010 – 2019
- 2019
- [j56]Zhenhua Huang, Jinyi Tang, Guangxu Shan, Juan Ni, Yunwen Chen, Cheng Wang:
An Efficient Passenger-Hunting Recommendation Framework With Multitask Deep Learning. IEEE Internet Things J. 6(5): 7713-7721 (2019) - [j55]Zhenhua Huang, Xin Xu, Juan Ni, Honghao Zhu, Cheng Wang:
Multimodal Representation Learning for Recommendation in Internet of Things. IEEE Internet Things J. 6(6): 10675-10685 (2019) - [j54]Cheng Wang, Bo Yang, Jipeng Cui, Chaodong Wang:
Fusing Behavioral Projection Models for Identity Theft Detection in Online Social Networks. IEEE Trans. Comput. Soc. Syst. 6(4): 637-648 (2019) - [j53]Cheng Wang, Zhiyang Xie, Lu Shao, Zhenzhen Zhang, MengChu Zhou:
Estimating Travel Speed of a Road Section Through Sparse Crowdsensing Data. IEEE Trans. Intell. Transp. Syst. 20(9): 3486-3495 (2019) - [j52]Siqian Yang, Cheng Wang, Lei Yang, Changjun Jiang:
iLogBook: Enabling Text-Searchable Event Query Using Sparse Vehicle-Mounted GPS Data. IEEE Trans. Intell. Transp. Syst. 20(12): 4328-4338 (2019) - [j51]Yuan He, Cheng Wang, Changjun Jiang:
Correlated Matrix Factorization for Recommendation with Implicit Feedback. IEEE Trans. Knowl. Data Eng. 31(3): 451-464 (2019) - [c49]Cheng Wang, Hangyu Zhu, Chaodong Wang, Qin Zhao, Bo Zhang:
Transport complexity of data dissemination in large-scale online social networks. ACM TUR-C 2019: 39:1-39:5 - [c48]Chen Jing, Cheng Wang, Chungang Yan:
Thinking Like a Fraudster: Detecting Fraudulent Transactions via Statistical Sequential Features. Financial Cryptography 2019: 588-604 - [c47]Siqian Yang, Cheng Wang, Hongzi Zhu, Changjun Jiang:
APP: Augmented Proactive Perception for Driving Hazards with Sparse GPS Trace. MobiHoc 2019: 21-30 - 2018
- [j50]Siqian Yang, Cheng Wang, Changjun Jiang:
Wireless Vehicular Check-in Protocol at Urban Road Intersection. IEEE Access 6: 19948-19958 (2018) - [j49]Siqian Yang, Cheng Wang, Changjun Jiang:
Centron: Cooperative neighbor discovery in mobile Ad-hoc networks. Comput. Networks 136: 128-136 (2018) - [j48]Cheng Wang, Luomeng Zhang, Zhong Li, Changjun Jiang:
SDCoR: Software Defined Cognitive Routing for Internet of Vehicles. IEEE Internet Things J. 5(5): 3513-3520 (2018) - [j47]Junqi Zhang, Yuheng Wang, Cheng Wang, MengChu Zhou:
Fast Variable Structure Stochastic Automaton for Discovering and Tracking Spatiotemporal Event Patterns. IEEE Trans. Cybern. 48(3): 890-903 (2018) - [j46]Yuan He, Cheng Wang, Changjun Jiang:
Discovering Canonical Correlations between Topical and Topological Information in Document Networks. IEEE Trans. Knowl. Data Eng. 30(3): 460-473 (2018) - [j45]Qin Zhao, Cheng Wang, Pengwei Wang, MengChu Zhou, Changjun Jiang:
A Novel Method on Information Recommendation via Hybrid Similarity. IEEE Trans. Syst. Man Cybern. Syst. 48(3): 448-459 (2018) - [c46]Chen Jing, Cheng Wang, Chungang Yan:
Replay Attack: A Prevalent Pattern of Fraudulent Online Transactions. CSCloud/EdgeCom 2018: 75-82 - [c45]Zheng Tan, Cheng Wang, Mengchu Zhou, Luomeng Zhang:
Private information retrieval in vehicular location-based services. WF-IoT 2018: 56-61 - [i6]Cheng Wang, Bo Yang:
Composite Behavioral Modeling for Identity Theft Detection in Online Social Networks. CoRR abs/1801.06825 (2018) - 2017
- [j44]Yuan He, Cheng Wang, Changjun Jiang:
Mining Coherent Topics With Pre-Learned Interest Knowledge in Twitter. IEEE Access 5: 10515-10525 (2017) - [j43]Yuan He, Cheng Wang, Changjun Jiang:
Modeling Data Correlations in Recommendation. IEEE Access 5: 11030-11042 (2017) - [j42]Zhong Li, Cheng Wang:
Modeling Data Transport Capacity of Mobile Networks for Mobile Social Services. IEEE Access 5: 12143-12157 (2017) - [j41]Lu Shao, Cheng Wang, Lu Liu, Changjun Jiang:
RTS: road topology-based scheme for traffic condition estimation via vehicular crowdsensing. Concurr. Comput. Pract. Exp. 29(3) (2017) - [j40]Zheng Tan, Cheng Wang, Xiaoling Fu, Jipeng Cui, Changjun Jiang, Weili Han:
Re-identification of Vehicular Location-Based Metadata. EAI Endorsed Trans. Security Safety 4(11): e1 (2017) - [j39]Junqi Zhang, Liang Zhang, Cheng Wang, MengChu Zhou:
Approximately Optimal Computing Budget Allocation for Selection of the Best and Worst Designs. IEEE Trans. Autom. Control. 62(7): 3249-3261 (2017) - [j38]Junqi Zhang, Zezhou Li, Cheng Wang, Di Zang, MengChu Zhou:
Approximate Simulation Budget Allocation for Subset Ranking. IEEE Trans. Control. Syst. Technol. 25(1): 358-365 (2017) - [j37]Junqi Zhang, Yuheng Wang, Cheng Wang, MengChu Zhou:
Symmetrical Hierarchical Stochastic Searching on the Line in Informative and Deceptive Environments. IEEE Trans. Cybern. 47(3): 626-635 (2017) - [j36]Xin Wang, Cheng Wang, Junqi Zhang, MengChu Zhou, Changjun Jiang:
Improved Rule Installation for Real-Time Query Service in Software-Defined Internet of Vehicles. IEEE Trans. Intell. Transp. Syst. 18(2): 225-235 (2017) - [j35]Zhong Li, Cheng Wang, Changjun Jiang:
User Association for Load Balancing in Vehicular Networks: An Online Reinforcement Learning Approach. IEEE Trans. Intell. Transp. Syst. 18(8): 2217-2228 (2017) - [j34]Zhong Li, Cheng Wang, Lu Shao, Changjun Jiang, Cheng-Xiang Wang:
Exploiting Traveling Information for Data Forwarding in Community-Characterized Vehicular Networks. IEEE Trans. Veh. Technol. 66(7): 6324-6335 (2017) - [c44]Xiaoling Fu, Zheng Tan, Chungang Yan, Zhong Li, Cheng Wang, Cheng-Xiang Wang:
Your Body Defines Your Fall Detection System: A Somatotype-Based Feature Selection Method. CBD 2017: 402-407 - [c43]Yuan He, Cheng Wang, Changjun Jiang:
Incorporating the Latent Link Categories in Relational Topic Modeling. CIKM 2017: 1877-1886 - [c42]Cheng Wang, Yujuan Fang, Zheng Tan, Yuan He:
Improving the Gain of Visual Perceptual Behaviour on Topic Modeling for Text Recommendation. CIKM 2017: 2339-2342 - [c41]Cheng Wang, Jing Luo, Bo Yang, Changjun Jiang:
On Complementary Effect of Blended Behavioral Analysis for Identity Theft Detection in Mobile Social Networks. MSN 2017: 32-44 - [c40]Yuan He, Cheng Wang, Changjun Jiang:
Multi-perspective Hierarchical Dirichlet Process for Geographical Topic Modeling. PAKDD (1) 2017: 811-823 - [c39]Cheng Wang, Jieren Zhou, Bo Yang:
From Footprint to Friendship: Modeling User Followership in Mobile Social Networks from Check-in Data. SIGIR 2017: 825-828 - [c38]Cheng Wang, Bo Yang, Jing Luo:
Identity Theft Detection in Mobile Social Networks Using Behavioral Semantics. SMARTCOMP 2017: 1-3 - [c37]Yuan He, Cheng Wang, Changjun Jiang:
Modeling Document Networks with Tree-Averaged Copula Regularization. WSDM 2017: 691-699 - 2016
- [j33]Qin Zhao, Cheng Wang, Pengwei Wang:
一种基于社区分类的社交网络用户推荐方法 (Novel Method on Community-based User Recommendation on Social Network). 计算机科学 43(5): 198-203 (2016) - [j32]Junqi Zhang, Cheng Wang, Di Zang, MengChu Zhou:
Incorporation of Optimal Computing Budget Allocation for Ordinal Optimization Into Learning Automata. IEEE Trans Autom. Sci. Eng. 13(2): 1008-1017 (2016) - [j31]Tianci Liu, Yunhao Liu, Lei Yang, Yi Guo, Cheng Wang:
BackPos: High Accuracy Backscatter Positioning System. IEEE Trans. Mob. Comput. 15(3): 586-598 (2016) - [c36]Ningning Li, ChunGang Yan, Xin Wang, Cheng Wang:
Conflict-Aware Network State Updates in SDN. MSN 2016: 214-221 - [c35]Cheng Wang, Zhenzhen Zhang, Jieren Zhou, Yuan He, Jipeng Cui, Changjun Jiang:
Modeling Interest-Driven Data Dissemination in Online Social Networks. MSN 2016: 290-295 - [c34]Zheng Xiao, Cheng Wang, Weili Han, Changjun Jiang:
Unique on the Road: Re-identification of Vehicular Location-Based Metadata. SecureComm 2016: 496-513 - [c33]Nan Guo, Yuan He, ChunGang Yan, Lu Liu, Cheng Wang:
Multi-level topical text categorization with wikipedia. UCC 2016: 343-352 - [c32]Cheng Wang, Zhenzhen Zhang, Lu Shao, MengChu Zhou:
Estimating travel speed via sparse vehicular crowdsensing data. WF-IoT 2016: 643-648 - 2015
- [j30]Zhen Huang, Cheng Wang, Tieying Zhu, Amiya Nayak:
Cascading Failures in Smart Grid: Joint Effect of Load Propagation and Interdependence. IEEE Access 3: 2520-2530 (2015) - [j29]Siqian Yang, Zhong Li, Milica Stojmenovic, Cheng Wang, Changjun Jiang:
ERUPT: A Role-based Neighbor Discovery Protocol for Mobile Social Applications. Ad Hoc Sens. Wirel. Networks 24(3-4): 265-281 (2015) - [j28]Zhen Huang, Cheng Wang, Milos Stojmenovic, Amiya Nayak:
Characterization of Cascading Failures in Interdependent Cyber-Physical Systems. IEEE Trans. Computers 64(8): 2158-2168 (2015) - [j27]Junqi Zhang, Cheng Wang, MengChu Zhou:
Fast and Epsilon-Optimal Discretized Pursuit Learning Automata. IEEE Trans. Cybern. 45(10): 2089-2099 (2015) - [j26]Lei Yang, Yi Guo, Xuan Ding, Jinsong Han, Yunhao Liu, Cheng Wang, Changwei Hu:
Unlocking Smart Phone through Handwaving Biometrics. IEEE Trans. Mob. Comput. 14(5): 1044-1055 (2015) - [j25]Lei Yang, Yi Guo, Tianci Liu, Cheng Wang, Yunhao Liu:
Perceiving the Slightest Tag Motion beyond Localization. IEEE Trans. Mob. Comput. 14(11): 2363-2375 (2015) - [j24]Zhong Li, Cheng Wang, Siqian Yang, Changjun Jiang, Xiang-Yang Li:
LASS: Local-Activity and Social-Similarity Based Data Forwarding in Mobile Social Networks. IEEE Trans. Parallel Distributed Syst. 26(1): 174-184 (2015) - [j23]Cheng Wang, Lu Shao, Zhong Li, Lei Yang, Xiang-Yang Li, Changjun Jiang:
Capacity Scaling of Wireless Social Networks. IEEE Trans. Parallel Distributed Syst. 26(7): 1839-1850 (2015) - [j22]Zhen Huang, Cheng Wang, Amiya Nayak, Ivan Stojmenovic:
Small Cluster in Cyber Physical Systems: Network Topology, Interdependence and Cascading Failures. IEEE Trans. Parallel Distributed Syst. 26(8): 2340-2351 (2015) - [j21]Lei Yang, Yong Qi, Jinsong Han, Cheng Wang, Yunhao Liu:
Shelving Interference and Joint Identification in Large-Scale RFID Systems. IEEE Trans. Parallel Distributed Syst. 26(11): 3149-3159 (2015) - [j20]Zhong Li, Cheng Wang, Siqian Yang, Changjun Jiang, Ivan Stojmenovic:
Space-Crossing: Community-Based Data Forwarding in Mobile Social Networks Under the Hybrid Communication Architecture. IEEE Trans. Wirel. Commun. 14(9): 4720-4727 (2015) - [c31]Junqi Zhang, Cheng Wang, Di Zang, MengChu Zhou:
Incorporation of ordinal optimization into learning automata for high learning efficiency. CASE 2015: 1206-1211 - [c30]Yuan He, Cheng Wang, Changjun Jiang:
Discovering Canonical Correlations between Topical and Topological Information in Document Networks. CIKM 2015: 1281-1290 - [c29]Zhuo Bi, Deji Chen, Cheng Wang, Changjun Jiang, Ming Chen:
Adopting WirelessHART for In-vehicle-Networking. HPCC/CSS/ICESS 2015: 1027-1030 - [c28]Junqi Zhang, Zezhou Li, Cheng Wang, Di Zang, MengChu Zhou:
Approximately Optimal Computing-Budget Allocation for subset ranking. ICRA 2015: 3856-3861 - [c27]Lei Yang, Pai Peng, Fan Dang, Cheng Wang, Xiang-Yang Li, Yunhao Liu:
Anti-counterfeiting via federated RFID tags' fingerprints and geometric relationships. INFOCOM 2015: 1966-1974 - [c26]Lu Shao, Cheng Wang, Zhong Li, Changjun Jiang:
Traffic condition estimation using vehicular crowdsensing data. IPCCC 2015: 1-8 - [c25]Cheng Wang, Jieren Zhou, Tianci Liu, Lu Shao, Huiya Yan:
New tight upper bounds on the capacity for general deterministic dissemination in wireless ad hoc networks. IPCCC 2015: 1-8 - [c24]Yu Fang, Zijiao Zhang, Cheng Wang, Zhong Li, Huiya Yan, Changjun Jiang:
Scaling Laws of Social-Broadcast Capacity for Mobile Ad Hoc Social Networks. MASS 2015: 262-270 - [i5]Xin Wang, Cheng Wang, Changjun Jiang, Lei Yang, Zhong Li, Xiaobo Zhou:
Rule Optimization for Real-Time Query Service in Software-Defined Internet of Vehicles. CoRR abs/1503.05646 (2015) - [i4]Lu Shao, Cheng Wang, Changjun Jiang:
STC: Coarse-Grained Vehicular Data Based Travel Speed Sensing by Leveraging Spatial-Temporal Correlation. CoRR abs/1504.04433 (2015) - [i3]Cheng Wang, Jieren Zhou, Tianci Liu, Lu Shao, Huiya Yan, Xiang-Yang Li, Changjun Jiang:
General Capacity for Deterministic Dissemination in Wireless Ad Hoc Networks. CoRR abs/1504.04510 (2015) - 2014
- [j19]Haottian Li, Ahmed Barnawi, Ivan Stojmenovic, Cheng Wang:
Market-Based Sensor Relocation by Robot Team in Wireless Sensor Networks. Ad Hoc Sens. Wirel. Networks 22(3-4): 259-280 (2014) - [j18]Cheng Wang, Changjun Jiang, Yunhao Liu, Xiang-Yang Li, Shaojie Tang:
Aggregation Capacity of Wireless Sensor Networks: Extended Network Case. IEEE Trans. Computers 63(6): 1351-1364 (2014) - [j17]Junqi Zhang, Cheng Wang, MengChu Zhou:
Last-Position Elimination-Based Learning Automata. IEEE Trans. Cybern. 44(12): 2484-2492 (2014) - [j16]Cheng Wang, Xiang-Yang Li, Changjun Jiang, Huiya Yan:
The Impact of Rate Adaptation on Capacity-Delay Tradeoffs in Mobile Ad Hoc Networks. IEEE Trans. Mob. Comput. 13(11): 2661-2674 (2014) - [j15]Shaojie Tang, Jing Yuan, Cheng Wang, Xiang-Yang Li:
A Framework for Amazon EC2 Bidding Strategy under SLA Constraints. IEEE Trans. Parallel Distributed Syst. 25(1): 2-11 (2014) - [c23]Zhong Li, Cheng Wang, Siqian Yang, Changjun Jiang, Ivan Stojmenovic:
Improving data forwarding in Mobile Social Networks with infrastructure support: A space-crossing community approach. INFOCOM 2014: 1941-1949 - [c22]Cheng Wang, Shaojie Tang, Lei Yang, Yi Guo, Fan Li, Changjun Jiang:
Modeling data dissemination in online social networks: a geographical perspective on bounding network traffic load. MobiHoc 2014: 53-62 - [c21]Wei Gong, Yunhao Liu, Amiya Nayak, Cheng Wang:
Wise counting: fast and efficient batch authentication for large-scale RFID systems. MobiHoc 2014: 347-356 - 2013
- [j14]Zhong Li, Cheng Wang, Changjun Jiang, Xiang-Yang Li:
Multicast capacity scaling for inhomogeneous mobile ad hoc networks. Ad Hoc Networks 11(1): 29-38 (2013) - [j13]Zhen Huang, Cheng Wang, Milos Stojmenovic, Amiya Nayak:
Balancing System Survivability and Cost of Smart Grid Via Modeling Cascading Failures. IEEE Trans. Emerg. Top. Comput. 1(1): 45-56 (2013) - [j12]Cheng Wang, Changjun Jiang, Shaojie Tang, Xiang-Yang Li:
Scaling Laws of Cognitive Ad Hoc Networks over General Primary Network Models. IEEE Trans. Parallel Distributed Syst. 24(5): 1030-1041 (2013) - [j11]Cheng Wang, Changjun Jiang, Xiang-Yang Li, Yunhao Liu:
Asymptotic throughput for large-scale wireless networks with general node density. Wirel. Networks 19(5): 559-575 (2013) - [c20]Shaojie Tang, Jing Yuan, Xiang-Yang Li, Yu Wang, Cheng Wang, Xuefeng Liu:
MINT: maximizing information propagation in predictable delay-tolerant network. MobiHoc 2013: 253-256 - [i2]Cheng Wang, Xiang-Yang Li, Changjun Jiang:
Modelling Capacity Scaling of Wireless Social Networks by A Population-Based Social Formation Model. CoRR abs/1304.6459 (2013) - [i1]Zhong Li, Cheng Wang, Siqian Yang, Changjun Jiang, Ivan Stojmenovic:
Improving Data Forwarding in Mobile Social Networks with Infrastructure Support: A Space-Crossing Community Approach. CoRR abs/1307.7326 (2013) - 2012
- [j10]Cheng Wang, Changjun Jiang, Xiang-Yang Li, Shaojie Tang, Yuan He, XuFei Mao, Yunhao Liu:
Scaling Laws of Multicast Capacity for Power-Constrained Wireless Networks under Gaussian Channel Model. IEEE Trans. Computers 61(5): 713-725 (2012) - [j9]Cheng Wang, Shaojie Tang, Xiang-Yang Li, Changjun Jiang:
Multicast Capacity Scaling Laws for Multihop Cognitive Networks. IEEE Trans. Mob. Comput. 11(11): 1627-1639 (2012) - [j8]Cheng Wang, Changjun Jiang, Shaojie Tang, Xiang-Yang Li:
SelectCast: Scalable Data Aggregation Scheme in Wireless Sensor Networks. IEEE Trans. Parallel Distributed Syst. 23(10): 1958-1969 (2012) - [c19]Shaojie Tang, Jie Wu, Guihai Chen, Cheng Wang, Xuefeng Liu, Tao Li, Xiang-Yang Li:
On minimum delay duty-cycling protocol in sustainable sensor network. ICNP 2012: 1-9 - [c18]Cheng Wang, Xiang-Yang Li, Shaojie Tang, Changjun Jiang:
Capacity and delay tradeoffs in mobile networks under Gaussian channel model. MASS 2012: 272-280 - 2011
- [j7]Cheng Wang, Changjun Jiang, Xiang-Yang Li, Yunhao Liu:
On multicast throughput scaling of hybrid wireless networks with general node density. Comput. Networks 55(15): 3548-3561 (2011) - [j6]Cheng Wang, Xiang-Yang Li, Changjun Jiang, Shaojie Tang, Yunhao Liu:
Multicast Throughput for Hybrid Wireless Networks under Gaussian Channel Model. IEEE Trans. Mob. Comput. 10(6): 839-852 (2011) - [j5]Shaojie Tang, Xiang-Yang Li, XuFei Mao, Cheng Wang:
Impact of deployment size on the asymptotic capacity for wireless ad hoc networks under Gaussian channel model. Wirel. Networks 17(4): 817-832 (2011) - [c17]Cheng Wang, Shaojie Tang, Xiang-Yang Li, Changjun Jiang:
SelectCast: Scalable data aggregation scheme in wireless sensor networks. INFOCOM 2011: 296-300 - [c16]Cheng Wang, Changjun Jiang, Xiang-Yang Li, Shaojie Tang, Panlong Yang:
General capacity scaling of wireless networks. INFOCOM 2011: 712-720 - [c15]Cheng Wang, Changjun Jiang, Yunhao Liu, Xiang-Yang Li, Shaojie Tang, Huadong Ma:
Aggregation capacity of wireless sensor networks: Extended network case. INFOCOM 2011: 1701-1709 - [c14]Lei Yang, Jinsong Han, Yong Qi, Cheng Wang, Tao Gu, Yunhao Liu:
Season: Shelving interference and joint identification in large-scale RFID systems. INFOCOM 2011: 3092-3100 - [c13]Shaojie Tang, Cheng Wang, Xiang-Yang Li, Changjun Jiang:
Reader Activation Scheduling in Multi-reader RFID Systems: A Study of General Case. IPDPS 2011: 1147-1155 - [c12]Shaojie Tang, Xiang-Yang Li, Haitao Zhang, Jiankang Han, Guojun Dai, Cheng Wang, Xingfa Shen:
TelosCAM: Identifying Burglar through Networked Sensor-Camera Mates with Privacy Protection. RTSS 2011: 327-336 - [c11]Jing Yuan, Shaojie Tang, Cheng Wang, Debraj De, Xiang-Yang Li, Wen-Zhan Song, Guihai Chen:
A real-time rescue system: Towards practical implementation of robotic sensor network. SECON 2011: 458-466 - 2010
- [j4]Cheng Wang, Changjun Jiang, Xiang-Yang Li, Jiujun Cheng:
Improved asymptotic multicast throughput for random extended networks. Comput. Commun. 33(18): 2195-2202 (2010) - [j3]Cheng Wang, Xiang-Yang Li, Shaojie Tang, Changjun Jiang, Yunhao Liu:
Capacity and delay in mobile ad hoc networks under Gaussian channel model. ACM SIGMOBILE Mob. Comput. Commun. Rev. 14(3): 22-24 (2010) - [j2]Shu Li, Yongfa Hong, Changjun Jiang, Cheng Wang:
Multicast capacity and delay trade-offs in ad hoc networks with random iid mobility model. Wirel. Commun. Mob. Comput. 10(3): 349-360 (2010) - [j1]Cheng Wang, Changjun Jiang, Xiang-Yang Li, Yunhao Liu:
Multicast throughput for large scale cognitive networks. Wirel. Networks 16(7): 1945-1960 (2010) - [c10]Lei Yang, Jinsong Han, Yong Qi, Cheng Wang, Zhuo Li, Qingsong Yao, Ying Chen, Xiao Zhong:
Utilizing RF Interference to Enable Private Estimation in RFID Systems. ICPADS 2010: 83-90 - [c9]Lei Yang, Jinsong Han, Yong Qi, Cheng Wang, Yunhao Liu, Ying Chen, Xiao Zhong:
Revisting Tag Collision Problem in RFID Systems. ICPP 2010: 178-187 - [c8]Shaojie Tang, Xiang-Yang Li, Jing Yuan, Cheng Wang, Guihai Chen, Changjun Jiang:
DREAM: On the reaction delay in large scale wireless networks with mobile sensors. IWQoS 2010: 1-9 - [c7]Cheng Wang, Xiang-Yang Li, Shaojie Tang, Changjun Jiang:
Multicast capacity scaling for cognitive networks: General extended primary network. MASS 2010: 262-271 - [c6]Yuanfang Chen, Shaojie Tang, Xiang-Yang Li, Min Gyung Kwak, Cheng Wang, Lei Wang:
SFL: Energy-Aware Spline Function Localization Scheme for Wireless Sensor Networks. MSN 2010: 116-121
2000 – 2009
- 2009
- [c5]Cheng Wang, Shaojie Tang, Xiang-Yang Li, Changjun Jiang, Yunhao Liu:
Multicast Throughput of Hybrid Wireless Networks Under Gaussian Channel Model. ICDCS 2009: 111-118 - [c4]Cheng Wang, Xiang-Yang Li, Changjun Jiang, Shaojie Tang, Yunhao Liu, Jizhong Zhao:
Scaling Laws on Multicast Capacity of Large Scale Wireless Networks. INFOCOM 2009: 1863-1871 - [c3]Cheng Wang, Shaojie Tang, Xiang-Yang Li, Changjun Jiang:
Multicast Capacity of Multihop Cognitive Networks. MASS 2009: 274-283 - [c2]Shaojie Tang, Xiang-Yang Li, Cheng Wang, Ping Xu:
Multicast capacity for multi-hop multi-channel multi-radio wireless networks. MSWiM 2009: 82-89 - [c1]Cheng Wang, Changjun Jiang, Shaojie Tang, Xiang-Yang Li, Xianfei Tang:
Achievable multicast throughput for homogeneous wireless ad hoc networks. WCNC 2009: 2133-2138
Coauthor Index
aka: Mengchu Zhou
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-23 19:34 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint