Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX records: Wei She
@article{DBLP:journals/asc/NiuSZWTL23, author = {Wentao Niu and Wei She and Lihong Zhong and Yeteng Wang and Zhao Tian and Wei Liu}, title = {Elite-centered artificial bee colony algorithm with extended solution boundary}, journal = {Appl. Soft Comput.}, volume = {148}, pages = {110906}, year = {2023}, url = {https://doi.org/10.1016/j.asoc.2023.110906}, doi = {10.1016/J.ASOC.2023.110906}, timestamp = {Sat, 13 Jan 2024 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/asc/NiuSZWTL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jnca/ZhangYHTLLS22, author = {Xiaoqing Zhang and Fei Yang and Yue Hu and Zhao Tian and Wei Liu and Yifa Li and Wei She}, title = {RANet: Network intrusion detection with group-gating convolutional neural network}, journal = {J. Netw. Comput. Appl.}, volume = {198}, pages = {103266}, year = {2022}, url = {https://doi.org/10.1016/j.jnca.2021.103266}, doi = {10.1016/J.JNCA.2021.103266}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jnca/ZhangYHTLLS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccsie/LiuST22, author = {Yuxiang Liu and Wei She and Shuai Tan}, title = {Research on Neural Network Algorithm for Road Crack Detection}, booktitle = {Proceedings of the 7th International Conference on Cyber Security and Information Engineering, {ICCSIE} 2022, Brisbane, QLD, Australia, September 23-25, 2022}, pages = {934--940}, publisher = {{ACM}}, year = {2022}, url = {https://doi.org/10.1145/3558819.3565220}, doi = {10.1145/3558819.3565220}, timestamp = {Wed, 01 Mar 2023 15:36:53 +0100}, biburl = {https://dblp.org/rec/conf/iccsie/LiuST22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ppna/LiuLWPST21, author = {Wei Liu and Yang Li and Xiujun Wang and Yufei Peng and Wei She and Zhao Tian}, title = {A donation tracing blockchain model using improved DPoS consensus algorithm}, journal = {Peer-to-Peer Netw. Appl.}, volume = {14}, number = {5}, pages = {2789--2800}, year = {2021}, url = {https://doi.org/10.1007/s12083-021-01102-9}, doi = {10.1007/S12083-021-01102-9}, timestamp = {Mon, 04 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ppna/LiuLWPST21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ppna/SheHTZNL21, author = {Wei She and Lijuan Huo and Zhao Tian and Yan Zhuang and Chaoyi Niu and Wei Liu}, title = {A double steganography model combining blockchain and interplanetary file system}, journal = {Peer-to-Peer Netw. Appl.}, volume = {14}, number = {5}, pages = {3029--3042}, year = {2021}, url = {https://doi.org/10.1007/s12083-021-01143-0}, doi = {10.1007/S12083-021-01143-0}, timestamp = {Mon, 04 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ppna/SheHTZNL21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sensors/FuWCSZ21, author = {Hongyu Fu and Chufeng Wang and Guoxian Cui and Wei She and Liang Zhao}, title = {Ramie Yield Estimation Based on {UAV} {RGB} Images}, journal = {Sensors}, volume = {21}, number = {2}, pages = {669}, year = {2021}, url = {https://doi.org/10.3390/s21020669}, doi = {10.3390/S21020669}, timestamp = {Thu, 04 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/sensors/FuWCSZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/HuZXHTSL20, author = {Yue Hu and Xiao{-}Qing Zhang and Li Xu and Feng Xian He and Zhao Tian and Wei She and Wei Liu}, title = {Harmonic Loss Function for Sensor-Based Human Activity Recognition Based on {LSTM} Recurrent Neural Networks}, journal = {{IEEE} Access}, volume = {8}, pages = {135617--135627}, year = {2020}, url = {https://doi.org/10.1109/ACCESS.2020.3003162}, doi = {10.1109/ACCESS.2020.3003162}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/HuZXHTSL20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijes/SheGLCWT20, author = {Wei She and Zhihao Gu and Wei Liu and Jian{-}Sen Chen and Bo Wang and Zhao Tian}, title = {A channel matching scheme for cross-chain}, journal = {Int. J. Embed. Syst.}, volume = {12}, number = {4}, pages = {500--509}, year = {2020}, url = {https://doi.org/10.1504/IJES.2020.107646}, doi = {10.1504/IJES.2020.107646}, timestamp = {Thu, 21 Jan 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijes/SheGLCWT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/SheCHYLGLT20, author = {Wei She and Jian{-}Sen Chen and Feng Xian He and Xiaoyu Yang and Xuhong Lu and Zhihao Gu and Wei Liu and Zhao Tian}, editor = {Xingming Sun and Jinwei Wang and Elisa Bertino}, title = {A Mutual Trust Method for Energy Internet Agent Nodes in Untrusted Environment}, booktitle = {Artificial Intelligence and Security - 6th International Conference, {ICAIS} 2020, Hohhot, China, July 17-20, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12240}, pages = {557--569}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-57881-7\_49}, doi = {10.1007/978-3-030-57881-7\_49}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icccsec/SheCHYLGLT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/SheXXZHT20, author = {Wei She and Li Xu and Huibo Xu and Xiao{-}Qing Zhang and Yue Hu and Zhao Tian}, editor = {Xingming Sun and Jinwei Wang and Elisa Bertino}, title = {Multilayer Perceptron Based on Joint Training for Predicting Popularity}, booktitle = {Artificial Intelligence and Security - 6th International Conference, {ICAIS} 2020, Hohhot, China, July 17-20, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12240}, pages = {570--580}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-57881-7\_50}, doi = {10.1007/978-3-030-57881-7\_50}, timestamp = {Sun, 12 Nov 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icccsec/SheXXZHT20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/LiuPTLS20, author = {Wei Liu and Yufei Peng and Zhao Tian and Yang Li and Wei She}, editor = {Xingming Sun and Jinwei Wang and Elisa Bertino}, title = {A Medical Blockchain Privacy Protection Model Based on Mimicry Defense}, booktitle = {Artificial Intelligence and Security - 6th International Conference, {ICAIS} 2020, Hohhot, China, July 17-20, 2020, Proceedings, Part {II}}, series = {Lecture Notes in Computer Science}, volume = {12240}, pages = {581--592}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-57881-7\_51}, doi = {10.1007/978-3-030-57881-7\_51}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icccsec/LiuPTLS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/spiot/YunZS20, author = {Dawei Yun and Zhengjun Zhou and Wei She}, editor = {John MacIntyre and Jinghua Zhao and Xiaomeng Ma}, title = {The Research on the Development and Utilization of Hospital Archive Information in the Big Data Era}, booktitle = {The 2020 International Conference on Machine Learning and Big Data Analytics for IoT Security and Privacy - SPIoT-2020, Shanghai, China, 6-8 November 2020, Volume 1}, series = {Advances in Intelligent Systems and Computing}, volume = {1282}, pages = {257--263}, publisher = {Springer}, year = {2020}, url = {https://doi.org/10.1007/978-3-030-62743-0\_36}, doi = {10.1007/978-3-030-62743-0\_36}, timestamp = {Thu, 15 Jun 2023 17:52:28 +0200}, biburl = {https://dblp.org/rec/conf/spiot/YunZS20.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/SheLTCWL19, author = {Wei She and Qi Liu and Zhao Tian and Jian{-}Sen Chen and Bo Wang and Wei Liu}, title = {Blockchain Trust Model for Malicious Node Detection in Wireless Sensor Networks}, journal = {{IEEE} Access}, volume = {7}, pages = {38947--38956}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2902811}, doi = {10.1109/ACCESS.2019.2902811}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/SheLTCWL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/SheGLLTL19, author = {Wei She and Zhihao Gu and Xu{-}Kang Lyu and Qi Liu and Zhao Tian and Wei Liu}, title = {Homomorphic Consortium Blockchain for Smart Home System Sensitive Data Privacy Preserving}, journal = {{IEEE} Access}, volume = {7}, pages = {62058--62070}, year = {2019}, url = {https://doi.org/10.1109/ACCESS.2019.2916345}, doi = {10.1109/ACCESS.2019.2916345}, timestamp = {Mon, 26 Oct 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/access/SheGLLTL19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/cluster/SheLXT19, author = {Wei She and Dingfang Li and Yongbo Xia and Shasha Tian}, title = {Parameter estimation of {P-III} distribution based on {GA} using rejection and interpolation mechanism}, journal = {Clust. Comput.}, volume = {22}, number = {Suppl 1}, pages = {2159--2167}, year = {2019}, url = {https://doi.org/10.1007/s10586-018-2110-6}, doi = {10.1007/S10586-018-2110-6}, timestamp = {Tue, 29 Sep 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/cluster/SheLXT19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/cits/LiuXTLLS19, author = {Wei Liu and Chang Xu and Zhao Tian and Dong{-}Kun Li and Guan{-}Zhong Lu and Wei She}, editor = {Mohammad S. Obaidat and Zhenqiang Mi and Kuei{-}Fang Hsiao and Petros Nicopolitidis and Daniel Cascado Caballero}, title = {Research on Gateway Deployment for Throughput Optimization in Wireless Mesh Networks}, booktitle = {2019 International Conference on Computer, Information and Telecommunication Systems, {CITS} 2019, Beijing, China, August 28-31, 2019}, pages = {1--5}, publisher = {{IEEE}}, year = {2019}, url = {https://doi.org/10.1109/CITS.2019.8862147}, doi = {10.1109/CITS.2019.8862147}, timestamp = {Sun, 08 Aug 2021 01:41:01 +0200}, biburl = {https://dblp.org/rec/conf/cits/LiuXTLLS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ida/GuoZWSX18, author = {Huaping Guo and Jun Zhou and Chang{-}an Wu and Wei She and Mingliang Xu}, title = {Ensemble based on feature projection and under-sampling for imbalanced learning}, journal = {Intell. Data Anal.}, volume = {22}, number = {5}, pages = {959--980}, year = {2018}, url = {https://doi.org/10.3233/IDA-173505}, doi = {10.3233/IDA-173505}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ida/GuoZWSX18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijait/GuoZWS18, author = {Huaping Guo and Jun Zhou and Chang{-}an Wu and Wei She}, title = {A Novel Hybrid-Based Ensemble for Class Imbalance Problem}, journal = {Int. J. Artif. Intell. Tools}, volume = {27}, number = {6}, pages = {1850025:1--1850025:13}, year = {2018}, url = {https://doi.org/10.1142/S0218213018500252}, doi = {10.1142/S0218213018500252}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ijait/GuoZWS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsjkx/LiuCPS18, author = {Wei Liu and Congcong Cheng and Mengli Pei and Wei She}, title = {{\unicode{22522}}{\unicode{20110}}{\unicode{23376}}{\unicode{22359}}{\unicode{20998}}{\unicode{21106}}{\unicode{30340}}{\unicode{33258}}{\unicode{36866}}{\unicode{24212}}{\unicode{24335}}{\unicode{20840}}{\unicode{30450}}{\unicode{22270}}{\unicode{20687}}{\unicode{27700}}{\unicode{21360}}{\unicode{31639}}{\unicode{27861}} (Adaptive Blind Watermarking Algorithm Based on Sub-block Segmentation)}, journal = {{\unicode{35745}}{\unicode{31639}}{\unicode{26426}}{\unicode{31185}}{\unicode{23398}}}, volume = {45}, number = {10}, pages = {178--182}, year = {2018}, url = {https://doi.org/10.11896/j.issn.1002-137X.2018.10.033}, doi = {10.11896/J.ISSN.1002-137X.2018.10.033}, timestamp = {Mon, 16 Mar 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jsjkx/LiuCPS18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jifs/GuoLWZXS16, author = {Huaping Guo and Hongbing Liu and Chang{-}an Wu and Weimei Zhi and Yan Xiao and Wei She}, title = {Logistic discrimination based on G-mean and F-measure for imbalanced problem}, journal = {J. Intell. Fuzzy Syst.}, volume = {31}, number = {3}, pages = {1155--1166}, year = {2016}, url = {https://doi.org/10.3233/IFS-162150}, doi = {10.3233/IFS-162150}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jifs/GuoLWZXS16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsc/She0YBT16, author = {Wei She and Wei Zhu and I{-}Ling Yen and Farokh B. Bastani and Bhavani Thuraisingham}, title = {Role-Based Integrated Access Control and Data Provenance for {SOA} Based Net-Centric Systems}, journal = {{IEEE} Trans. Serv. Comput.}, volume = {9}, number = {6}, pages = {940--953}, year = {2016}, url = {https://doi.org/10.1109/TSC.2015.2432795}, doi = {10.1109/TSC.2015.2432795}, timestamp = {Wed, 29 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tsc/She0YBT16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jsjkx/ChenSY15, author = {Qian Chen and Wei She and Yangdong Ye}, title = {{\unicode{19968}}{\unicode{31181}}{\unicode{22522}}{\unicode{20110}}TF-HBPN{\unicode{30340}}{\unicode{22797}}{\unicode{26434}}{\unicode{31995}}{\unicode{32479}}{\unicode{34892}}{\unicode{20026}}{\unicode{20998}}{\unicode{26512}}{\unicode{26041}}{\unicode{27861}} (Method of Behavior Analysis for Complex System Based on Hierarchical Bayesian Petri Net with Time Factor)}, journal = {{\unicode{35745}}{\unicode{31639}}{\unicode{26426}}{\unicode{31185}}{\unicode{23398}}}, volume = {42}, number = {7}, pages = {62--67}, year = {2015}, url = {https://doi.org/10.11896/j.issn.1002-137X.2015.07.014}, doi = {10.11896/J.ISSN.1002-137X.2015.07.014}, timestamp = {Mon, 27 Apr 2020 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jsjkx/ChenSY15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tsc/SheYTB13, author = {Wei She and I{-}Ling Yen and Bhavani Thuraisingham and Elisa Bertino}, title = {Security-Aware Service Composition with Fine-Grained Information Flow Control}, journal = {{IEEE} Trans. Serv. Comput.}, volume = {6}, number = {3}, pages = {330--343}, year = {2013}, url = {https://doi.org/10.1109/TSC.2012.3}, doi = {10.1109/TSC.2012.3}, timestamp = {Wed, 29 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tsc/SheYTB13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/seke/DiaoSYG13, author = {Lijuan Diao and Wei She and I{-}Ling Yen and Junzhong Gu}, title = {A Semantic-based Semi-automated Role Mapping Mechanism {(S)}}, booktitle = {The 25th International Conference on Software Engineering and Knowledge Engineering, Boston, MA, USA, June 27-29, 2013}, pages = {14--17}, publisher = {Knowledge Systems Institute Graduate School}, year = {2013}, timestamp = {Thu, 12 Mar 2020 11:30:49 +0100}, biburl = {https://dblp.org/rec/conf/seke/DiaoSYG13.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fuzzIEEE/SheY12, author = {Wei She and Yangdong Ye}, title = {Fault diagnosis via fuzzy time analysis}, booktitle = {{FUZZ-IEEE} 2012, {IEEE} International Conference on Fuzzy Systems, Brisbane, Australia, June 10-15, 2012, Proceedings}, pages = {1--7}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/FUZZ-IEEE.2012.6250796}, doi = {10.1109/FUZZ-IEEE.2012.6250796}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/fuzzIEEE/SheY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/isda/SheY12, author = {Wei She and Yangdong Ye}, editor = {Ajith Abraham and Albert Y. Zomaya and Sebasti{\'{a}}n Ventura and Ronald R. Yager and V{\'{a}}clav Sn{\'{a}}sel and Azah Kamilah Muda and Philip Samuel}, title = {{PPN:} {A} probabilistic model for fault detection and diagnosis}, booktitle = {12th International Conference on Intelligent Systems Design and Applications, {ISDA} 2012, Kochi, India, November 27-29, 2012}, pages = {1006--1011}, publisher = {{IEEE}}, year = {2012}, url = {https://doi.org/10.1109/ISDA.2012.6416676}, doi = {10.1109/ISDA.2012.6416676}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/isda/SheY12.