Zhicheng Wen

Orcid: 0000-0002-7646-2290

According to our database1, Zhicheng Wen authored at least 19 papers between 2006 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
An Algorithm for Network Security Situation Assessment Based on Deep Learning.
Int. J. Pattern Recognit. Artif. Intell., February, 2023

A Network Security Situation Awareness Method Based on GRU in Big Data Environment.
Int. J. Pattern Recognit. Artif. Intell., January, 2023

2022
EM_WOA: A budget-constrained energy consumption optimization approach for workflow scheduling in clouds.
Peer-to-Peer Netw. Appl., 2022

Image segmentation based on super-pixel with neighborhood constrained and multi-level FCM clustering.
J. Comput. Methods Sci. Eng., 2022

<i>α</i>-Fairness-based joint power allocation and power splitting for massive MIMO systems with SWIPT.
Digit. Signal Process., 2022

2021
Parallel FCM clustering algorithm of fuzzy number based on cut set.
J. Comput. Methods Sci. Eng., 2021

A massive images classification method based on MapReduce parallel fuzzy C-means clustering.
J. Comput. Methods Sci. Eng., 2021

A sample de-noising method for FCM clustering induced by Gauss kernel.
Int. J. Inf. Commun. Technol., 2021

An automatic approach for detecting seedlings per hill of machine-transplanted hybrid rice utilizing machine vision.
Comput. Electron. Agric., 2021

2020
Checking the consistency of Object-Z formal specification based on theorem proof.
J. Comput. Methods Sci. Eng., 2020

Research on anomaly detection of network security situation based on interval estimation.
J. Comput. Methods Sci. Eng., 2020

Minimizing Energy Consumption Scheduling Algorithm of Workflows With Cost Budget Constraint on Heterogeneous Cloud Computing Systems.
IEEE Access, 2020

2019
Network security situation prediction in the cloud environment based on grey neural network.
J. Comput. Methods Sci. Eng., 2019

2016
Quantitative assessment for network security situation based on weighted factors.
J. Comput. Methods Sci. Eng., 2016

Network security situation abnormal detection method based on hypothesis test.
J. Comput. Methods Sci. Eng., 2016

Contention-aware reliability management scheme for parallel tasks scheduling in heterogeneous computing systems.
Proceedings of the Seventh International Green and Sustainable Computing Conference, 2016

2009
Research on Running Time Behavior Analyzing and Trend Predicting of Modern Distributed Software.
J. Comput., 2009

2006
Generating Proof Obligation to Verify Object-Z Specification.
Proceedings of the International Conference on Software Engineering Advances (ICSEA 2006), October 28, 2006

An Approach to Extending Object-Z with Real-Time.
Proceedings of the Third IEEE International Workshop on Electronic Design, 2006


  Loading...