Huan Wang

Orcid: 0000-0002-9688-6242

Affiliations:
  • Changchun University of Science and Technology, College of Computer Science and Technology, China (PhD 2017)


According to our database1, Huan Wang authored at least 18 papers between 2009 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Multi-Constraint and Multi-Policy Path Hopping Active Defense Method Based on SDN.
Future Internet, April, 2024

A Multiagent Deep Reinforcement Learning Autonomous Security Management Approach for Internet of Things.
IEEE Internet Things J., 2024

A method of network attack-defense game and collaborative defense decision-making based on hierarchical multi-agent reinforcement learning.
Comput. Secur., 2024

Research on Method for Fusion and Mapping of Cyberspace Assets Based on Knowledge Graph.
IEEE Access, 2024

2023
An Intelligent Digital Twin Method Based on Spatio-Temporal Feature Fusion for IoT Attack Behavior Identification.
IEEE J. Sel. Areas Commun., November, 2023

An evolutionary computation-based machine learning for network attack detection in big data traffic.
Appl. Soft Comput., May, 2023

A Survey on Vehicular Cloud Network Security.
IEEE Access, 2023

2021
An identification strategy for unknown attack through the joint learning of space-time features.
Future Gener. Comput. Syst., 2021

2020
Hand Gesture Recognition Enhancement Based on Spatial Fuzzy Matching in Leap Motion.
IEEE Trans. Ind. Informatics, 2020

2019
Virtual machine scheduling strategy based on machine learning algorithms for load balancing.
EURASIP J. Wirel. Commun. Netw., 2019

Allocating Limited Resources to Protect a Massive Number of Targets using a Game Theoretic Model.
CoRR, 2019

Research on classification and recognition of attacking factors based on radial basis function neural network.
Clust. Comput., 2019

2018
Research on Network Security Situation Assessment and Quantification Method Based on Analytic Hierarchy Process.
Wirel. Pers. Commun., 2018

A cloud service adaptive framework based on reliable resource allocation.
Future Gener. Comput. Syst., 2018

A Vulnerability Assessment Method in Industrial Internet of Things Based on Attack Graph and Maximum Flow.
IEEE Access, 2018

Dynamic Consistency Adjustment Mechanism of Distributed Cloud Data Storage Based on Hotspot.
Proceedings of the 2018 International Conference on Internet and e-Business, 2018

2017
An Improved Fast Decision Tree Algorithm Based on Attribute Deviation.
Proceedings of the Fuzzy Systems and Data Mining III, 2017

2009
An Improved Intrusion Detection Method in Mobile AdHoc Network.
Proceedings of the Eighth IEEE International Conference on Dependable, 2009


  Loading...