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icaic/ZhangSWD11, author = {Siping Zhang and Wei She and Mei Wang and Zhimin Duan}, editor = {Dehuai Zeng}, title = {A Two-Stage Decision Tree Algorithm on Constructing Hyper-Plane}, booktitle = {Applied Informatics and Communication - International Conference, {ICAIC} 2011, Xi'an, China, August 20-21, 2011, Proceedings, Part {II}}, series = {Communications in Computer and Information Science}, volume = {225}, pages = {316--323}, publisher = {Springer}, year = {2011}, url = {https://doi.org/10.1007/978-3-642-23220-6\_40}, doi = {10.1007/978-3-642-23220-6\_40}, timestamp = {Tue, 29 Dec 2020 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icaic/ZhangSWD11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icws/SheYTH11, author = {Wei She and I{-}Ling Yen and Bhavani Thuraisingham and San{-}Yih Huang}, title = {Rule-Based Run-Time Information Flow Control in Service Cloud}, booktitle = {{IEEE} International Conference on Web Services, {ICWS} 2011, Washington, DC, USA, July 4-9, 2011}, pages = {524--531}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/ICWS.2011.35}, doi = {10.1109/ICWS.2011.35}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icws/SheYTH11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/sose/SheYBTT11, author = {Wei She and I{-}Ling Yen and Farokh B. Bastani and Bao N. Tran and Bhavani Thuraisingham}, editor = {Jerry Zeyu Gao and Xiaodong Lu and Muhammad Younas and Hong Zhu}, title = {Role-based integrated access control and data provenance for {SOA} based net-centric systems}, booktitle = {{IEEE} 6th International Symposium on Service Oriented System Engineering, {SOSE} 2011, Irvine, CA, USA, December 12-14, 2011}, pages = {225--234}, publisher = {{IEEE} Computer Society}, year = {2011}, url = {https://doi.org/10.1109/SOSE.2011.6139111}, doi = {10.1109/SOSE.2011.6139111}, timestamp = {Wed, 21 Jun 2023 16:54:56 +0200}, biburl = {https://dblp.org/rec/conf/sose/SheYBTT11.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jwsr/SheYT10, author = {Wei She and I{-}Ling Yen and Bhavani Thuraisingham}, title = {Enhancing Security Modeling for Web Services Using Delegation and Pass-On}, journal = {Int. J. Web Serv. Res.}, volume = {7}, number = {1}, pages = {1--21}, year = {2010}, url = {https://doi.org/10.4018/jwsr.2010010101}, doi = {10.4018/JWSR.2010010101}, timestamp = {Wed, 29 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jwsr/SheYT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/compsac/SheYT10, author = {Wei She and I{-}Ling Yen and Bhavani Thuraisingham}, title = {WS-Sim: {A} Web Service Simulation Toolset with Realistic Data Support}, booktitle = {Workshop Proceedings of the 34th Annual {IEEE} International Computer Software and Applications Conference, {COMPSAC} Workshops 2010, Seoul, Korea, 19-23 July 2010}, pages = {109--114}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/COMPSACW.2010.29}, doi = {10.1109/COMPSACW.2010.29}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/compsac/SheYT10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icws/SheYTB10, author = {Wei She and I{-}Ling Yen and Bhavani Thuraisingham and Elisa Bertino}, title = {Policy-Driven Service Composition with Information Flow Control}, booktitle = {{IEEE} International Conference on Web Services, {ICWS} 2010, Miami, Florida, USA, July 5-10, 2010}, pages = {50--57}, publisher = {{IEEE} Computer Society}, year = {2010}, url = {https://doi.org/10.1109/ICWS.2010.37}, doi = {10.1109/ICWS.2010.37}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icws/SheYTB10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icws/SheYTB09, author = {Wei She and I{-}Ling Yen and Bhavani Thuraisingham and Elisa Bertino}, title = {The {SCIFC} Model for Information Flow Control in Web Service Composition}, booktitle = {{IEEE} International Conference on Web Services, {ICWS} 2009, Los Angeles, CA, USA, 6-10 July 2009}, pages = {1--8}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/ICWS.2009.13}, doi = {10.1109/ICWS.2009.13}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icws/SheYTB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/soca/SheYTB09, author = {Wei She and I{-}Ling Yen and Bhavani Thuraisingham and Elisa Bertino}, title = {Effective and efficient implementation of an information flow control protocol for service composition}, booktitle = {{IEEE} International Conference on Service-Oriented Computing and Applications, {SOCA} 2009, 14-15 December 2009, Taipei, Taiwan}, pages = {1--8}, publisher = {{IEEE} Computer Society}, year = {2009}, url = {https://doi.org/10.1109/SOCA.2009.5410468}, doi = {10.1109/SOCA.2009.5410468}, timestamp = {Wed, 29 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/soca/SheYTB09.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icws/SheYT08, author = {Wei She and I{-}Ling Yen and Bhavani Thuraisingham}, title = {Enhancing Security Modeling for Web Services Using Delegation and Pass-On}, booktitle = {2008 {IEEE} International Conference on Web Services {(ICWS} 2008), September 23-26, 2008, Beijing, China}, pages = {545--552}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ICWS.2008.23}, doi = {10.1109/ICWS.2008.23}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/icws/SheYT08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isjgp/SheT07, author = {Wei She and Bhavani Thuraisingham}, title = {Security for Enterprise Resource Planning Systems}, journal = {Inf. Secur. J. {A} Glob. Perspect.}, volume = {16}, number = {3}, pages = {152--163}, year = {2007}, url = {https://doi.org/10.1080/10658980701401959}, doi = {10.1080/10658980701401959}, timestamp = {Wed, 29 Jun 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isjgp/SheT07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/hase/SheTY07, author = {Wei She and Bhavani Thuraisingham and I{-}Ling Yen}, title = {Delegation-Based Security Model for Web Services}, booktitle = {Tenth {IEEE} International Symposium on High Assurance Systems Engineering {(HASE} 2007), November 14-16, 2007, Dallas, Texas, {USA}}, pages = {82--91}, publisher = {{IEEE} Computer Society}, year = {2007}, url = {https://doi.org/10.1109/HASE.2007.76}, doi = {10.1109/HASE.2007.76}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/hase/SheTY07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/IEEEcit/SheYW06, author = {Wei She and Jiahai Yang and Jianping Wu}, title = {Passive Inter-Domain Routing Monitor Based on Routing Interaction}, booktitle = {Sixth International Conference on Computer and Information Technology {(CIT} 2006), 20-22 September 2006, Seoul, Korea}, pages = {104}, publisher = {{IEEE} Computer Society}, year = {2006}, url = {https://doi.org/10.1109/CIT.2006.142}, doi = {10.1109/CIT.2006.142}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/IEEEcit/SheYW06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icon/ZhangYSZ06, author = {Jun Zhang and Jiahai Yang and Wei She and Miaohui Zhang}, title = {A New Conceptual Distributed Network Measurement Architecture Based on Web Service}, booktitle = {14th {IEEE} International Conference on Networks, {ICON} 2006, Singapore, 13-15 September 2006}, pages = {1--7}, publisher = {{IEEE}}, year = {2006}, url = {https://doi.org/10.1109/ICON.2006.302676}, doi = {10.1109/ICON.2006.302676}, timestamp = {Wed, 16 Oct 2019 14:14:52 +0200}, biburl = {https://dblp.org/rec/conf/icon/ZhangYSZ06.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.