Zengliang Liu

According to our database1, Zengliang Liu authored at least 13 papers between 2008 and 2022.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2022
Link Connectivity-Based Access Selection Method for Multi-UAV Heterogeneous Networks.
Int. J. Pattern Recognit. Artif. Intell., 2022

2018
A extended intuitionistic fuzzy Choquet integral correlation coefficient based on Shapley index in multi-criteria decision making.
J. Intell. Fuzzy Syst., 2018

Factorial-Quality Scalar and an Extension of ELECTRE in Intuitionistic Fuzzy Sets.
Int. J. Inf. Technol. Decis. Mak., 2018

2013
Mobile Cloud Computing Network Attack and Defense Learning System Based on Fuzzy Soft Sets.
Proceedings of the First International Conference on Information Technology and Quantitative Management, 2013

Digital Rights Management and Access Control in Multimedia Social Networks.
Proceedings of the Genetic and Evolutionary Computing, 2013

2012
An oriented-application adaptive mobile cloud computing middleware.
Proceedings of the 2nd IEEE International Conference on Cloud Computing and Intelligence Systems, 2012

Study of soft sets category and it's properties.
Proceedings of the 2nd IEEE International Conference on Cloud Computing and Intelligence Systems, 2012

A task-oriented computing service sharing model and its application to talent training and management.
Proceedings of the 2nd IEEE International Conference on Cloud Computing and Intelligence Systems, 2012

2011
Driving and control of torque for direct-wheel-driven electric vehicle with motors in serial.
Expert Syst. Appl., 2011

Tacit knowledge sharing result evaluation based on improved AHP.
Proceedings of the IEEE International Conference on Automation and Logistics, 2011

The metric model of software trustworthiness based on symbiosis theory.
Proceedings of the International Conference on Electronic and Mechanical Engineering and Information Technology, 2011

2008
Research on Intelligent Simulation Model of Network Defense.
Proceedings of the PACIIA 2008, 2008

Evaluating Method of Security Threat Based on Attacking-Path Graph Model.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008


  Loading...