


default search action
Wenbo He 0003
Person information
- affiliation: McMaster University, Hamilton, ON, Canada
Other persons with the same name
- Wenbo He — disambiguation page
- Wenbo He 0001
— McMaster University, ON, Canada - Wenbo He 0002
— Washington University, St. Louis, MO, USA - Wenbo He 0004
— West China Hospital of Sichuan University, Chengdu, Sichuan, China
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
[j26]Qingjuan Zhao, Jianwei Niu
, Xuefeng Liu, Wenbo He, Shaojie Tang:
Generation of Coherent Multi-Sentence Texts with a Coherence Mechanism. Comput. Speech Lang. 78: 101457 (2023)- 2021
[j25]Yixin Chen
, Dongsheng Li
, Yu Hua
, Wenbo He
:
Effective and Efficient Content Redundancy Detection of Web Videos. IEEE Trans. Big Data 7(1): 187-198 (2021)
[c52]Wenbo He
, Shusheng Li, Wenbo Wang, Muheng Wei, Bohua Qiu:
CryptoEyes: Privacy Preserving Classification over Encrypted Images. INFOCOM 2021: 1-10- 2020
[c51]Yixin Chen, Xinye Lin, Keshi Ge, Wenbo He
, Dongsheng Li:
Tag Pollution Detection in Web Videos via Cross-Modal Relevance Estimation. IWQoS 2020: 1-10
2010 – 2019
- 2018
[j24]Nan Zhu, Yangdi Lu, Wenbo He, Yu Hua, Jike Ge:
Towards Update-Efficient and Parallel-Friendly Content-Based Indexing Scheme in Cloud Computing. Int. J. Semantic Comput. 12(2): 191-213 (2018)
[j23]Alireza Shameli-Sendi
, Habib Louafi, Wenbo He
, Mohamed Cheriet
:
Dynamic Optimal Countermeasure Selection for Intrusion Response System. IEEE Trans. Dependable Secur. Comput. 15(5): 755-770 (2018)
[c50]Yang Bo, Yixin Chen, Wenbo He, Jie Xiang:
DVD: Constructing a Discriminative Video Descriptor by Convolving Frame Features. BigMM 2018: 1-5- 2017
[j22]Long Cheng, Jianwei Niu
, Linghe Kong
, Chengwen Luo, Yu Gu, Wenbo He
, Sajal K. Das
:
Compressive sensing based data quality improvement for crowd-sensing applications. J. Netw. Comput. Appl. 77: 123-134 (2017)
[j21]Qiang Ma, Shanfeng Zhang, Tong Zhu, Kebin Liu, Lan Zhang, Wenbo He
, Yunhao Liu:
PLP: Protecting Location Privacy Against Correlation Analyze Attack in Crowdsensing. IEEE Trans. Mob. Comput. 16(9): 2588-2598 (2017)
[c49]Nan Zhu, Yangdi Lu, Wenbo He, Yu Hua:
A Content-Based Indexing Scheme for Large-Scale Unstructured Data. BigMM 2017: 205-212
[c48]Wen Wang, Wenbo He, Jinshu Su
:
Enhancing the effectiveness of traffic engineering in hybrid SDN. ICC 2017: 1-6
[c47]Wen Wang, Wenbo He
, Jinshu Su
:
Boosting The Benefits of Hybrid SDN. ICDCS 2017: 2165-2170- 2016
[j20]Yixin Chen, Wen Wang, Wenbo He
, Xiaofeng Li:
An Empirical Study of the Textual Content of Online Videos. Int. J. Semantic Comput. 10(3): 323-346 (2016)
[j19]Pinghui Wang
, Wenbo He, Xue Liu:
Efficiently Estimating Statistics of Points of Interests on Maps. IEEE Trans. Knowl. Data Eng. 28(2): 425-438 (2016)
[j18]Wei Gong, Haoxiang Liu, Xin Miao, Kebin Liu, Wenbo He
, Lan Zhang, Yunhao Liu:
Fast and Adaptive Continuous Scanning in Large-Scale RFID Systems. IEEE/ACM Trans. Netw. 24(6): 3314-3325 (2016)
[j17]Wenbo He
, Sahra Sedigh Sarvestani
, I-Ling Yen, Jia Zhang:
Guest Editorial: Special Issue on Cyber-Physical Systems and Services. IEEE Trans. Serv. Comput. 9(2): 172-173 (2016)
[c46]Yixin Chen, Wenbo He
:
An Empirical Study of the Textual Content of Online Videos. BigMM 2016: 287-294
[c45]Wen Wang, Wenbo He, Jinshu Su
:
Redactor: Reconcile network control with declarative control programs In SDN. ICNP 2016: 1-10
[c44]Yixin Chen, Wenbo He
, Yu Hua, Wen Wang:
CompoundEyes: Near-duplicate detection in large scale online video systems in the cloud. INFOCOM 2016: 1-9
[c43]Wen Wang, Wenbo He
, Jinshu Su
, Yixin Chen:
Cupid: Congestion-free consistent data plane update in software defined networks. INFOCOM 2016: 1-9
[c42]Wen Wang, Cong Liu, Jinshu Su
, Wenbo He
:
Achieving Consistent SDN Control With Declarative Applications. SIGCOMM 2016: 585-586
[i2]Nan Zhu, Wenbo He, Xue Liu, Yu Hua:
PFO: A ParallelFriendly High Performance System for Online Query and Update of Nearest Neighbors. CoRR abs/1604.06984 (2016)- 2015
[j16]Jie Shen, Wenbo He
, Xue Liu, Zhibo Wang, Zhi Wang, Jianguo Yao:
End-to-end delay analysis for networked systems. Frontiers Inf. Technol. Electron. Eng. 16(9): 732-743 (2015)
[j15]Gang Liang, Wenbo He
, Chun Xu, Liangyin Chen, Jinquan Zeng:
Rumor Identification in Microblogging Systems Based on Users' Behavior. IEEE Trans. Comput. Soc. Syst. 2(3): 99-108 (2015)
[j14]Haojin Zhu
, Kuand-Hao Liu, Wenbo He
, Kaoru Ota
:
Quality of experience and quality of protection provisions in emerging mobile networks [Guest Editorial]. IEEE Wirel. Commun. 22(4): 8-9 (2015)
[c41]Nan Zhu, Wenbo He
, Yu Hua, Yixin Chen:
Marlin: Taming the big streaming data in large scale video similarity search. IEEE BigData 2015: 1755-1764
[c40]Alireza Shameli-Sendi, Habib Louafi, Wenbo He
, Mohamed Cheriet:
A Defense-Centric Model for Multi-step Attack Damage Cost Evaluation. FiCloud 2015: 145-149
[c39]Shanfeng Zhang, Qiang Ma, Tong Zhu, Kebin Liu, Lan Zhang, Wenbo He
, Yunhao Liu:
PLP: Protecting Location Privacy Against Correlation-Analysis Attack in Crowdsensing. ICPP 2015: 111-119
[c38]Yu Hua, Wenbo He, Xue Liu, Dan Feng:
SmartEye: Real-time and efficient cloud image sharing for disaster environments. INFOCOM 2015: 1616-1624
[c37]Wen Wang, Wenbo He, Jinshu Su
:
Network intrusion detection and prevention middlebox management in SDN. IPCCC 2015: 1-8
[c36]Wen Wang, Wenbo He, Jinshu Su
:
M2SDN: Achieving multipath and multihoming in data centers with software defined networking. IWQoS 2015: 11-20
[c35]Long Cheng, Linghe Kong
, Chengwen Luo, Jianwei Niu
, Yu Gu, Wenbo He, Sajal K. Das
:
Deco: False data detection and correction framework for participatory sensing. IWQoS 2015: 213-218- 2014
[j13]Yu Hua, Xue Liu, Wenbo He
, Dan Feng:
Design and Implementation of Holistic Scheduling and Efficient Storage for FlexRay. IEEE Trans. Parallel Distributed Syst. 25(10): 2529-2539 (2014)
[j12]Fan Zhang, Wenbo He
, Yangyi Chen, Zhou Li
, XiaoFeng Wang, Shuo Chen, Xue Liu:
Thwarting Wi-Fi Side-Channel Analysis through Traffic Demultiplexing. IEEE Trans. Wirel. Commun. 13(1): 86-98 (2014)
[j11]Huanzhong Li, Xue Liu, Wenbo He
, Wei Yang, Wenhua Dou:
Delay analysis in practical wireless network coding. Wirel. Commun. Mob. Comput. 14(5): 497-515 (2014)
[c34]Xinye Lin, Wenbo He
:
WiLoVe: A WiFi-coverage based Location Verification System in LBS. FNC/MobiSPC 2014: 484-491
[c33]Haoxiang Liu, Wei Gong, Lei Chen
, Wenbo He
, Kebin Liu, Yunhao Liu:
Generic Composite Counting in RFID Systems. ICDCS 2014: 597-606
[c32]Pinghui Wang, Wenbo He, Xue Liu:
An efficient sampling method for characterizing points of interests on maps. ICDE 2014: 1012-1023
[c31]Yi Zhang
, Yuan He, Xiaopei Wu, Yunhao Liu, Wenbo He
:
NetMaster: Taming Energy Devourers on Smartphones. ICPP 2014: 301-310
[c30]Jianwei Niu
, Lei Wang, Yixin Chen, Wenbo He
:
Detecting collusive cheating in online shopping systems through characteristics of social networks. INFOCOM Workshops 2014: 311-316
[c29]Haoxiang Liu, Wei Gong, Xin Miao, Kebin Liu, Wenbo He:
Towards adaptive continuous scanning in large-scale RFID systems. INFOCOM 2014: 486-494
[c28]Qiuyu Li, Yu Hua, Wenbo He, Dan Feng, Zhenhua Nie, Yuanyuan Sun:
Necklace: An efficient cuckoo hashing scheme for cloud storage services. IWQoS 2014: 153-158- 2013
[j10]Michael M. Groat, Benjamin Edwards, James Horey, Wenbo He
, Stephanie Forrest
:
Application and analysis of multidimensional negative surveys in participatory sensing applications. Pervasive Mob. Comput. 9(3): 372-391 (2013)
[c27]Mingyuan Xia, Wenbo He, Xue Liu, Jie Liu:
Why application errors drain battery easily?: a study of memory leaks in smartphone apps. HotPower@SOSP 2013: 2:1-2:5- 2012
[c26]Jianguo Yao, Xue Liu, Wenbo He
, Ashikur Rahman
:
Dynamic Control of Electricity Cost with Power Demand Smoothing and Peak Shaving for Distributed Internet Data Centers. ICDCS 2012: 416-424
[c25]Yu Hua, Xue Liu, Wenbo He:
HOSA: Holistic scheduling and analysis for scalable fault-tolerant FlexRay design. INFOCOM 2012: 1233-1241
[c24]Fan Zhang, Li He
, Wenbo He
, Xue Liu:
Data perturbation with state-dependent noise for participatory sensing. INFOCOM 2012: 2246-2254
[c23]Michael M. Groat, Benjamin Edwards, James Horey, Wenbo He, Stephanie Forrest
:
Enhancing privacy in participatory sensing applications with multidimensional data. PerCom 2012: 144-152- 2011
[j9]Wenbo He
, Xue Liu, Hoang Viet Nguyen, Klara Nahrstedt, Tarek F. Abdelzaher:
PDA: Privacy-Preserving Data Aggregation for Information Collection. ACM Trans. Sens. Networks 8(1): 6:1-6:22 (2011)
[c22]Huanzhong Li, Xue Liu, Wenbo He
, Jian Li, Wenhua Dou:
End-to-End Delay Analysis in Wireless Network Coding: A Network Calculus-Based Approach. ICDCS 2011: 47-56
[c21]Fan Zhang, Wenbo He
, Xue Liu:
Defending Against Traffic Analysis in Wireless Networks through Traffic Reshaping. ICDCS 2011: 593-602
[c20]Wenbo He
, Xue Liu, Mai Ren:
Location Cheating: A Security Challenge to Location-Based Social Network Services. ICDCS 2011: 740-749
[c19]Michael M. Groat, Wenbo He, Stephanie Forrest
:
KIPDA: k-indistinguishable privacy-preserving data aggregation in wireless sensor networks. INFOCOM 2011: 2024-2032
[c18]Fan Zhang, Wenbo He, Xue Liu, Patrick G. Bridges
:
Inferring users' online activities through traffic analysis. WISEC 2011: 59-70
[i1]Wenbo He, Xue Liu, Mai Ren:
Location Cheating: A Security Challenge to Location-based Social Network Services. CoRR abs/1102.4135 (2011)- 2010
[c17]Wenbo He
, Xue Liu, Long Zheng, Hao Yang:
Reliability Calculus: A Theoretical Framework to Analyze Communication Reliability. ICDCS 2010: 159-168
[c16]Wenbo He, Ying Huang, Klara Nahrstedt, Bo Wu:
Message propagation in ad-hoc-based proximity mobile social networks. PerCom Workshops 2010: 141-146
2000 – 2009
- 2009
[j8]Wenbo He
, Ying Huang, Ravishankar Sathyam, Klara Nahrstedt, Whay Chiou Lee:
SMOCK: a scalable method of cryptographic key management for mission-critical wireless ad-hoc networks. IEEE Trans. Inf. Forensics Secur. 4(1): 140-150 (2009)
[c15]Ying Huang, Yan Gao, Klara Nahrstedt, Wenbo He:
Optimizing File Retrieval in Delay-Tolerant Content Distribution Community. ICDCS 2009: 308-316
[c14]Wenbo He, Xue Liu, Hoang Nguyen, Klara Nahrstedt:
A Cluster-Based Protocol to Enforce Integrity and Preserve Privacy in Data Aggregation. ICDCS Workshops 2009: 14-19
[c13]Jie Liu, Feng Zhao, Xue Liu, Wenbo He:
Challenges Towards Elastic Power Management in Internet Data Centers. ICDCS Workshops 2009: 65-72
[c12]Ying Huang, Wenbo He, Klara Nahrstedt:
ChainFarm: A Novel Authentication Protocol for High-rate Any Source Probabilistic Broadcast. MASS 2009: 264-273
[p2]Wenbo He
, Yuan Xue, Klara Nahrstedt:
Delay Management in Wireless Ad Hoc Networks. Guide to Wireless Ad Hoc Networks 2009: 311-331
[p1]Klara Nahrstedt, Wenbo He
, Ying Huang:
Security in Wireless Ad Hoc Networks. Guide to Wireless Ad Hoc Networks 2009: 391-425- 2008
[j7]Zhong Xu, Xue Liu, Guoqing Zhang, Wenbo He
:
McCLS: Certificateless Signature Scheme for Emergency Mobile Wireless Cyber-Physical Systems. Int. J. Comput. Commun. Control 3(4): 395-411 (2008)
[j6]Wenbo He, Klara Nahrstedt:
MobileAds: advertisement on mobile devices. SIGBED Rev. 5(1): 17 (2008)
[j5]Wenbo He, Ying Huang, Klara Nahrstedt, Whay Chiou Lee:
Alert propagation in mobile ad hoc networks. ACM SIGMOBILE Mob. Comput. Commun. Rev. 12(1): 23-25 (2008)
[j4]Xue Liu, Qixin Wang
, Sathish Gopalakrishnan, Wenbo He
, Lui Sha, Hui Ding, Kihwal Lee:
ORTEGA: An Efficient and Flexible Online Fault Tolerance Architecture for Real-Time Control Systems. IEEE Trans. Ind. Informatics 4(4): 213-224 (2008)
[j3]Wenbo He
, Klara Nahrstedt, Xue Liu:
End-to-end delay control of multimedia applications over multihop wireless links. ACM Trans. Multim. Comput. Commun. Appl. 5(2): 16:1-16:20 (2008)
[c11]Zhong Xu, Xue Liu, Guoqing Zhang, Wenbo He, Guanzhong Dai, Weihuan Shu:
A Certificateless Signature Scheme for Mobile Wireless Cyber-Physical Systems. ICDCS Workshops 2008: 489-494
[c10]Gong Chen, Wenbo He, Jie Liu, Suman Nath, Leonidas Rigas, Lin Xiao, Feng Zhao:
Energy-Aware Server Provisioning and Load Dispatching for Connection-Intensive Internet Services. NSDI 2008: 337-350- 2007
[j2]Wenbo He, Ying Huang, Klara Nahrstedt, Whay Chiou Lee:
A scalable public key management scheme in wireless ad hoc networks. ACM SIGMOBILE Mob. Comput. Commun. Rev. 11(2): 69-70 (2007)
[c9]Xue Liu, Wenbo He:
Active queue management design using discrete-event control. CDC 2007: 3806-3811
[c8]Wenbo He
, Xue Liu, Hoang Nguyen, Klara Nahrstedt, Tarek F. Abdelzaher:
PDA: Privacy-Preserving Data Aggregation in Wireless Sensor Networks. INFOCOM 2007: 2045-2053
[c7]Wenbo He
, Ying Huang, Klara Nahrstedt, Whay Chiou Lee:
SMOCK: A Self-Contained Public Key Management Scheme for Mission-Critical Wireless Ad Hoc Networks. PerCom 2007: 201-210- 2006
[j1]Xue Liu, Qixin Wang
, Wenbo He, Marco Caccamo, Lui Sha:
Optimal real-time sampling rate assignment for wireless sensor networks. ACM Trans. Sens. Networks 2(2): 263-295 (2006)
[c6]Wenbo He, Hoang Nguyen, Klara Nahrstedt:
Experimental Validation of Middleware-based QoS Control in 802.11 Wireless Networks. BROADNETS 2006
[c5]Wenbo He, Klara Nahrstedt:
Impact of Upper Layer Adaptation on End-to-end Delay Management in Wireless Ad Hoc Networks. IEEE Real Time Technology and Applications Symposium 2006: 59-70
[c4]Wenbo He, Klara Nahrstedt:
An integrated solution to delay and security support in wireless networks. WCNC 2006: 2211-2215- 2005
[c3]Wenbo He, Xue Liu, Klara Nahrstedt:
A Feedback Control Scheme for Resource Allocation in Wireless Multi-hop Ad Hoc Networks. MobiQuitous 2005: 432-442
[c2]Qixin Wang
, Xue Liu, Weiqun Chen, Wenbo He, Marco Caccamo:
Building Robust Wireless LAN for Industrial Control with DSSS-CDMA Cellphone Network Paradigm. RTSS 2005: 3-14- 2003
[c1]Xue Liu, Qixin Wang, Lui Sha, Wenbo He:
Optimal QoS Sampling Frequency Assignment for Real-Time Wireless Sensor Networks. RTSS 2003: 308-319
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-11-13 00:24 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID







