Xu Wang

ORCID: 0000-0003-4950-6013
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Recommender Systems and Techniques
  • Blockchain Technology Applications and Security
  • Educational Technology and Assessment
  • Caching and Content Delivery
  • Network Security and Intrusion Detection
  • Service-Oriented Architecture and Web Services
  • Information and Cyber Security
  • Peer-to-Peer Network Technologies
  • Semantic Web and Ontologies
  • Advanced Decision-Making Techniques
  • Cloud Data Security Solutions
  • Advanced Graph Neural Networks
  • Big Data and Digital Economy
  • Advanced Malware Detection Techniques
  • Innovative Educational Techniques
  • Innovative Microfluidic and Catalytic Techniques Innovation
  • Technology and Security Systems
  • Physical Unclonable Functions (PUFs) and Hardware Security
  • Mental Health via Writing
  • Cryptography and Data Security
  • Cognitive Computing and Networks
  • IoT and Edge/Fog Computing
  • Advanced Computational Techniques and Applications
  • Complex Network Analysis Techniques
  • Educational Reforms and Innovations

Tencent (China)
2022

Beijing Research Institute of Mechanical and Electrical Technology
2022

Xinjiang New Energy Research Institute (China)
2021

Wuhan University
2020

Xi'an University of Technology
2019

Inner Mongolia Electric Power (China)
2017

Shanghai University of Engineering Science
2015

University of Chinese Academy of Sciences
2012

Now more and data are being outsourced to cloud services. In order ensure security privacy, usually stored on the server in form of ciphertext. When a user requests access encrypted data, an key distributed by third party is needed. However, if dishonest, system will be threatened. Faced with this problem, paper, we propose new secure storage framework control using Ethereum blockchain technology. Our scheme combination ciphertext-policy attribute-based encryption (CP-ABE). The proposed...

10.1109/access.2019.2929205 article EN cc-by IEEE Access 2019-01-01

There have been many studies on improving the efficiency of shared learning in Multi-Task Learning (MTL). Previous works focused "micro" sharing perspective for a small number tasks, while Recommender Systems (RS) and other AI applications, we often need to model large tasks. For example, when using MTL various user behaviors RS, if differentiate new users items from old ones, tasks will increase exponentially with multidimensional relations. This work proposes Multi-Faceted Hierarchical...

10.1145/3511808.3557140 article EN Proceedings of the 31st ACM International Conference on Information & Knowledge Management 2022-10-16

Industrial network of the next generation are expected to have augmented capabilities and intelligence within information-centric paradigm supports. In this paper, a 7-level protocol is devised with service-oriented architecture 3-tier hierarchical model. Large-scale decentralized resources abstracted into virtual physical devices first as primary service provider. Knowledge services defined formulated using ontology models in modeling layer. Context awareness used align attributes intensify...

10.1109/ccis.2012.6664557 article EN 2012-10-01

Event ontology is a new paradigm for describing event-based knowledge in web, including action, time, place and objects event. But it lacks unified language description of event classes or individuals. Simple Knowledge Organization System (SKOS) common data model sharing linking organization systems via the Web. This paper proposes an framework based on SKOS. In this framework, SKOS used to link current ontologies vocabularies four key elements. As well, increases reusability ontology.

10.1109/uic-atc-scalcom-cbdcom-iop.2015.322 article EN 2015-08-01

With the wide application of embedded devices, security problems caused by malware intrusion into systems are increasing. Existing detection models difficult to be deployed a variety resource-constrained devices. Undetectable can cause devices malfunction and potentially spread other causing massive device failures. We propose TPM-based remote auditing scheme for software, aiming at problem that existing on systems. This paper analyzes threats faced system schemes raised objectives. use...

10.1109/bigdatasecurityhpscids54978.2022.00021 article EN 2022-05-01

In order to cope with the issues that physical hardware conditions and virtualized technical restrictions, Information Security Laboratory, Electric Power Research Institute, State Gird Xinjiang Company, where adopts virtualization cloud technologies as well uses python openstack build out a fire-new, heterogeneous real-time virtual (NHRVC), reproducing vulnerability attack its processes in application systems for showing network security technology platform. The platform three equipments...

10.1109/itnec.2017.8285007 article EN 2017 IEEE 2nd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC) 2017-12-01

In certain Blockchain systems, multiple Blockchains are required to operate cooperatively for security, performance, and capacity considerations. This invention defines a cross-chain mechanism where main issues the tokens, which can then be transferred used in side drive their operations. A set of witnesses created securely manage token exchange across chain chains. The system decouples consensus algorithms between We also discuss coexistence tokens native

10.48550/arxiv.2208.05125 preprint EN cc-by arXiv (Cornell University) 2022-01-01

Self-supervised learning (SSL) recently has achieved outstanding success on recommendation. By setting up an auxiliary task (either predictive or contrastive), SSL can discover supervisory signals from the raw data without human annotation, which greatly mitigates problem of sparse user-item interactions. However, most SSL-based recommendation models rely general-purpose tasks, e.g., maximizing correspondence between node representations learned original and perturbed interaction graphs, are...

10.48550/arxiv.2203.03982 preprint EN other-oa arXiv (Cornell University) 2022-01-01

There has been many studies on improving the efficiency of shared learning in Multi-Task Learning(MTL). Previous work focused "micro" sharing perspective for a small number tasks, while Recommender Systems(RS) and other AI applications, there are often demands to model large tasks with multi-dimensional task relations. For example, when using MTL various user behaviors RS, if we differentiate new users items from old ones, will be cartesian product style increase This "macro" network design...

10.48550/arxiv.2110.13365 preprint EN cc-by-nc-nd arXiv (Cornell University) 2021-01-01

Nowadays,a lot of work has been done on network security protection. Only by fully identifying risks can effective measures be taken. However, a large number continuous operation protection equipment produces huge amount alarm, which makes it difficult for administrators to understand the threat status system in face alarm information, and not take appropriate response timely manner. integrate multi-dimensional linkage multi-type defense means measures. Therefore, studying mechanism, this...

10.1109/iciba52610.2021.9688280 article EN 2021 IEEE 2nd International Conference on Information Technology, Big Data and Artificial Intelligence (ICIBA) 2021-12-17
Coming Soon ...