default search action
Ming-Hung Wang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j18]Ming-Hung Wang, Ting-Shen Hsieh, Yu-Yao Tseng, Po-Wen Chi:
A Software-Defined Networking-Driven Reliable Transmission Architecture for Enhancing Real-Time Video Streaming Quality. IEEE Multim. 31(1): 54-64 (2024) - [j17]Ming-Hung Wang, Chia-Yuan Zhang, Jia-Ru Song:
CrowdDC: Ranking From Crowdsourced Paired Comparison With Divide-and-Conquer. IEEE Trans. Comput. Soc. Syst. 11(2): 3015-3021 (2024) - [c30]Yun-Hsin Chuang, Po-Wen Chi, Ming-Hung Wang:
CCADM: A Continuous Collection Scheme for Anonymous Data Management. AsiaJCIS 2024: 69-74 - [c29]Wen-Shiang Li, Yao-Cheng Lu, Wen-Kai Hsiao, Yu-Yao Tseng, Ming-Hung Wang:
DRM-SN: Detecting Reused Multimedia Content on Social Networks. MIPR 2024: 169-175 - [c28]Kuan-Hung Kuo, Ming-Hung Wang, Hung-Yu Kao, Yu-Chen Dai:
Advancing Stance Detection of Political Fan Pages: A Multimodal Approach. WWW (Companion Volume) 2024: 702-705 - 2023
- [j16]Ming-Hung Wang, Wei-Yang Chang, Kuan-Hung Kuo, Kuo-Yu Tsai:
Analyzing image-based political propaganda in referendum campaigns: from elements to strategies. EPJ Data Sci. 12(1): 29 (2023) - [j15]Hsiu-Ling Chu, Yu-Chen Dai, Wei-Bin Lee, Ting-Shen Hsieh, Ming-Hung Wang:
Characterizing Behaviors of Sockpuppets in Online Political Discourses. J. Inf. Sci. Eng. 39(3): 489-506 (2023) - [c27]Rui-Zhen Xu, Sheng-Yi Hong, Po-Wen Chi, Ming-Hung Wang:
A Revocation Key-based Approach Towards Efficient Federated Unlearning. AsiaJCIS 2023: 17-24 - [c26]Sumeet Gupta, Shweta Jain, Shashi Shekhar Jha, Pao-Ann Hsiung, Ming-Hung Wang:
Take Expert Advice Judiciously: Combining Groupwise Calibrated Model Probabilities with Expert Predictions. ECAI 2023: 956-963 - [c25]Ying-Zhe Hung, Ming-Hung Wang, Pao-Ann Hsiung:
From 5-Stars to Real Insight: Geospatial Detection of Campaigned Reviews with Google Maps and Mobility Data. TAAI (2) 2023: 68-80 - [i4]Ming-Hung Wang, Chia-Yuan Zhang, Jia-Ru Song:
CrowDC: A Divide-and-Conquer Approach for Paired Comparisons in Crowdsourcing. CoRR abs/2302.11722 (2023) - 2022
- [j14]Po-Wen Chi, Yu Zheng, Wei-Yang Chang, Ming-Hung Wang:
SandboxNet: A Learning-Based Malicious Application Detection Framework in SDN Networks. J. Inf. Sci. Eng. 38(6): 1189-1211 (2022) - [j13]Nhut-Lam Nguyen, Ming-Hung Wang, Chyi-Ren Dow:
Learning to Recognize Sockpuppets in Online Political Discussions. IEEE Syst. J. 16(2): 1873-1884 (2022) - [c24]Ling-Yen Song, Tung-Chieh Kuo, Ming-Hung Wang, Chien-Nan Jimmy Liu, Juinn-Dar Huang:
Fast Variation-aware Circuit Sizing Approach for Analog Design with ML-Assisted Evolutionary Algorithm. ASP-DAC 2022: 80-85 - [i3]Ming-Hung Wang, Wei-Yang Chang, Kuan-Hung Kuo, Kuo-Yu Tsai:
Analyzing Image-based Political Propaganda in Referendum Campaigns: From Elements to Strategies. CoRR abs/2205.13154 (2022) - 2021
- [j12]Ming-Hung Wang:
Positioning and Categorizing Mass Media Using Reaction Emojis on Facebook. Comput. J. 64(3): 451-461 (2021) - [j11]Yi-Bing Lin, Chien-Chao Tseng, Ming-Hung Wang:
Effects of Transport Network Slicing on 5G Applications. Future Internet 13(3): 69 (2021) - [j10]Po-Wen Chi, Ming-Hung Wang:
Deniable search of encrypted cloud-storage data. J. Inf. Secur. Appl. 58: 102806 (2021) - [j9]Nhut-Lam Nguyen, Ming-Hung Wang, Yu-Chen Dai, Chyi-Ren Dow:
Understanding Malicious Accounts in Online Political Discussions: A Multilayer Network Approach. Sensors 21(6): 2183 (2021) - [i2]Andrea W. Wang, Jo-Yu Lan, Chihhao Yu, Ming-Hung Wang:
The Evolution of Rumors on a Closed Platform during COVID-19. CoRR abs/2104.13816 (2021) - 2020
- [j8]Po-Wen Chi, Ming-Hung Wang, Hung-Jr Shiu:
How to Hide the Real Receiver Under the Cover Receiver: CP-ABE With Policy Deniability. IEEE Access 8: 89866-89881 (2020) - [c23]Ming-Hung Wang, Yu-Chen Dai:
POSTER: How Do Suspicious Accounts Participate in Online Political Discussions? A Preliminary Study in Taiwan. AsiaCCS 2020: 886-888 - [c22]Po-Wen Chi, Ming-Hung Wang, Yu Zheng:
SandboxNet: An Online Malicious SDN Application Detection Framework for SDN Networking. ICS 2020: 397-402
2010 – 2019
- 2019
- [j7]Ming-Hung Wang, Po-Wen Chi:
Blurring Political Leanings of Messages on Social Networks Using Deniable Steganography. IEEE Access 7: 87692-87703 (2019) - [j6]Po-Wen Chi, Ming-Hung Wang, Jing-Wei Guo, Chin-Laung Lei:
MigrateSDN: efficient approach to integrate OpenFlow networks with STP-enabled networks. Int. J. Comput. Sci. Eng. 20(4): 480-491 (2019) - [j5]Po-Wen Chi, Ming-Hung Wang:
Privacy-Preserving Broker-ABE Scheme for Multiple Cloud-Assisted Cyber Physical Systems. Sensors 19(24): 5463 (2019) - [c21]Ming-Hung Wang:
Understanding Mass Media Using Facebook Like Activities. TTO 2019 - 2018
- [j4]Ming-Hung Wang, Chin-Laung Lei:
SocialDNA: A Novel Approach for Distinguishing Notable Articles and Authors through Social Events. J. Inf. Sci. Eng. 34(6): 1579-1598 (2018) - [c20]Ming-Hung Wang, Nhut-Lam Nguyen, Chyi-Ren Dow:
Detecting Potential Cyber Armies of Election Campaigns Based on Behavioral Analysis. COMPLEX NETWORKS (2) 2018: 437-446 - [c19]Po-Wen Chi, Ming-Hung Wang:
A Lightweight Compound Defense Framework Against Injection Attacks in IIoT. DSC 2018: 1-8 - [c18]Ming-Hung Wang, Meng-Han Tsai, Wei-Chieh Yang, Chin-Laung Lei:
Infection categorization using deep autoencoder. INFOCOM Workshops 2018: 1-2 - [c17]Po-Wen Chi, Ming-Hung Wang:
Dynamic Key Management Scheme in IoT. ICS 2018: 559-566 - [c16]Meng-Han Tsai, Ming-Hung Wang, Wei-Chieh Yang, Chin-Laung Lei:
Uncovering Internal Threats Based on Open-Source Intelligence. ICS 2018: 618-624 - [c15]Li-Hsing Yen, Ming-Hung Wang, Song-Yu Wu, Chien-Chao Tseng:
PIM-compliant SDN-enabled IP multicast service. NOMS 2018: 1-4 - 2017
- [j3]Ming-Hung Wang, Lung-Wen Chen, Po-Wen Chi, Chin-Laung Lei:
SDUDP: A Reliable UDP-Based Transmission Protocol Over SDN. IEEE Access 5: 5904-5916 (2017) - [j2]Ming-Hung Wang, Alex Chuan-Hsien Chang, Kuan-Ta Chen, Chin-Laung Lei:
Estimating Ideological Scores of Facebook Pages: An Empirical Study in Taiwan. Comput. J. 60(11): 1675-1686 (2017) - [j1]Ming-Hung Wang, Hanchi Wang, You-Ru Chen, Chin-Laung Lei:
Automatic Test Pattern Generator for Fuzzing Based on Finite State Machine. Secur. Commun. Networks 2017: 7819590:1-7819590:11 (2017) - [c14]Tah-Kang Joseph Ting, Gyh-Bin Wang, Ming-Hung Wang, Chun-Peng Wu, Chun-Kai Wang, Chun-Wei Lo, Li-Chin Tien, Der-Min Yuan, Yung-Ching Hsieh, Jenn-Shiang Lai, Wen-Pin Hsu, Chien-Chih Huang, Chi-Kang Chen, Yung-Fa Chou, Ding-Ming Kwai, Zhe Wang, Wei Wu, Shigeki Tomishima, Patrick Stolt, Shih-Lien Lu:
23.9 An 8-channel 4.5Gb 180GB/s 18ns-row-latency RAM for the last level cache. ISSCC 2017: 404-405 - 2016
- [c13]Po-Wen Chi, Ming-Hung Wang, Che-Wei Lin, Jing-Wei Guo, Chin-Laung Lei, Nen-Fu Huang:
SDNort: A Software Defined Network Testing Framework Using Openflow. AsiaJCIS 2016: 100-107 - [c12]Ming-Hung Wang, Chin-Laung Lei:
Boosting election prediction accuracy by crowd wisdom on social forums. CCNC 2016: 348-353 - [c11]Ming-Hung Wang, Shao-You Wu, Li-Hsing Yen, Chien-Chao Tseng:
PathMon: Path-specific traffic monitoring in OpenFlow-enabled networks. ICUFN 2016: 775-780 - [c10]Ming-Hung Wang, Po-Wen Chi, Jing-Wei Guo, Chin-Laung Lei:
SDN storage: A stream-based storage system over software-defined networks. INFOCOM Workshops 2016: 598-599 - 2015
- [c9]Ming-Hung Wang, Chin-Laung Lei:
Modelling Polarity of Articles and Identifying Influential Authors through Social Movements. SMC 2015: 1664-1669 - 2014
- [c8]Ming-Hung Wang, Chia-Ming Yu, Chia-Liang Lin, Chien-Chao Tseng, Li-Hsing Yen:
KPAT: A kernel and protocol analysis tool for embedded networking devices. ICC 2014: 1160-1165 - [c7]Ming-Hung Wang, Chin-Laung Lei:
Forecasting the Impacts of Articles and Authors on the Social Forum during Emergencies. ICS 2014: 335-344 - [c6]Ming-Hung Wang, Chien-Chao Tseng:
Personalized Smart TV System Developed Using a Service Composition Platform. MoMM 2014: 396-400 - 2013
- [c5]Ming-Hung Wang, Kuan-Ta Chen, Shuo-Yang Wang, Chin-Laung Lei:
Understanding Potential MicrotaskWorkers for Paid Crowdsourcing. HCOMP (Works in Progress / Demos) 2013 - [c4]Shuo-Yang Wang, Ming-Hung Wang, Kuan-Ta Chen:
Boosting OCR Accuracy Using Crowdsourcing. HCOMP (Works in Progress / Demos) 2013 - [i1]Shan-Hung Wu, Man-Ju Chou, Ming-Hung Wang, Chun-Hsiung Tseng, Yuh-Jye Lee, Kuan-Ta Chen:
Is Somebody Watching Your Facebook Newsfeed? CoRR abs/1308.5168 (2013) - 2011
- [c3]Nen-Fu Huang, Tzu-Chien Wang, Ming-Hung Wang, Shiu-Shun Peng:
ARMS: An agent-based real-time monitoring system for large scale P2P video streaming platforms. APCC 2011: 405-410 - [c2]Shao-Yu Wu, Ming-Hung Wang, Kuan-Ta Chen:
Privacy Crisis Due to Crisis Response on the Web. TrustCom 2011: 197-205
2000 – 2009
- 2009
- [c1]Meng-Hsiun Tsai, Ming-Hung Wang, Ting-Yuan Chang, Pei-Yan Pai, Yung-Kuan Chan:
An Adaptable Threshold Decision Method. IAS 2009: 45-48
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-08 20:34 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint