Wan Tang
Orcid: 0000-0003-3611-7385
According to our database1,
Wan Tang
authored at least 25 papers
between 2008 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
H-Louvain: Hierarchical Louvain-based community detection in social media data streams.
Peer Peer Netw. Appl., July, 2024
2023
Proceedings of the 9th IEEE International Conference on Cloud Computing and Intelligent Systems, 2023
GANDPS: Ensuring Both Detection Precision and Stability in GAN-based Anomaly Detection for Network Traffic.
Proceedings of the IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2023
2022
Proceedings of the 15th IEEE/ACM International Conference on Utility and Cloud Computing, 2022
BACO: A Bi-Ant-Colony-Based Strategy for UAV Trajectory Planning with Obstacle Avoidance.
Proceedings of the 18th International Conference on Mobility, Sensing and Networking, 2022
2021
MPDC: A Multi-channel Pipelined Data Collection MAC for Duty-Cycled Linear Sensor Networks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2021
2020
IPsec Cryptographic Algorithm Invocation Considering Performance and Security for SDN Southbound Interface Communication.
IEEE Access, 2020
MEM: A Multi-Staged Eviction Mechanism of Flowtable for Software-Defined Datacenters.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020
2019
Centroid opposition with a two-point full crossover for the partially attracted firefly algorithm.
Soft Comput., 2019
2018
Wirel. Commun. Mob. Comput., 2018
Cryptographic Algorithm Invocation in IPsec: Guaranteeing the Communication Security in the Southbound Interface of SDN Networks.
Proceedings of the Communications and Networking, 2018
2016
2015
KSII Trans. Internet Inf. Syst., 2015
2014
Home Circuit Sharing for Dynamic Wavelength Assignment in LOBS-Based Datacenter Networks.
IEICE Trans. Inf. Syst., 2014
Sample Size Determination to Detect Cusp Catastrophe in Stochastic Cusp Catastrophe Model: A Monte-Carlo Simulation-Based Approach.
Proceedings of the Social Computing, Behavioral-Cultural Modeling and Prediction, 2014
Proceedings of the 9th International Conference on Communications and Networking in China, 2014
2011
Security Enhancement Mechanism Based on Contextual Authentication and Role Analysis for 2G-RFID Systems.
Sensors, 2011
Int. J. Commun. Networks Distributed Syst., 2011
P-MAC: A Cross-Layer Duty Cycle MAC Protocol Towards Pipelining for Wireless Sensor Networks.
Proceedings of IEEE International Conference on Communications, 2011
Proceedings of IEEE International Conference on Communications, 2011
2010
KSII Trans. Internet Inf. Syst., 2010
Proceedings of the 18th International Workshop on Quality of Service, 2010
2008
Comparing multiple sensitivities and specificities with different diagnostic criteria: Applications to sexual abuse and sexual health research.
Comput. Stat. Data Anal., 2008
Study on Adaptive Intrusion Detection Engine Based on Gene Expression Programming Rules.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008