default search action
Shancang Li
Person information
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j88]Chunchun Ni, Shancang Li:
Machine learning enabled Industrial IoT Security: Challenges, Trends and Solutions. J. Ind. Inf. Integr. 38: 100549 (2024) - [j87]Hongping Li, Shancang Li, Geyong Min:
Lightweight privacy-preserving predictive maintenance in 6G enabled IIoT. J. Ind. Inf. Integr. 39: 100548 (2024) - [j86]Xueyi Wang, Shancang Li, Muddesar Iqbal:
Live Power Generation Predictions via AI-Driven Resilient Systems in Smart Microgrids. IEEE Trans. Consumer Electron. 70(1): 3875-3884 (2024) - [j85]Wangli Hao, Meng Han, Shancang Li, Fuzhong Li:
Dancing with the sound in edge computing environments. Wirel. Networks 30(5): 3935-3945 (2024) - 2023
- [j84]Shancang Li, Surya Nepal, Theo Tryfonas, Hongwei Li:
Blockchain-based Zero Trust Cybersecurity in the Internet of Things. ACM Trans. Internet Techn. 23(3): 36:1-36:3 (2023) - [j83]Shancang Li, Shanshan Zhao, Prosanta Gope, Li Da Xu:
Data Privacy Enhancing in the IoT User/Device Behavior Analytics. ACM Trans. Sens. Networks 19(2): 32:1-32:13 (2023) - [c15]Shancang Li, Yifan Liu:
Human-centric Artificial Intelligence enabled Digital Images and Videos Forensic Triage. HCCS 2023: 1-5 - [c14]Yifan Liu, Shancang Li:
Hybrid cyber threats detection using explainable AI in Industrial IoT. HCCS 2023: 1-6 - [c13]Xueyi Wang, Yifan Liu, Shancang Li:
Deep Learning Enabled Keystroke Eavesdropping Attack Over Videoconferencing Platforms. INFOCOM Workshops 2023: 1-2 - [c12]Sarah Binhulayyil, Shancang Li:
Ripple20 Vulnerabilities Detection using a Featureless Deep Learning Model. TrustCom 2023: 1236-1240 - 2022
- [j82]Wangli Hao, Meng Han, Shancang Li, Fuzhong Li:
An Attention Enhanced Cross-Modal Image-Sound Mutual Generation Model for Birds. Comput. J. 65(2): 410-422 (2022) - [j81]Han Cao, Chengxiang Si, Qindong Sun, Yanxiao Liu, Shancang Li, Prosanta Gope:
ABCAttack: A Gradient-Free Optimization Black-Box Attack for Fooling Deep Image Classifiers. Entropy 24(3): 412 (2022) - [j80]Yuwen Liu, Dejuan Li, Shaohua Wan, Fan Wang, Wanchun Dou, Xiaolong Xu, Shancang Li, Rui Ma, Lianyong Qi:
A long short-term memory-based model for greenhouse climate prediction. Int. J. Intell. Syst. 37(1): 135-151 (2022) - [j79]Chenghui Zhang, Xinchun Cui, Shujun Lian, Ruyi Xiao, Hong Qiao, Shancang Li, Yue Lou, Yue Feng, Liying Zhuang, Jianzong Du, Xiaoli Liu:
Intelligent algorithm for dynamic functional brain network complexity from CN to AD. Int. J. Intell. Syst. 37(8): 4715-4746 (2022) - [j78]Shancang Li, Shanshan Zhao, Geyong Min, Lianyong Qi, Gang Liu:
Lightweight Privacy-Preserving Scheme Using Homomorphic Encryption in Industrial Internet of Things. IEEE Internet Things J. 9(16): 14542-14550 (2022) - [j77]Zhengxin Yu, Jia Hu, Geyong Min, Zi Wang, Wang Miao, Shancang Li:
Privacy-Preserving Federated Deep Learning for Cooperative Hierarchical Caching in Fog Computing. IEEE Internet Things J. 9(22): 22246-22255 (2022) - [j76]Peisong Li, Xinheng Wang, Kaizhu Huang, Yi Huang, Shancang Li, Muddesar Iqbal:
Multi-Model Running Latency Optimization in an Edge Computing Paradigm. Sensors 22(16): 6097 (2022) - [j75]Biying Wang, Zheng Chang, Shancang Li, Timo Hämäläinen:
