💻 About Me

Kai Wang is a full Professor with School of Computer Science and Technology (Weihai 264209) and with Faculty of Computing (Harbin 150001), Harbin Institute of Technology, China. He received the B.S. and Ph.D. degree from the National Engineering Research Center of Advanced Network Technologies led by Prof. Hongke Zhang (Academician of the Chinese Academy of Engineering, IEEE Fellow), Beijing Jiaotong University, in 2009 and 2014, respectively. From 2017 to 2019, he was a postdoc researcher in Tsinghua University, China. His research interests include trustworthy AI and network intrusion detection.

📖 Publications since joining HIT ( * corresponding author)

2025


XIPHOS: Adaptive In-Vehicle Intrusion Detection via Unsupervised Graph Contrastive Learning

IEEE Transactions on Information Forensics and Security, vol. 20, pp. 10419-10433, Oct. 2025, DOI: 10.1109/TIFS.2025.3616624

Qiguang jiang, Kai Wang*, Yuliang Wei, Hongri Liu, Bailing Wang

Paper | Code


Optimizing Consistency in Distributed Data Services: The CP-Raft Protocol for High-Performance and Fault-Tolerant Replication

IEEE Transactions on Services Computing, vol. 18, no. 4, pp. 2281-2294, Jul.-Aug. 2025, DOI: 10.1109/TSC.2025.3577505

Haiwen Du, Kai Wang*, Yulei Wu, Hongke Zhang

Paper | Code


Hierarchical GNN Message Passing for Node-level Anomaly Detection in Industrial Control Systems

IEEE Transactions on Dependable and Secure Computing, 2025, DOI: 10.1109/TDSC.2025.3623299

Shuaiyi L(y)u, Kai Wang*, Yang Liu, Bailing Wang*

Paper | Code


LiPar: A Lightweight Parallel Learning Model for Practical In-Vehicle Network Intrusion Detection

IEEE Transactions on Intelligent Transportation Systems, 2025, DOI: 10.1109/TITS.2025.3605465

Aiheng Zhang, Zhen Sun, Qiguang Jiang, Kai Wang*, Ming Li, Bailing Wang

Paper | Code


Graph Optimization via Decoupled Edge Tuning for Efficient Industrial Anomaly Detection

IEEE Transactions on Network Science and Engineering, vol. 12, no. 5, pp. 4028-4043, Sept.-Oct. 2025, DOI: 10.1109/TNSE.2025.3567671

Kai Wang, Shuaiyi L(y)u*, Yang Liu, Bailing Wang*

Paper | Code


Anomaly Detection via Semantically Conjugate View Learning on Industrial Temporal Data

IEEE Internet of Things Journal, vol. 12, no. 11, pp. 15479-15490, June 2025, DOI: 10.1109/JIOT.2025.3527694

Kai Wang, Shuaiyi L(y)u*, Bailing Wang*, Yongzheng Zhang

Paper | Code


KDRSFL: A knowledge distillation resistance transfer framework for defending model inversion attacks in split federated learning

Future Generation Computer Systems, vol. 166, Article 107637, pp. 1-10, May. 2025, DOI: 10.1016/j.future.2024.107637

Renlong Chen, Hui Xia*, Kai Wang*, Shuo Xu, Rui Zhang

Paper | Code


DRL-Based Time-Varying Workload Scheduling With Priority and Resource Awareness

IEEE Transactions on Network and Service Management, vol. 22, no. 3, pp. 2838-2852, 2025, DOI: 10.1109/TNSM.2025.3559610

Qifeng Liu, Qilin Fan, Xu Zhang, Xiuhua Li, Kai Wang, Qingyu Xiong

Paper | Code


KERMIT: Knowledge graph completion of enhanced relation modeling with inverse transformation

Knowledge-Based Systems, vol. 324, Article 113500, Aug. 2025, DOI: 10.1016/j.knosys.2025.113500

Haotian Li, Bin Yu, Yuliang Wei, Kai Wang, Richard Yi Da Xu, Bailing Wang*

Paper | Code


An original model for multi-target learning of logical rules for knowledge graph reasoning

Applied Intelligence, vol. 55, no. 138, pp. 1-19, 2025, DOI: 10.1007/s10489-024-05966-1

Haotian Li, Bailing Wang, Kai Wang, Rui Zhang, Yuliang Wei*

Paper | Code


Advancing CAN Network Security through RBM-Based Synthetic Attack Data Generation for Intrusion Detection Systems

arXiv:2503.21496, Mar. 2025

Huacheng Li, Jingyong Su, Kai Wang*

Paper | Code


2024


Computation Cost-driven Offloading Strategy based on Reinforcement Learning for Consumer Devices

IEEE Transactions on Consumer Electronics, vol. 70, no. 1, pp. 4120-4131, Feb. 2024, DOI: 10.1109/TCE.2024.3357459

Rui Zhang, Hui Xia*, Zijun Chen, Zi Kang, Kai Wang*, Wei Gao*

Paper | Code


Multi-agent DRL for edge computing: A real-time proportional compute offloading

Computer Networks, vol. 252, Article 110665, pp. 1-13, Oct. 2024, DOI: 10.1016/j.comnet.2024.110665

Kunkun Jia, Hui Xia*, Rui Zhang, Yue Sun, Kai Wang

Paper | Code


2023


Analysis of Recent Deep Learning-based Intrusion Detection Methods for In-Vehicle Network

IEEE Transactions on Intelligent Transportation Systems, vol. 24, no. 2, pp. 1843-1854, Feb. 2023, DOI: 10.1109/TITS.2022.3222486

Kai Wang, Aiheng Zhang, Haoran Sun, Bailing Wang*

Paper | Code


GNN-based Advanced Feature Integration for ICS Anomaly Detection

ACM Transactions on Intelligent Systems and Technology, vol. 14, no. 6, Article 106, pp. 1-32, Nov. 2023, DOI: 10.1145/3620676

Shuaiyi Lyu(Lu), Kai Wang*, Yuliang Wei, Hongri Liu, Qilin Fan, Bailing Wang*

Paper | Code


Process-Oriented Heterogeneous Graph Learning in GNN-Based ICS Anomalous Pattern Recognition

Pattern Recognition, vol. 141, Article 109661, Sept. 2023, DOI: 10.1016/j.patcog.2023.109661

Shuaiyi L(y)u, Kai Wang*, Liren Zhang, Bailing Wang*

Paper | Code


2022


Global-Local Integration for GNN-based Anomalous Device State Detection in Industrial Control Systems

Expert Systems with Applications, vol. 209, Article 118345, Dec. 2022, DOI: 10.1016/j.eswa.2022.118345

Shuaiyi L(y)u, Kai Wang, Liren Zhang, Bailing Wang*

Paper | Code


2021


PA-Cache: Evolving Learning-Based Popularity-Aware Content Caching in Edge Networks

IEEE Transactions on Network and Service Management, vol. 18, no. 2, pp. 1746-1757, Jun. 2021, DOI: 10.1109/TNSM.2021.3053645

Qilin Fan, Xiuhua Li*, Jian Li, Qiang He, Kai Wang, Junhao Wen

Paper | Code


2020


Analyzing NDN NACK on Interest Flooding Attack via SIS Epidemic Model

IEEE Systems Journal, vol. 14, no. 2, pp. 1862-1873, Jun. 2020, DOI: 10.1109/JSYST.2019.2923841

Kai Wang, Dongchao Guo*, Wei Quan

Paper | Code


InterestFence: Simple but Efficient Way to Counter Interest Flooding Attack

Computers & Security, vol. 88, Article 101628, Jan. 2020, DOI: 10.1016/j.cose.2019.101628

Jiaqing Dong, Kai Wang*, Wei Quan, Hao Yin

Paper | Code


2019


Betweenness Centrality Based Software Defined Routing: Observation from Practical Internet Datasets

ACM Transactions on Internet Technology, vol. 19, no. 4, Article 50, Nov. 2019, DOI: 10.1145/3355605

Kai Wang, Wei Quan*, Nan Cheng, Mingyuan Liu, Yu Liu, H. Anthony Chan

Paper | Code


Graph Structure and Statistical Properties of Ethereum Transaction Relationships

Information Sciences, vol. 492, pp. 58-71, Aug. 2019, DOI: 10.1016/j.ins.2019.04.013

Dongchao Guo, Jiaqing Dong, Kai Wang*

Paper | Code