Ze Li

Orcid: 0009-0007-4193-2663

Affiliations:
  • National University of Defense Technology, College of Information System and Management, Changsha, China


According to our database1, Ze Li authored at least 11 papers between 2014 and 2025.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Enhanced Fault Localization in Energy Systems Using an Improved MVO Algorithm and Multistrategy Optimization.
IEEE Access, 2025

2017
Tie strength still matters: Investigating interaction patterns of Al-Qaeda network in terror operations.
Proceedings of the 2017 IEEE International Conference on Intelligence and Security Informatics, 2017

Social Network Based Anomaly Detection of Organizational Behavior using Temporal Pattern Mining.
Proceedings of the 2017 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining 2017, Sydney, Australia, July 31, 2017

2016
Identifying the socio-spatial dynamics of terrorist attacks in the Middle East.
Proceedings of the IEEE Conference on Intelligence and Security Informatics, 2016

Social network change detection using a genetic algorithm based back propagation neural network model.
Proceedings of the 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2016

2015
Research on the Evaluation Method of National Military Development Based on Net Assessment.
Proceedings of the 2015 European Intelligence and Security Informatics Conference, 2015

Game Analysis on the Counter-Terrorism Cooperation of Shanghai Cooperation Organization.
Proceedings of the 2015 European Intelligence and Security Informatics Conference, 2015

Understanding the Dynamic of Covert Organization with Multilayer Networks Model.
Proceedings of the 2015 European Intelligence and Security Informatics Conference, 2015

Detecting Changes in Terrorism Networks: A Perspective of Multi-Meta-Network Modeling.
Proceedings of the 2015 European Intelligence and Security Informatics Conference, 2015

Sentiment Analysis for Topics based on Interaction Chain Model.
Proceedings of the 2015 European Intelligence and Security Informatics Conference, 2015

2014
Detecting key individuals in terrorist network based on FANP model.
Proceedings of the 2014 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining, 2014


  Loading...