1. J.T. Wu, .., K. Wang*, Vision Transformers Beat WideResNets on Small Scale Datasets Adversarial Robustness, AAAI 2025.
2. K. Wang, et.al.,A Statistical Physics Perspective: Understanding the Causality Behind Convolutional Neural Network Adversarial Vulnerability,IEEE Transactions on Neural Networks and Learning Systems, doi: 10.1109/TNNLS.2024.3359269. 2024.
3. K. Wang, et.al.,Score-based Counterfactual Generation for Interpretable Medical Image Classification and Lesion Localization, IEEE Transactions on Medical Imaging, doi: 10.1109/TMI.2024.3375357, 2024.
4. K. Wang, et.al., Interpreting Adversarial Examples and Robustness for Deep Learning-based Auto-Driving Systems, IEEE Transactions on Intelligent Transportation Systems (T-ITS), 23(7):9755-9764, DOI: 10.1109/TITS.2021.3108520, 2022.
5. K. Wang, et.al., AFFIRM: Provably Forward Privacy for Searchable Encryption in Cooperative Intelligent Transportation System, IEEE Transactions on Intelligent Transportation Systems (T-ITS), 23(11):22607-22618, 2022.
6. K. Wang, et.al.,Statistics-Physics-Based Interpretation of the Classification Reliability of Convolutional Neural Networks in Industrial Automation Domain, IEEE Transactions on Industrial Informatics (TII),19(2):2165-2172, 2023.
7. K. Wang, et.al., Voice-Transfer Attacking on Industrial Voice Control Systems in 5G-Aided IIoT Domain, IEEE Transactions on Industrial Informatics (TII), 17(10):7085-7092, 2021.
8. K. Wang, X. Huang, C. Tan, S. -M. Yiu, Z. Chen and X. Lei, Optimizing Neural Network Training: A Markov Chain Approach for Resource Conservation, IEEE Transactions on Artificial Intelligence, doi: 10.1109/TAI.2024.3413688, 2024.
9. K. Wang,et.al., Forward Privacy Preservation in IoT enabled Healthcare Systems, IEEE Transactions on Industrial Informatics (TII), 18(3):1991-1999, 2022.
10. P.Xu, K. Wang*, et.al., Adversarial Robustness in Graph-Based Neural Architecture Search for Edge AI Transportation Systems, IEEE Transactions on Intelligent Transportation Systems (T-ITS), doi:10.1109/TITS.2022.3197713, 2023.
11. P. Xu, K. Wang*, et.al., An Interpretive Perspective: Adversarial Trojaning Attack on Neural-Architecture-Search Enabled Edge AI Systems, IEEE Transactions on Industrial Informatics (TII), 19(1):503-510,2023.
12. K. Wang, et.al., Uncovering Hidden Vulnerabilities in Convolutional Neural Networks through Graph-based Adversarial Robustness Evaluation, Pattern Recognition,143,109745, 2023.
13. K. Wang, et.al., Neural Architecture Search Based Multiobjective Cognitive Automation System, IEEE Systems Journal, 15(2):2918-2925, 2021.
14. K. Wang, et.al.,A Trusted Consensus Scheme for Collaborative Learning in the Edge AI Computing Domain, IEEE Network, 35(1):204-210, 2021.
15. K. Wang, et.al., A Trusted Consensus Fusion Scheme for Decentralized Collaborative Learning in Massive IoT Domain, Information Fusion, 72(1):100-109, 2021.
16. K. Wang, et.al., Deep Semantics Sorting of Voice-Interaction-Enabled Industrial Control System, IEEE Internet of Things Journal, 10(4): 2793-2801, 2023.
17. K. Wang,et.al., Neural architecture search for robust networks in 6G-enabled massive IoT domain. IEEE Internet of Things Journal, 8(7), 5332-5339, 2021.
18. K. Wang, et.al., A Dynamic Trust Framework for Opportunistic Mobile Social Networks. IEEE Transactions on Network and Service Management (TNSM), 15(1): 319-329, 2018.
19. K. Wang, et.al., Transfer Reinforcement Learning-based Road Object Detection in Next Generation IoT Domain, Computer Networks, 2021, 108078.
20. K. Wang, et.al., Proof of X-Repute Blockchain Consensus Protocol for IoT Systems, Computers & Security, 95:101071, 2020.
21. L.Lin, Z. Xu, C. M. Chen, K. Wang*, et.al.,Understanding the impact on convolutional neural networks with different model scales in AIoT domain. Journal of Parallel and Distributed Computing (JPDC), vol. 170, 1-12, 2023.
22. J.Guan, K. Wang*, Repeated review based image captioning for image evidence review. Signal Processing: Image Communication, 63(C):141-148,2018.