Ming-Hung Wang
Feng Chia University
H-index: 5
Asia-Taiwan
Top articles of Ming-Hung Wang
Title | Journal | Author(s) | Publication Date |
---|---|---|---|
An SDN-Driven Reliable Transmission Architecture for Enhancing Real-Time Video Streaming Quality | IEEE MultiMedia | Ming-Hung Wang Ting-Shen Hsieh Yu-Yao Tseng Po-Wen Chi | 2023/10/24 |
A Revocation Key-based Approach Towards Efficient Federated Unlearning | Rui-Zhen Xu Sheng-Yi Hong Po-Wen Chi Ming-Hung Wang | 2023/8/15 | |
CrowdDC: Ranking From Crowdsourced Paired Comparison With Divide-and-Conquer | IEEE Transactions on Computational Social Systems | Ming-Hung Wang Chia-Yuan Zhang Jia-Ru Song | 2023/8/1 |
Characterizing Behaviors of Sockpuppets in Online Political Discourses | Journal of Information Science & Engineering | HSIU-LING CHU YU-CHEN DAI WEI-BIN LEE TING-SHEN HSIEH MING-HUNG WANG | 2023/5/1 |
From 5-Stars to Real Insight: Geospatial Detection of Campaigned Reviews with Google Maps and Mobility Data | Ying-Zhe Hung Ming-Hung Wang Pao-Ann Hsiung | 2023/12/1 | |
Analyzing image-based political propaganda in referendum campaigns: from elements to strategies | EPJ Data Science | Ming-Hung Wang Wei-Yang Chang Kuan-Hung Kuo Kuo-Yu Tsai | 2023/12/1 |
SandboxNet: A Learning-Based Malicious Application Detection Framework in SDN Networks. | Journal of Information Science & Engineering | Po-Wen Chi Yu Zheng Wei-Yang Chang Ming-Hung Wang | 2022/11/1 |
初探非同質化代幣-機制與市場 | 資訊安全通訊 | 鄭睿中, 王銘宏 | 2022/8/1 |
A LWE-Based Receiver-Deniable Encryption Scheme | Po-Wen Chi Ming-Hung Wang Yun-Hsin Chuang | 2022/11/30 | |
Positioning and Categorizing Mass Media Using Reaction Emojis on Facebook | The Computer Journal | Ming-Hung Wang | 2021/3 |
The evolution of rumors on a closed social networking platform during COVID-19: algorithm development and content study | JMIR Medical Informatics | Andrea W Wang Jo-Yu Lan Ming-Hung Wang Chihhao Yu | 2021/11/23 |
Learning to recognize sockpuppets in online political discussions | IEEE Systems Journal | Nhut-Lam Nguyen Ming-Hung Wang Chyi-Ren Dow | 2021/11/4 |
Deniable search of encrypted cloud-storage data | Journal of Information Security and Applications | Po-Wen Chi Ming-Hung Wang | 2021/5/1 |
Understanding malicious accounts in online political discussions: A multilayer network approach | Sensors | Nhut-Lam Nguyen Ming-Hung Wang Yu-Chen Dai Chyi-Ren Dow | 2021/3/20 |
SmileJob: A Lightweight Personalized Accompanying System for Home Security | Pin-Yu Lin Yow-Shin Liou Jian-Xing Li Joon-Kui Liew Po-Wen Chi | 2020 | |
SandboxNet: An Online Malicious SDN Application Detection Framework for SDN Networking | Po-Wen Chi Ming-Hung Wang Yu Zheng | 2020/12/17 | |
POSTER: How Do Suspicious Accounts Participate in Online Political Discussions? A Preliminary Study in Taiwan | Ming-Hung Wang Yu-Chen Dai | 2020/10/5 | |
How to hide the real receiver under the cover receiver: Cp-abe with policy deniability | IEEE Access | Po-Wen Chi Ming-Hung Wang Hung-Jr Shiu | 2020/5/11 |
Understanding potential cyber-armies in elections: a study of Taiwan | Sustainability | Ming-Hung Wang Nhut-Lam Nguyen Shih-chan Dai Po-Wen Chi Chyi-Ren Dow | 2020/3/13 |