Ping Wang
Orcid: 0000-0001-8077-4759Affiliations:
- Kun Shan University, Department of Information Management, Taiwan
- National Chiao Tung University, Institute of Information Management, Taiwan (former)
According to our database1,
Ping Wang
authored at least 36 papers
between 2004 and 2021.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2021
Identifying the Attack Sources of Botnets for a Renewable Energy Management System by Using a Revised Locust Swarm Optimisation Scheme.
Symmetry, 2021
2020
Proceedings of the International Computer Symposium, 2020
2019
Implementation of a PSO-Based Security Defense Mechanism for Tracing the Sources of DDoS Attacks.
Comput., 2019
Behaviorial-Based Network Flow Analyses for Anomaly Detection in Sequential Data Using Temporal Convolutional Networks.
Proceedings of the Advances in E-Business Engineering for Ubiquitous Computing, 2019
2018
A Cross-Age Face Recognition Approach Using Fog Computing Architecture for User Authentication on Mobile Devices.
Proceedings of the 15th IEEE International Conference on e-Business Engineering, 2018
2017
Using ontologies to perform threat analysis and develop defensive strategies for mobile security.
Inf. Technol. Manag., 2017
Weighted-spectral clustering algorithm for detecting community structures in complex networks.
Artif. Intell. Rev., 2017
A Face-Recognition Approach Using Deep Reinforcement Learning Approach for User Authentication.
Proceedings of the 14th IEEE International Conference on e-Business Engineering, 2017
2016
Inf. Sci., 2016
Using malware for software-defined networking-based smart home security management through a taint checking approach.
Int. J. Distributed Sens. Networks, 2016
Electron. Commer. Res. Appl., 2016
An Efficient Flow Control Approach for SDN-Based Network Threat Detection and Migration Using Support Vector Machine.
Proceedings of the 13th IEEE International Conference on e-Business Engineering, 2016
2015
Malware behavioural detection and vaccine development by using a support vector model classifier.
J. Comput. Syst. Sci., 2015
Satisfaction-based Web service discovery and selection scheme utilizing vague sets theory.
Inf. Syst. Frontiers, 2015
A reputation-based computing approach in trusted web service provisions.
Comput. Syst. Sci. Eng., 2015
Proceedings of the 12th IEEE International Conference on e-Business Engineering, 2015
2014
Proceedings of the 11th IEEE International Conference on e-Business Engineering, 2014
2013
A Novel Threat and Risk Assessment Mechanism for Security Controls in Service Management.
Proceedings of the IEEE 10th International Conference on e-Business Engineering, 2013
2011
Proceedings of the 17th IEEE International Conference on Parallel and Distributed Systems, 2011
Proceedings of the IEEE 8th International Conference on e-Business Engineering, 2011
2010
Proceedings of the Agent-Based Service-Oriented Computing, 2010
Expert Syst. Appl., 2010
Proceedings of the International Conference on Networked Computing and Advanced Information Management, 2010
2009
Proceedings of the IEEE International Conference on Service-Oriented Computing and Applications, 2009
Proceedings of the 2009 IEEE International Conference on e-Business Engineering, 2009
2008
Proceedings of the 2008 IEEE International Conference on e-Business Engineering, 2008
2007
Int. J. Electron. Bus. Manag., 2007
Concurr. Comput. Pract. Exp., 2007
Clust. Comput., 2007
2006
Expert Syst. Appl., 2006
Service discovery through consensus based preferences.
Comput. Syst. Sci. Eng., 2006
Proceedings of the 2006 IEEE International Conference on e-Business Engineering (ICEBE 2006), 2006
A Fuzzy Decision Model of Risk Assessment Through Fuzzy Preference Relations with Users Confidence-interval.
Proceedings of the 20th International Conference on Advanced Information Networking and Applications (AINA 2006), 2006
2005
Solving Consensus Measure of Ambiguous GDM Problems Using Vague Sets - An Application of Risk Assessment.
Proceedings of the Computer Supported Cooperative Work in Design II, 2005
2004
Using fuzzy distance to evaluate the consensus of group decision-making an entropy-based approach.
Proceedings of the IEEE International Conference on Fuzzy Systems, 2004