An Efficient and Privacy-Preserving Blockchain-Based Authentication Scheme for Low Earth Orbit Satellite-Assisted Internet of Things. IEEE Trans. Aerosp. Electron. Syst. 58(6): 5153-5164 (2022) - [j74]Fan Wang, Haibin Zhu, Gautam Srivastava, Shancang Li, Mohammad Reza Khosravi, Lianyong Qi:
Robust Collaborative Filtering Recommendation With User-Item-Trust Records. IEEE Trans. Comput. Soc. Syst. 9(4): 986-996 (2022) - [j73]Zhaoli Liu, Tao Qin, Qindong Sun, Shancang Li, Houbing Herbert Song, Zhouguo Chen:
SIRQU: Dynamic Quarantine Defense Model for Online Rumor Propagation Control. IEEE Trans. Comput. Soc. Syst. 9(6): 1703-1714 (2022) - [j72]Yi Jin, Bin Huang, Yulong Yan, Yuxiang Huan, Jiawei Xu, Shancang Li, Prosanta Gope, Li Da Xu, Zhuo Zou, Lirong Zheng:
Edge-Based Collaborative Training System for Artificial Intelligence-of-Things. IEEE Trans. Ind. Informatics 18(10): 7162-7173 (2022) - [j71]Qindong Sun, Kai Lin, Chengxiang Si, Yanyue Xu, Shancang Li, Prosanta Gope:
A Secure and Anonymous Communicate Scheme over the Internet of Things. ACM Trans. Sens. Networks 18(3): 40:1-40:21 (2022) - [j70]Jianyu Xiao, Wei Su, Shancang Li, Huanhua Liu:
Microservices priority estimation for IoT platform based on analytic hierarchy process and fuzzy comprehensive method. World Wide Web 25(5): 1851-1862 (2022) - 2021
- [j69]Wang Ren, Xin Tong, Jing Du, Na Wang, Shancang Li, Geyong Min, Zhiwei Zhao, Ali Kashif Bashir:
Privacy-preserving using homomorphic encryption in Mobile IoT systems. Comput. Commun. 165: 105-111 (2021) - [j68]Gang Liu, Wenxian Pei, Yumin Tian, Chen Liu, Shancang Li:
A novel conflict detection method for ABAC security policies. J. Ind. Inf. Integr. 22: 100200 (2021) - [j67]Jing Liu, Jianhui Ge, Yuxin Xue, Wenjuan He, Qindong Sun, Shancang Li:
Multi-scale skip-connection network for image super-resolution. Multim. Syst. 27(4): 821-836 (2021) - [j66]Qindong Sun, Xingyu Feng, Shanshan Zhao, Han Cao, Shancang Li, Yufeng Yao:
Deep Learning Based Customer Preferences Analysis in Industry 4.0 Environment. Mob. Networks Appl. 26(6): 2329-2340 (2021) - [j65]Fang Yang, Fuzhong Li, Kai Zhang, Wuping Zhang, Shancang Li:
Influencing factors analysis in pear disease recognition using deep learning. Peer-to-Peer Netw. Appl. 14(3): 1816-1828 (2021) - [j64]Runnan Zhang, Gang Liu, Shancang Li, Yongheng Wei, Quan Wang:
ABSAC: Attribute-Based Access Control Model Supporting Anonymous Access for Smart Cities. Secur. Commun. Networks 2021: 5531369:1-5531369:11 (2021) - [j63]Yawei Yue, Shancang Li, Phil Legg, Fuzhong Li:
Deep Learning-Based Security Behaviour Analysis in IoT Environments: A Survey. Secur. Commun. Networks 2021: 8873195:1-8873195:13 (2021) - [j62]Tao Zhou, Jiuxin Cao, Xuelin Zhu, Bo Liu, Shancang Li:
Visual-Textual Sentiment Analysis Enhanced by Hierarchical Cross-Modality Interaction. IEEE Syst. J. 15(3): 4303-4314 (2021) - [j61]Wenmin Lin, Xuyun Zhang, Lianyong Qi, Weimin Li, Shancang Li, Victor S. Sheng, Surya Nepal:
Location-Aware Service Recommendations With Privacy-Preservation in the Internet of Things. IEEE Trans. Comput. Soc. Syst. 8(1): 227-235 (2021) - [j60]Han Yu, Li Da Xu, Hongming Cai, Shancang Li, Boyi Xu, Lihong Jiang:
A Stream Processing Framework Based on Linked Data for Information Collaborating of Regional Energy Networks. IEEE Trans. Ind. Informatics 17(1): 179-188 (2021) - [j59]Lianyong Qi, Xiaokang Wang, Xiaolong Xu, Wanchun Dou, Shancang Li:
