
Wen Zeng
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2020
- [j24]Hongmei Xia, Wenbin Zhen, Dongyang Chen, Wen Zeng:
Rigid-flexible coupling contact action simulation study of the open mechanism on the ordinary multilayer fruit paper bag for fruit bagging. Comput. Electron. Agric. 173: 105414 (2020) - [j23]Wen Zeng, Reem Bashir, Trevor Wood, François Siewe, Helge Janicke, Isabel Wagner:
How Location-Aware Access Control Affects User Privacy and Security in Cloud Computing Systems. EAI Endorsed Trans. Cloud Syst. 6(18): e1 (2020) - [j22]Liang Ge, Junxian Chen, Guiyun Tian
, Wen Zeng, Qi Huang, Ze Hu:
Study on a New Electromagnetic Flow Measurement Technology Based on Differential Correlation Detection. Sensors 20(9): 2489 (2020) - [j21]Wen Zeng, Alexis J. Comber:
Using household counts as ancillary information for areal interpolation of population: Comparing formal and informal, online data sources. Comput. Environ. Urban Syst. 80: 101440 (2020) - [c26]Wen Zeng, Vasileios Germanos:
Quantitative Reaction Systems. PNSE@Petri Nets 2020: 216-217 - [c25]François Siewe, Vasileios Germanos, Wen Zeng:
Analysing Petri Nets in a Calculus of Context-Aware Ambients. COMPSAC 2020: 1647-1652
2010 – 2019
- 2019
- [j20]Wen Zeng
:
A methodology for cost-benefit analysis of information security technologies. Concurr. Comput. Pract. Exp. 31(7) (2019) - [j19]Wen Zeng
, Maciej Koutny:
Modelling and analysis of corporate efficiency and productivity loss associated with enterprise information security technologies. J. Inf. Secur. Appl. 49 (2019) - [j18]Wen Zeng, Jiayi Zhang
, Derrick Wing Kwan Ng
, Bo Ai
, Zhangdui Zhong:
Two-Way Hybrid Terrestrial-Satellite Relaying Systems: Performance Analysis and Relay Selection. IEEE Trans. Veh. Technol. 68(7): 7011-7023 (2019) - [c24]Wen Zeng, Vasileios Germanos:
Modelling Hybrid Cyber Kill Chain. PNSE@Petri Nets/ACSD 2019: 143-160 - [c23]Xiaolin Wang, Cheng Dong, Wen Zeng, Zhen Xu, Junsheng Zhang:
Survey of Data Value Evaluation Methods Based on Open Source Scientific and Technological Information. ICPCSEE (1) 2019: 172-185 - [c22]Wen Zeng, Vasileios Germanos:
Benefit and Cost of Cloud Computing Security. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2019: 291-295 - 2018
- [j17]Wen Zeng, Hongjiao Xu, Hui Li, Xiang Li:
Research on Methodology of Correlation Analysis of Sci-Tech Literature Based on Deep Learning Technology in the Big Data. J. Database Manag. 29(3): 67-88 (2018) - [j16]Jiayi Zhang
, Wen Zeng, Xu Li, Qiang Sun
, Kostas P. Peppas
:
New Results on the Fluctuating Two-Ray Model With Arbitrary Fading Parameters and Its Applications. IEEE Trans. Veh. Technol. 67(3): 2766-2770 (2018) - [j15]Wen Zeng, Jiayi Zhang
, Shuaifei Chen, Kostas P. Peppas
, Bo Ai
:
Physical Layer Security Over Fluctuating Two-Ray Fading Channels. IEEE Trans. Veh. Technol. 67(9): 8949-8953 (2018) - [c21]Shuaifei Chen, Jiayi Zhang, Wen Zeng, Kostas P. Peppas, Bo Ai:
Performance Analysis of Wireless Powered UAV Relaying Systems Over $\kappa-\mu$ Fading Channels. GLOBECOM Workshops 2018: 1-6 - [c20]Wen Zeng, Xiang Li, Hui Li:
Study on Chinese Term Extraction Method Based on Machine Learning. ICPCSEE (2) 2018: 128-135 - [c19]Wen Zeng, Jiayi Zhang, Kostas P. Peppas, Bo Ai, Zhangdui Zhong:
UAV-Aided Wireless Information and Power Transmission for High-Speed Train Communications. ITSC 2018: 3409-3414 - [c18]Wen Zeng, Junsheng Zhang, Yunliang Zhang:
Exploration on Chinese Term Recognition and Semantic Analysis of Scientific & Technical Literature. SKG 2018: 273-276 - [i3]Wen Zeng, Jiayi Zhang, Shuaifei Chen, Kostas P. Peppas, Bo Ai:
Physical Layer Security over Fluctuating Two-Ray Fading Channels. CoRR abs/1805.12360 (2018) - 2017
- [j14]Wen Zeng, Changqing Yao, Hui Li:
The exploration of information extraction and analysis about science and technology policy in China. Electron. Libr. 35(4): 709-723 (2017) - [j13]Wen Zeng, Hongjiao Xu, Junsheng Zhang:
Term extraction and correlation analysis based on massive scientific and technical literature. Int. J. Comput. Sci. Eng. 15(3/4): 248-255 (2017) - [j12]Bai Ying Lei, Yingxia Liu, Changfeng Dong, Xin Chen
, Xinyu Zhang, Xian-Fen Diao, Guilin Yang, Jing Liu, Simin Yao, Hanying Li, Jing Yuan, Shaxi Li, Xiaohua Le, Yimin Lin, Wen Zeng:
Assessment of liver fibrosis in chronic hepatitis B via multimodal data. Neurocomputing 253: 169-176 (2017) - [j11]Ziqian Xu, Wen Zeng, Jiayu Sun, Wei Chen, Ruzhi Zhang, Zunyuan Yang, Zunwei Yao, Lei Wang, Li Song, Yushu Chen, Yu Zhang, Chunhua Wang, Li Gong, Bing Wu, Tinghua Wang, Jie Zheng, Fabao Gao:
The quantification of blood-brain barrier disruption using dynamic contrast-enhanced magnetic resonance imaging in aging rhesus monkeys with spontaneous type 2 diabetes mellitus. NeuroImage 158: 480-487 (2017) - [i2]Jiayi Zhang, Wen Zeng, Xu Li, Qiang Sun, Kostas P. Peppas:
New Results on the Fluctuating Two-Ray Model with Arbitrary Fading Parameters and Its Applications. CoRR abs/1710.09234 (2017) - 2016
- [j10]Peng Qu, Junsheng Zhang
, Changqing Yao, Wen Zeng:
Identifying long tail term from large-scale candidate pairs for big data-oriented patent analysis. Concurr. Comput. Pract. Exp. 28(15): 4194-4208 (2016) - [j9]Wen Zeng, Maciej Koutny, Paul Watson
, Vasileios Germanos:
Formal verification of secure information flow in cloud computing. J. Inf. Secur. Appl. 27-28: 103-116 (2016) - [c17]Wen Zeng:
Processing and Mining of Multi-source Scientific and Technical Literature Data. IIKI 2016: 10-13 - 2015
- [j8]Wen Zeng, Junsheng Zhang
, Ying Li, Peng Qu:
The Study on Media Access Control Protocol for Wireless Network in Library. Int. J. Distributed Sens. Networks 11: 792542:1-792542:10 (2015) - [c16]Hongjiao Xu, Wen Zeng, Jie Gui, Peng Qu, Xiaohua Zhu, Lijun Wang:
Exploring similarity between academic paper and patent based on Latent Semantic Analysis and Vector Space Model. FSKD 2015: 801-805 - [c15]Shang Hui Liu, Wen Zeng, Yan Lou, Juanhua Zhai:
A Reliable Multi-path Routing Approach for Medical Wireless Sensor Networks. IIKI 2015: 126-129 - [c14]Wen Zeng, Maciej Koutny, Paul Watson
:
Opacity in Internet of Things with Cloud Computing (Short Paper). SOCA 2015: 201-207 - 2014
- [b1]Wen Zeng:
Quantitative analysis of distributed systems. Newcastle University, Newcastle upon Tyne, UK, 2014 - [c13]Wen Zeng, Maciej Koutny, Aad P. A. van Moorsel:
Performance Modelling and Evaluation of Enterprise Information Security Technologies. CIT 2014: 504-511 - [c12]Wen Zeng, Maciej Koutny, Paul Watson
:
Verifying Secure Information Flow in Federated Clouds. CloudCom 2014: 78-85 - [c11]Peng Qu, Junsheng Zhang
, Yanqing He, Wen Zeng, Hongjiao Xu:
Term Extraction Using Co-occurrence in Abstract and First Claim for Patent Analysis. IIKI 2014: 60-63 - [c10]Wen Zeng, Junsheng Zhang
, Peng Qu:
The Study of MAC Protocol for Industrial Wireless Sensor Network Based on Ultra-wide Band. IIKI 2014: 194-197 - [c9]Wen Zeng, Maciej Koutny:
Data Resources in Dynamic Environments. TASE 2014: 185-192 - [i1]Wen Zeng, Chunyan Mu, Maciej Koutny, Paul Watson:
A Flow Sensitive Security Model for Cloud Computing Systems. CoRR abs/1404.7760 (2014) - 2013
- [j7]Wen Zeng, Wenfeng Qi:
Finding slid pairs in trivium with MiniSat. Sci. China Inf. Sci. 56(9): 1-8 (2013) - [c8]Wen Zeng, Kaiyu Liu, Maciej Koutny:
Cost-benefit analysis of digital rights management products using stochastic models. SpringSim (ANSS) 2013: 1 - 2012
- [j6]Wen Zeng:
Exploration and Study of Multilingual Thesauri Automation Construction for Digital Libraries in China. Electron. Libr. 30(2): 233-247 (2012) - [c7]Wen Zeng, Kaiyu Liu:
Sensitivity Analysis of Loss of Corporate Efficiency and Productivity Associated with Enterprise DRM Technology. ARES 2012: 445-453 - [c6]Chunyan Mu, Wen Zeng:
Security measurement in service-based computing systems. SOCA 2012: 1-8 - 2011
- [j5]Wen Zeng, Aad P. A. van Moorsel:
Quantitative Evaluation of Enterprise DRM Technology. Electron. Notes Theor. Comput. Sci. 275: 159-174 (2011) - 2010
- [j4]Xi-Guang Wang, Wei-Hua Lin, Wen Zeng:
Design and Key Technology of Gardening Information Management System Based on Data Center. J. Geogr. Inf. Syst. 2(2): 100-105 (2010) - [j3]Wen Zeng, Xiao-Jie Chang, Jianjun Lv:
Design of Data Model for Urban Transport GIS. J. Geogr. Inf. Syst. 2(2): 106-112 (2010) - [c5]Wen Zeng, Huilin Wang, Junsheng Zhang
:
Reconsidering Nature of Thesaurus and Its Automatic Construction in Information Network. SKG 2010: 414-415 - [c4]Wen Zeng, Huilin Wang:
Nature of Chinese Thesaurus Automatic Construction and Its Study of Major Technologies in Digital Libraries. WISM 2010: 103-110
2000 – 2009
- 2009
- [j2]Wen Zeng, Jianjun Lv, Xincai Wu:
SOA Based Municipal Information Management Basic Platform. J. Geogr. Inf. Syst. 1(1): 5-11 (2009) - [j1]Wen Zeng, Tianmo Liu, Zhongchang Wang, Susumu Tsukimoto, Mitsuhiro Saito, Yuichi Ikuhara:
Selective Detection of Formaldehyde Gas Using a Cd-Doped TiO2-SnO2 Sensor. Sensors 9(11): 9029-9038 (2009) - [c3]Huijuan Xiao, Wen Zeng:
A Hard Disk Encryption System Realized by the Digital Signal Processor. CIS (2) 2009: 312-314 - [c2]Wen Zeng, Baogang Wang:
Development of Municipal Infrastructure Metadata System and Standard. ESIAT (2) 2009: 152-155 - 2008
- [c1]Hong Wang, Xingqiang Wang, Wen Zeng:
A Research on Automaticity Optimization of KeyX Index in Native XML Database. CSSE (4) 2008: 700-703
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
Tweets on dblp homepage
Show tweets from on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter account. At the same time, Twitter will persistently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
last updated on 2020-10-11 22:48 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint