Wei She

Orcid: 0000-0001-8876-3763

According to our database1, Wei She authored at least 40 papers between 2006 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Multi-party codebook distribution strategy based on secret sharing.
Int. J. Inf. Sec., August, 2024

Fast UAV path planning in urban environments based on three-step experience buffer sampling DDPG.
Digit. Commun. Networks, 2024

2023
Elite-centered artificial bee colony algorithm with extended solution boundary.
Appl. Soft Comput., November, 2023

2022
RANet: Network intrusion detection with group-gating convolutional neural network.
J. Netw. Comput. Appl., 2022

Research on Neural Network Algorithm for Road Crack Detection.
Proceedings of the 7th International Conference on Cyber Security and Information Engineering, 2022

2021
Ramie Yield Estimation Based on UAV RGB Images.
Sensors, 2021

A double steganography model combining blockchain and interplanetary file system.
Peer-to-Peer Netw. Appl., 2021

A donation tracing blockchain model using improved DPoS consensus algorithm.
Peer-to-Peer Netw. Appl., 2021

2020
A channel matching scheme for cross-chain.
Int. J. Embed. Syst., 2020

Harmonic Loss Function for Sensor-Based Human Activity Recognition Based on LSTM Recurrent Neural Networks.
IEEE Access, 2020

The Research on the Development and Utilization of Hospital Archive Information in the Big Data Era.
Proceedings of the 2020 International Conference on Machine Learning and Big Data Analytics for IoT Security and Privacy, 2020

Multilayer Perceptron Based on Joint Training for Predicting Popularity.
Proceedings of the Artificial Intelligence and Security - 6th International Conference, 2020

A Mutual Trust Method for Energy Internet Agent Nodes in Untrusted Environment.
Proceedings of the Artificial Intelligence and Security - 6th International Conference, 2020

A Medical Blockchain Privacy Protection Model Based on Mimicry Defense.
Proceedings of the Artificial Intelligence and Security - 6th International Conference, 2020

2019
Parameter estimation of P-III distribution based on GA using rejection and interpolation mechanism.
Clust. Comput., 2019

Blockchain Trust Model for Malicious Node Detection in Wireless Sensor Networks.
IEEE Access, 2019

Homomorphic Consortium Blockchain for Smart Home System Sensitive Data Privacy Preserving.
IEEE Access, 2019

Research on Gateway Deployment for Throughput Optimization in Wireless Mesh Networks.
Proceedings of the 2019 International Conference on Computer, 2019

2018
基于子块分割的自适应式全盲图像水印算法 (Adaptive Blind Watermarking Algorithm Based on Sub-block Segmentation).
计算机科学, 2018

A Novel Hybrid-Based Ensemble for Class Imbalance Problem.
Int. J. Artif. Intell. Tools, 2018

Ensemble based on feature projection and under-sampling for imbalanced learning.
Intell. Data Anal., 2018

2016
Role-Based Integrated Access Control and Data Provenance for SOA Based Net-Centric Systems.
IEEE Trans. Serv. Comput., 2016

Logistic discrimination based on G-mean and F-measure for imbalanced problem.
J. Intell. Fuzzy Syst., 2016

2015
一种基于TF-HBPN的复杂系统行为分析方法 (Method of Behavior Analysis for Complex System Based on Hierarchical Bayesian Petri Net with Time Factor).
计算机科学, 2015

2013
Security-Aware Service Composition with Fine-Grained Information Flow Control.
IEEE Trans. Serv. Comput., 2013

A Semantic-based Semi-automated Role Mapping Mechanism (S).
Proceedings of the 25th International Conference on Software Engineering and Knowledge Engineering, 2013

2012
PPN: A probabilistic model for fault detection and diagnosis.
Proceedings of the 12th International Conference on Intelligent Systems Design and Applications, 2012

Fault diagnosis via fuzzy time analysis.
Proceedings of the FUZZ-IEEE 2012, 2012

2011
Role-based integrated access control and data provenance for SOA based net-centric systems.
Proceedings of the IEEE 6th International Symposium on Service Oriented System Engineering, 2011

Rule-Based Run-Time Information Flow Control in Service Cloud.
Proceedings of the IEEE International Conference on Web Services, 2011

A Two-Stage Decision Tree Algorithm on Constructing Hyper-Plane.
Proceedings of the Applied Informatics and Communication - International Conference, 2011

2010
Enhancing Security Modeling for Web Services Using Delegation and Pass-On.
Int. J. Web Serv. Res., 2010

Policy-Driven Service Composition with Information Flow Control.
Proceedings of the IEEE International Conference on Web Services, 2010

WS-Sim: A Web Service Simulation Toolset with Realistic Data Support.
Proceedings of the Workshop Proceedings of the 34th Annual IEEE International Computer Software and Applications Conference, 2010

2009
Effective and efficient implementation of an information flow control protocol for service composition.
Proceedings of the IEEE International Conference on Service-Oriented Computing and Applications, 2009

The SCIFC Model for Information Flow Control in Web Service Composition.
Proceedings of the IEEE International Conference on Web Services, 2009

2007
Security for Enterprise Resource Planning Systems.
Inf. Secur. J. A Glob. Perspect., 2007

Delegation-Based Security Model for Web Services.
Proceedings of the Tenth IEEE International Symposium on High Assurance Systems Engineering (HASE 2007), 2007

2006
A New Conceptual Distributed Network Measurement Architecture Based on Web Service.
Proceedings of the 14th IEEE International Conference on Networks, 2006

Passive Inter-Domain Routing Monitor Based on Routing Interaction.
Proceedings of the Sixth International Conference on Computer and Information Technology (CIT 2006), 2006


  Loading...