default search action
Zhen Wang 0013
Person information
- unicode name: 王震
- affiliation: Hangzhou Dianzi University, School of Cyberspace, China
- affiliation (former): Nanyang Technological University, School of Computer Engineering, Singapore
- affiliation (former): Dalian University of Technology, Software School, China
Other persons with the same name
- Zhen Wang — disambiguation page
- Zhen Wang 0001 — Boston University, Reliable Computing Laboratory, MA, USA
- Zhen Wang 0002 — Inner Monggolia University, School of Mathematical Sciences, Hohhot, China (and 1 more)
- Zhen Wang 0003 — Zhejiang University, College of Computer Science and Technology, China
- Zhen Wang 0004 — Northwestern Polytechnical University, Center for Optical Imagery Analysis and Learning, Xi'an, China (and 4 more)
- Zhen Wang 0005 — Beijing Institute of Technology, Radar Research Laboratory, School of Information and Electronics, China
- Zhen Wang 0006 — Google Inc. (and 1 more)
- Zhen Wang 0007 — Georgia Institute of Technology, Center for Energy and Geo Processing, Atlanta, GA, USA
- Zhen Wang 0008 — Anhui University of Technology, School of Electrical and Information Engineering, Ma'anshan, China (and 2 more)
- Zhen Wang 0009 — Zhejiang University, College of Electrical Engineering, Hangzhou, China (and 1 more)
- Zhen Wang 0010 — Xi'an Jiaotong University, State Key Laboratory for Manufacturing Systems Engineering, China
- Zhen Wang 0011 — Beijing University of Posts and Telecommunications, School of Cyberspace Security, China
- Zhen Wang 0012 — Xijing University, School of Science, Xi'an, China
- Zhen Wang 0014 — Wuhan University, School of Resource and Environmental Science, China
- Zhen Wang 0015 — Shanghai Jiao Tong University School of Medicine, Shanghai Mental Health Center, Department of Clinical Psychology, China
- Zhen Wang 0016 — Shandong University of Science and Technology, College of Electrical Engineering and Automation, Qingdao, China
- Zhen Wang 0017 — Tianjin University of Finance and Economics, Department of Information Science and Technology, China
- Zhen Wang 0018 — Nanjing University of Science and Technology, School of Science, China
- Zhen Wang 0019 — Nanjing Prochip Electronic Technology Company Ltd., China (and 1 more)
- Zhen Wang 0020 — Xijing University, School of Information Engineering, Xi'an, China
- Zhen Wang 0021 — University of Science and Technology Beijing, School of Computer and Communication Engineering, China
- Zhen Wang 0022 — Beijing University of Posts and Telecommunications, MoE Key Laboratory of Universal Wireless Communications, China (and 1 more)
- Zhen Wang 0023 — Qingdao City Planning and Design Institute, China
- Zhen Wang 0024 — Shandong University of Technology, School of Computer Science and Technology, Zibo, China (and 1 more)
- Zhen Wang 0025 — Chang'an University, School of Information Engineering, Xi'an, China
- Zhen Wang 0026 — Shandong University of Science and Technology, College of Geomatics, Qingdao, China
- Zhen Wang 0027 — Shandong University of Science and Technology, College of Computer Science and Engineering, Qingdao, China
- Zhen Wang 0028 — Tsinghua University, State Key Laboratory of Automotive Safety and Energy, Beijing, China
- Z. Jane Wang 0001 (aka: Zhen Jane Wang 0001, Zhen Wang 0029) — University of British Columbia, Department of Electrical and Computer Engineering, Vancouver, Canada (and 2 more)
- Zhen Wang 0030 — University of Sydney, Department of Computer Science, NSW, Australia (and 1 more)
- Zhen Wang 0031 — Shanghai Jiao Tong University, Department of Automation, School of Electronic Information and Electrical Engineering, China
- Zhen Wang 0032 — China University of Geosciences, School of Land Science and Technology, Beijing, China (and 1 more)
- Zhen Wang 0033 — Hebei University of Technology, Tianjin, China
- Zhen Wang 0034 — University of Suwon, Department of Computer Science, South Korea
- Zhen Wang 0035 — China University of Mining and Technology, School of Computer Science and Technology, Xuzhou, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j29]Jingrui Wang, Huizhen Zhang, Tianbo An, Xing Jin, Chao Wang, Jian Zhao, Zhen Wang:
Effect of vaccine efficacy on vaccination behavior with adaptive perception. Appl. Math. Comput. 469: 128543 (2024) - [j28]Manzhi Yang, Jian Zhang, Liyuan Lin, Jinpeng Han, Xiaoguang Chen, Zhen Wang, Fei-Yue Wang:
Multipattern Integrated Networks With Contrastive Pretraining for Graph Anomaly Detection. IEEE Trans. Comput. Soc. Syst. 11(5): 5619-5630 (2024) - [j27]Dayuan Chen, Jian Zhang, Yuqian Lv, Jinhuan Wang, Hongjie Ni, Shanqing Yu, Zhen Wang, Qi Xuan:
Single-Node Injection Label Specificity Attack on Graph Neural Networks via Reinforcement Learning. IEEE Trans. Comput. Soc. Syst. 11(5): 6135-6150 (2024) - [j26]Rongke Liu, Dong Wang, Yizhi Ren, Zhen Wang, Kaitian Guo, Qianqian Qin, Xiaolei Liu:
Unstoppable Attack: Label-Only Model Inversion Via Conditional Diffusion Model. IEEE Trans. Inf. Forensics Secur. 19: 3958-3973 (2024) - [j25]Qiuyun Lyu, Yilong Zhou, Yizhi Ren, Zhen Wang, Yunchuan Guo:
Toward Personal Data Sharing Autonomy: A Task-Driven Data Capsule Sharing System. IEEE Trans. Inf. Forensics Secur. 19: 9760-9774 (2024) - [j24]Jinpeng Han, Zhen Wang, Xiaoguang Chen, Manzhi Yang, Fei-Yue Wang:
Digger: A Graph Contraction Algorithm for Patrolling Games. IEEE Trans. Reliab. 73(2): 1104-1116 (2024) - [c14]Jianan Ma, Pengfei Yang, Jingyi Wang, Youcheng Sun, Cheng-Chao Huang, Zhen Wang:
VeRe: Verification Guided Synthesis for Repairing Deep Neural Networks. ICSE 2024: 8:1-8:13 - [c13]Xing Jin, Zhihai Gong, Jiuchuan Jiang, Chao Wang, Jian Zhang, Zhen Wang:
RCTD: Reputation-Constrained Truth Discovery in Sybil Attack Crowdsourcing Environment. KDD 2024: 1313-1324 - 2023
- [j23]Xing Jin, Yuchen Tao, Jingrui Wang, Chao Wang, Yongheng Wang, Zhouyang Zhang, Zhen Wang:
Strategic use of payoff information in k-hop evolutionary Best-shot networked public goods game. Appl. Math. Comput. 459: 128271 (2023) - [j22]Xueyuan Wen, Kaiyan Dai, Qi Xiong, Lili Chen, Jian Zhang, Zhen Wang:
An approach to internal threats detection based on sentiment analysis and network analysis. J. Inf. Secur. Appl. 77: 103557 (2023) - [j21]Zhen Wang, Ruodan Li, Xing Jin, Hong Ding:
Emergence of Social Norms in Metanorms Game With High-Order Interaction Topology. IEEE Trans. Comput. Soc. Syst. 10(3): 1057-1072 (2023) - [j20]Qinghua Lu, Weishan Zhang, Zhen Wang, Qun Jin, Vincenzo Piuri:
Guest Editorial: Special Issue on Responsible AI in Social Computing. IEEE Trans. Comput. Soc. Syst. 10(6): 2906-2908 (2023) - [c12]Tingwei Hu, Lili Mei, Zhen Wang:
Stackelberg Strategies on Epidemic Containment Games. IJTCS-FAW 2023: 281-294 - [c11]Zhehua Zhong, Tianyi Chen, Zhen Wang:
MAT: Mixed-Strategy Game of Adversarial Training in Fine-tuning. IJCAI 2023: 4674-4683 - [i3]Zhehua Zhong, Tianyi Chen, Zhen Wang:
MAT: Mixed-Strategy Game of Adversarial Training in Fine-tuning. CoRR abs/2306.15826 (2023) - [i2]Wenjie Lv, Zhen Wang, Yitao Zheng, Zhehua Zhong, Qi Xuan, Tianyi Chen:
BufferSearch: Generating Black-Box Adversarial Texts With Lower Queries. CoRR abs/2310.09652 (2023) - 2022
- [j19]Zhen Wang, Yitao Zheng, Hai Zhu, Chang Yang, Tianyi Chen:
Transferable adversarial examples can efficiently fool topic models. Comput. Secur. 118: 102749 (2022) - [c10]Danni Qu, Qi Chen, Jiahui Wang, Jiaojiao Jiang, Zhen Wang:
The Effect of Source Location on the Effectiveness of Source Detection in Finite Networks. ICC 2022: 4104-4113 - [c9]Xiwei Xu, Chen Wang, Zhen Wang, Qinghua Lu, Liming Zhu:
Dependency Tracking for Risk Mitigation in Machine Learning (ML) Systems. ICSE (SEIP) 2022: 145-146 - 2021
- [j18]Guanghai Cui, Zhen Wang, Jun-Li Li, Xing Jin, Zhiwang Zhang:
Influence of precaution and dynamic post-indemnity based insurance policy on controlling the propagation of epidemic security risks in networks. Appl. Math. Comput. 392: 125720 (2021) - [j17]Zhen Wang, Chaofan Li, Xing Jin, Hong Ding, Guanghai Cui, Lanping Yu:
Evolutionary dynamics of the interdependent security games on complex network. Appl. Math. Comput. 399: 126051 (2021) - [j16]Juntao Zhu, Hong Ding, Yuchen Tao, Zhen Wang, Lanping Yu:
Secure the IoT Networks as Epidemic Containment Game. Symmetry 13(2): 156 (2021) - [j15]Xing Jin, Mingchu Li, Zhen Wang, Cheng Guo, Hong Ding, Yong Guan:
EigenCloud: A Cooperation and Trust-Aware Dependable Cloud File-Sharing Network. IEEE Trans. Comput. Soc. Syst. 8(2): 522-536 (2021) - [c8]Qi Zhou, Haipeng Chen, Yitao Zheng, Zhen Wang:
EvaLDA: Efficient Evasion Attacks Towards Latent Dirichlet Allocation. AAAI 2021: 14602-14611 - 2020
- [j14]Yizhi Ren, Mengjin Jiang, Ting Wu, Ye Yao, Kim-Kwang Raymond Choo, Zhen Wang:
An eigenvalue-based immunization scheme for node attacks in networks with uncertainty. Sci. China Inf. Sci. 63(3) (2020) - [j13]Yizhi Ren, Qi Zhou, Zhen Wang, Ting Wu, Guohua Wu, Kim-Kwang Raymond Choo:
Query-efficient label-only attacks against black-box machine learning models. Comput. Secur. 90: 101698 (2020) - [j12]Fenghua Li, Yongjun Li, Siyuan Leng, Yunchuan Guo, Kui Geng, Zhen Wang, Liang Fang:
Dynamic countermeasures selection for multi-path attacks. Comput. Secur. 97: 101927 (2020) - [j11]Lili Chen, Zhen Wang, Fenghua Li, Yunchuan Guo, Kui Geng:
A Stackelberg Security Game for Adversarial Outbreak Detection in the Internet of Things. Sensors 20(3): 804 (2020) - [j10]Qiuhua Wang, Hao Liu, Xing Jin, Zhen Wang:
A Heterogeneous Network Modeling Method Based on Public Goods Game Theory to Explore Cooperative Behavior in VANETs. Sensors 20(6): 1802 (2020) - [i1]Qi Zhou, Haipeng Chen, Yitao Zheng, Zhen Wang:
EvaLDA: Efficient Evasion Attacks Towards Latent Dirichlet Allocation. CoRR abs/2012.04864 (2020)
2010 – 2019
- 2019
- [j9]Guohua Wu, Guangen Tang, Zhongru Wang, Zhen Zhang, Zhen Wang:
An Attention-Based BiLSTM-CRF Model for Chinese Clinic Named Entity Recognition. IEEE Access 7: 113942-113949 (2019) - [j8]Jie Ji, Guohua Wu, Jinguo Shuai, Zhen Zhang, Zhen Wang, Yizhi Ren:
Heuristic Approaches for Enhancing the Privacy of the Leader in IoT Networks. Sensors 19(18): 3886 (2019) - [c7]Chenjian Duan, Zhen Wang, Hong Ding, Mengting Jiang, Yizhi Ren, Ting Wu:
A Vulnerability Assessment Method for Network System Based on Cooperative Game Theory. ICA3PP (2) 2019: 391-398 - [c6]Jie Ji, Guohua Wu, Chenjian Duan, Yizhi Ren, Zhen Wang:
Greedily Remove k Links to Hide Important Individuals in Social Network. SocialSec 2019: 223-237 - 2018
- [j7]Yizhi Ren, Xiangyu Chen, Zhen Wang, Benyun Shi, Guanghai Cui, Ting Wu, Kim-Kwang Raymond Choo:
Neighbor-considered migration facilitates cooperation in prisoner's dilemma games. Appl. Math. Comput. 323: 95-105 (2018) - [j6]Yizhi Ren, Gang Wang, Lanping Yu, Benyun Shi, Weitong Hu, Zhen Wang:
Rigorous or tolerant: The effect of different reputation attitudes in complex networks. Future Gener. Comput. Syst. 83: 476-484 (2018) - [c5]Mengjin Jiang, Yizhi Ren, Ye Yao, Lifeng Yuan, Ting Wu, Zhen Wang:
CPS: A Community Priority Based Vaccine Distribution Strategy in Different Networks. DASC/PiCom/DataCom/CyberSciTech 2018: 334-337 - [c4]Jia-Hao Xu, Zhen Wang, Guanghai Cui, Yizhi Ren, Hong Ding, Kim-Kwang Raymond Choo:
An Extended Exploration to the Epidemic Containment Game. ICCCN 2018: 1-7 - [c3]Yizhi Ren, Mengjin Jiang, Ye Yao, Ting Wu, Zhen Wang, Mengkun Li, Kim-Kwang Raymond Choo:
Node Immunization in Networks with Uncertainty. TrustCom/BigDataSE 2018: 1392-1397 - 2017
- [j5]Changbing Tang, Xiang Li, Zhen Wang, Jianmin Han:
Cooperation and distributed optimization for the unreliable wireless game with indirect reciprocity. Sci. China Inf. Sci. 60(11): 110205:1-110205:17 (2017) - [j4]Ruchdee Binmad, Mingchu Li, Zhen Wang, Nakema Deonauth, Chettupally Anil Carie:
An Extended Framework for Recovering From Trust Breakdowns in Online Community Settings. Future Internet 9(3): 36 (2017) - [j3]Kun Lu, Shiyu Wang, Ling Xie, Zhen Wang, Mingchu Li:
Modeling altruism agents: Incentive mechanism in autonomous networks with other-regarding preference. Peer-to-Peer Netw. Appl. 10(5): 1169-1181 (2017) - [c2]Guangliang Liu, Hongjun Qiu, Benyun Shi, Zhen Wang:
Imitation and memory-based self-organizing behaviors under voluntary vaccination. SPAC 2017: 491-496 - 2016
- [j2]Kun Lu, Shiyu Wang, Ling Xie, Zhen Wang, Mingchu Li:
A dynamic reward-based incentive mechanism: Reducing the cost of P2P systems. Knowl. Based Syst. 112: 105-113 (2016) - 2015
- [j1]Guanghai Cui, Mingchu Li, Zhen Wang, Jiankang Ren, Dong Jiao, Jianhua Ma:
Analysis and evaluation of incentive mechanisms in P2P networks: a spatial evolutionary game theory perspective. Concurr. Comput. Pract. Exp. 27(12): 3044-3064 (2015) - 2012
- [c1]Guanghai Cui, Mingchu Li, Zhen Wang, Linlin Tian, Jianhua Ma:
Analysis and Evaluation Framework Based on Spatial Evolutionary Game Theory for Incentive Mechanism in Peer-to-Peer Network. TrustCom 2012: 287-294
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-20 21:59 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint