default search action
Ping Wang 0007
Person information
- affiliation: Kun Shan University, Department of Information Management, Taiwan
- affiliation (former): National Chiao Tung University, Institute of Information Management, Taiwan
Other persons with the same name
- Ping Wang (aka: Wang Ping) — disambiguation page
- Ping Wang 0001 — York University, Department of Electrical Engineering and Computer Science, Toronto, Canada (and 2 more)
- Ping Wang 0002 — PLA University of Science and Technology, College of Defense Engineering, Nanjing, China
- Ping Wang 0003 — Peking University, School of Software and Microelectronics / National Engineering Research Center for Software Engineering, Beijing, China
- Ping Wang 0004 — Tongji University, Department of Information and Communication Engineering, Shanghai, China (and 1 more)
- Ping Wang 0005 — Shenzhen University, College of Information Engineering, China (and 1 more)
- Ping Wang 0006 — Nanyang Technological University, School of Electrical and Electronic Engineering, Singapore (and 2 more)
- Ping Wang 0008 — Chongqing University of Posts and Telecommunications, Key Laboratory of Industrial Internet of Things and Networked Control, China (and 1 more)
- Ping Wang 0009 — Xi'an Jiaotong University, School of Electronic and Information Engineering, China
- Ping Wang 0010 — Zhengzhou Science and Technology Institute, China
- Ping Wang 0011 — Jilin University, Department of Control Science and Engineering, Changchun, China
- Ping Wang 0012 — Georgia Institute of Technology, Atlanta, GA, USA
- Ping Wang 0013 — University of Southampton, UK
- Ping Wang 0014 — Chinese Academy of Sciences, Institute of Electrical Engineering, Key Laboratory of Power Electronics and Electric Drive, Beijing, China
- Ping Wang 0015 — Tianjin University, School of Electrical and Information Engineering, China
- Ping Wang 0016 — Shandong University of Finance and Economics, Department of Computer Science and Technology, Jinan, China
- Ping Wang 0017 — Sun Yat-sen University, Shenzhen, China (and 4 more)
- Ping Wang 0018 — National University of Defense Technology, Intelligence Science College, Changsha, China
- Ping Wang 0019 — North China Electric Power University, Hebei Provincial Key Laboratory of Power Transmission Equipment Security Defense, Baoding, China
- Ping Wang 0020 — Chinese Academy of Sciences, Institute of Geographic Sciences and Natural Resources Research, Beijing, China
- Ping Wang 0021 — Xidian University, School of Telecommunications Engineering, State Key Laboratory of Integrated Service Networks, Xi'an, China
- Ping Wang 0022 — Texas A&M University, Deptartment of Electrical and Computer Engineering; TX, USA
- Ping Wang 0023 — St. Francis Xavier University, Department of Mathematics, Statistics and Computer Science, Antigonish, NS, Canada
- Ping Wang 0024 — Stevens Institute of Technology, Hoboken, NJ, USA (and 1 more)
- Ping Wang 0025 — University of Queensland, Brisbane, Australia (and 2 more)
- Ping Wang 0026 — Zhejiang University, Department of Biomedical Engineering, Cancer Center, Hangzhou, China (and 1 more)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2021
- [j17]Hsiao-Chung Lin, Ping Wang, Wen-Hui Lin, Kuo-Ming Chao, Zong-Yu Yang:
Identifying the Attack Sources of Botnets for a Renewable Energy Management System by Using a Revised Locust Swarm Optimisation Scheme. Symmetry 13(7): 1295 (2021) - 2020
- [c18]Huang Yu Hsiang, Tseng Sheng Yuan, Ping Wang, Wen-Hui Lin, Lin Hsiao Chung:
A Case Study on Experiment Site Selection for PV Energy Generation Forecast. ICS 2020: 468-472
2010 – 2019
- 2019
- [j16]Hsiao-Chung Lin, Ping Wang, Wen-Hui Lin:
Implementation of a PSO-Based Security Defense Mechanism for Tracing the Sources of DDoS Attacks. Comput. 8(4): 88 (2019) - [c17]Wen-Hui Lin, Ping Wang, Bao-Hua Wu, Ming-Sheng Jhou, Kuo-Ming Chao, Chi-Chun Lo:
Behaviorial-Based Network Flow Analyses for Anomaly Detection in Sequential Data Using Temporal Convolutional Networks. ICEBE 2019: 173-183 - 2018
- [c16]Ping Wang, Wen-Hui Lin, Bao-Hua Wu, Kuo-Ming Chao, Chi-Chun Lo:
A Cross-Age Face Recognition Approach Using Fog Computing Architecture for User Authentication on Mobile Devices. ICEBE 2018: 86-93 - 2017
- [j15]Tzy Shiah Wang, Hui-Tang Lin, Ping Wang:
Weighted-spectral clustering algorithm for detecting community structures in complex networks. Artif. Intell. Rev. 47(4): 463-483 (2017) - [j14]Ping Wang, Kuo-Ming Chao, Chi-Chun Lo, Yu-Shih Wang:
Using ontologies to perform threat analysis and develop defensive strategies for mobile security. Inf. Technol. Manag. 18(1): 1-25 (2017) - [c15]Ping Wang, Wen-Hui Lin, Kuo-Ming Chao, Chi-Chun Lo:
A Face-Recognition Approach Using Deep Reinforcement Learning Approach for User Authentication. ICEBE 2017: 183-188 - 2016
- [j13]Wen-Hui Lin, Ping Wang, Chen-Fang Tsai:
Face recognition using support vector model classifier for user authentication. Electron. Commer. Res. Appl. 18: 71-82 (2016) - [j12]Ping Wang, Kuo-Ming Chao, Chi-Chun Lo, Wen-Hui Lin, Hsiao-Chung Lin, Wun Jie Chao:
Using malware for software-defined networking-based smart home security management through a taint checking approach. Int. J. Distributed Sens. Networks 12(8) (2016) - [j11]Ping Wang, Hui-Tang Lin, Tzy Shiah Wang:
An improved ant colony system algorithm for solving the IP traceback problem. Inf. Sci. 326: 172-187 (2016) - [c14]Ping Wang, Kuo-Ming Chao, Hsiao-Chung Lin, Wen-Hui Lin, Chi-Chun Lo:
An Efficient Flow Control Approach for SDN-Based Network Threat Detection and Migration Using Support Vector Machine. ICEBE 2016: 56-63 - 2015
- [j10]Ping Wang, Kuo-Ming Chao, Chi-Chun Lo:
A reputation-based computing approach in trusted web service provisions. Comput. Syst. Sci. Eng. 30(4) (2015) - [j9]Ping Wang, Kuo-Ming Chao, Chi-Chun Lo:
Satisfaction-based Web service discovery and selection scheme utilizing vague sets theory. Inf. Syst. Frontiers 17(4): 827-844 (2015) - [j8]Ping Wang, Yu-Shih Wang:
Malware behavioural detection and vaccine development by using a support vector model classifier. J. Comput. Syst. Sci. 81(6): 1012-1026 (2015) - [c13]Ping Wang, Wen-Hui Lin, Wun Jie Chao, Kuo-Ming Chao, Chi-Chun Lo:
Using Dynamic Taint Approach for Malware Threat. ICEBE 2015: 408-416 - 2014
- [c12]Ping Wang, Wun Jie Chao, Kuo-Ming Chao, Chi-Chun Lo:
Using Taint Analysis for Threat Risk of Cloud Applications. ICEBE 2014: 185-190 - 2013
- [c11]Ping Wang, Kuo-Ming Chao, Chi-Chun Lo:
A Novel Threat and Risk Assessment Mechanism for Security Controls in Service Management. ICEBE 2013: 337-344 - 2011
- [j7]Ping Wang, Kuo-Ming Chao, Chi-Chun Lo, Ray Farmer:
An evidence-based scheme for web service selection. Inf. Technol. Manag. 12(2): 161-172 (2011) - [c10]Ping Wang, Kuo-Ming Chao, Chi-Chun Lo, Wen-Hui Lin, Tzu Chia Wang:
A Consumer Trust-Based Approach in Web Services Selection. ICEBE 2011: 251-256 - [c9]Ping Wang, Hui-Tang Lin, Tzy Shiah Wang:
A Revised Ant Colony Optimization Scheme for Discovering Attack Paths of Botnet. ICPADS 2011: 918-923 - 2010
- [j6]Ping Wang, Kuo-Ming Chao, Chi-Chun Lo:
On optimal decision for QoS-aware composite service selection. Expert Syst. Appl. 37(1): 440-449 (2010) - [c8]Ping Wang, Tzu Chia Wang, Pu-Tsun Kuo, Chin Pin Wang:
An analysis model of botnet tracking based on ant colony optimization algorithm. NCM 2010: 606-611 - [p1]Ping Wang, Chi-Chun Lo, Leon Smalov:
Consensus Issues for Service Advertisement and Selection. Agent-Based Service-Oriented Computing 2010: 161-187
2000 – 2009
- 2009
- [c7]Ping Wang, Kuo-Ming Chao, Chi-Chun Lo, Ray Farmer, Pu-Tsun Kuo:
A Reputation-Based Service Selection Scheme. ICEBE 2009: 501-506 - [c6]Ping Wang, Kuo-Ming Chao, Chi-Chun Lo, Pu-Tsun Kuo:
A reputation scheme with witness reasoning for service selection. SOCA 2009: 1-8 - 2008
- [c5]Ping Wang, Kuo-Ming Chao, Chi-Chun Lo, Yinsheng Li:
QoS-Aware Service Selection under Consumer's Reputation. ICEBE 2008: 627-632 - 2007
- [j5]Ping Wang, Kuo-Ming Chao, Chi-Chun Lo, Chun-Lung Huang, Muhammad Younas:
A fuzzy outranking approach in risk analysis of web service security. Clust. Comput. 10(1): 47-55 (2007) - [j4]Muhammad Younas, Kuo-Ming Chao, Ping Wang, Chun-Lung Huang:
QoS-aware mobile service transactions in a wireless environment. Concurr. Comput. Pract. Exp. 19(8): 1219-1236 (2007) - [j3]Chun-Lung Huang, Chi-Chun Lo, Ping Wang, Kuo-Ming Chao, Yinsheng Li:
Applying Semi-Order Preference Model in Content-Based Service Discovery. Int. J. Electron. Bus. Manag. 5(1): 48-58 (2007) - 2006
- [j2]Chun-Lung Huang, Kuo-Ming Chao, Chi-Chun Lo, Ping Wang, Jen-Yao Chung:
Service discovery through consensus based preferences. Comput. Syst. Sci. Eng. 21(4) (2006) - [j1]Chi-Chun Lo, Ping Wang, Kuo-Ming Chao:
A fuzzy group-preferences analysis method for new-product development. Expert Syst. Appl. 31(4): 826-834 (2006) - [c4]Ping Wang, Kuo-Ming Chao, Chun-Lung Huang, Chi-Chun Lo, Chia-Ling Hu:
A Fuzzy Decision Model of Risk Assessment Through Fuzzy Preference Relations with Users Confidence-interval. AINA (2) 2006: 889-893 - [c3]Ping Wang, Kuo-Ming Chao, Chi-Chun Lo, Chun-Lung Huang, Yinsheng Li:
A Fuzzy Model for Selection of QoS-Aware Web Services. ICEBE 2006: 585-593 - 2005
- [c2]Chi-Chun Lo, Ping Wang, Kuo-Ming Chao:
Solving Consensus Measure of Ambiguous GDM Problems Using Vague Sets - An Application of Risk Assessment. CSCWD (Selected papers) 2005: 573-585 - 2004
- [c1]Chi-Chun Lo, Ping Wang:
Using fuzzy distance to evaluate the consensus of group decision-making an entropy-based approach. FUZZ-IEEE 2004: 1001-1006
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-15 19:32 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint