MingJian Tang
MingJian Tang
Principal Data Scientist
Nessuna email verificata
Citata da
Citata da
Big data for cybersecurity: Vulnerability disclosure trends and dependencies
MJ Tang, M Alazab, Y Luo
IEEE Transactions on Big Data 5 (3), 317-329, 2019
Deep Learning Applications for Cyber Security
M Alazab, MJ Tang
Vulnerability Exploitation Time Prediction: an Integrated Framework for Dynamic Imbalanced Learning
J Yin, MJ Tang, J Cao, H Wang, M You, Y Lin
World Wide Web Journal, 2021
Apply transfer learning to cybersecurity: Predicting exploitability of vulnerabilities by description
J Yin, MJ Tang, J Cao, H Wang
Knowledge-Based Systems, 2020
Knowledge-Driven Cybersecurity intelligence: Software Vulnerability Co-exploitation Behaviour Discovery
J Yin, MJ Tang, J Cao, M You, H Wang, M Alazab
IEEE Transactions on Industrial Informatics, 2022
Privacy-preserving Bilateral Fine-grained Access Control for Cloud-enabled Industrial IoT Healthcare
J Sun, Y Yuan, MJ Tang, X Cheng, X Nie, UA Muhammad
IEEE Transactions on Industrial Informatics, 2021
Unsupervised fraud detection in Medicare Australia
MJ Tang, BSU Mendis, DW Murray, Y Hu, A Sutinen
Proceedings of the Ninth Australasian Data Mining Conference-Volume 121, 103-110, 2011
Disclosure of Cyber Security Vulnerabilities: Time Series Modelling
M Tang, M Alazab, Y Luo, M Donlon
International Journal of Electronic Security and Digital Forensics, 2017
DATSING: Data Augmented Time Series Forecasting with Adversarial Domain Adaptation
H Hu, MJ Tang, C Bai
29th ACM International Conference on Information and Knowledge Management …, 2020
Secure Data Sharing With Flexible Cross-Domain Authorization in Autonomous Vehicle Systems
J Sun, G Xu, T Zhang, X Cheng, X Han, MJ Tang
IEEE Transactions on Intelligent Transportation Systems, 2022
Robust Information Bottleneck for Task-Oriented Communication with Digital Modulation
S Xie, Y Wu, S Ma, M Ding, Y Shi, MJ Tang
IEEE Journal on Selected Areas in Communications, 2023
Adaptive Online Learning for Vulnerability Exploitation Time Prediction
J Yin, MJ Tang, J Cao, H Wang, M You, Y Lin
21st International Conference on Web Information Systems Engineering (WISE 2020), 2020
A dynamic mechanism for handling mobile computing environmental changes
MJ Tang, J Cao
Proceedings of the 1st international conference on Scalable information …, 2006
A Real-time Dynamic Concept Adaptive Learning Algorithm for Exploitability Prediction
J Yin, MJ Tang, J Cao, H Wang, M You
Neurocomputing 472, 252-265, 2022
Data-driven hierarchical neural network modeling for high-pressure feedwater heater group
J Yin, M You, J Cao, H Wang, MJ Tang, YF Ge
Databases Theory and Applications: 31st Australasian Database Conference …, 2020
Modelling of Extreme Vulnerability Disclosure in Smart City Industrial Environments
MJ Tang, Y Jiao, M Alazab, J Cao, Y Luo
IEEE Transactions on Industrial Informatics 17 (6), 4150-4158, 2021
A Privacy-aware and Traceable Fine-grained Data Delivery System in Cloud-assisted Healthcare IIoT
J Sun, D Chen, N Zhang, G Xu, MJ Tang, X Nie, M Cao
IEEE Internet of Things Journal, 2021
Exploiting vulnerability disclosures: Statistical framework and case study
MJ Tang, M Alazab, Y Luo
2016 Cybersecurity and Cyberforensics Conference (CCC), 117-122, 2016
Do Simpler Statistical Methods Perform Better in Multivariate Long Sequence Time-Series Forecasting?
H Li, J Shao, K Liao, MJ Tang
CIKM '22: Proceedings of the 31st ACM International Conference on …, 2022
Efficient power management for Wireless Sensor Networks: A data-driven approach
MJ Tang, J Cao, X Jia
2008 33rd IEEE Conference on Local Computer Networks (LCN), 106-113, 2008
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20