default search action
Wenbo Shi
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j64]Dan Li, Ning Lu, Siyu Wang, Wenbo Shi, Chang Choi:
A precise method of identifying Android application family. Expert Syst. J. Knowl. Eng. 41(1) (2024) - [j63]Yongxin Zhang, Hong Lei, Bin Wang, Qinghao Wang, Ning Lu, Wenbo Shi, Bangdao Chen, Qiuling Yue:
Traceable ring signature schemes based on SM2 digital signature algorithm and its applications in the data sharing scheme. Frontiers Comput. Sci. 18(2): 182815 (2024) - [j62]Yuqian Ma, Wenbo Shi, Xinghua Li, Qingfeng Cheng:
Provable secure authentication key agreement for wireless body area networks. Frontiers Comput. Sci. 18(5): 185811 (2024) - [j61]Kuan Fan, Chaozhi Zhou, Ning Lu, Wenbo Shi, Victor Chang:
A fair multi-attribute data transaction mechanism supporting cross-chain. Internet Things 28: 101339 (2024) - [j60]Yuan Chang, Jiliang Li, Ning Lu, Wenbo Shi, Zhou Su, Weizhi Meng:
Practical Privacy-Preserving Scheme With Fault Tolerance for Smart Grids. IEEE Internet Things J. 11(2): 1990-2005 (2024) - [j59]Yongxin Zhang, Jiacheng Yang, Hong Lei, Zijian Bao, Ning Lu, Wenbo Shi, Bangdao Chen:
PACTA: An IoT Data Privacy Regulation Compliance Scheme Using TEE and Blockchain. IEEE Internet Things J. 11(5): 8882-8893 (2024) - [j58]Wenbo Shi, Robert A. Malaney:
Quantum Routing for Emerging Quantum Networks. IEEE Netw. 38(1): 140-146 (2024) - [j57]Yongxin Zhang, Jiacheng Yang, Hong Lei, Zijian Bao, Ning Lu, Wenbo Shi, Bangdao Chen:
Verifiable Random Function Schemes Based on SM2 Digital Signature Algorithm and its Applications for Committee Elections. IEEE Open J. Comput. Soc. 5: 480-490 (2024) - [j56]Ning Lu, Ruxiao Huang, Mingliang Yao, Wenbo Shi, Kim-Kwang Raymond Choo:
V-Digger: An Efficient and Secure Vulnerability Assessment for Large-Scale ISP Network. IEEE Trans. Dependable Secur. Comput. 21(4): 3227-3246 (2024) - [j55]Ning Lu, Mingxi Liu, Wenbo Shi, Ximeng Liu, Kim-Kwang Raymond Choo:
SG-Audit: An Efficient and Robust Cloud Auditing Scheme for Smart Grid. IEEE Trans. Dependable Secur. Comput. 21(4): 4162-4179 (2024) - [j54]Yunduan Cui, Wenbo Shi, Huan Yang, Cuiping Shao, Lei Peng, Huiyun Li:
Probabilistic Model-Based Reinforcement Learning Unmanned Surface Vehicles Using Local Update Sparse Spectrum Approximation. IEEE Trans. Ind. Informatics 20(2): 1283-1293 (2024) - [j53]Mazeyu Ji, Wenbo Shi, Yujie Cui, Chengju Liu, Qijun Chen:
Adaptive Denoising-Enhanced LiDAR Odometry for Degeneration Resilience in Diverse Terrains. IEEE Trans. Instrum. Meas. 73: 1-15 (2024) - [j52]Dan Li, Wenbo Shi, Ning Lu, Sang-Su Lee, Sokjoon Lee:
ARdetector: android ransomware detection framework. J. Supercomput. 80(6): 7557-7584 (2024) - [j51]Yuqian Ma, Xinghua Li, Wenbo Shi, Qingfeng Cheng:
STCLA: An Efficient Certificateless Authenticated Key Agreement Scheme for the Internet of Vehicles. IEEE Trans. Veh. Technol. 73(4): 4830-4841 (2024) - [c40]Yifei Xia, Shuaizhe Ma, Wanqing Zhao, Jia Li, Ruixuan Yang, Yuye Yano, Xi Liu, Feiyang Zhang, Jianyu Yang, Wenbo Shi, Lei Jing, Xiaoyan Gui, Bing Zhang, Li Geng, Dan Li:
An Integrated Burst-Mode 2R Receiver Employing Fast Residual Offset Canceller for XGS-PON in 40-nm CMOS. CICC 2024: 1-2 - 2023
- [j50]Yongxin Zhang, Zijian Bao, Qinghao Wang, Ning Lu, Wenbo Shi, Bangdao Chen, Hong Lei:
OWL: A data sharing scheme with controllable anonymity and integrity for group users. Comput. Commun. 209: 455-468 (2023) - [j49]Wenbo Shi, Robert A. Malaney:
Entanglement of Signal Paths via Noisy Superconducting Quantum Devices. Entropy 25(1): 153 (2023) - [j48]Min Li, Wenbo Shi, Fuhao Zhang, Min Zeng, Yaohang Li:
A Deep Learning Framework for Predicting Protein Functions With Co-Occurrence of GO Terms. IEEE ACM Trans. Comput. Biol. Bioinform. 20(2): 833-842 (2023) - [j47]Shu Li, Qingqing Yan, Wenbo Shi, Liuyi Wang, Chengju Liu, Qijun Chen:
HoloParser: Holistic Visual Parsing for Real-Time Semantic Segmentation in Autonomous Driving. IEEE Trans. Instrum. Meas. 72: 1-15 (2023) - [j46]Wenbo Shi, Shu Li, Chenpeng Yao, Qingqing Yan, Chengju Liu, Qijun Chen:
Dense Normal Based Degeneration-Aware 2-D Lidar Odometry for Correlative Scan Matching. IEEE Trans. Instrum. Meas. 72: 1-16 (2023) - [c39]Wenbo Shi, Robert A. Malaney:
Error-Mitigated Quantum Routing on Noisy Devices. GLOBECOM 2023: 5475-5480 - [c38]Wenbo Shi, Robert A. Malaney:
Signal Processing And Quantum State Tomography on Noisy Devices. ICASSP 2023: 1-5 - [c37]Wenbo Shi, Wenming Yang, Qingmin Liao:
Robust Content-Variant Reference Image Quality Assessment Via Similar Patch Matching. ICASSP 2023: 1-5 - [c36]Chengyue Shi, Wenbo Shi, Jintong Hu, Wenming Yang:
Semantic and Gradient Guided Scene Text Image Super-Resolution. ICIG (2) 2023: 423-434 - [c35]Wenbo Shi, Wenming Yang, Qingmin Liao:
Boosting External-Reference Image Quality Assessment by Content-Constrain Loss and Attention-based Adaptive Feature Fusion. IJCNN 2023: 1-8 - [i9]Xin Chen, Andy Sun, Wenbo Shi, Na Li:
Carbon-Aware Optimal Power Flow. CoRR abs/2308.03240 (2023) - [i8]Xin Chen, Hungpo Chao, Wenbo Shi, Na Li:
Towards Carbon-Free Electricity: A Comprehensive Flow-Based Framework for Power Grid Carbon Accounting and Decarbonization. CoRR abs/2308.03268 (2023) - [i7]Mazeyu Ji, Wenbo Shi, Yujie Cui, Chengju Liu, Qijun Chen:
Ambient-Aware LiDAR Odometry in Variable Terrains. CoRR abs/2309.14641 (2023) - 2022
- [j45]Fuhao Zhang, Bi Zhao, Wenbo Shi, Min Li, Lukasz A. Kurgan:
DeepDISOBind: accurate prediction of RNA-, DNA- and protein-binding intrinsically disordered residues with deep multi-task learning. Briefings Bioinform. 23(1) (2022) - [j44]Mingxi Liu, Kuan Fan, Neeraj Kumar, Debiao He, Wenbo Shi:
Hash-balanced binary tree-based public auditing in vehicular edge computing and networks. Int. J. Commun. Syst. 35(12) (2022) - [j43]Qingfeng Cheng, Yuting Li, Wenbo Shi, Xinghua Li:
A Certificateless Authentication and Key Agreement Scheme for Secure Cloud-assisted Wireless Body Area Network. Mob. Networks Appl. 27(1): 346-356 (2022) - [j42]Jiawei Zhang, Ning Lu, Jian Feng Ma, Ruixiao Wang, Wenbo Shi:
A Secure Access Control Framework for Cloud Management. Mob. Networks Appl. 27(1): 404-416 (2022) - [j41]Ning Lu, Yuan Chang, Wenbo Shi, Kim-Kwang Raymond Choo:
CoinLayering: An Efficient Coin Mixing Scheme for Large Scale Bitcoin Transactions. IEEE Trans. Dependable Secur. Comput. 19(3): 1974-1987 (2022) - [j40]Ning Lu, Junwei Zhang, Ximeng Liu, Wenbo Shi, Jianfeng Ma:
STOP: A Service Oriented Internet Purification Against Link Flooding Attacks. IEEE Trans. Inf. Forensics Secur. 17: 938-953 (2022) - [j39]Wenbo Shi, Tongshuai Xu, Huan Yang, Yongming Xi, Yukun Du, Jinhua Li, Jinxu Li:
Attention Gate Based Dual-Pathway Network for Vertebra Segmentation of X-Ray Spine Images. IEEE J. Biomed. Health Informatics 26(8): 3976-3987 (2022) - [j38]Qinghao Wang, Yongxin Zhang, Zijian Bao, Wenbo Shi, Hong Lei, Han Liu, Bangdao Chen:
SorTEE: Service-Oriented Routing for Payment Channel Networks With Scalability and Privacy Protection. IEEE Trans. Netw. Serv. Manag. 19(4): 3764-3780 (2022) - [c34]Yongxin Zhang, Qinghao Wang, Ning Lu, Wenbo Shi, Hong Lei:
Traceable Ring Signature Schemes Based on SM2 Digital Signature Algorithm and Its Applications in the Evidence-Storage System. BlockSys 2022: 122-133 - [c33]Chen Tan, Wei Huang, Yonghui Fan, Jing Li, Chuanhao Yu, Wenbo Shi, Shiti Huang, Zhenyu Yin, Chenfan Cao, Lei Jing, Zhixiong Ren, Xiaoyan Gui, Bing Zhang, Dan Li, Li Geng:
A 10/2.5-Gb/s Hyper-Supplied CMOS Low-Noise Burst-Mode TIA with Loud Burst Protection and Gearbox Automatic Offset Cancellation for XGS-PON. CICC 2022: 1-2 - [c32]Jiawei Zhang, Wenbo Shi, Chengju Liu, Qijun Chen:
Dynamic Self-Maintenance Obstacle Costmap Based on Instance Segmentation and Memory Storage Mechanism. ROBIO 2022: 462-468 - [c31]Li Wang, Wenbo Shi, Haozhe Zhu, Denghuang Zhang, Yikang Zhang, Jiahe Fan, Mohammud Junaid Bocus:
Road Defect Detection Based on Semantic Transformed Disparity Image Segmentation. ROBIO 2022: 644-649 - 2021
- [j37]Ning Lu, Dan Li, Wenbo Shi, Pandi Vijayakumar, Francesco Piccialli, Victor Chang:
An efficient combined deep neural network based malware detection framework in 5G environment. Comput. Networks 189: 107932 (2021) - [j36]Jiaqi Wang, Ning Lu, Qingfeng Cheng, Lu Zhou, Wenbo Shi:
A secure spectrum auction scheme without the trusted party based on the smart contract. Digit. Commun. Networks 7(2): 223-234 (2021) - [j35]Yuting Li, Qingfeng Cheng, Wenbo Shi:
Security Analysis of a Lightweight Identity-Based Two-Party Authenticated Key Agreement Protocol for IIoT Environments. Secur. Commun. Networks 2021: 5573886:1-5573886:6 (2021) - [j34]Ning Lu, Bin Wang, Yongxin Zhang, Wenbo Shi, Christian Esposito:
NeuCheck: A more practical Ethereum smart contract security analysis tool. Softw. Pract. Exp. 51(10): 2065-2084 (2021) - 2020
- [j33]Zijian Bao, Qinghao Wang, Wenbo Shi, Lei Wang, Hong Lei, Bangdao Chen:
When Blockchain Meets SGX: An Overview, Challenges, and Open Issues. IEEE Access 8: 170404-170420 (2020) - [j32]Qingchun Zhao, Maohai Zhai, Wenbo Shi, Bin Wu:
Generation of Tunable Microwave Frequency Comb Utilizing a Semiconductor Laser Subject to Optical Injection from an SFP Module Modulated by an Arbitrary Periodic Signal. Complex. 2020: 9504152:1-9504152:7 (2020) - [j31]Ning Lu, Yongxin Zhang, Wenbo Shi, Saru Kumari, Kim-Kwang Raymond Choo:
A secure and scalable data integrity auditing scheme based on hyperledger fabric. Comput. Secur. 92: 101741 (2020) - [j30]Dan Li, Lichao Zhao, Qingfeng Cheng, Ning Lu, Wenbo Shi:
Opcode sequence analysis of Android malware by a convolutional neural network. Concurr. Comput. Pract. Exp. 32(18) (2020) - [j29]Kuan Fan, Zijian Bao, Mingxi Liu, Athanasios V. Vasilakos, Wenbo Shi:
Dredas: Decentralized, reliable and efficient remote outsourced data auditing scheme with blockchain smart contract for industrial IoT. Future Gener. Comput. Syst. 110: 665-674 (2020) - [j28]Zijian Bao, Wenbo Shi, Saru Kumari, Zhiyin Kong, Chien-Ming Chen:
Lockmix: a secure and privacy-preserving mix service for Bitcoin anonymity. Int. J. Inf. Sec. 19(3): 311-321 (2020) - [j27]Ning Lu, Can Chen, Wenbo Shi, Junwei Zhang, Jianfeng Ma:
Weakly Supervised Change Detection Based on Edge Mapping and SDAE Network in High-Resolution Remote Sensing Images. Remote. Sens. 12(23): 3907 (2020) - [j26]Kuan Fan, Mingxi Liu, Guofang Dong, Wenbo Shi:
Enhancing cloud storage security against a new replay attack with an efficient public auditing scheme. J. Supercomput. 76(7): 4857-4883 (2020) - [c30]Hong Lei, Zijian Bao, Qinghao Wang, Yongxin Zhang, Wenbo Shi:
SDABS: A Secure Cloud Data Auditing Scheme Based on Blockchain and SGX. BlockSys 2020: 269-281 - [c29]Hong Lei, Qinghao Wang, Wenbo Shi, Zijian Bao:
A Survey on the Application of SGX in Blockchain Area. BlockSys 2020: 633-647 - [c28]Hong Lei, Yun Yan, Zijian Bao, Qinghao Wang, Yongxin Zhang, Wenbo Shi:
SDSBT: A Secure Multi-party Data Sharing Platform Based on Blockchain and TEE. CSS 2020: 184-196 - [c27]Peng Zhang, Yuhao Huang, Aaron Gember-Jacobson, Wenbo Shi, Xu Liu, Hongkun Yang, Zhiqiang Zuo:
Incremental Network Configuration Verification. HotNets 2020: 81-87
2010 – 2019
- 2019
- [j25]Kuan Fan, Mingxi Liu, Wenbo Shi:
Improving efficiency of remote data audit for cloud storage. KSII Trans. Internet Inf. Syst. 13(4): 2198-2222 (2019) - [j24]Jiaqi Wang, Marimuthu Karuppiah, Saru Kumari, Zhiyin Kong, Wenbo Shi:
A privacy-preserving spectrum auction scheme using paillier cryptosystem with public verification. J. Intell. Fuzzy Syst. 36(5): 4215-4226 (2019) - [j23]Xin Su, Kuan Fan, Wenbo Shi:
Privacy-Preserving Distributed Data Fusion Based on Attribute Protection. IEEE Trans. Ind. Informatics 15(10): 5765-5777 (2019) - 2018
- [j22]Guofang Dong, Pu Sun, Wenbo Shi, Chang Choi:
A novel valuation pruning optimization fuzzing test model based on mutation tree for industrial control systems. Appl. Soft Comput. 70: 896-902 (2018) - [j21]Yipeng Dong, Xiaorong Xie, Wenbo Shi, Baorong Zhou, Qirong Jiang:
Demand-Response-Based Distributed Preventive Control to Improve Short-Term Voltage Stability. IEEE Trans. Smart Grid 9(5): 4785-4795 (2018) - [c26]Zijian Bao, Bin Wang, Wenbo Shi:
A Privacy-Preserving, Decentralized and Functional Bitcoin E-Voting Protocol. SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI 2018: 252-256 - [i6]Zijian Bao, Wenbo Shi, Debiao He, Kim-Kwang Raymond Choo:
IoTChain: A Three-Tier Blockchain-based IoT Security Architecture. CoRR abs/1806.02008 (2018) - [i5]Zijian Bao, Bin Wang, Wenbo Shi:
A privacy-preserving, decentralized and functional Bitcoin e-voting protocol. CoRR abs/1809.08362 (2018) - [i4]Zijian Bao, Bin Wang, Yongxin Zhang, Qinghao Wang, Wenbo Shi:
Lockcoin: a secure and privacy-preserving mix service for bitcoin anonymity. CoRR abs/1811.04349 (2018) - 2017
- [j20]Wenbo Shi, Wei Wei, Jiaqi Wang, Qingchun Zhao, Zhuo Lin, Huihui Wang:
A Verifiable Sealed-Bid Multi-Qualitative-Attribute Based Auction Scheme in the Semi-Honest Model. IEEE Access 5: 12380-12388 (2017) - [j19]Wenbo Shi, Zijian Bao, Jiaqi Wang, Ning Lu, Fang Zhu, Jian Shen:
A privacy-preserving degree-matching multi-attribute auction scheme in smart grid auction market. Pers. Ubiquitous Comput. 21(5): 779-789 (2017) - [j18]Lanxiang Chen, Linbing Qiu, Kuan-Ching Li, Wenbo Shi, Nan Zhang:
DMRS: an efficient dynamic multi-keyword ranked search over encrypted cloud data. Soft Comput. 21(16): 4829-4841 (2017) - [j17]Wenbo Shi, Na Li, Chi-Cheng Peter Chu, Rajit Gadh:
Real-Time Energy Management in Microgrids. IEEE Trans. Smart Grid 8(1): 228-238 (2017) - [c25]Xuan Zhang, Wenbo Shi, Qinran Hu, Bin Yan, Ali Malkawi, Na Li:
Distributed temperature control via Geothermal Heat Pump systems in energy efficient buildings. ACC 2017: 754-760 - [c24]Takeshi Hatanaka, Xuan Zhang, Wenbo Shi, Minghui Zhu, Na Li:
An integrated design of optimization and physical dynamics for energy efficient buildings: A passivity approach. CCTA 2017: 1050-1057 - [c23]Xuan Zhang, Bin Yan, Wenbo Shi, Ali Malkawi, Qing-Shan Jia, Na Li:
Community-level Geothermal Heat Pump system management via an aggregation-disaggregation framework. CDC 2017: 3487-3494 - [c22]Takeshi Hatanaka, Xuan Zhang, Wenbo Shi, Minghui Zhu, Na Li:
Physics-integrated hierarchical/distributed HVAC optimization for multiple buildings with robustness against time delays. CDC 2017: 6573-6579 - [i3]Takeshi Hatanaka, Xuan Zhang, Wenbo Shi, Minghui Zhu, Na Li:
An Integrated Design of Optimization and Physical Dynamics for Energy Efficient Buildings: A Passivity Approach. CoRR abs/1701.05577 (2017) - [i2]Xuan Zhang, Wenbo Shi, Bin Yan, Ali Malkawi, Na Li:
Decentralized and Distributed Temperature Control via HVAC Systems in Energy Efficient Buildings. CoRR abs/1702.03308 (2017) - [i1]Xuan Zhang, Wenbo Shi, Qinran Hu, Bin Yan, Ali Malkawi, Na Li:
Distributed Temperature Control via Geothermal Heat Pump Systems in Energy Efficient Buildings. CoRR abs/1702.08819 (2017) - 2016
- [j16]Wenbo Shi:
Entry and exit of service providers under cost uncertainty: a real options approach. J. Oper. Res. Soc. 67(2): 229-239 (2016) - [c21]Xuan Zhang, Wenbo Shi, Xiwang Li, Bin Yan, Ali Malkawi, Na Li:
Decentralized temperature control via HVAC systems in energy efficient buildings: An approximate solution procedure. GlobalSIP 2016: 936-940 - [c20]Mingfan Ma, Jun Gao, Ning Lu, Wenbo Shi:
A Privacy-Preserving Online Reverse Multi-attributes Auction Scheme Based on Degree-Matching. ICCCS (1) 2016: 432-442 - [c19]Yonghong Guo, Xiaorong Xie, Bin Wang, Wenbo Shi, Yipeng Dong, Liufeng Mou, Fei Xue:
Improving AGC performance of a coal-fueled generators with MW-level BESS. ISGT 2016: 1-5 - [c18]Jun Gao, Jiaqi Wang, Ning Lu, Fang Zhu, Wenbo Shi:
A Secure Reverse Multi-Attribute First-Price E-Auction Mechanism Using Multiple Auctioneer Servers (Work in Progress). ProvSec 2016: 384-391 - 2015
- [j15]Zhiheng Wang, Zhanqiang Huo, Wenbo Shi:
A Dynamic Identity Based Authentication Scheme Using Chaotic Maps for Telecare Medicine Information Systems. J. Medical Syst. 39(1): 158 (2015) - [j14]Wenbo Shi, Neeraj Kumar, Peng Gong, Naveen K. Chilamkurti, Hangbae Chang:
On the security of a certificateless online/offline signcryption for Internet of Things. Peer-to-Peer Netw. Appl. 8(5): 881-885 (2015) - [j13]Maohua Jing, Yixian Yang, Ning Lu, Wenbo Shi, Changyong Yu:
Postfix automata. Theor. Comput. Sci. 562: 590-605 (2015) - [j12]Wenbo Shi, Xiaorong Xie, Chi-Cheng Peter Chu, Rajit Gadh:
Distributed Optimal Energy Management in Microgrids. IEEE Trans. Smart Grid 6(3): 1137-1146 (2015) - [c17]Qingchun Zhao, Hongxi Yin, Xiaolei Chen, Wenbo Shi:
Performance optimization of the echo state network for time series prediction and spoken digit recognition. ICNC 2015: 502-506 - [c16]Rui Huang, Yubo Wang, Wenbo Shi, Daoyuan Yao, Boyang Hu, Chi-Cheng Peter Chu, Rajit Gadh:
Integration of IEC 61850 into a Vehicle-to-Grid system with networked electric vehicles. ISGT 2015: 1-5 - 2014
- [j11]Wenbo Shi, Neeraj Kumar, Peng Gong, Zezhong Zhang:
Cryptanalysis and improvement of a certificateless signcryption scheme without bilinear pairing. Frontiers Comput. Sci. 8(4): 656-666 (2014) - [j10]Wenbo Shi:
A provable secure sealed-bid multi-attribute auction scheme under semi-honest model. Int. J. Commun. Syst. 27(12): 3738-3747 (2014) - [j9]Wenbo Shi, Debiao He, Shuhua Wu:
Cryptanalysis and improvement of a DoS-resistant ID-based password authentication scheme without using smart card. Int. J. Inf. Commun. Technol. 6(1): 39-48 (2014) - [j8]Wenbo Shi, Na Li, Xiaorong Xie, Chi-Cheng Peter Chu, Rajit Gadh:
Optimal Residential Demand Response in Distribution Networks. IEEE J. Sel. Areas Commun. 32(7): 1441-1450 (2014) - [j7]Wenbo Shi, Kyung Jo Min:
Product Remanufacturing: A Real Options Approach. IEEE Trans. Engineering Management 61(2): 237-250 (2014) - [c15]Peng Gong, Haiqiao Wu, Ping Li, Wenbo Shi, Duk Kyung Kim:
Optimal power allocation for heterogeneous data traffic in NAF relay-assisted uplink transmission. ISCIT 2014: 228-232 - [c14]Ping Li, Guohong Wang, Xiaopeng Yan, Gong Peng, Wenbo Shi, Liu Jian:
A single-station location method based on long baseline interferometer. ISCIT 2014: 332-335 - [c13]Ping Li, Guohong Wang, Xiaopeng Yan, Gong Peng, Wenbo Shi, Chunyun Song:
Chaos characteristics analysis of transient signals for phase-locked synthesizer based FHC system. ISCIT 2014: 458-461 - [c12]Wenbo Shi, Xiaorong Xie, Chi-Cheng Peter Chu, Rajit Gadh:
A distributed optimal energy management strategy for microgrids. SmartGridComm 2014: 200-205 - [c11]Wenbo Shi, Eun-Kyu Lee, Daoyuan Yao, Rui Huang, Chi-Cheng Peter Chu, Rajit Gadh:
Evaluating microgrid management and control with an implementable energy management system. SmartGridComm 2014: 272-277 - 2013
- [j6]Wenbo Shi, Peng Gong:
A New User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography. Int. J. Distributed Sens. Networks 9 (2013) - [j5]Debiao He, Jianhua Chen, Wenbo Shi, Muhammad Khurram Khan:
On the security of an authentication scheme for multi-server architecture. Int. J. Electron. Secur. Digit. Forensics 5(3/4): 288-296 (2013) - [j4]Wenbo Shi:
A sealed-bid multi-attribute auction protocol with strong bid privacy and bidder privacy. Secur. Commun. Networks 6(10): 1281-1289 (2013) - [j3]Wenbo Shi, Kyung Jo Min:
A Study of Product Weight and Collection Rate in Closed-Loop Supply Chains With Recycling. IEEE Trans. Engineering Management 60(2): 409-423 (2013) - 2011
- [j2]Xiaofeng Liu, Liusheng Huang, Hongli Xu, Wenbo Shi, Dashan Wang:
An Energy-Efficient k-connected Scheme for Wireless Sensor Networks. Ad Hoc Sens. Wirel. Networks 12(1-2): 1-21 (2011) - [c10]Wenbo Shi, Vincent W. S. Wong:
MDS-Based Localization Algorithm for RFID Systems. ICC 2011: 1-6 - [c9]Wenbo Shi, Vincent W. S. Wong:
Real-time vehicle-to-grid control algorithm under price uncertainty. SmartGridComm 2011: 261-266 - 2010
- [j1]Wenbo Shi, Injoo Jang, Hyeong Seon Yoo:
An Improved Fuzzy Identity-Based Encryption Scheme With Constant Size Ciphertext. J. Digit. Content Technol. its Appl. 4(4): 7-14 (2010) - [c8]Ang Gao, Wei Wei, Wenbo Shi:
Efficient Password-Proven Key Exchange Protocol against Relay Attack on Ad Hoc Networks. APSCC 2010: 469-475 - [c7]Wenbo Shi, Vincent W. S. Wong:
A Two-Phase Algorithm for Locating Sensors in Irregular Areas. GLOBECOM 2010: 1-6
2000 – 2009
- 2008
- [c6]Wenbo Shi, Injoo Jang, Hyeong Seon Yoo:
An Efficient Electronic Marketplace Bidding Auction Protocol with Bid Privacy. APWeb 2008: 297-308 - [c5]Wenbo Shi, Injoo Jang, Hyeong Seon Yoo:
A Provable Secure Authentication Protocol Given Forward Secure Session Key. APWeb 2008: 309-318 - [c4]Xiaofeng Liu, Liusheng Huang, Wenbo Shi, Hongli Xu:
Energy-Efficient Location-Independent k -connected Scheme in Wireless Sensor Networks. WSAN 2008: 257-268 - [c3]Injoo Jang, Wenbo Shi, Hyeong Seon Yoo:
Policy Negotiation System Architecture for Privacy Protection. NCM (2) 2008: 592-597 - 2006
- [c2]Wenbo Shi, Hyeong Seon Yoo:
Efficient Nonce-Based Authentication Scheme Using Token-Update. ICCSA (3) 2006: 213-221 - 2005
- [c1]Xiangsheng Kong, Fang Miao, Yuyang Dong, Hongfu Liu, Wenbo Shi, Jun Liang:
Short wavelength infrared images for indigenous coke-making sites monitoring in China. IGARSS 2005: 1785-1788
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 20:35 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint