Wan Tang

According to our database1, Wan Tang authored at least 23 papers between 2008 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
A Undersampling-DoppelGANger based Data Generation Method for Unbalanced BGP Data.
Proceedings of the 9th IEEE International Conference on Cloud Computing and Intelligent Systems, 2023

2022
An inter-cell resource usage analysis of large-scale datacentre trace logs.
Proceedings of the 15th IEEE/ACM International Conference on Utility and Cloud Computing, 2022

BACO: A Bi-Ant-Colony-Based Strategy for UAV Trajectory Planning with Obstacle Avoidance.
Proceedings of the 18th International Conference on Mobility, Sensing and Networking, 2022

2021
MPDC: A Multi-channel Pipelined Data Collection MAC for Duty-Cycled Linear Sensor Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2021

2020
IPsec Cryptographic Algorithm Invocation Considering Performance and Security for SDN Southbound Interface Communication.
IEEE Access, 2020

MEM: A Multi-Staged Eviction Mechanism of Flowtable for Software-Defined Datacenters.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

2019
Centroid opposition with a two-point full crossover for the partially attracted firefly algorithm.
Soft Comput., 2019

An accurate partially attracted firefly algorithm.
Computing, 2019

2018
Cryptographic Algorithm Invocation Based on Software-Defined Everything in IPsec.
Wirel. Commun. Mob. Comput., 2018

Cryptographic Algorithm Invocation in IPsec: Guaranteeing the Communication Security in the Southbound Interface of SDN Networks.
Proceedings of the Communications and Networking, 2018

2016
Software-Defined Mobile Networks Security.
Mob. Networks Appl., 2016

2015
Dynamic Home Circuit Construction for Datacenter Networks Using LOBS-HC Ring.
KSII Trans. Internet Inf. Syst., 2015

2014
Home Circuit Sharing for Dynamic Wavelength Assignment in LOBS-Based Datacenter Networks.
IEICE Trans. Inf. Syst., 2014

Sample Size Determination to Detect Cusp Catastrophe in Stochastic Cusp Catastrophe Model: A Monte-Carlo Simulation-Based Approach.
Proceedings of the Social Computing, Behavioral-Cultural Modeling and Prediction, 2014

Dynamic home circuit grouping and wavelength assignment in LOBS-HC ring networks.
Proceedings of the 9th International Conference on Communications and Networking in China, 2014

2011
Security Enhancement Mechanism Based on Contextual Authentication and Role Analysis for 2G-RFID Systems.
Sensors, 2011

Close-packing-based sensor node deployment schemes for AOFSN.
Int. J. Commun. Networks Distributed Syst., 2011

P-MAC: A Cross-Layer Duty Cycle MAC Protocol Towards Pipelining for Wireless Sensor Networks.
Proceedings of IEEE International Conference on Communications, 2011

Cube-Based Intra-Datacenter Networks with LOBS-HC.
Proceedings of IEEE International Conference on Communications, 2011

2010
GEP-based Framework for Immune- Inspired Intrusion Detection.
KSII Trans. Internet Inf. Syst., 2010

Avidity-model based clonal selection algorithm for network intrusion detection.
Proceedings of the 18th International Workshop on Quality of Service, 2010

2008
Comparing multiple sensitivities and specificities with different diagnostic criteria: Applications to sexual abuse and sexual health research.
Comput. Stat. Data Anal., 2008

Study on Adaptive Intrusion Detection Engine Based on Gene Expression Programming Rules.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008


  Loading...