default search action
MingJian Tang 0001
Person information
- affiliation: Westpac Banking Corporation, Sydney, NSW, Australia
- affiliation (former): Huawei Technologies Co. Ltd, Shenzhen, China
- affiliation (Ph.D.): La Trobe University, Melbourne, Australia
Other persons with the same name
- Mingjian Tang 0002 — University of Technology Sydney, Ultimo, NSW, Australia
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j13]Qinghua Lu, Yuxiu Luo, Liming Zhu, MingJian Tang, Xiwei Xu, Jon Whittle:
Developing Responsible Chatbots for Financial Services: A Pattern-Oriented Responsible Artificial Intelligence Engineering Approach. IEEE Intell. Syst. 38(6): 42-51 (2023) - [j12]Songjie Xie, Shuai Ma, Ming Ding, Yuanming Shi, MingJian Tang, Youlong Wu:
Robust Information Bottleneck for Task-Oriented Communication With Digital Modulation. IEEE J. Sel. Areas Commun. 41(8): 2577-2591 (2023) - [j11]Haoning Chen, Junfeng Long, Shuai Ma, Mingjian Tang, Youlong Wu:
On the Optimality of Data Exchange for Master-Aided Edge Computing Systems. IEEE Trans. Commun. 71(3): 1364-1376 (2023) - [j10]Jiao Yin, MingJian Tang, Jinli Cao, Mingshan You, Hua Wang, Mamoun Alazab:
Knowledge-Driven Cybersecurity Intelligence: Software Vulnerability Coexploitation Behavior Discovery. IEEE Trans. Ind. Informatics 19(4): 5593-5601 (2023) - [j9]Jianfei Sun, Guowen Xu, Tianwei Zhang, Xiaochun Cheng, Xingshuo Han, Mingjian Tang:
Secure Data Sharing With Flexible Cross-Domain Authorization in Autonomous Vehicle Systems. IEEE Trans. Intell. Transp. Syst. 24(7): 7527-7540 (2023) - [c14]Songjie Xie, Youlong Wu, Kewen Liao, Lu Chen, Chengfei Liu, Haifeng Shen, MingJian Tang, Lu Sun:
Fed-SC: One-Shot Federated Subspace Clustering over High-Dimensional Data. ICDE 2023: 2905-2918 - [p1]Jiao Yin, MingJian Tang, Jinli Cao, Mingshan You, Hua Wang:
Cybersecurity Applications in Software: Data-Driven Software Vulnerability Assessment and Management. Emerging Trends in Cybersecurity Applications 2023: 371-389 - [i2]Qinghua Lu, Yuxiu Luo, Liming Zhu, MingJian Tang, Xiwei Xu, Jon Whittle:
Operationalising Responsible AI Using a Pattern-Oriented Approach: A Case Study on Chatbots in Financial Services. CoRR abs/2301.05517 (2023) - 2022
- [j8]Jiao Yin, MingJian Tang, Jinli Cao, Hua Wang, Mingshan You:
A real-time dynamic concept adaptive learning algorithm for exploitability prediction. Neurocomputing 472: 252-265 (2022) - [j7]Jianfei Sun, Yu Yuan, MingJian Tang, Xiaochun Cheng, Xuyun Nie, Muhammad Umar Aftab:
Privacy-Preserving Bilateral Fine-Grained Access Control for Cloud-Enabled Industrial IoT Healthcare. IEEE Trans. Ind. Informatics 18(9): 6483-6493 (2022) - [j6]Jiao Yin, MingJian Tang, Jinli Cao, Hua Wang, Mingshan You, Yongzheng Lin:
Vulnerability exploitation time prediction: an integrated framework for dynamic imbalanced learning. World Wide Web 25(1): 401-423 (2022) - [c13]Hao Li, Jie Shao, Kewen Liao, Mingjian Tang:
Do Simpler Statistical Methods Perform Better in Multivariate Long Sequence Time-Series Forecasting? CIKM 2022: 4168-4172 - [c12]Hao Li, Mingjian Tang, Kewen Liao, Jie Shao:
A Multi-output Integration Residual Network for Predicting Time Series Data with Diverse Scales. PRICAI (1) 2022: 380-393 - [i1]Songjie Xie, Youlong Wu, Shuai Ma, Ming Ding, Yuanming Shi, Mingjian Tang:
Robust Information Bottleneck for Task-Oriented Communication with Digital Modulation. CoRR abs/2209.10382 (2022) - 2021
- [j5]Jianfei Sun, Dajiang Chen, Ning Zhang, Guowen Xu, Mingjian Tang, Xuyun Nie, Mingsheng Cao:
A Privacy-Aware and Traceable Fine-Grained Data Delivery System in Cloud-Assisted Healthcare IIoT. IEEE Internet Things J. 8(12): 10034-10046 (2021) - [j4]MingJian Tang, Jiao Yin, Mamoun Alazab, Jinli Cao, Yuxiu Luo:
Modeling of Extreme Vulnerability Disclosure in Smart City Industrial Environments. IEEE Trans. Ind. Informatics 17(6): 4150-4158 (2021) - 2020
- [j3]Jiao Yin, MingJian Tang, Jinli Cao, Hua Wang:
Apply transfer learning to cybersecurity: Predicting exploitability of vulnerabilities by description. Knowl. Based Syst. 210: 106529 (2020) - [c11]Jiao Yin, Mingshan You, Jinli Cao, Hua Wang, MingJian Tang, Yong-Feng Ge:
Data-Driven Hierarchical Neural Network Modeling for High-Pressure Feedwater Heater Group. ADC 2020: 225-233 - [c10]Hailin Hu, MingJian Tang, Chengcheng Bai:
DATSING: Data Augmented Time Series Forecasting with Adversarial Domain Adaptation. CIKM 2020: 2061-2064 - [c9]Jiao Yin, MingJian Tang, Jinli Cao, Hua Wang, Mingshan You, Yongzheng Lin:
Adaptive Online Learning for Vulnerability Exploitation Time Prediction. WISE (2) 2020: 252-266
2010 – 2019
- 2019
- [j2]MingJian Tang, Mamoun Alazab, Yuxiu Luo:
Big Data for Cybersecurity: Vulnerability Disclosure Trends and Dependencies. IEEE Trans. Big Data 5(3): 317-329 (2019) - 2018
- [j1]MingJian Tang, Mamoun Alazab, Yuxiu Luo, Matthew Donlon:
Disclosure of cyber security vulnerabilities: time series modelling. Int. J. Electron. Secur. Digit. Forensics 10(3): 255-275 (2018) - 2016
- [c8]MingJian Tang, Mamoun Alazab, Yuxiu Luo:
Exploiting Vulnerability Disclosures: Statistical Framework and Case Study. CCC 2016: 117-122 - 2011
- [c7]MingJian Tang, B. Sumudu U. Mendis, D. Wayne Murray, Yingsong Hu, Alison Sutinen:
Unsupervised Fraud Detection in Medicare Australia. AusDM 2011: 103-110 - [c6]Yingsong Hu, D. Wayne Murray, Yeung Sam Hung, Alison Sutinen, B. Sumudu U. Mendis, MingJian Tang:
Prescriber-Consumer Social Network Analysis for Risk Level Re-estimation based on an Asymmetrical Rating Exchange Model. AusDM 2011: 111-118
2000 – 2009
- 2009
- [c5]MingJian Tang, Jinli Cao, Xiaohua Jia, Ke-Yan Liu:
Optimization on Data Object Compression and Replication in Wireless Multimedia Sensor Networks. DASFAA 2009: 77-91 - 2008
- [c4]MingJian Tang, Jinli Cao:
An energy-efficient data-driven power management for wireless sensor networks. DMSN 2008: 21-27 - [c3]MingJian Tang, Jinli Cao, Xiaohua Jia:
Efficient power management for Wireless Sensor Networks: A data-driven approach. LCN 2008: 106-113 - 2007
- [c2]MingJian Tang, Jinli Cao:
Optimization on distributed user management in Wireless Sensor Networks. ICPADS 2007: 1-8 - 2006
- [c1]MingJian Tang, Jinli Cao:
A dynamic mechanism for handling mobile computing environmental changes. Infoscale 2006: 7
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:22 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint