default search action
BibTeX records: Wenli Shang
@article{DBLP:journals/ijis/ShangQSWDX24, author = {Wenli Shang and Jiawei Qiu and Haotian Shi and Shuang Wang and Lei Ding and Yanjun Xiao}, title = {An Efficient Anomaly Detection Method for Industrial Control Systems: Deep Convolutional Autoencoding Transformer Network}, journal = {Int. J. Intell. Syst.}, volume = {2024}, pages = {1--18}, year = {2024}, url = {https://doi.org/10.1155/2024/5459452}, doi = {10.1155/2024/5459452}, timestamp = {Fri, 02 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijis/ShangQSWDX24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ijsysc/GaoDSZL24, author = {Xiaobin Gao and Feiqi Deng and Wenli Shang and Xueyan Zhao and Shuqi Li}, title = {Attack-resilient asynchronous state estimation of interval type-2 fuzzy systems under stochastic protocols}, journal = {Int. J. Syst. Sci.}, volume = {55}, number = {13}, pages = {2688--2700}, year = {2024}, url = {https://doi.org/10.1080/00207721.2024.2345199}, doi = {10.1080/00207721.2024.2345199}, timestamp = {Fri, 20 Sep 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/ijsysc/GaoDSZL24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/isci/LiuZDSS24, author = {Yansong Liu and Li Zhu and Lei Ding and He Sui and Wenli Shang}, title = {A hybrid sampling method for highly imbalanced and overlapped data classification with complex distribution}, journal = {Inf. Sci.}, volume = {661}, pages = {120117}, year = {2024}, url = {https://doi.org/10.1016/j.ins.2024.120117}, doi = {10.1016/J.INS.2024.120117}, timestamp = {Wed, 03 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/isci/LiuZDSS24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/kbs/ShangWZDW24, author = {Wenli Shang and Bowen Wang and Pengcheng Zhu and Lei Ding and Shuang Wang}, title = {A Span-based Multivariate Information-aware Embedding Network for joint relational triplet extraction of threat intelligence}, journal = {Knowl. Based Syst.}, volume = {295}, pages = {111829}, year = {2024}, url = {https://doi.org/10.1016/j.knosys.2024.111829}, doi = {10.1016/J.KNOSYS.2024.111829}, timestamp = {Fri, 19 Jul 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/kbs/ShangWZDW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icic/ShangHGCDW24, author = {Wenli Shang and Zifeng Huang and Zhaojun Gu and Zhong Cao and Lei Ding and Shuang Wang}, editor = {De{-}Shuang Huang and Wei Chen and Yijie Pan}, title = {CWMAGAN-GP-Based Oversampling Technique for Intrusion Detection}, booktitle = {Advanced Intelligent Computing Technology and Applications - 20th International Conference, {ICIC} 2024, Tianjin, China, August 5-8, 2024, Proceedings, Part {VIII}}, series = {Lecture Notes in Computer Science}, volume = {14869}, pages = {318--330}, publisher = {Springer}, year = {2024}, url = {https://doi.org/10.1007/978-981-97-5603-2\_26}, doi = {10.1007/978-981-97-5603-2\_26}, timestamp = {Thu, 08 Aug 2024 08:41:10 +0200}, biburl = {https://dblp.org/rec/conf/icic/ShangHGCDW24.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/access/ShangGHLC23, author = {Wenli Shang and Tianyu Gong and Jing Hou and Jiayue Lu and Zhong Cao}, title = {Quantitative Evaluation Method for Industrial Control System Vulnerability Based on Improved Expert Elicitation and Fuzzy Set Method}, journal = {{IEEE} Access}, volume = {11}, pages = {101007--101019}, year = {2023}, url = {https://doi.org/10.1109/ACCESS.2023.3314629}, doi = {10.1109/ACCESS.2023.3314629}, timestamp = {Sat, 14 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/access/ShangGHLC23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/iotj/CaoCSZ23, author = {Zhong Cao and Zhuo Chen and Wenli Shang and Yongdong Zhu}, title = {Efficient Revocable Anonymous Authentication Mechanism for Edge Intelligent Controllers}, journal = {{IEEE} Internet Things J.}, volume = {10}, number = {12}, pages = {10357--10367}, year = {2023}, url = {https://doi.org/10.1109/JIOT.2023.3237609}, doi = {10.1109/JIOT.2023.3237609}, timestamp = {Thu, 15 Jun 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/iotj/CaoCSZ23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jfi/WeiCS23, author = {Yun{-}Shan Wei and Ying{-}Yu Chen and Wenli Shang}, title = {Feedback higher-order iterative learning control for nonlinear systems with non-uniform iteration lengths and random initial state shifts}, journal = {J. Frankl. Inst.}, volume = {360}, number = {14}, pages = {10745--10765}, year = {2023}, url = {https://doi.org/10.1016/j.jfranklin.2023.08.016}, doi = {10.1016/J.JFRANKLIN.2023.08.016}, timestamp = {Sat, 14 Oct 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jfi/WeiCS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/network/LiDWLCHS23, author = {Jun Li and Shuping Dang and Miaowen Wen and Qiang Li and Yingyang Chen and Yu Huang and Wenli Shang}, title = {Index Modulation Multiple Access for 6G Communications: Principles, Applications, and Challenges}, journal = {{IEEE} Netw.}, volume = {37}, number = {1}, pages = {52--60}, year = {2023}, url = {https://doi.org/10.1109/MNET.002.2200433}, doi = {10.1109/MNET.002.2200433}, timestamp = {Tue, 07 May 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/network/LiDWLCHS23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tgcn/HuangWLLSL23, author = {Jinhao Huang and Wei Wei and Bifa Liang and Cheng Liu and Wenli Shang and Jun Li}, title = {Real-Time Stereo Disparity Prediction Based on Patch-Embedded Extraction and Depthwise Hierarchical Refinement for 3-D Sensing of Autonomous Vehicles on Energy-Efficient Edge Computing Devices}, journal = {{IEEE} Trans. Green Commun. Netw.}, volume = {7}, number = {1}, pages = {424--433}, year = {2023}, url = {https://doi.org/10.1109/TGCN.2023.3233963}, doi = {10.1109/TGCN.2023.3233963}, timestamp = {Sat, 19 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tgcn/HuangWLLSL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tvt/LiuWLLSL23, author = {Cheng Liu and Wei Wei and Bifa Liang and Xihao Liu and Wenli Shang and Jun Li}, title = {ConvMLP-Mixer Based Real-Time Stereo Matching Network Towards Autonomous Driving}, journal = {{IEEE} Trans. Veh. Technol.}, volume = {72}, number = {2}, pages = {2581--2586}, year = {2023}, url = {https://doi.org/10.1109/TVT.2022.3206612}, doi = {10.1109/TVT.2022.3206612}, timestamp = {Sat, 19 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tvt/LiuWLLSL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tvt/LiangWHLYYSL23, author = {Bifa Liang and Wei Wei and Jinhao Huang and Cheng Liu and Hong Yang and Ru Yang and Wenli Shang and Jun Li}, title = {Real-Time Stereo Image Depth Estimation Network With Group-Wise {L1} Distance for Edge Devices Towards Autonomous Driving}, journal = {{IEEE} Trans. Veh. Technol.}, volume = {72}, number = {11}, pages = {13917--13928}, year = {2023}, url = {https://doi.org/10.1109/TVT.2023.3284011}, doi = {10.1109/TVT.2023.3284011}, timestamp = {Sun, 10 Dec 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/tvt/LiangWHLYYSL23.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/ojcs/KuangWYLLPLS22, author = {Zhenfei Kuang and Wei Wei and Yier Yan and Jie Li and Guangman Lu and Yuyang Peng and Jun Li and Wenli Shang}, title = {A Real-time and Robust Monocular Visual Inertial {SLAM} System Based on Point and Line Features for Mobile Robots of Smart Cities Toward 6G}, journal = {{IEEE} Open J. Commun. Soc.}, volume = {3}, pages = {1950--1962}, year = {2022}, url = {https://doi.org/10.1109/OJCOMS.2022.3217147}, doi = {10.1109/OJCOMS.2022.3217147}, timestamp = {Mon, 05 Dec 2022 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/ojcs/KuangWYLLPLS22.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/complexity/WeiYSC21, author = {Yun{-}Shan Wei and Xiaofen Yang and Wenli Shang and Ying{-}Yu Chen}, title = {Higher-Order Iterative Learning Control with Optimal Control Gains Based on Evolutionary Algorithm for Nonlinear System}, journal = {Complex.}, volume = {2021}, pages = {4281006:1--4281006:9}, year = {2021}, url = {https://doi.org/10.1155/2021/4281006}, doi = {10.1155/2021/4281006}, timestamp = {Thu, 22 Aug 2024 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/complexity/WeiYSC21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sp/ShangZWZ21, author = {Wenli Shang and Guanyu Zhang and Tianyu Wang and Rui Zhang}, title = {A Test Cases Generation Method for Industrial Control Protocol Test}, journal = {Sci. Program.}, volume = {2021}, pages = {6611732:1--6611732:9}, year = {2021}, url = {https://doi.org/10.1155/2021/6611732}, doi = {10.1155/2021/6611732}, timestamp = {Mon, 04 Oct 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sp/ShangZWZ21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/sp/ShangX21, author = {Wenli Shang and Xiangyu Xing}, title = {{ICS} Software Trust Measurement Method Based on Dynamic Length Trust Chain}, journal = {Sci. Program.}, volume = {2021}, pages = {6691696:1--6691696:11}, year = {2021}, url = {https://doi.org/10.1155/2021/6691696}, doi = {10.1155/2021/6691696}, timestamp = {Sun, 16 May 2021 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/sp/ShangX21.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ShangGCHZ19, author = {Wenli Shang and Tianyu Gong and Chunyu Chen and Jing Hou and Peng Zeng}, title = {Information Security Risk Assessment Method for Ship Control System Based on Fuzzy Sets and Attack Trees}, journal = {Secur. Commun. Networks}, volume = {2019}, pages = {3574675:1--3574675:11}, year = {2019}, url = {https://doi.org/10.1155/2019/3574675}, doi = {10.1155/2019/3574675}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ShangGCHZ19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/aiipcc/WangLWCS19, author = {Zixiang Wang and Zhoubin Liu and Fengning Wang and Lu Chen and Wenli Shang}, editor = {Jo{\~{a}}o Manuel R. S. Tavares and Zeshui Xu}, title = {Energy minimum encrypted data aggregation scheme for {WSN} in smart grid}, booktitle = {Proceedings of the International Conference on Artificial Intelligence, Information Processing and Cloud Computing, {AIIPCC} 2019, Sanya, China, December 19-21, 2019}, pages = {73:1--73:6}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3371425.3371473}, doi = {10.1145/3371425.3371473}, timestamp = {Thu, 26 Mar 2020 18:20:28 +0100}, biburl = {https://dblp.org/rec/conf/aiipcc/WangLWCS19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/QiSH19, author = {Yingying Qi and Wenli Shang and Xiaojun He}, title = {A Combined Prediction Method of Industrial Internet Security Situation Based on Time Series}, booktitle = {{ICCNS} 2019: The 9th International Conference on Communication and Network Security, Chongqing, China, November 15-17, 2019}, pages = {84--91}, publisher = {{ACM}}, year = {2019}, url = {https://doi.org/10.1145/3371676.3371704}, doi = {10.1145/3371676.3371704}, timestamp = {Thu, 22 Apr 2021 19:04:09 +0200}, biburl = {https://dblp.org/rec/conf/iccns/QiSH19.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/icccsec/ZhaoSLW18, author = {Jianming Zhao and Wenli Shang and Zhoubin Liu and Zixiang Wang}, editor = {Xingming Sun and Zhaoqing Pan and Elisa Bertino}, title = {Security Classification Transmission Method Based on {SDN} in Industrial Networks}, booktitle = {Cloud Computing and Security - 4th International Conference, {ICCCS} 2018, Haikou, China, June 8-10, 2018, Revised Selected Papers, Part {VI}}, series = {Lecture Notes in Computer Science}, volume = {11068}, pages = {26--36}, publisher = {Springer}, year = {2018}, url = {https://doi.org/10.1007/978-3-030-00021-9\_3}, doi = {10.1007/978-3-030-00021-9\_3}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/icccsec/ZhaoSLW18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/trustcom/ShangCSZZ18, author = {Wenli Shang and Junrong Cui and Chunhe Song and Jianming Zhao and Peng Zeng}, title = {Research on Industrial Control Anomaly Detection Based on {FCM} and {SVM}}, booktitle = {17th {IEEE} International Conference On Trust, Security And Privacy In Computing And Communications / 12th {IEEE} International Conference On Big Data Science And Engineering, TrustCom/BigDataSE 2018, New York, NY, USA, August 1-3, 2018}, pages = {218--222}, publisher = {{IEEE}}, year = {2018}, url = {https://doi.org/10.1109/TrustCom/BigDataSE.2018.00042}, doi = {10.1109/TRUSTCOM/BIGDATASE.2018.00042}, timestamp = {Fri, 24 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/trustcom/ShangCSZZ18.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/telsys/WanSKZ17, author = {Ming Wan and Wenli Shang and Linghe Kong and Peng Zeng}, title = {Content-based deep communication control for networked control system}, journal = {Telecommun. Syst.}, volume = {65}, number = {1}, pages = {155--168}, year = {2017}, url = {https://doi.org/10.1007/s11235-016-0223-x}, doi = {10.1007/S11235-016-0223-X}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/telsys/WanSKZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/tifs/WanSZ17, author = {Ming Wan and Wenli Shang and Peng Zeng}, title = {Double Behavior Characteristics for One-Class Classification Anomaly Detection in Networked Control Systems}, journal = {{IEEE} Trans. Inf. Forensics Secur.}, volume = {12}, number = {12}, pages = {3011--3023}, year = {2017}, url = {https://doi.org/10.1109/TIFS.2017.2730581}, doi = {10.1109/TIFS.2017.2730581}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/tifs/WanSZ17.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcm/WanSZZ16, author = {Ming Wan and Wenli Shang and Peng Zeng and Jianming Zhao}, title = {{SRDA:} {A} Secure Routing and Data Aggregation Approach for Wireless Smart Meter}, journal = {J. Commun.}, volume = {11}, number = {1}, pages = {108--117}, year = {2016}, url = {https://doi.org/10.12720/jcm.11.1.108-117}, doi = {10.12720/JCM.11.1.108-117}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/jcm/WanSZZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/jcp/ShangQWZ16, author = {Wenli Shang and Quansheng Qiao and Ming Wan and Peng Zeng}, title = {Design and Implementation of Industrial Firewall for Modbus/TCP}, journal = {J. Comput.}, volume = {11}, number = {5}, pages = {432--438}, year = {2016}, url = {https://doi.org/10.17706/jcp.11.5.432-438}, doi = {10.17706/JCP.11.5.432-438}, timestamp = {Thu, 25 Feb 2021 00:00:00 +0100}, biburl = {https://dblp.org/rec/journals/jcp/ShangQWZ16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ShangZWLA16, author = {Wenli Shang and Peng Zeng and Ming Wan and Lin Li and Panfeng An}, title = {Intrusion detection algorithm based on {OCSVM} in industrial control system}, journal = {Secur. Commun. Networks}, volume = {9}, number = {10}, pages = {1040--1049}, year = {2016}, url = {https://doi.org/10.1002/sec.1398}, doi = {10.1002/SEC.1398}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ShangZWLA16.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/scn/ShangZWLA16a, author = {Wenli Shang and Peng Zeng and Ming Wan and Lin Li and Panfeng An}, title = {Corrigendum to "Intrusion detection algorithm based on {OCSVM} in industrial control system"}, journal = {Secur. Commun. Networks}, volume = {9}, number = {17}, pages = {4822}, year = {2016}, url = {https://doi.org/10.1002/sec.1697}, doi = {10.1002/SEC.1697}, timestamp = {Mon, 28 Aug 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/scn/ShangZWLA16a.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iccns/ShangCWA016, author = {Wenli Shang and Junrong Cui and Ming Wan and Panfeng An and Peng Zeng}, title = {Modbus Communication Behavior Modeling and {SVM} Intrusion Detection Method}, booktitle = {Proceedings of the 6th International Conference on Communication and Network Security, {ICCNS} '16, Singapore, November 26-29, 2016}, pages = {80--85}, publisher = {{ACM}}, year = {2016}, url = {https://doi.org/10.1145/3017971.3017978}, doi = {10.1145/3017971.3017978}, timestamp = {Sat, 02 Sep 2023 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/iccns/ShangCWA016.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/infosec/ShangWZQ15, author = {Wenli Shang and Ming Wan and Peng Zeng and Quansheng Qiao}, title = {Research on self-learning method on generation and optimization of industrial firewall rules}, booktitle = {2015 Second International Conference on Information Security and Cyber Forensics, InfoSec 2015, Cape Town, South Africa, November 15-17, 2015}, pages = {47--52}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/InfoSec.2015.7435505}, doi = {10.1109/INFOSEC.2015.7435505}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/infosec/ShangWZQ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/wcicss/ShangLWZ15, author = {Wenli Shang and Lin Li and Ming Wan and Peng Zeng}, title = {Industrial communication intrusion detection algorithm based on improved one-class {SVM}}, booktitle = {2015 World Congress on Industrial Control Systems Security, {WCICSS} 2015, London, United Kingdom, December 14-16, 2015}, pages = {21--25}, publisher = {{IEEE}}, year = {2015}, url = {https://doi.org/10.1109/WCICSS.2015.7420317}, doi = {10.1109/WCICSS.2015.7420317}, timestamp = {Sun, 02 Oct 2022 01:00:00 +0200}, biburl = {https://dblp.org/rec/conf/wcicss/ShangLWZ15.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@article{DBLP:journals/eswa/ShangZY14, author = {Wenli Shang and Xiaofeng Zhou and Jie Yuan}, title = {An intelligent fault diagnosis system for newly assembled transmission}, journal = {Expert Syst. Appl.}, volume = {41}, number = {9}, pages = {4060--4072}, year = {2014}, url = {https://doi.org/10.1016/j.eswa.2013.12.045}, doi = {10.1016/J.ESWA.2013.12.045}, timestamp = {Fri, 26 May 2017 01:00:00 +0200}, biburl = {https://dblp.org/rec/journals/eswa/ShangZY14.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/fuzzIEEE/YuanSLS08, author = {Jie Yuan and Haibo Shi and Chang Liu and Wenli Shang}, title = {Backward concurrent reasoning based on fuzzy Petri nets}, booktitle = {{FUZZ-IEEE} 2008, {IEEE} International Conference on Fuzzy Systems, Hong Kong, China, 1-6 June, 2008, Proceedings}, pages = {832--837}, publisher = {{IEEE}}, year = {2008}, url = {https://doi.org/10.1109/FUZZY.2008.4630467}, doi = {10.1109/FUZZY.2008.4630467}, timestamp = {Wed, 16 Oct 2019 14:14:52 +0200}, biburl = {https://dblp.org/rec/conf/fuzzIEEE/YuanSLS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iscsct/ShangDS08, author = {Wenli Shang and Bin Duan and Haibo Shi}, title = {Event-Driven Model for Manufacturing Execution System Platform}, booktitle = {2008 International Symposium on Computer Science and Computational Technology, {ISCSCT} 2008, 20-22 December 2008, Shanghai, China, 2 Volumes}, pages = {387--390}, publisher = {{IEEE} Computer Society}, year = {2008}, url = {https://doi.org/10.1109/ISCSCT.2008.168}, doi = {10.1109/ISCSCT.2008.168}, timestamp = {Thu, 23 Mar 2023 00:00:00 +0100}, biburl = {https://dblp.org/rec/conf/iscsct/ShangDS08.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/ksem/PengSSP07, author = {Hui Peng and Wenli Shang and Haibo Shi and Wei Peng}, editor = {Zili Zhang and J{\"{o}}rg H. Siekmann}, title = {On-Line Monitoring and Diagnosis of Failures Using Control Charts and Fault Tree Analysis {(FTA)} Based on Digital Production Model}, booktitle = {Knowledge Science, Engineering and Management, Second International Conference, {KSEM} 2007, Melbourne, Australia, November 28-30, 2007, Proceedings}, series = {Lecture Notes in Computer Science}, volume = {4798}, pages = {544--549}, publisher = {Springer}, year = {2007}, url = {https://doi.org/10.1007/978-3-540-76719-0\_56}, doi = {10.1007/978-3-540-76719-0\_56}, timestamp = {Tue, 14 May 2019 10:00:53 +0200}, biburl = {https://dblp.org/rec/conf/ksem/PengSSP07.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
@inproceedings{DBLP:conf/iceb/ShangF04, author = {Wenli Shang and Yushun Fan}, editor = {Jian Chen}, title = {Integrated Optimization Model of Production Planning and Scheduling for Batch Production}, booktitle = {The Fourth International Conference on Electronic Business - Shaping Business Strategy in a Networked World}, pages = {419--421}, publisher = {Academic Publishers/World Publishing Corporation}, year = {2004}, timestamp = {Tue, 22 Feb 2005 15:21:39 +0100}, biburl = {https://dblp.org/rec/conf/iceb/ShangF04.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.