Ping Wang

Orcid: 0000-0001-8077-4759

Affiliations:
  • Kun Shan University, Department of Information Management, Taiwan
  • National Chiao Tung University, Institute of Information Management, Taiwan (former)


According to our database1, Ping Wang authored at least 36 papers between 2004 and 2021.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2021
Identifying the Attack Sources of Botnets for a Renewable Energy Management System by Using a Revised Locust Swarm Optimisation Scheme.
Symmetry, 2021

2020
A Case Study on Experiment Site Selection for PV Energy Generation Forecast.
Proceedings of the International Computer Symposium, 2020

2019
Implementation of a PSO-Based Security Defense Mechanism for Tracing the Sources of DDoS Attacks.
Comput., 2019

Behaviorial-Based Network Flow Analyses for Anomaly Detection in Sequential Data Using Temporal Convolutional Networks.
Proceedings of the Advances in E-Business Engineering for Ubiquitous Computing, 2019

2018
A Cross-Age Face Recognition Approach Using Fog Computing Architecture for User Authentication on Mobile Devices.
Proceedings of the 15th IEEE International Conference on e-Business Engineering, 2018

2017
Using ontologies to perform threat analysis and develop defensive strategies for mobile security.
Inf. Technol. Manag., 2017

Weighted-spectral clustering algorithm for detecting community structures in complex networks.
Artif. Intell. Rev., 2017

A Face-Recognition Approach Using Deep Reinforcement Learning Approach for User Authentication.
Proceedings of the 14th IEEE International Conference on e-Business Engineering, 2017

2016
An improved ant colony system algorithm for solving the IP traceback problem.
Inf. Sci., 2016

Using malware for software-defined networking-based smart home security management through a taint checking approach.
Int. J. Distributed Sens. Networks, 2016

Face recognition using support vector model classifier for user authentication.
Electron. Commer. Res. Appl., 2016

An Efficient Flow Control Approach for SDN-Based Network Threat Detection and Migration Using Support Vector Machine.
Proceedings of the 13th IEEE International Conference on e-Business Engineering, 2016

2015
Malware behavioural detection and vaccine development by using a support vector model classifier.
J. Comput. Syst. Sci., 2015

Satisfaction-based Web service discovery and selection scheme utilizing vague sets theory.
Inf. Syst. Frontiers, 2015

A reputation-based computing approach in trusted web service provisions.
Comput. Syst. Sci. Eng., 2015

Using Dynamic Taint Approach for Malware Threat.
Proceedings of the 12th IEEE International Conference on e-Business Engineering, 2015

2014
Using Taint Analysis for Threat Risk of Cloud Applications.
Proceedings of the 11th IEEE International Conference on e-Business Engineering, 2014

2013
A Novel Threat and Risk Assessment Mechanism for Security Controls in Service Management.
Proceedings of the IEEE 10th International Conference on e-Business Engineering, 2013

2011
An evidence-based scheme for web service selection.
Inf. Technol. Manag., 2011

A Revised Ant Colony Optimization Scheme for Discovering Attack Paths of Botnet.
Proceedings of the 17th IEEE International Conference on Parallel and Distributed Systems, 2011

A Consumer Trust-Based Approach in Web Services Selection.
Proceedings of the IEEE 8th International Conference on e-Business Engineering, 2011

2010
Consensus Issues for Service Advertisement and Selection.
Proceedings of the Agent-Based Service-Oriented Computing, 2010

On optimal decision for QoS-aware composite service selection.
Expert Syst. Appl., 2010

An analysis model of botnet tracking based on ant colony optimization algorithm.
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2010

2009
A reputation scheme with witness reasoning for service selection.
Proceedings of the IEEE International Conference on Service-Oriented Computing and Applications, 2009

A Reputation-Based Service Selection Scheme.
Proceedings of the 2009 IEEE International Conference on e-Business Engineering, 2009

2008
QoS-Aware Service Selection under Consumer's Reputation.
Proceedings of the 2008 IEEE International Conference on e-Business Engineering, 2008

2007
Applying Semi-Order Preference Model in Content-Based Service Discovery.
Int. J. Electron. Bus. Manag., 2007

QoS-aware mobile service transactions in a wireless environment.
Concurr. Comput. Pract. Exp., 2007

A fuzzy outranking approach in risk analysis of web service security.
Clust. Comput., 2007

2006
A fuzzy group-preferences analysis method for new-product development.
Expert Syst. Appl., 2006

Service discovery through consensus based preferences.
Comput. Syst. Sci. Eng., 2006

A Fuzzy Model for Selection of QoS-Aware Web Services.
Proceedings of the 2006 IEEE International Conference on e-Business Engineering (ICEBE 2006), 2006

A Fuzzy Decision Model of Risk Assessment Through Fuzzy Preference Relations with Users Confidence-interval.
Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 2006

2005
Solving Consensus Measure of Ambiguous GDM Problems Using Vague Sets - An Application of Risk Assessment.
Proceedings of the Computer Supported Cooperative Work in Design II, 2005

2004
Using fuzzy distance to evaluate the consensus of group decision-making an entropy-based approach.
Proceedings of the IEEE International Conference on Fuzzy Systems, 2004


  Loading...