Journal Conference Others (patents, book chapters, invited papers)
- Y.F. Zhang, X.H. Chen, J.P. Wang, Z.D. Zheng, and K. Wu, "A Generative Car-following Model Conditioned on Driving Styles," Transportation Research Part C: Emerging Technologies, Volume 145, Dec. 2022. (link)
- J. Fan, K. Wu, Y. Zhou, Z. Zhao and S. Huang, "Fast Model Update for IoT Traffic Anomaly Detection with Machine Unlearning," IEEE Internet of Things Journal, 2022. (pdf)
- Y. Zhang, Q. Xu, J.P. Wang, K. Wu, Z. Zheng and K. Lu, "A Learning-Based Discretionary Lane-Change Decision-Making Model with Driving Style Awareness," IEEE Transactions on Intelligent Transportation Systems, 2022, doi: 10.1109/TITS.2022.3217673.
- L. Ye, Z. Wang, X. Chen, J.P. Wang, K. Wu and K. Lu, "GSAN: Graph Self-Attention Network for Learning Spatial–Temporal Interaction Representation in Autonomous Driving," IEEE Internet of Things Journal, vol. 9, no. 12, pp. 9190-9204, 15 June15, 2022, doi: 10.1109/JIOT.2021.3093523.
- Z. Tang, L.N. Wang, Q. Xu, K. Lu, J.P. Wang, K. Wu, and X.H. Jia, "SNIFF: A Scalable Network Inference Framework for Measuring End-to-End Performance," IEEE Transactions on Network Science and Engineering, vol. 9, no. 3, pp. 1909-1923, 1 May-June 2022, doi: 10.1109/TNSE.2022.3154758.
- H. Liao, G. Tang, D. Guo, K. Wu, and Y. Wu, "EdgeSaver: Edge-Assisted Energy-Aware Mobile Video Streaming for User Retention Enhancement," IEEE Internet of Things Journal, vol. 9, no. 9, pp. 6550-6562, 1 May1, 2022, doi: 10.1109/JIOT.2021.3111645.
- H. Yuan, G.M. Tang, D.K. Guo, K. Wu, X. Shao, K. Yu, and W. Wei, "BESS Aided Renewable Energy Supply Using Deep Reinforcement Learning for 5G and Beyond," IEEE Transactions on Green Communications and Networking, vol. 6, no. 2, pp. 669-684, June 2022, doi: 10.1109/TGCN.2021.3136363.
- H. Wang, G.M. Tang, K. Wu, and J.P. Wang, "PLVER: Joint Stable Allocation and Content Replication for Edge-Assisted Live Video Delivery," IEEE Transactions on Parallel and Distributed Systems (TPDS), Vol. 33, Jan. 2022, pp. 218-230. (pdf)
- C. Feng, J. An, K. Wu and J. Wang, "Bound Inference and Reinforcement Learning-Based Path Construction in Bandwidth Tomography," in IEEE/ACM Transactions on Networking, vol. 30, no. 2, pp. 501-514, April 2022. (link) .
- G. Tang, K. Wu, Y. Wu, H. Wang and G. Qian, "Modeling and Alleviating Low-Battery Anxiety for Mobile Users in Video Streaming Services," IEEE Internet of Things Journal, vol. 9, no. 7, pp. 5065-5079, 1 April, 2022, doi: 10.1109/JIOT.2021.3107728.
- C. Wang, K. Wu, T. Zhou, G. Yu and Z. Cai, "TSAGen: Synthetic Time Series Generation for KPI Anomaly Detection," IEEE Transactions on Network and Service Management, vol. 19, no. 1, pp. 130-145, March 2022, doi: 10.1109/TNSM.2021.3098784.
- J. Zhang, Y. Lou, J. Wang, K. Wu, K. Lu and X. Jia, "Evaluating Adversarial Attacks on Driving Safety in Vision-Based Autonomous Vehicles," IEEE Internet of Things Journal, vol. 9, no. 5, pp. 3443-3456, 1 March1, 2022, doi: 10.1109/JIOT.2021.3099164.
- Y. Qiao, K. Wu, and P. Jin, "Efficient anomaly detection for high-dimensional sensing data with one-class support vector machine," IEEE Transactions on Knowledge and Data Engineering (TKDE), doi: 10.1109/TKDE.2021.3077046, 2021.
- J.D. Zhang, Y.F., Zhang, K.J. Lu, J.P. Wang, K. Wu, X.H. Jia, and B. Liu, "Detecting and identifying optical signal attacks on autonomous driving systems," IEEE Internet Things Journal, 8(2): 1140-1153 (2021)
- J. Yu, H. Chen, K. Wu, T. Zhou, Z. Cai and F. Liu, "Centipede: Leveraging the Distributed Camera Crowd for Cooperative Video Data Storage," IEEE Internet of Things Journal, vol. 8, no. 22, pp. 16498-16509, 15 Nov.15, 2021, doi: 10.1109/JIOT.2021.3074823.
- C.Y. Feng, L. Wang, K. Wu, and J.P. Wang, "Bound inference in network performance tomography with additive metrics," ACM/IEEE Transactions on Networking, doi: 10.1109/TNET.2020.3000115, accepted in June 2020.
- G. Tang, D. Guo, K. Wu, F. Liu, and Y. Qin, "QoS guaranteed edge cloud resource provisioning for vehicle fleets," IEEE Transactions on Vehicular Technology, doi: 10.1109/TVT.2020.2987839, accepted in April 2020.
- Q. Zhang, K. Wu, and Y. Shi, "Route planning and power management for PHEVs with reinforcement learning," IEEE Transactions on Vehicular Technology, vol. 69, no. 5, pp. 4751-4762, May 2020.
- Q. Xu, J.P. Wang, and K. Wu, "Learning-based dynamic resource provisioning for network slicing with ensured end-to-end performance bound," IEEE Transactions on Network Science Engineering. 7(1): 28-41, March 2020.
- F.X. Wang, W. Gong, J.C. Liu, and K. Wu, "Channel selective activity recognition with wifi: a deep learning approach exploring wideband information," IEEE Transactions on Network Science Engineering. 7(1): 181-192, March 2020.
- F.Y. Li, K. Wu, C. Qin, and J.S. Lei, "Anti-compression JPEG steganography over repetitive compression networks." Elsevier Signal Process. 170: 107454, May 2020.
- G.M. Tang, H. Wang, K. Wu, and D.K. Guo, "Tapping the knowledge of dynamic traffic demands for optimal cdn design," IEEE/ACM Transactions on Networking, vol. 27, no. 1, pp. 98-111, Feb. 2019
- G.M. Tang, S. Keshav, L. Golab, and K. Wu, "Bikeshare pool sizing for bike-and-ride multimodal transit," IEEE Transactions on Intelligent Transportation Systems (TITS) Special Issue on Advances in Smart and Green Transportation for Smart Cities, September 2018.
- F. Dong, K. Wu, and V. Srinivasan, "Copula analysis of temporal dependence structure in markov modulated poisson process and its applications," ACM Transactions on Modeling and Performance Evaluation of Computing Systems (TOMPECS), June 2017.
- Z. Ling, J.Z. Luo, Y.L. Xu, C. Gao, K. Wu, and X.W. Fu, "Security vulnerabilities of internet of things: a case study of the smart plug system," IEEE Internet of Things Journal, May, 2017.
- G.M Tang, W.X. Jiang, Z.F. Xu, F.M. Liu, and K. Wu, "NIPD: non-intrusive power disaggregation in legacy datacenters," IEEE Transactions on Computers, Vol. 66, No. 2, pp. 312-325, Feb. 2017.
- T.Q. Zhou, Z.P. Cai, K. Wu, Y. Chen, and M. Xu,"FIDC: a framework for improving data credibility in mobile crowdsensing," Computer Networks, 120: 157-169 (2017).
- L.J. Dong, K. Wu, and G.M. Tang, "A data-centric approach to quality estimation of role mining results," IEEE Transactions on Information Forensics and Security (TIFS), Vol. 11, No. 12, pp. 2678-2692, Dec. 2016.
- C. Chen, L. Zheng, V. Srinivasan, A. Thomo, K. Wu, and A. Sukow, "Conflict-aware weighted bipartite b-matching and its application to e-Commerce," IEEE Transactions on Knowledge and Data Engineering (TKDE), Vol. 28, No. 6, pp. 1475 - 1488, Feb. 2016.
- G.M. Tang, K. Wu, J.S. Lei, and J.Y. Tang, "A simple and robust approach to energy disaggregation in the presence of outliers," Elsevier Journal of Sustainable Computing: Informatics and Systems, Vol. 9, pp. 8-19, March 2016.
- F.Y. Li, K. Wu, J.S. Lei, M. Wen, Z.Q. Bi, C.H. Gu, "Steganalysis over large-scale social networks with high-order joint features and clustering ensembles," IEEE Transactions on Information Forensics and Security (TIFS), Vol. 11 (2), pp. 344-357, Dec. 2015.
- G.M. Tang, K. Wu, J.S. Lei, "A distributed and scalable approach to semi-intrusive load monitoring," IEEE Transactions on Parallel and Distributed Systems (TPDS), DOI: 10.1109/TPDS.2015.2470238, pp. 1-13, Aug. 2015.
- S. Ali, K. Wu, K. Weston, and D. Marinakis, "A machine learning approach to meter placement for power quality estimation in smart grid," IEEE Transactions on Smart Grid (TSG), DOI: 10.1109/TSG.2015.2442837, pp. 1-10, July 2015.
- Z. Ling, J.Z. Luo, K. Wu, W. Yu, and X.W. Fu, "TorWard: discovery, blocking, and traceback of malicious traffic over tor", IEEE Transactions on Information Forensics and Security (TIFS), Vol. 10 (12), pp. 2515-2530, Aug. 2015.
- R. Zhang, K. Wu, M. Li, J.P. Wang, "Online resource scheduling under concave pricing for cloud computing," IEEE Transactions on Parallel and Distributed Systems (TPDS), DOI 10.1109/TPDS.2015.2432799, pp. 1-14, May 2015.
- C. Chen, K. Wu, V. Srinivasan, R. K. Bharadwaj, "The best answers? Think twice: identifying commercial campagins in the CQA forums," Journal of Computer Science and Technology, Volume 30, Issue 4, pp. 810-828, July 2015.
- G.M. Tang, K. Wu, J.S. Lei, Z.Q. Bi, and J.Y. Tang, "From landscape to portrait: a new approach for load curve data analysis and cleansing," IEEE Transactions on Smart Grid (TSG), Vol. 5, No. 4, pp. 1764-1773, July 2014.
- Z.N. Zhang, Z.Y. Li, K. Wu, D.S. Li, H.B. Li, Y.X. Peng, and X.C. Lu, "VMThunder: fast provisioning of large-scale virtual machine clusters," IEEE Transactions on Parallel and Distributed Systems (TPDS), Vol. 25, No. 12, pp. 3328-3338, Dec. 2014.
- P. Qin, B. Dai, B.X. Huang, G. Xu, and K. Wu, "A survey on network tomography with network coding," IEEE Communications Surveys and Tutorials 16(4): 1981-1995 (2014).
- B. Sun, X.M. Shan, K. Wu, and Y. Xiao, "Anomaly detection based secure in-network aggregation for wireless sensor networks," IEEE Systems Journal , Vol. 7, No. 1, pp. 13-25, March 2013.
- D. Marinakis, K. Wu, N. Ye, and S. Whitesides, "Network Optimization for Lightweight Stochastic Scheduling in Underwater Sensor Networks," IEEE Transactions for Wireless Communications , Vol. 11, No. 8, pp. 2786-2795, Aug. 2012.
- X.M. Wang, K. Wu, J.P. Wang, and Y.L. Xu, "Cape: coded anycast packet forwarding for wireless mesh networks," ACM/Springer Wireless Networks (WINET) Journal, 17(5), pp. 1273-1285, 2011.
- Yuan, Y., K. Wu, and W.J. Jia, "On the queueing behavior of inter-flow asynchronous network coding, " Elsevier International Journal of Computer Communications (COMCOM), Vol 35., No. 13, pp. 1535-1548, July 2012.
- X.Y., Wang, J. Li, K. Wu, and H. Liu, "Transmission rate enhancement via adaptive relaying in wireless networks, " International Journal of Parallel, Emergent and Distributed Systems (IJPEDS), 27(3), pp. 235-247, 2012.
- Y. Yuan, K. Wu, W.J. Jia, and Y.M. Jiang, "Performance of acyclic stochastic networks with network coding," IEEE Transactions on Parallel and Distributed Systems (TPDS), Vol. 22, No. 7, July, 2011.
- Y. Xiao, H. Chen, K. Wu, B. Sun, Y. Zhang, X. Sun, and C. Liu, "Coverage and detection of a randomized scheduling algorithm in wireless sensor networks," IEEE Transactions on Computers (TC), vol. 59, No. 4, pp. 507-521, April 2010.
- M. Hua, M.K. Lau, J. Pei, and K. Wu, "Continuous K-Means monitoring with low reporting cost in sensor networks," IEEE Transactions on Knowledge and Data Engineering (TKDE), Vol. 21, No. 12, pp. 1679-1691, Dec. 2009. (Selected as the Spotlight Paper for the December issue of TKDE)
- Y. Xiao, Y. Zhang, M. Peng, H. Chen, X.J. Du, B. Sun, and K. Wu, "Two and three-dimensional intrusion object detection under randomized scheduling algorithms in sensor networks," Elsevier Computer Networks, Vol. 53, No. 14, pp. 2458-2475, Sept. 2009.
- K. Wu, C. Liu, Y. Xiao, and J.C. Liu, "A delay-constrained optimal data aggregation framework for the gateway nodes in hierarchical wireless sensor networks," ACM/Springer Mobile Networks and Applications (MONET) Journal, Vol. 14, No. 5, pp. 571-589, Oct. 2009.
- R. Li, J. Li, K. Wu, Y. Xiao, and L.J. Xie, "An enhanced fast handover scheme with low latency for mobile IPv6," IEEE Transactions on Wireless Communications, Vo. 7, No. 1, pp. 334-342, January 2008.
- F. Li, K. Wu, and A. Lippman, "Minimum energy cooperative path routing in all-wireless networks: NP-completeness and heuristic algorithms," Journal of Communications and Networks, Vol. 10, No. 2, pp 204-214, 2008.
- K. Wu, C. Liu, J. Pan, and D. Huang, "Robust range-free localization in wireless sensor networks," ACM/Springer Mobile Networks and Applications (MONET) Journal, Vol. 12, No. 5-6, pp. 392-405, Dec. 2007.
- C. Liu, T. Scott, K. Wu, and D. Hoffman, "Range-free sensor localization with ring overlapping based on comparison of received signal strength indicator," International Journal of Sensor Networks (IJSNet), Vol. 2, No. 5/6, pp. 399-413, July 2007.
- C. Liu, K. Wu, and J. Pei, "An energy efficient data collection framework for wireless sensor networks by exploiting spatiotemporal correlation," IEEE Transactions on Parallel and Distributed Systems (TPDS), Vol. 18, N0.7, pp. 1010-1023, July 2007. (pdf)
- H.-C. Yang, K. Wu, and W.-S. Lu, "Cross-layer path configuration for energy-efficient communication over wireless ad hoc networks," Journal of Advances in Multimedia, Vol. 2007, Article ID: 19860, online, April 2007.
- K. Wu, D. Dreef, B. Sun, and Y. Xiao, "Secure data aggregation without persistent cryptographic operations in wireless sensor networks," Elsevier AD HOC Networks journal, special issue on Security Issues in Sensor and AD HOC Networks, Vol. 5, No. 1, pp. 100-111, January 2007.
- C. Liu, K. Wu, Y. Xiao, and B. Sun, "Random coverage with guaranteed connectivity: joint scheduling for wireless sensor networks," IEEE Transactions on Parallel and Distributed Systems (TPDS), Vol.17, No. 6, pp. 562-575, June 2006. (Selected to be a feature article in IEEE Distributed System Online)
- Y. Xiao, H. Li, K. Wu, K. Leung, and Q. Ni, "On optimizing backoff counter reservation and classifying stations for the IEEE 802.11 distributed wireless LANs," IEEE Transactions on Parallel and Distributed Systems (TPDS), Vol. 17, No. 7, pp. 713-722, July 2006.
- B. Sun, K. Wu, Y. Xiao, and R. Wang, "Integration of mobility and intrusion detection for wireless ad hoc networks," (Wiley) International Journal of Communication Systems, Vol. 20, No. 6, pp. 695-721, September 2006.
- B. Sun, C.-C Li, K. Wu, and Y. Xiao, "A lightweight secure protocol for wireless sensor networks", Elsevier Computer Communications journal: special issue on Wireless Sensor Networks: Performance, Reliability, Security, and Beyond. Vol. 29, No. 13/14, pp. 2556-2568, 2006.
- B. Sun, F. Yu, K. Wu, Y. Xiao, V. C. M. Leung, "Enhancing security using mobility-based anomaly detection in cellular mobile networks," IEEE Transactions on Vehicular Technology, Vol. 55, No. 3, pp. pp. 1385-1396, May 2006.
- B. Sun, K. Wu, and U. Pooch, "Zone-based intrusion detection system for mobile ad hoc networks,"International Journal of Ad Hoc & Sensor Wireless Networks, Vol. 2, No. 3, online, 2006.
- K. Wu and J. Harms, "Performance Study of Proactive Flow Handoff for Mobile Ad Hoc Networks," ACM Wireless Networks (WINET) Journal. Vol. 12, No. 1, pp. 119-135, February 2006.
- K. Wu, Y. Gao, F. Li, and Y. Xiao, "Lightweight deployment-aware scheduling for wireless sensor networks," ACM/Springer Mobile Networks and Applications ( MONET) Journal, Special Issue on Energy Constraints and Lifetime Performance in Wireless Sensor Networks, Vol. 10, No. 6, pp. 837-852, December 2005.
- Y. Xiao, H. Li, Y. Pan, K. Wu, and J. Li, "On optimizing power consumption for mobile handsets," IEEE Transactions on Vehicular Technology, Vol. 53, No. 6, pp. 1927-1941, November 2004.
- K. Wu and J. Harms, "Multipath Routing for Mobile Ad Hoc Networks, " IEEE ComSoc/KICS Journal of Communications and Networks, Special Issue on Innovations in Ad Hoc Mobile Pervasive Networks, Vol. 4, No. 1, March 2002, pp. 48-58.
- Y. Cao, S. Tao and K. Wu, "A Network Performance Evaluation Method Based on Simulation and Measurement," Chinese Journal of Computers, Vol. 22, No. 5, pp. 507-512, May 1999 (in Chinese).
- D.W. Dai, K. Wu, and H.G. Zhang, "Cryptanalysis on a Finite Automaton Public Key Cryptosystem," Science in China, Vol. 39, No.1, pp. 27-36, Feb. 1996.