default search action
Ze Wang 0016
Person information
- affiliation: Tiangong University, Tianjin, China
- affiliation (former): Tianjin Polytechnic University, Tianjin, China
Other persons with the same name
- Ze Wang — disambiguation page
- Ze Wang 0001 — University of Macau, China
- Ze Wang 0002 — Tsinghua University, Department of Mechanical Engineering, Beijing, China
- Ze Wang 0003 — University of Maryland, School of Medicine, Baltimore, MD, USA
- Ze Wang 0004 — Naval University of Engineering, National Key Laboratory of Electromagnetic Energy, Wuhan, China (and 1 more)
- Ze Wang 0005 — Meituan, Beijing, China
- Ze Wang 0006 — Beijing Normal University at Zhuhai, International Academic Center of Complex Systems, Zhuhai, China (and 1 more)
- Ze Wang 0007 — Central China Normal University, Department of Electronics and Information Engineering, Wuhan, China
- Ze Wang 0008 — Purdue University, West Lafayette, IN, USA
- Ze Wang 0009 — Zhejiang University, State Key Laboratory of Modern Optical Instrumentation, Hangzhou, China
- Ze Wang 0010 — Huazhong University of Science and Technology, State Key Laboratory of Advanced Electromagnetic Engineering and Technology, Wuhan, China
- Ze Wang 0011 — Huazhong Agricultural University, College of Life Science and Technology, Wuhan, China
- Ze Wang 0012 — Xi'an University of Posts & Telecommunications, China
- Ze Wang 0013 — Xidian University, Xi'an, China
- Ze Wang 0014 — Northeast Electric Power University, School of Automation Engineering, Jilin, China
- Ze Wang 0015 — Wuhan University, GNSS Research Center, Wuhan, China (and 1 more)
- Ze Wang 0017 — University of Pennsylvania, Philadelphia, PA, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j9]Ze Wang, Zhenglin Zong, Fang Li, Shimin Sun, Ping Zhao:
Revocable Certificateless Cross-Domain Authentication Scheme Based on Primary-Secondary Blockchain. IEEE Trans. Comput. Soc. Syst. 11(5): 5880-5891 (2024) - 2022
- [j8]Chen Lang, Ze Wang, Kaiming He, Shimin Sun:
POI recommendation based on a multiple bipartite graph network model. J. Supercomput. 78(7): 9782-9816 (2022) - [j7]Zhenghao Yang, Ze Wang, Lei Guo, Wenju Liu, Shimin Sun:
Meta Path-Aware Recommendation Method Based on Non-Negative Matrix Factorization in LBSN. IEEE Trans. Netw. Serv. Manag. 19(4): 4284-4297 (2022) - 2020
- [j6]Yongyang Lv, Wenju Liu, Ze Wang, Zhihao Zhang:
WSN Localization Technology Based on Hybrid GA-PSO-BP Algorithm for Indoor Three-Dimensional Space. Wirel. Pers. Commun. 114(1): 167-184 (2020)
2010 – 2019
- 2019
- [j5]Ren Yue-Qiang, Ze Wang, Sun Xiao-Na, Sun Shi-Min:
A Multi-Element Hybrid Location Recommendation Algorithm for Location Based Social Networks. IEEE Access 7: 100416-100427 (2019) - 2017
- [j4]Ze Wang, Chang Zhou, Yiran Liu:
Efficient Hybrid Detection of Node Replication Attacks in Mobile Sensor Networks. Mob. Inf. Syst. 2017: 8636379:1-8636379:13 (2017) - [c6]Xiaoxu Ma, Wenju Liu, Ze Wang:
Node Localization of Wireless Sensor Network Based on Secondary Correction Error. PAAP 2017: 142-151 - 2015
- [j3]Ze Wang, Haijuan Zhang, Luqiang Wu, Chang Zhou:
Layered Location-Based Security Mechanism for Mobile Sensor Networks: Moving Security Areas. Sensors 15(10): 24886-24902 (2015) - 2013
- [j2]Ze Wang, Yunlong Wang, Maode Ma, Jigang Wu:
Efficient localization for mobile sensor networks based on constraint rules optimized Monte Carlo method. Comput. Networks 57(14): 2788-2801 (2013) - 2012
- [j1]Ze Wang, Maode Ma, Jigang Wu:
Securing wireless mesh networks in a unified security framework with corruption-resilience. Comput. Networks 56(12): 2981-2993 (2012) - [c5]Ze Wang, Maode Ma:
A collusion-resilient self-healing key distribution scheme for wireless sensor networks. ICC 2012: 566-570 - 2011
- [c4]Ze Wang, Maode Ma, Wenju Liu, Xixi Wei:
A Unified Security Framework for Multi-domain Wireless Mesh Networks. ICICS 2011: 319-329 - [c3]Yunlong Wang, Ze Wang:
Accurate and computation-efficient localization for mobile sensor networks. WCSP 2011: 1-5
2000 – 2009
- 2007
- [c2]Wei Sun, Yongzhen Ke, Wenju Liu, Ze Wang:
An Unsupervised Host-Based Anomaly Intrusion Detection Technique Based on Non-negative Matrix Factorization. IMECS 2007: 238-243 - [c1]Yongzhen Ke, Wei Sun, Wenju Liu, Ze Wang:
Intrusion Detection Using Wavelet Transform and Non Negative Matrix Factorization. IMECS 2007: 1345-1350
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-04 20:46 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint