BibTeX records: Wei She

download as .bib file

@article{DBLP:journals/asc/NiuSZWTL23,
  author       = {Wentao Niu and
                  Wei She and
                  Lihong Zhong and
                  Yeteng Wang and
                  Zhao Tian and
                  Wei Liu},
  title        = {Elite-centered artificial bee colony algorithm with extended solution
                  boundary},
  journal      = {Appl. Soft Comput.},
  volume       = {148},
  pages        = {110906},
  year         = {2023},
  url          = {https://doi.org/10.1016/j.asoc.2023.110906},
  doi          = {10.1016/J.ASOC.2023.110906},
  timestamp    = {Sat, 13 Jan 2024 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/asc/NiuSZWTL23.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jnca/ZhangYHTLLS22,
  author       = {Xiaoqing Zhang and
                  Fei Yang and
                  Yue Hu and
                  Zhao Tian and
                  Wei Liu and
                  Yifa Li and
                  Wei She},
  title        = {RANet: Network intrusion detection with group-gating convolutional
                  neural network},
  journal      = {J. Netw. Comput. Appl.},
  volume       = {198},
  pages        = {103266},
  year         = {2022},
  url          = {https://doi.org/10.1016/j.jnca.2021.103266},
  doi          = {10.1016/J.JNCA.2021.103266},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jnca/ZhangYHTLLS22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/iccsie/LiuST22,
  author       = {Yuxiang Liu and
                  Wei She and
                  Shuai Tan},
  title        = {Research on Neural Network Algorithm for Road Crack Detection},
  booktitle    = {Proceedings of the 7th International Conference on Cyber Security
                  and Information Engineering, {ICCSIE} 2022, Brisbane, QLD, Australia,
                  September 23-25, 2022},
  pages        = {934--940},
  publisher    = {{ACM}},
  year         = {2022},
  url          = {https://doi.org/10.1145/3558819.3565220},
  doi          = {10.1145/3558819.3565220},
  timestamp    = {Wed, 01 Mar 2023 15:36:53 +0100},
  biburl       = {https://dblp.org/rec/conf/iccsie/LiuST22.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ppna/LiuLWPST21,
  author       = {Wei Liu and
                  Yang Li and
                  Xiujun Wang and
                  Yufei Peng and
                  Wei She and
                  Zhao Tian},
  title        = {A donation tracing blockchain model using improved DPoS consensus
                  algorithm},
  journal      = {Peer-to-Peer Netw. Appl.},
  volume       = {14},
  number       = {5},
  pages        = {2789--2800},
  year         = {2021},
  url          = {https://doi.org/10.1007/s12083-021-01102-9},
  doi          = {10.1007/S12083-021-01102-9},
  timestamp    = {Mon, 04 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ppna/LiuLWPST21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ppna/SheHTZNL21,
  author       = {Wei She and
                  Lijuan Huo and
                  Zhao Tian and
                  Yan Zhuang and
                  Chaoyi Niu and
                  Wei Liu},
  title        = {A double steganography model combining blockchain and interplanetary
                  file system},
  journal      = {Peer-to-Peer Netw. Appl.},
  volume       = {14},
  number       = {5},
  pages        = {3029--3042},
  year         = {2021},
  url          = {https://doi.org/10.1007/s12083-021-01143-0},
  doi          = {10.1007/S12083-021-01143-0},
  timestamp    = {Mon, 04 Oct 2021 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/ppna/SheHTZNL21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/sensors/FuWCSZ21,
  author       = {Hongyu Fu and
                  Chufeng Wang and
                  Guoxian Cui and
                  Wei She and
                  Liang Zhao},
  title        = {Ramie Yield Estimation Based on {UAV} {RGB} Images},
  journal      = {Sensors},
  volume       = {21},
  number       = {2},
  pages        = {669},
  year         = {2021},
  url          = {https://doi.org/10.3390/s21020669},
  doi          = {10.3390/S21020669},
  timestamp    = {Thu, 04 Feb 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/sensors/FuWCSZ21.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/HuZXHTSL20,
  author       = {Yue Hu and
                  Xiao{-}Qing Zhang and
                  Li Xu and
                  Feng Xian He and
                  Zhao Tian and
                  Wei She and
                  Wei Liu},
  title        = {Harmonic Loss Function for Sensor-Based Human Activity Recognition
                  Based on {LSTM} Recurrent Neural Networks},
  journal      = {{IEEE} Access},
  volume       = {8},
  pages        = {135617--135627},
  year         = {2020},
  url          = {https://doi.org/10.1109/ACCESS.2020.3003162},
  doi          = {10.1109/ACCESS.2020.3003162},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/HuZXHTSL20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijes/SheGLCWT20,
  author       = {Wei She and
                  Zhihao Gu and
                  Wei Liu and
                  Jian{-}Sen Chen and
                  Bo Wang and
                  Zhao Tian},
  title        = {A channel matching scheme for cross-chain},
  journal      = {Int. J. Embed. Syst.},
  volume       = {12},
  number       = {4},
  pages        = {500--509},
  year         = {2020},
  url          = {https://doi.org/10.1504/IJES.2020.107646},
  doi          = {10.1504/IJES.2020.107646},
  timestamp    = {Thu, 21 Jan 2021 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijes/SheGLCWT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/SheCHYLGLT20,
  author       = {Wei She and
                  Jian{-}Sen Chen and
                  Feng Xian He and
                  Xiaoyu Yang and
                  Xuhong Lu and
                  Zhihao Gu and
                  Wei Liu and
                  Zhao Tian},
  editor       = {Xingming Sun and
                  Jinwei Wang and
                  Elisa Bertino},
  title        = {A Mutual Trust Method for Energy Internet Agent Nodes in Untrusted
                  Environment},
  booktitle    = {Artificial Intelligence and Security - 6th International Conference,
                  {ICAIS} 2020, Hohhot, China, July 17-20, 2020, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12240},
  pages        = {557--569},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-57881-7\_49},
  doi          = {10.1007/978-3-030-57881-7\_49},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icccsec/SheCHYLGLT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/SheXXZHT20,
  author       = {Wei She and
                  Li Xu and
                  Huibo Xu and
                  Xiao{-}Qing Zhang and
                  Yue Hu and
                  Zhao Tian},
  editor       = {Xingming Sun and
                  Jinwei Wang and
                  Elisa Bertino},
  title        = {Multilayer Perceptron Based on Joint Training for Predicting Popularity},
  booktitle    = {Artificial Intelligence and Security - 6th International Conference,
                  {ICAIS} 2020, Hohhot, China, July 17-20, 2020, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12240},
  pages        = {570--580},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-57881-7\_50},
  doi          = {10.1007/978-3-030-57881-7\_50},
  timestamp    = {Sun, 12 Nov 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icccsec/SheXXZHT20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icccsec/LiuPTLS20,
  author       = {Wei Liu and
                  Yufei Peng and
                  Zhao Tian and
                  Yang Li and
                  Wei She},
  editor       = {Xingming Sun and
                  Jinwei Wang and
                  Elisa Bertino},
  title        = {A Medical Blockchain Privacy Protection Model Based on Mimicry Defense},
  booktitle    = {Artificial Intelligence and Security - 6th International Conference,
                  {ICAIS} 2020, Hohhot, China, July 17-20, 2020, Proceedings, Part {II}},
  series       = {Lecture Notes in Computer Science},
  volume       = {12240},
  pages        = {581--592},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-57881-7\_51},
  doi          = {10.1007/978-3-030-57881-7\_51},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icccsec/LiuPTLS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/spiot/YunZS20,
  author       = {Dawei Yun and
                  Zhengjun Zhou and
                  Wei She},
  editor       = {John MacIntyre and
                  Jinghua Zhao and
                  Xiaomeng Ma},
  title        = {The Research on the Development and Utilization of Hospital Archive
                  Information in the Big Data Era},
  booktitle    = {The 2020 International Conference on Machine Learning and Big Data
                  Analytics for IoT Security and Privacy - SPIoT-2020, Shanghai, China,
                  6-8 November 2020, Volume 1},
  series       = {Advances in Intelligent Systems and Computing},
  volume       = {1282},
  pages        = {257--263},
  publisher    = {Springer},
  year         = {2020},
  url          = {https://doi.org/10.1007/978-3-030-62743-0\_36},
  doi          = {10.1007/978-3-030-62743-0\_36},
  timestamp    = {Thu, 15 Jun 2023 17:52:28 +0200},
  biburl       = {https://dblp.org/rec/conf/spiot/YunZS20.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/SheLTCWL19,
  author       = {Wei She and
                  Qi Liu and
                  Zhao Tian and
                  Jian{-}Sen Chen and
                  Bo Wang and
                  Wei Liu},
  title        = {Blockchain Trust Model for Malicious Node Detection in Wireless Sensor
                  Networks},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {38947--38956},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2019.2902811},
  doi          = {10.1109/ACCESS.2019.2902811},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/SheLTCWL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/access/SheGLLTL19,
  author       = {Wei She and
                  Zhihao Gu and
                  Xu{-}Kang Lyu and
                  Qi Liu and
                  Zhao Tian and
                  Wei Liu},
  title        = {Homomorphic Consortium Blockchain for Smart Home System Sensitive
                  Data Privacy Preserving},
  journal      = {{IEEE} Access},
  volume       = {7},
  pages        = {62058--62070},
  year         = {2019},
  url          = {https://doi.org/10.1109/ACCESS.2019.2916345},
  doi          = {10.1109/ACCESS.2019.2916345},
  timestamp    = {Mon, 26 Oct 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/access/SheGLLTL19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/cluster/SheLXT19,
  author       = {Wei She and
                  Dingfang Li and
                  Yongbo Xia and
                  Shasha Tian},
  title        = {Parameter estimation of {P-III} distribution based on {GA} using rejection
                  and interpolation mechanism},
  journal      = {Clust. Comput.},
  volume       = {22},
  number       = {Suppl 1},
  pages        = {2159--2167},
  year         = {2019},
  url          = {https://doi.org/10.1007/s10586-018-2110-6},
  doi          = {10.1007/S10586-018-2110-6},
  timestamp    = {Tue, 29 Sep 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/cluster/SheLXT19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/cits/LiuXTLLS19,
  author       = {Wei Liu and
                  Chang Xu and
                  Zhao Tian and
                  Dong{-}Kun Li and
                  Guan{-}Zhong Lu and
                  Wei She},
  editor       = {Mohammad S. Obaidat and
                  Zhenqiang Mi and
                  Kuei{-}Fang Hsiao and
                  Petros Nicopolitidis and
                  Daniel Cascado Caballero},
  title        = {Research on Gateway Deployment for Throughput Optimization in Wireless
                  Mesh Networks},
  booktitle    = {2019 International Conference on Computer, Information and Telecommunication
                  Systems, {CITS} 2019, Beijing, China, August 28-31, 2019},
  pages        = {1--5},
  publisher    = {{IEEE}},
  year         = {2019},
  url          = {https://doi.org/10.1109/CITS.2019.8862147},
  doi          = {10.1109/CITS.2019.8862147},
  timestamp    = {Sun, 08 Aug 2021 01:41:01 +0200},
  biburl       = {https://dblp.org/rec/conf/cits/LiuXTLLS19.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ida/GuoZWSX18,
  author       = {Huaping Guo and
                  Jun Zhou and
                  Chang{-}an Wu and
                  Wei She and
                  Mingliang Xu},
  title        = {Ensemble based on feature projection and under-sampling for imbalanced
                  learning},
  journal      = {Intell. Data Anal.},
  volume       = {22},
  number       = {5},
  pages        = {959--980},
  year         = {2018},
  url          = {https://doi.org/10.3233/IDA-173505},
  doi          = {10.3233/IDA-173505},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ida/GuoZWSX18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/ijait/GuoZWS18,
  author       = {Huaping Guo and
                  Jun Zhou and
                  Chang{-}an Wu and
                  Wei She},
  title        = {A Novel Hybrid-Based Ensemble for Class Imbalance Problem},
  journal      = {Int. J. Artif. Intell. Tools},
  volume       = {27},
  number       = {6},
  pages        = {1850025:1--1850025:13},
  year         = {2018},
  url          = {https://doi.org/10.1142/S0218213018500252},
  doi          = {10.1142/S0218213018500252},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/ijait/GuoZWS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsjkx/LiuCPS18,
  author       = {Wei Liu and
                  Congcong Cheng and
                  Mengli Pei and
                  Wei She},
  title        = {{\unicode{22522}}{\unicode{20110}}{\unicode{23376}}{\unicode{22359}}{\unicode{20998}}{\unicode{21106}}{\unicode{30340}}{\unicode{33258}}{\unicode{36866}}{\unicode{24212}}{\unicode{24335}}{\unicode{20840}}{\unicode{30450}}{\unicode{22270}}{\unicode{20687}}{\unicode{27700}}{\unicode{21360}}{\unicode{31639}}{\unicode{27861}}
                  (Adaptive Blind Watermarking Algorithm Based on Sub-block Segmentation)},
  journal      = {{\unicode{35745}}{\unicode{31639}}{\unicode{26426}}{\unicode{31185}}{\unicode{23398}}},
  volume       = {45},
  number       = {10},
  pages        = {178--182},
  year         = {2018},
  url          = {https://doi.org/10.11896/j.issn.1002-137X.2018.10.033},
  doi          = {10.11896/J.ISSN.1002-137X.2018.10.033},
  timestamp    = {Mon, 16 Mar 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jsjkx/LiuCPS18.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jifs/GuoLWZXS16,
  author       = {Huaping Guo and
                  Hongbing Liu and
                  Chang{-}an Wu and
                  Weimei Zhi and
                  Yan Xiao and
                  Wei She},
  title        = {Logistic discrimination based on G-mean and F-measure for imbalanced
                  problem},
  journal      = {J. Intell. Fuzzy Syst.},
  volume       = {31},
  number       = {3},
  pages        = {1155--1166},
  year         = {2016},
  url          = {https://doi.org/10.3233/IFS-162150},
  doi          = {10.3233/IFS-162150},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/journals/jifs/GuoLWZXS16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsc/She0YBT16,
  author       = {Wei She and
                  Wei Zhu and
                  I{-}Ling Yen and
                  Farokh B. Bastani and
                  Bhavani Thuraisingham},
  title        = {Role-Based Integrated Access Control and Data Provenance for {SOA}
                  Based Net-Centric Systems},
  journal      = {{IEEE} Trans. Serv. Comput.},
  volume       = {9},
  number       = {6},
  pages        = {940--953},
  year         = {2016},
  url          = {https://doi.org/10.1109/TSC.2015.2432795},
  doi          = {10.1109/TSC.2015.2432795},
  timestamp    = {Wed, 29 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tsc/She0YBT16.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jsjkx/ChenSY15,
  author       = {Qian Chen and
                  Wei She and
                  Yangdong Ye},
  title        = {{\unicode{19968}}{\unicode{31181}}{\unicode{22522}}{\unicode{20110}}TF-HBPN{\unicode{30340}}{\unicode{22797}}{\unicode{26434}}{\unicode{31995}}{\unicode{32479}}{\unicode{34892}}{\unicode{20026}}{\unicode{20998}}{\unicode{26512}}{\unicode{26041}}{\unicode{27861}}
                  (Method of Behavior Analysis for Complex System Based on Hierarchical
                  Bayesian Petri Net with Time Factor)},
  journal      = {{\unicode{35745}}{\unicode{31639}}{\unicode{26426}}{\unicode{31185}}{\unicode{23398}}},
  volume       = {42},
  number       = {7},
  pages        = {62--67},
  year         = {2015},
  url          = {https://doi.org/10.11896/j.issn.1002-137X.2015.07.014},
  doi          = {10.11896/J.ISSN.1002-137X.2015.07.014},
  timestamp    = {Mon, 27 Apr 2020 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jsjkx/ChenSY15.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/tsc/SheYTB13,
  author       = {Wei She and
                  I{-}Ling Yen and
                  Bhavani Thuraisingham and
                  Elisa Bertino},
  title        = {Security-Aware Service Composition with Fine-Grained Information Flow
                  Control},
  journal      = {{IEEE} Trans. Serv. Comput.},
  volume       = {6},
  number       = {3},
  pages        = {330--343},
  year         = {2013},
  url          = {https://doi.org/10.1109/TSC.2012.3},
  doi          = {10.1109/TSC.2012.3},
  timestamp    = {Wed, 29 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/tsc/SheYTB13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/seke/DiaoSYG13,
  author       = {Lijuan Diao and
                  Wei She and
                  I{-}Ling Yen and
                  Junzhong Gu},
  title        = {A Semantic-based Semi-automated Role Mapping Mechanism {(S)}},
  booktitle    = {The 25th International Conference on Software Engineering and Knowledge
                  Engineering, Boston, MA, USA, June 27-29, 2013},
  pages        = {14--17},
  publisher    = {Knowledge Systems Institute Graduate School},
  year         = {2013},
  timestamp    = {Thu, 12 Mar 2020 11:30:49 +0100},
  biburl       = {https://dblp.org/rec/conf/seke/DiaoSYG13.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/fuzzIEEE/SheY12,
  author       = {Wei She and
                  Yangdong Ye},
  title        = {Fault diagnosis via fuzzy time analysis},
  booktitle    = {{FUZZ-IEEE} 2012, {IEEE} International Conference on Fuzzy Systems,
                  Brisbane, Australia, June 10-15, 2012, Proceedings},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/FUZZ-IEEE.2012.6250796},
  doi          = {10.1109/FUZZ-IEEE.2012.6250796},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/fuzzIEEE/SheY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/isda/SheY12,
  author       = {Wei She and
                  Yangdong Ye},
  editor       = {Ajith Abraham and
                  Albert Y. Zomaya and
                  Sebasti{\'{a}}n Ventura and
                  Ronald R. Yager and
                  V{\'{a}}clav Sn{\'{a}}sel and
                  Azah Kamilah Muda and
                  Philip Samuel},
  title        = {{PPN:} {A} probabilistic model for fault detection and diagnosis},
  booktitle    = {12th International Conference on Intelligent Systems Design and Applications,
                  {ISDA} 2012, Kochi, India, November 27-29, 2012},
  pages        = {1006--1011},
  publisher    = {{IEEE}},
  year         = {2012},
  url          = {https://doi.org/10.1109/ISDA.2012.6416676},
  doi          = {10.1109/ISDA.2012.6416676},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/isda/SheY12.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icaic/ZhangSWD11,
  author       = {Siping Zhang and
                  Wei She and
                  Mei Wang and
                  Zhimin Duan},
  editor       = {Dehuai Zeng},
  title        = {A Two-Stage Decision Tree Algorithm on Constructing Hyper-Plane},
  booktitle    = {Applied Informatics and Communication - International Conference,
                  {ICAIC} 2011, Xi'an, China, August 20-21, 2011, Proceedings, Part
                  {II}},
  series       = {Communications in Computer and Information Science},
  volume       = {225},
  pages        = {316--323},
  publisher    = {Springer},
  year         = {2011},
  url          = {https://doi.org/10.1007/978-3-642-23220-6\_40},
  doi          = {10.1007/978-3-642-23220-6\_40},
  timestamp    = {Tue, 29 Dec 2020 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icaic/ZhangSWD11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icws/SheYTH11,
  author       = {Wei She and
                  I{-}Ling Yen and
                  Bhavani Thuraisingham and
                  San{-}Yih Huang},
  title        = {Rule-Based Run-Time Information Flow Control in Service Cloud},
  booktitle    = {{IEEE} International Conference on Web Services, {ICWS} 2011, Washington,
                  DC, USA, July 4-9, 2011},
  pages        = {524--531},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/ICWS.2011.35},
  doi          = {10.1109/ICWS.2011.35},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icws/SheYTH11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/sose/SheYBTT11,
  author       = {Wei She and
                  I{-}Ling Yen and
                  Farokh B. Bastani and
                  Bao N. Tran and
                  Bhavani Thuraisingham},
  editor       = {Jerry Zeyu Gao and
                  Xiaodong Lu and
                  Muhammad Younas and
                  Hong Zhu},
  title        = {Role-based integrated access control and data provenance for {SOA}
                  based net-centric systems},
  booktitle    = {{IEEE} 6th International Symposium on Service Oriented System Engineering,
                  {SOSE} 2011, Irvine, CA, USA, December 12-14, 2011},
  pages        = {225--234},
  publisher    = {{IEEE} Computer Society},
  year         = {2011},
  url          = {https://doi.org/10.1109/SOSE.2011.6139111},
  doi          = {10.1109/SOSE.2011.6139111},
  timestamp    = {Wed, 21 Jun 2023 16:54:56 +0200},
  biburl       = {https://dblp.org/rec/conf/sose/SheYBTT11.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/jwsr/SheYT10,
  author       = {Wei She and
                  I{-}Ling Yen and
                  Bhavani Thuraisingham},
  title        = {Enhancing Security Modeling for Web Services Using Delegation and
                  Pass-On},
  journal      = {Int. J. Web Serv. Res.},
  volume       = {7},
  number       = {1},
  pages        = {1--21},
  year         = {2010},
  url          = {https://doi.org/10.4018/jwsr.2010010101},
  doi          = {10.4018/JWSR.2010010101},
  timestamp    = {Wed, 29 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/jwsr/SheYT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/compsac/SheYT10,
  author       = {Wei She and
                  I{-}Ling Yen and
                  Bhavani Thuraisingham},
  title        = {WS-Sim: {A} Web Service Simulation Toolset with Realistic Data Support},
  booktitle    = {Workshop Proceedings of the 34th Annual {IEEE} International Computer
                  Software and Applications Conference, {COMPSAC} Workshops 2010, Seoul,
                  Korea, 19-23 July 2010},
  pages        = {109--114},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/COMPSACW.2010.29},
  doi          = {10.1109/COMPSACW.2010.29},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/compsac/SheYT10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icws/SheYTB10,
  author       = {Wei She and
                  I{-}Ling Yen and
                  Bhavani Thuraisingham and
                  Elisa Bertino},
  title        = {Policy-Driven Service Composition with Information Flow Control},
  booktitle    = {{IEEE} International Conference on Web Services, {ICWS} 2010, Miami,
                  Florida, USA, July 5-10, 2010},
  pages        = {50--57},
  publisher    = {{IEEE} Computer Society},
  year         = {2010},
  url          = {https://doi.org/10.1109/ICWS.2010.37},
  doi          = {10.1109/ICWS.2010.37},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icws/SheYTB10.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icws/SheYTB09,
  author       = {Wei She and
                  I{-}Ling Yen and
                  Bhavani Thuraisingham and
                  Elisa Bertino},
  title        = {The {SCIFC} Model for Information Flow Control in Web Service Composition},
  booktitle    = {{IEEE} International Conference on Web Services, {ICWS} 2009, Los
                  Angeles, CA, USA, 6-10 July 2009},
  pages        = {1--8},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/ICWS.2009.13},
  doi          = {10.1109/ICWS.2009.13},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icws/SheYTB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/soca/SheYTB09,
  author       = {Wei She and
                  I{-}Ling Yen and
                  Bhavani Thuraisingham and
                  Elisa Bertino},
  title        = {Effective and efficient implementation of an information flow control
                  protocol for service composition},
  booktitle    = {{IEEE} International Conference on Service-Oriented Computing and
                  Applications, {SOCA} 2009, 14-15 December 2009, Taipei, Taiwan},
  pages        = {1--8},
  publisher    = {{IEEE} Computer Society},
  year         = {2009},
  url          = {https://doi.org/10.1109/SOCA.2009.5410468},
  doi          = {10.1109/SOCA.2009.5410468},
  timestamp    = {Wed, 29 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/conf/soca/SheYTB09.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icws/SheYT08,
  author       = {Wei She and
                  I{-}Ling Yen and
                  Bhavani Thuraisingham},
  title        = {Enhancing Security Modeling for Web Services Using Delegation and
                  Pass-On},
  booktitle    = {2008 {IEEE} International Conference on Web Services {(ICWS} 2008),
                  September 23-26, 2008, Beijing, China},
  pages        = {545--552},
  publisher    = {{IEEE} Computer Society},
  year         = {2008},
  url          = {https://doi.org/10.1109/ICWS.2008.23},
  doi          = {10.1109/ICWS.2008.23},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/icws/SheYT08.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@article{DBLP:journals/isjgp/SheT07,
  author       = {Wei She and
                  Bhavani Thuraisingham},
  title        = {Security for Enterprise Resource Planning Systems},
  journal      = {Inf. Secur. J. {A} Glob. Perspect.},
  volume       = {16},
  number       = {3},
  pages        = {152--163},
  year         = {2007},
  url          = {https://doi.org/10.1080/10658980701401959},
  doi          = {10.1080/10658980701401959},
  timestamp    = {Wed, 29 Jun 2022 01:00:00 +0200},
  biburl       = {https://dblp.org/rec/journals/isjgp/SheT07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/hase/SheTY07,
  author       = {Wei She and
                  Bhavani Thuraisingham and
                  I{-}Ling Yen},
  title        = {Delegation-Based Security Model for Web Services},
  booktitle    = {Tenth {IEEE} International Symposium on High Assurance Systems Engineering
                  {(HASE} 2007), November 14-16, 2007, Dallas, Texas, {USA}},
  pages        = {82--91},
  publisher    = {{IEEE} Computer Society},
  year         = {2007},
  url          = {https://doi.org/10.1109/HASE.2007.76},
  doi          = {10.1109/HASE.2007.76},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/hase/SheTY07.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/IEEEcit/SheYW06,
  author       = {Wei She and
                  Jiahai Yang and
                  Jianping Wu},
  title        = {Passive Inter-Domain Routing Monitor Based on Routing Interaction},
  booktitle    = {Sixth International Conference on Computer and Information Technology
                  {(CIT} 2006), 20-22 September 2006, Seoul, Korea},
  pages        = {104},
  publisher    = {{IEEE} Computer Society},
  year         = {2006},
  url          = {https://doi.org/10.1109/CIT.2006.142},
  doi          = {10.1109/CIT.2006.142},
  timestamp    = {Fri, 24 Mar 2023 00:00:00 +0100},
  biburl       = {https://dblp.org/rec/conf/IEEEcit/SheYW06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
@inproceedings{DBLP:conf/icon/ZhangYSZ06,
  author       = {Jun Zhang and
                  Jiahai Yang and
                  Wei She and
                  Miaohui Zhang},
  title        = {A New Conceptual Distributed Network Measurement Architecture Based
                  on Web Service},
  booktitle    = {14th {IEEE} International Conference on Networks, {ICON} 2006, Singapore,
                  13-15 September 2006},
  pages        = {1--7},
  publisher    = {{IEEE}},
  year         = {2006},
  url          = {https://doi.org/10.1109/ICON.2006.302676},
  doi          = {10.1109/ICON.2006.302676},
  timestamp    = {Wed, 16 Oct 2019 14:14:52 +0200},
  biburl       = {https://dblp.org/rec/conf/icon/ZhangYSZ06.bib},
  bibsource    = {dblp computer science bibliography, https://dblp.org}
}
a service of  Schloss Dagstuhl - Leibniz Center for Informatics