WANG Ke
Address:
C202,HIT Campus, Shenzhen University Town, Xili District, Shenzhen (518055)
Email:
wk_hit@hit.edu.cn
Phone:
PERSONAL PROFILE
 
RESEARCH INTEREST
 
Deep Learning, Data Mining, Machine Learning, Social Computing, Block Chain.
EDUCATION  
2005.09-2009.08
The Unviersity of Hong Kong, Phd
2001.09-2003.12
Shanghai Jiaotong University, Master
1997.09-2001.08
National University of Science and Technolgy, Bachelor
RESEARCH & WORK EXPERIENCE  
2007.01-2007.09
France, INRIA, Research Visit
2004.01-2005.09
Hunan University, Lecturer
PROFESSIONAL QUALIFICATION & ACADEMIC SERVICE
 
2009.10-2013.03
CCF Shenzhen
RESEARCH PROJECTS
2012.01-2014.12
National Science Fundation of China, Indirect Privacy Protection Scheme for Context-aware Mobile Social Networks
RESEARCH ACHIEVEMENT & AWARDS
2014-
Oversea High Level C
PATENT
   
PAPER & BOOK PUBLICATIONS
[1].Eric Ke Wang, Yueping Li, Yunming Ye, Siu-Ming Yiu, Lucas C. K. Hui:
A Dynamic Trust Framework for Opportunistic Mobile Social Networks. IEEE Trans. Network and Service Management 15(1): 319-329 (2018).(SCI)
[2] Xutao Li, Michael K. Ng, Yunming Ye, Eric Ke Wang, Xiaofei Xu:
Block linear discriminant analysis for visual tensor objects with frequency or time information. J. Visual Communication and Image Representation 49: 38-46 (2017).(SCI)
[3]Shaokai Wang, Eric Ke Wang, Xutao Li, Yunming Ye, Raymond Y. K. Lau, Xiaolin Du:
Multi-view learning via multiple graph regularized generative model. Knowl.-Based Syst. 121: 153-162 (2017).(SCI)
[4]Jingxuan Wang, Lucas Chi Kwong Hui, Siu-Ming Yiu, Eric Ke Wang, Jun-bin Fang:A survey on cyber attacks against nonlinear state estimation in power systems of ubiquitous cities. Pervasive and Mobile Computing 39: 52-64 (2017) (SCI)
[5]Eric Ke Wang*, Yunming Ye, and Xiao F. Xu,“LDGKA: Location-based Distributed Group Key Agreement Scheme for Vehicular Ad Hoc Network”, International Journal of Distributed Sensor Networks, Vol. 2014, No. 759601, 8 pages, 2014. (SCI)
[6] Eric Ke Wang*, Yunming Ye, Xu X. Lightweight Secure Directed Diffusion for Wireless Sensor Networks[J]. International Journal of Distributed Sensor Networks, Volume 2014, Article ID 415143,2014.(SCI)
[7]Eric Ke Wang*, Yunming Ye, A New Privacy-Preserving Scheme for Continuous Query in Location-Based Social Networking Services[J]. International Journal of Distributed Sensor Networks, Volume 2014, Article ID 979201,2014. (SCI)
[8]. Zhujin Zhang, Jiuyong Li,Linqiang Pan, Yunming Ye, Xiangxiang Zeng, Tao Song,Xiaofeng Zhang, Eric Ke Wang* , A Novel Visualization of DNA Sequences,Reflecting GC-Content , MATCH Communications in Mathematical and in Computer Chemistry,issue 72,pp.533-550,2014.(SCI).
CONFERENCE PAPERS/TALKS
 
[1].Eric Ke Wang*, Tsu-Yang Wu, Chien-Ming Chen, Yuming Ye, Zhujin Zhang, Futai Zou: MDPAS: Markov Decision Process Based Adaptive Security for Sensors in Internet of Things. ICGEC 2014: 389-397, 2014.
[2].Eric Ke Wang*, A New Text Based CAPTCHA, Applied Mechanics and Materials, 373-375, 644,2013.
[3].Eric Ke Wang, Yunming Ye, Siu-Ming Yiu, L.C.K. Hui, K.P. Chow, “Challenges in Data Management for Cyber Physical System”, IEEE International Conference on Cyber Technology in Automation, Control, and Intelligent Systems (IEEE CYBER 2011), China, 2011.
[4].Eric Ke Wang, Lucas Chi Kwong Hui, Siu-Ming Yiu: Authenticated Directed Diffusion. CANS 2008: 366-377.
[5].Eric Ke Wang, Yi Jun He, Lucas Chi Kwong Hui, Siu-Ming Yiu, “A Practical SMS-based Mutual Authentication Protocol for Secure Online Banking”. Security and Management 2009: 179-183.
[6].Eric Ke Wang, Lucas Chi Kwong Hui, Siu-Ming Yiu, “A New Practical Scheme for Protecting Web Content”. Security and Management 2009: 62-66
[7].Eric Ke Wang, Joe Cho-Ki Yau, Lucas Chi Kwong Hui, Zoe L. Jiang, Siu-Ming Yiu, “A Key-Recovery System for Long-term Encrypted Documents”. EDOC Workshops 2006.
[8].Eric K.Wang, Lucas C.K.Hui and S.M.Yiu, “DGPB: A Distributed Group Key Agreement Scheme for Partition Based Wireless Ad Hoc Network”, ChinaCrypto’2006.
[9].Eric Ke Wang, Ye Y., “An efficient and secure key establishment scheme for wireless sensor network”,Intelligent Information Technology and Security Informatics (IITSI), 2010 Third International Symposium on. IEEE, 2010: 511-516. (Cited 7)
[10].De Oliveira A S, Eric K. Wang *, Kirchner C, et al. “Weaving rewrite-based access control policies”, Proceedings of the 2007 ACM workshop on Formal methods in security engineering. ACM, 2007: 71-80.(Cited 32)
[11].Eric Ke Wang, Yunming Ye, Xiaofei Xu, Siu-Ming Yiu, Lucas C.K. Hui, K.P. Chow, “Security Issues and Challenges for Cyber Physical System”, The 3rd IEEE/ACM International Conference on Cyber, Physical and Social Computing (CPSCom-2010), 2010. (Cited 21)
TEACHING/SUPERVISING EXPERIENCE
Master Course
Network Security, 2011.03 until now
Master Course
Distributed Computing,2009.09 to 2011.01
The applications of Phd and Master Degree from oversea students are welcome.
Updated:2018-09