Privacy-Aware Cross-Platform Service Recommendation Based on Enhanced Locality-Sensitive Hashing. IEEE Trans. Netw. Sci. Eng. 8(2): 1145-1153 (2021) - [j58]Yan Wang, Qindong Sun, Dongzhu Rong, Shancang Li, Li Da Xu:
Image Source Identification Using Convolutional Neural Networks in IoT Environment. Wirel. Commun. Mob. Comput. 2021: 5804665:1-5804665:12 (2021) - 2020
- [j57]Shancang Li, Kim-Kwang Raymond Choo, Zhiyuan Tan, Xiangjian He, Jiankun Hu, Tao Qin:
IEEE Access Special Section Editorial: Security and Trusted Computing for Industrial Internet of Things: Research Challenges and Opportunities. IEEE Access 8: 145033-145036 (2020) - [j56]Jing Liu, Yuxin Xue, Shanshan Zhao, Shancang Li, Xiaoyan Zhang:
A Convolutional Neural Network for Image Super-Resolution Using Internal Dataset. IEEE Access 8: 201055-201070 (2020) - [j55]Weiyi Zhong, Xiaochun Yin, Xuyun Zhang, Shancang Li, Wanchun Dou, Ruili Wang, Lianyong Qi:
Multi-dimensional quality-driven service recommendation with privacy-preservation in mobile edge environment. Comput. Commun. 157: 116-123 (2020) - [j54]Lianyong Qi, Xuyun Zhang, Shancang Li, Shaohua Wan, Yiping Wen, Wenwen Gong:
Spatial-temporal data-driven service recommendation with privacy-preservation. Inf. Sci. 515: 91-102 (2020) - [j53]Saqib Rasool, Muddesar Iqbal, Tasos Dagiuklas, Zia Ul-Qayyum, Shancang Li:
Reliable Data Analysis through Blockchain based Crowdsourcing in Mobile Ad-hoc Cloud. Mob. Networks Appl. 25(1): 153-163 (2020) - [j52]Tao Qin, Zhaoli Liu, Shancang Li, Xiaohong Guan:
A Two-Stagse Approach for Social Identity Linkage Based on an Enhanced Weighted Graph Model. Mob. Networks Appl. 25(4): 1364-1375 (2020) - [j51]Muhammad Safyan, Sohail Sarwar, Zia Ul-Qayyum, Muddesar Iqbal, Shancang Li, Muhammad Kashif:
Machine Learning Based Activity Learning for Behavioral Contexts in Internet of Things (IoT). Program. Comput. Softw. 46(8): 626-635 (2020) - [j50]Huaijun Wang, Jing Zhao, Junhuai Li, Ling Tian, Pengjia Tu, Ting Cao, Yang An, Kan Wang, Shancang Li:
Wearable Sensor-Based Human Activity Recognition Using Hybrid Deep Learning Techniques. Secur. Commun. Networks 2020: 2132138:1-2132138:12 (2020) - [j49]Wangli Hao, Ruixian Zhang, Shancang Li, Junyu Li, Fuzhong Li, Shanshan Zhao, Wuping Zhang:
Anomaly Event Detection in Security Surveillance Using Two-Stream Based Model. Secur. Commun. Networks 2020: 8876056:1-8876056:15 (2020) - [j48]Shuai Xu, Jiuxin Cao, Phil Legg, Bo Liu, Shancang Li:
Venue2Vec: An Efficient Embedding Model for Fine-Grained User Location Prediction in Geo-Social Networks. IEEE Syst. J. 14(2): 1740-1751 (2020) - [j47]Shanshan Zhao, Shancang Li, Lianyong Qi, Li Da Xu:
Computational Intelligence Enabled Cybersecurity for the Internet of Things. IEEE Trans. Emerg. Top. Comput. Intell. 4(5): 666-674 (2020) - [j46]Tao Qin, Zhaoli Liu, Pinghui Wang, Shancang Li, Xiaohong Guan, Lixin Gao:
Symmetry Degree Measurement and its Applications to Anomaly Detection. IEEE Trans. Inf. Forensics Secur. 15: 1040-1055 (2020) - [j45]Xiaolong Xu, Qihe Huang, Yiwen Zhang, Shancang Li, Lianyong Qi, Wanchun Dou:
An LSH-based Offloading Method for IoMT Services in Integrated Cloud-Edge Environment. ACM Trans. Multim. Comput. Commun. Appl. 16(3s): 94:1-94:19 (2020)
2010 – 2019
- 2019
- [j44]Jianyu Xiao, Shancang Li, Qingliang Xu:
Video-Based Evidence Analysis and Extraction in Digital Forensic Investigation. IEEE Access 7: 55432-55442 (2019) - [j43]Xiaolong Xu, Daoming Li, Zhonghui Dai, Shancang Li, Xuening Chen:
A Heuristic Offloading Method for Deep Learning Edge Services in 5G Networks. IEEE Access 7: 67734-67744 (2019) - [j42]Jiuxin Cao, Weijia Liu, Biwei Cao, Pan Wang, Shancang Li, Bo Liu, Muddesar Iqbal:
Social Relationships and Temp-Spatial Behaviors Based Community Discovery to Improve Cyber Security Practices. IEEE Access 7: 105973-105986 (2019) - [j41]Jiuxin Cao, Yuntao Yang, Biwei Cao, Lingyun Xue, Shancang Li, Muddesar Iqbal, Shahid Mumtaz:
Local experts finding using user comments in location-based social networks. Trans. Emerg. Telecommun. Technol. 30(9) (2019) - [j40]Shancang Li, Shanshan Zhao, Po Yang, Panagiotis Andriotis, Lida Xu, Qindong Sun:
Distributed Consensus Algorithm for Events Detection in Cyber-Physical Systems. IEEE Internet Things J. 6(2): 2299-2308 (2019) - [j39]Shancang Li, Kim-Kwang Raymond Choo, Qindong Sun, William J. Buchanan, Jiuxin Cao:
IoT Forensics: Amazon Echo as a Use Case. IEEE Internet Things J. 6(4): 6487-6497 (2019) - [j38]Lianyong Qi, Ruili Wang, Chunhua Hu, Shancang Li, Qiang He, Xiaolong Xu:
Time-aware distributed service recommendation with privacy-preservation. Inf. Sci. 480: 354-364 (2019) - [j37]Xuyun Zhang, Yuan Yuan, Zhili Zhou, Shancang Li, Lianyong Qi, Deepak Puthal:
Intrusion Detection and Prevention in Cloud, Fog, and Internet of Things. Secur. Commun. Networks 2019: 4529757:1-4529757:4 (2019) - [j36]Shancang Li, Houbing Song, Muddesar Iqbal:
Privacy and Security for Resource-Constrained IoT Devices and Networks: Research Challenges and Opportunities. Sensors 19(8): 1935 (2019) - [j35]Shancang Li, Yong Yuan, Jun Jason Zhang, Bill Buchanan, Erwu Liu, Ramesh Ramadoss:
Guest Editorial Special Issue on Blockchain-Based Secure and Trusted Computing for IoT. IEEE Trans. Comput. Soc. Syst. 6(6): 1369-1372 (2019) - [j34]Shancang Li, Tao Qin, Geyong Min:
Blockchain-Based Digital Forensics Investigation Framework in the Internet of Things and Social Systems. IEEE Trans. Comput. Soc. Syst. 6(6): 1433-1441 (2019) - [j33]Shanshan Zhao, Shancang Li, Yufeng Yao:
Blockchain Enabled Industrial Internet of Things Technology. IEEE Trans. Comput. Soc. Syst. 6(6): 1442-1453 (2019) - [c11]Yiming Qin, Xinchun Cui, Yuefan Wang, Hong Qiao, Shancang Li:
Lightweight Encryption Algorithm Containing SPN Structure for IoT. CSS (2) 2019: 253-262 - [c10]Xinchun Cui, Yilei Wang, Xiangwei Zheng, Yingshuai Han, Hong Qiao, Shancang Li:
A Novel Color Image Watermarking Algorithm Based on Digital Signature. iThings/GreenCom/CPSCom/SmartData 2019: 267-274 - 2018
- [j32]Xiaolong Xu, Weizhi Chong, Shancang Li, Abdullahi Arabo, Jianyu Xiao:
MIAEC: Missing Data Imputation Based on the Evidence Chain. IEEE Access 6: 12983-12992 (2018) - [j31]Zhaoli Liu, Xiaohong Guan, Shancang Li, Tao Qin, Chao He:
Behavior Rhythm: A New Model for Behavior Visualization and Its Application in System Security Management. IEEE Access 6: 73940-73951 (2018) - [j30]Qindong Sun, Nan Wang, Shancang Li, Hongyi Zhou:
Local spatial obesity analysis and estimation using online social network sensors. J. Biomed. Informatics 83: 54-62 (2018) - [j29]Shancang Li, Li Da Xu, Shanshan Zhao:
5G Internet of Things: A survey. J. Ind. Inf. Integr. 10: 1-9 (2018) - [j28]Xiaolong Xu, Shucun Fu, Lianyong Qi, Xuyun Zhang, Qingxiang Liu, Qiang He, Shancang Li:
An IoT-Oriented data placement method with privacy preservation in cloud environment. J. Netw. Comput. Appl. 124: 148-157 (2018) - [j27]Shancang Li, Shanshan Zhao, Yong Yuan, Qindong Sun, Kewang Zhang:
Dynamic Security Risk Evaluation via Hybrid Bayesian Risk Graph in Cyber-Physical Social Systems. IEEE Trans. Comput. Soc. Syst. 5(4): 1133-1141 (2018) - [c9]Shancang Li, Qindong Sun, Xiaolong Xu:
Forensic Analysis of Digital Images over Smart Devices and Online Social Networks. HPCC/SmartCity/DSS 2018: 1015-1021 - 2017
- [j26]Qindong Sun, Shancang Li, Shanshan Zhao, Hongjian Sun, Li Xu, Arumugam Nallanathan:
Industrial wireless sensor networks 2016. Int. J. Distributed Sens. Networks 13(6) (2017) - [c8]Panagiotis Andriotis, Shancang Li, Theodoros Spyridopoulos, Gianluca Stringhini:
A Comparative Study of Android Users' Privacy Preferences Under the Runtime Permission Model. HCI (22) 2017: 604-622 - 2016
- [j25]Shancang Li, Theo Tryfonas, Honglei Li:
The Internet of Things: a security point of view. Internet Res. 26(2): 337-359 (2016) - [j24]Shancang Li, Theo Tryfonas, Gordon Russell, Panagiotis Andriotis:
Risk Assessment for Mobile Systems Through a Multilayered Hierarchical Bayesian Network. IEEE Trans. Cybern. 46(8): 1749-1759 (2016) - [j23]Panagiotis Andriotis, George C. Oikonomou, Theo Tryfonas, Shancang Li:
Highlighting Relationships of a Smartphone's Social Ecosystem in Potentially Large Investigations. IEEE Trans. Cybern. 46(9): 1974-1985 (2016) - 2015
- [j22]Shancang Li, Li Da Xu, Shanshan Zhao:
The internet of things: a survey. Inf. Syst. Frontiers 17(2): 243-259 (2015) - [c7]Shancang Li, Junhua Chen, Theodoros Spyridopoulos, Panagiotis Andriotis, Robert Ludwiniak, Gordon Russell:
Real-Time Monitoring of Privacy Abuses and Intrusion Detection in Android System. HCI (22) 2015: 379-390 - 2014
- [j21]Shancang Li, Hongjian Sun, Arumugam Nallanathan, Li Xu, Shanshan Zhao, Qindong Sun:
Industrial Wireless Sensor Networks. Int. J. Distributed Sens. Networks 10 (2014) - [j20]Shancang Li, Shanshan Zhao, Xinheng Wang, Kewang Zhang, Ling Li:
Adaptive and Secure Load-Balancing Routing Protocol for Service-Oriented Wireless Sensor Networks. IEEE Syst. J. 8(3): 858-867 (2014) - [j19]Shancang Li, Xinheng Wang, Shanshan Zhao, Jue Wang, Ling Li:
Local Semidefinite Programming-Based Node Localization System for Wireless Sensor Network Applications. IEEE Syst. J. 8(3): 879-888 (2014) - [j18]Shancang Li, George C. Oikonomou, Theo Tryfonas, Thomas M. Chen, Li Da Xu:
A Distributed Consensus Algorithm for Decision Making in Service-Oriented Internet of Things. IEEE Trans. Ind. Informatics 10(2): 1461-1468 (2014) - [j17]Ling Li, Shancang Li, Shanshan Zhao:
QoS-Aware Scheduling of Services-Oriented Internet of Things. IEEE Trans. Ind. Informatics 10(2): 1497-1505 (2014) - [j16]Li Da Xu, Wu He, Shancang Li:
Internet of Things in Industries: A Survey. IEEE Trans. Ind. Informatics 10(4): 2233-2243 (2014) - [c6]Theodoros Spyridopoulos, Konstantinos Maraslis, Theo Tryfonas, George C. Oikonomou, Shancang Li:
Managing cyber security risks in industrial control systems with game theory and viable system modelling. SoSE 2014: 266-271 - [c5]Panagiotis Andriotis, Theo Tryfonas, George C. Oikonomou, Shancang Li, Zacharias Tzermias, Konstantinos Xynos, Huw Read, Vassilis Prevelakis:
On the Development of Automated Forensic Analysis Methods for Mobile Devices. TRUST 2014: 212-213 - 2013
- [j15]Xinheng Wang, Shancang Li:
Scalable Routing Modeling for Wireless Ad Hoc Networks by Using Polychromatic Sets. IEEE Syst. J. 7(1): 50-58 (2013) - [j14]Shancang Li, Lida Xu, Xinheng Wang:
A Continuous Biomedical Signal Acquisition System Based on Compressed Sensing in Body Sensor Networks. IEEE Trans. Ind. Informatics 9(3): 1764-1771 (2013) - [j13]Shancang Li, Li Da Xu, Xinheng Wang:
Compressed Sensing Signal and Data Acquisition in Wireless Sensor Networks and Internet of Things. IEEE Trans. Ind. Informatics 9(4): 2177-2186 (2013) - 2012
- [j12]Shancang Li, Lida Xu, Xinheng Wang, Jue Wang:
Integration of hybrid wireless networks in cloud services oriented enterprise information systems. Enterp. Inf. Syst. 6(2): 165-187 (2012) - [j11]Shancang Li, Xinheng Wang, Xu Zhou:
Efficient blind spectrum sensing for cognitive radio networks based on compressed sensing. EURASIP J. Wirel. Commun. Netw. 2012: 306 (2012) - [j10]Shancang Li, Xinheng Wang:
Polychromatic set theory-based spectrum access in cognitive radios. IET Commun. 6(8): 909-916 (2012) - [j9]Shancang Li, Xinheng Wang, Jue Wang:
Manifold learning-based automatic signal identification in cognitive radio networks. IET Commun. 6(8): 955-963 (2012) - 2011
- [j8]Shancang Li, Xingheng Wang, Shanshan Zhao:
Multipath Routing for Video Streaming inWireless Mesh Networks. Ad Hoc Sens. Wirel. Networks 11(1-2): 73-92 (2011) - [j7]Shancang Li, Jue Wang, Xinheng Wang:
A novel gait recognition analysis system based on body sensor networks for patients with Parkinson's disease. Int. J. Commun. Networks Distributed Syst. 7(3/4): 262-274 (2011) - 2010
- [j6]Muddesar Iqbal, Xinheng Wang, Shancang Li, Tim Ellis:
QoS scheme for multimedia multicast communications over wireless mesh networks. IET Commun. 4(11): 1312-1324 (2010) - [j5]Shancang Li, Xinheng Wang:
Source nodes localisation algorithm for large-scale wireless sensor networks using self-organising isometric mapping. Int. J. Sens. Networks 7(1/2): 44-52 (2010) - [c4]Shancang Li, Xinheng Wang, Xu Zhou:
A high performance congestion control scheme for streaming transmission over wireless mesh networks. ISWCS 2010: 325-329
2000 – 2009
- 2009
- [j4]Shancang Li, Xinheng Wang, Deyun Zhang:
An adaptive distributed localisation in wireless sensor network. Enterp. Inf. Syst. 3(2): 117-132 (2009) - 2008
- [j3]Shancang Li, Xinheng Wang, Deyun Zhang:
Node localisation in wireless sensor network based on self-organising isometric embedding. Enterp. Inf. Syst. 2(3): 259-273 (2008) - 2007
- [j2]Lida Xu, Zongbin Li, Shancang Li, Fengming Tang:
A decision support system for product design in concurrent engineering. Decis. Support Syst. 42(4): 2029-2042 (2007) - [j1]Shancang Li, Deyun Zhang:
A Novel Manifold Learning Algorithm for Localization Estimation in Wireless Sensor Networks. IEICE Trans. Commun. 90-B(12): 3496-3500 (2007) - 2006
- [c3]Shancang Li, Deyun Zhang, Zhenyu Yang, Ningning Chang:
A Novel Algorithm for Node Localization and Motion Analysis in Wireless Sensor Networks. CASE 2006: 574-579 - [c2]Shancang Li, Deyun Zhang, Zongbin Li, Fuhai Ma, Feng Wu:
A Formal Modeling Method based on CPN. SMC 2006: 4994-4998 - [c1]Xinqin Gao, Zongbin Li, Shancang Li, Feng Wu:
Modeling and Analyzing Concurrent Design Process for Manufacturing Enterprise Information Systems. SMC 2006: 4999-5003
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:25 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint