


Остановите войну!
for scientists:


default search action
Wan Tang
Person information

Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2022
- [c11]Zhiyang Liu, Ximin Yang, Wan Tang, Xiao Zhang, Zhen Yang:
BACO: A Bi-Ant-Colony-Based Strategy for UAV Trajectory Planning with Obstacle Avoidance. MSN 2022: 279-286 - [c10]Zekun Sun, John Panneerselvam, Lu Liu, Yao Lu, Wan Tang:
An inter-cell resource usage analysis of large-scale datacentre trace logs. UCC 2022: 305-312 - 2021
- [c9]Fei Tong, Rucong Sui, Yujian Zhang, Wan Tang:
MPDC: A Multi-channel Pipelined Data Collection MAC for Duty-Cycled Linear Sensor Networks. WASA (2) 2021: 550-562 - 2020
- [j11]Ximin Yang
, Deqiang Wang
, Wan Tang
, Wei Feng
, Cuitao Zhu
:
IPsec Cryptographic Algorithm Invocation Considering Performance and Security for SDN Southbound Interface Communication. IEEE Access 8: 181782-181795 (2020) - [c8]Wei Feng, Wan Tang, Ximin Yang, Lu Liu
:
MEM: A Multi-Staged Eviction Mechanism of Flowtable for Software-Defined Datacenters. INFOCOM Workshops 2020: 400-405
2010 – 2019
- 2019
- [j10]Lingyun Zhou
, Lixin Ding, Maode Ma, Wan Tang:
An accurate partially attracted firefly algorithm. Computing 101(5): 477-493 (2019) - [j9]Lingyun Zhou, Maode Ma, Lixin Ding, Wan Tang:
Centroid opposition with a two-point full crossover for the partially attracted firefly algorithm. Soft Comput. 23(23): 12241-12254 (2019) - 2018
- [j8]Ximin Yang, Deqiang Wang, Wei Feng, Jingjing Wu, Wan Tang
:
Cryptographic Algorithm Invocation Based on Software-Defined Everything in IPsec. Wirel. Commun. Mob. Comput. 2018: 8728424:1-8728424:11 (2018) - [c7]Deqiang Wang, Wan Tang, Ximin Yang, Wei Feng:
Cryptographic Algorithm Invocation in IPsec: Guaranteeing the Communication Security in the Southbound Interface of SDN Networks. ChinaCom 2018: 583-592 - 2016
- [j7]Min Chen
, Yongfeng Qian, Shiwen Mao, Wan Tang, Xi-Min Yang:
Software-Defined Mobile Networks Security. Mob. Networks Appl. 21(5): 729-743 (2016) - 2015
- [j6]Wan Tang, Bo Yi, Ximin Yang, Jingcong Li:
Dynamic Home Circuit Construction for Datacenter Networks Using LOBS-HC Ring. KSII Trans. Internet Inf. Syst. 9(5): 1606-1623 (2015) - 2014
- [j5]Wan Tang, Xi-Min Yang, Bo Yi, Rongbo Zhu
:
Home Circuit Sharing for Dynamic Wavelength Assignment in LOBS-Based Datacenter Networks. IEICE Trans. Inf. Syst. 97-D(10): 2660-2662 (2014) - [c6]Bo Yi, Wan Tang, Ximin Yang, Jingcong Li:
Dynamic home circuit grouping and wavelength assignment in LOBS-HC ring networks. ChinaCom 2014: 303-306 - [c5]Ding-Geng Din Chen
, Xinguang Jim Chen
, Wan Tang, Feng Lin
:
Sample Size Determination to Detect Cusp Catastrophe in Stochastic Cusp Catastrophe Model: A Monte-Carlo Simulation-Based Approach. SBP 2014: 35-41 - 2011
- [j4]Li-Mei Peng, Chan-Hyun Youn, Wan Tang, Xin-Wan Li:
Close-packing-based sensor node deployment schemes for AOFSN. Int. J. Commun. Networks Distributed Syst. 7(3/4): 311-330 (2011) - [j3]Wan Tang, Min Chen, Jin Ni, Xi-Min Yang:
Security Enhancement Mechanism Based on Contextual Authentication and Role Analysis for 2G-RFID Systems. Sensors 11(7): 6743-6759 (2011) - [c4]Li-Mei Peng, Chunming Qiao, Wan Tang, Chan-Hyun Youn:
Cube-Based Intra-Datacenter Networks with LOBS-HC. ICC 2011: 1-6 - [c3]Fei Tong, Wan Tang, Rong Xie, Lei Shu
, Young-Chon Kim:
P-MAC: A Cross-Layer Duty Cycle MAC Protocol Towards Pipelining for Wireless Sensor Networks. ICC 2011: 1-5 - 2010
- [j2]Wan Tang, Li-Mei Peng, Xi-Min Yang, Xia Xie, Yang Cao:
GEP-based Framework for Immune- Inspired Intrusion Detection. KSII Trans. Internet Inf. Syst. 4(6): 1273-1293 (2010) - [c2]Wan Tang, Xi-Min Yang, Xia Xie, Li-Mei Peng, Chan-Hyun Youn, Yang Cao:
Avidity-model based clonal selection algorithm for network intrusion detection. IWQoS 2010: 1-5
2000 – 2009
- 2008
- [j1]Qin Yu, Wan Tang, Yan Ma, S. A. Gamble, X. M. Tu:
Comparing multiple sensitivities and specificities with different diagnostic criteria: Applications to sexual abuse and sexual health research. Comput. Stat. Data Anal. 53(1): 27-37 (2008) - [c1]Wan Tang, Yang Cao, Xi-Min Yang, Won-Ho So:
Study on Adaptive Intrusion Detection Engine Based on Gene Expression Programming Rules. CSSE (3) 2008: 959-963
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2023-09-08 13:19 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint