default search action
Wan Tang
Person information
Other persons with a similar name
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j12]Zixuan Han, Lei-lei Shi, Lu Liu, Liang Jiang, Wan Tang, Xiao Chen, Jing-yu Yang, Ayodeji Ayorinde, Nick Antonopoulos:
H-Louvain: Hierarchical Louvain-based community detection in social media data streams. Peer Peer Netw. Appl. 17(4): 2334-2353 (2024) - 2023
- [c13]Liuhuan Li, Ximin Yang, Xiao Zhang, Yumeng Yang, Xuefeng Chen, Wan Tang:
GANDPS: Ensuring Both Detection Precision and Stability in GAN-based Anomaly Detection for Network Traffic. ISPA/BDCloud/SocialCom/SustainCom 2023: 305-310 - [c12]Yumeng Yang, Ximin Yang, Wan Tang, Liuhuan Li:
A Undersampling-DoppelGANger based Data Generation Method for Unbalanced BGP Data. CCIS 2023: 100-105 - 2022
- [c11]Zhiyang Liu, Ximin Yang, Wan Tang, Xiao Zhang, Zhen Yang:
BACO: A Bi-Ant-Colony-Based Strategy for UAV Trajectory Planning with Obstacle Avoidance. MSN 2022: 279-286 - [c10]Zekun Sun, John Panneerselvam, Lu Liu, Yao Lu, Wan Tang:
An inter-cell resource usage analysis of large-scale datacentre trace logs. UCC 2022: 305-312 - 2021
- [c9]Fei Tong, Rucong Sui, Yujian Zhang, Wan Tang:
MPDC: A Multi-channel Pipelined Data Collection MAC for Duty-Cycled Linear Sensor Networks. WASA (2) 2021: 550-562 - 2020
- [j11]Ximin Yang, Deqiang Wang, Wan Tang, Wei Feng, Cuitao Zhu:
IPsec Cryptographic Algorithm Invocation Considering Performance and Security for SDN Southbound Interface Communication. IEEE Access 8: 181782-181795 (2020) - [c8]Wei Feng, Wan Tang, Ximin Yang, Lu Liu:
MEM: A Multi-Staged Eviction Mechanism of Flowtable for Software-Defined Datacenters. INFOCOM Workshops 2020: 400-405
2010 – 2019
- 2019
- [j10]Lingyun Zhou, Lixin Ding, Maode Ma, Wan Tang:
An accurate partially attracted firefly algorithm. Computing 101(5): 477-493 (2019) - [j9]Lingyun Zhou, Maode Ma, Lixin Ding, Wan Tang:
Centroid opposition with a two-point full crossover for the partially attracted firefly algorithm. Soft Comput. 23(23): 12241-12254 (2019) - 2018
- [j8]Ximin Yang, Deqiang Wang, Wei Feng, Jingjing Wu, Wan Tang:
Cryptographic Algorithm Invocation Based on Software-Defined Everything in IPsec. Wirel. Commun. Mob. Comput. 2018: 8728424:1-8728424:11 (2018) - [c7]Deqiang Wang, Wan Tang, Ximin Yang, Wei Feng:
Cryptographic Algorithm Invocation in IPsec: Guaranteeing the Communication Security in the Southbound Interface of SDN Networks. ChinaCom 2018: 583-592 - 2016
- [j7]Min Chen, Yongfeng Qian, Shiwen Mao, Wan Tang, Xi-Min Yang:
Software-Defined Mobile Networks Security. Mob. Networks Appl. 21(5): 729-743 (2016) - 2015
- [j6]Wan Tang, Bo Yi, Ximin Yang, Jingcong Li:
Dynamic Home Circuit Construction for Datacenter Networks Using LOBS-HC Ring. KSII Trans. Internet Inf. Syst. 9(5): 1606-1623 (2015) - 2014
- [j5]Wan Tang, Xi-Min Yang, Bo Yi, Rongbo Zhu:
Home Circuit Sharing for Dynamic Wavelength Assignment in LOBS-Based Datacenter Networks. IEICE Trans. Inf. Syst. 97-D(10): 2660-2662 (2014) - [c6]Bo Yi, Wan Tang, Ximin Yang, Jingcong Li:
Dynamic home circuit grouping and wavelength assignment in LOBS-HC ring networks. ChinaCom 2014: 303-306 - [c5]Ding-Geng Din Chen, Xinguang Jim Chen, Wan Tang, Feng Lin:
Sample Size Determination to Detect Cusp Catastrophe in Stochastic Cusp Catastrophe Model: A Monte-Carlo Simulation-Based Approach. SBP 2014: 35-41 - 2011
- [j4]Li-Mei Peng, Chan-Hyun Youn, Wan Tang, Xin-Wan Li:
Close-packing-based sensor node deployment schemes for AOFSN. Int. J. Commun. Networks Distributed Syst. 7(3/4): 311-330 (2011) - [j3]Wan Tang, Min Chen, Jin Ni, Xi-Min Yang:
Security Enhancement Mechanism Based on Contextual Authentication and Role Analysis for 2G-RFID Systems. Sensors 11(7): 6743-6759 (2011) - [c4]Li-Mei Peng, Chunming Qiao, Wan Tang, Chan-Hyun Youn:
Cube-Based Intra-Datacenter Networks with LOBS-HC. ICC 2011: 1-6 - [c3]Fei Tong, Wan Tang, Rong Xie, Lei Shu, Young-Chon Kim:
P-MAC: A Cross-Layer Duty Cycle MAC Protocol Towards Pipelining for Wireless Sensor Networks. ICC 2011: 1-5 - 2010
- [j2]Wan Tang, Li-Mei Peng, Xi-Min Yang, Xia Xie, Yang Cao:
GEP-based Framework for Immune- Inspired Intrusion Detection. KSII Trans. Internet Inf. Syst. 4(6): 1273-1293 (2010) - [c2]Wan Tang, Xi-Min Yang, Xia Xie, Li-Mei Peng, Chan-Hyun Youn, Yang Cao:
Avidity-model based clonal selection algorithm for network intrusion detection. IWQoS 2010: 1-5
2000 – 2009
- 2008
- [j1]Qin Yu, Wan Tang, Yan Ma, S. A. Gamble, X. M. Tu:
Comparing multiple sensitivities and specificities with different diagnostic criteria: Applications to sexual abuse and sexual health research. Comput. Stat. Data Anal. 53(1): 27-37 (2008) - [c1]Wan Tang, Yang Cao, Xi-Min Yang, Won-Ho So:
Study on Adaptive Intrusion Detection Engine Based on Gene Expression Programming Rules. CSSE (3) 2008: 959-963
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-08-28 23:34 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint