Ze Wang
Orcid: 0000-0001-6971-2004Affiliations:
- Tiangong University, Tianjin, China
- Tianjin Polytechnic University, Tianjin, China (former)
According to our database1,
Ze Wang
authored at least 21 papers
between 2007 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2025
Predictive Control Plane Balancing in SD-IoT Networks Based on Elitism Genetic Algorithm and Non-Cooperative Game Theory.
IEEE Trans. Netw. Serv. Manag., February, 2025
Neurocomputing, 2025
A distributed identity management and cross-domain authentication scheme for the Internet of Things.
Future Gener. Comput. Syst., 2025
Robust intrusion detection based on personalized federated learning for IoT environment.
Comput. Secur., 2025
2024
Revocable Certificateless Cross-Domain Authentication Scheme Based on Primary-Secondary Blockchain.
IEEE Trans. Comput. Soc. Syst., October, 2024
Comput. Commun., 2024
2022
Meta Path-Aware Recommendation Method Based on Non-Negative Matrix Factorization in LBSN.
IEEE Trans. Netw. Serv. Manag., December, 2022
J. Supercomput., 2022
Proceedings of the 31st International Conference on Computer Communications and Networks, 2022
2020
WSN Localization Technology Based on Hybrid GA-PSO-BP Algorithm for Indoor Three-Dimensional Space.
Wirel. Pers. Commun., 2020
2019
A Multi-Element Hybrid Location Recommendation Algorithm for Location Based Social Networks.
IEEE Access, 2019
2017
Mob. Inf. Syst., 2017
Proceedings of the Parallel Architecture, Algorithm and Programming, 2017
2015
Layered Location-Based Security Mechanism for Mobile Sensor Networks: Moving Security Areas.
Sensors, 2015
2013
Efficient localization for mobile sensor networks based on constraint rules optimized Monte Carlo method.
Comput. Networks, 2013
2012
Securing wireless mesh networks in a unified security framework with corruption-resilience.
Comput. Networks, 2012
A collusion-resilient self-healing key distribution scheme for wireless sensor networks.
Proceedings of IEEE International Conference on Communications, 2012
2011
Proceedings of the 2011 International Conference on Wireless Communications & Signal Processing, 2011
Proceedings of the Information and Communications Security - 13th International Conference, 2011
2007
An Unsupervised Host-Based Anomaly Intrusion Detection Technique Based on Non-negative Matrix Factorization.
Proceedings of the International MultiConference of Engineers and Computer Scientists 2007, 2007
Intrusion Detection Using Wavelet Transform and Non Negative Matrix Factorization.
Proceedings of the International MultiConference of Engineers and Computer Scientists 2007, 2007