Shunan Ma

According to our database1, Shunan Ma authored at least 14 papers between 2010 and 2019.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of five.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2019
An intelligent optimization method for information recommendation.
Proceedings of the MobiQuitous 2019, 2019

Web Information Recommendation Evaluation Model Based on Multifactor Decision Making.
Proceedings of the 21st IEEE International Conference on High Performance Computing and Communications; 17th IEEE International Conference on Smart City; 5th IEEE International Conference on Data Science and Systems, 2019

2018
Bionic Mechanism Based Dynamic Trust Evaluation Method in Cloud Environment.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Towards Effective Genetic Trust Evaluation in Open Network.
Proceedings of the 20th IEEE International Conference on High Performance Computing and Communications; 16th IEEE International Conference on Smart City; 4th IEEE International Conference on Data Science and Systems, 2018

2017
Application of Fuzzy Comprehensive Evaluation Method for Reservoir Well Logging Interpretation While Drilling.
Proceedings of the Mobile Networks and Management - 9th International Conference, 2017

2015
Dynamic Game Access Control Based on Trust.
Proceedings of the 2015 IEEE TrustCom/BigDataSE/ISPA, 2015

2014
Modelling the relationship between trust and privacy in network environments.
Int. J. Comput. Sci. Eng., 2014

2012
An Access Control Model based on Multi-factors Trust.
J. Networks, 2012

Trust Based Privacy Protection Method in Pervasive Computing.
J. Networks, 2012

An Access Control Method based on Scenario Trust.
Int. J. Comput. Intell. Syst., 2012

2011
Application of Fuzzy Comprehensive Evaluation Method in Trust Quantification.
Int. J. Comput. Intell. Syst., 2011

2010
Access Control Mechanism Based on Trust Quantification.
Proceedings of the 2010 IEEE Second International Conference on Social Computing, 2010

A collaborative approach for identifying privacy disclosure in Web-based services.
Proceedings of the IEEE International Conference on Service-Oriented Computing and Applications, 2010

A trust quantification method based on grey fuzzy theory.
Proceedings of the 3rd International Conference on Security of Information and Networks, 2010


  Loading...