Ze Wang

Orcid: 0000-0001-6971-2004

Affiliations:
  • Tiangong University, Tianjin, China
  • Tianjin Polytechnic University, Tianjin, China (former)


According to our database1, Ze Wang authored at least 15 papers between 2007 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Revocable Certificateless Cross-Domain Authentication Scheme Based on Primary-Secondary Blockchain.
IEEE Trans. Comput. Soc. Syst., October, 2024

2022
Meta Path-Aware Recommendation Method Based on Non-Negative Matrix Factorization in LBSN.
IEEE Trans. Netw. Serv. Manag., December, 2022

POI recommendation based on a multiple bipartite graph network model.
J. Supercomput., 2022

2020
WSN Localization Technology Based on Hybrid GA-PSO-BP Algorithm for Indoor Three-Dimensional Space.
Wirel. Pers. Commun., 2020

2019
A Multi-Element Hybrid Location Recommendation Algorithm for Location Based Social Networks.
IEEE Access, 2019

2017
Efficient Hybrid Detection of Node Replication Attacks in Mobile Sensor Networks.
Mob. Inf. Syst., 2017

Node Localization of Wireless Sensor Network Based on Secondary Correction Error.
Proceedings of the Parallel Architecture, Algorithm and Programming, 2017

2015
Layered Location-Based Security Mechanism for Mobile Sensor Networks: Moving Security Areas.
Sensors, 2015

2013
Efficient localization for mobile sensor networks based on constraint rules optimized Monte Carlo method.
Comput. Networks, 2013

2012
Securing wireless mesh networks in a unified security framework with corruption-resilience.
Comput. Networks, 2012

A collusion-resilient self-healing key distribution scheme for wireless sensor networks.
Proceedings of IEEE International Conference on Communications, 2012

2011
Accurate and computation-efficient localization for mobile sensor networks.
Proceedings of the 2011 International Conference on Wireless Communications & Signal Processing, 2011

A Unified Security Framework for Multi-domain Wireless Mesh Networks.
Proceedings of the Information and Communications Security - 13th International Conference, 2011

2007
An Unsupervised Host-Based Anomaly Intrusion Detection Technique Based on Non-negative Matrix Factorization.
Proceedings of the International MultiConference of Engineers and Computer Scientists 2007, 2007

Intrusion Detection Using Wavelet Transform and Non Negative Matrix Factorization.
Proceedings of the International MultiConference of Engineers and Computer Scientists 2007, 2007


  Loading...