Shuangbao Wang

Affiliations:
  • Morgan State University, Department of Computer Science, Baltimore, MD, USA
  • Metonymy Labs, USA


According to our database1, Shuangbao Wang authored at least 19 papers between 2001 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Advancing Network Security with Quantum-Safe System Integration.
Proceedings of the 33rd International Conference on Computer Communications and Networks, 2024

2023
An Overview of Quantum-Safe Approaches: Quantum Key Distribution and Post-Quantum Cryptography.
Proceedings of the 57th Annual Conference on Information Sciences and Systems, 2023

2022
Trustworthy Artificial Intelligence for Cyber Threat Analysis.
Proceedings of the Intelligent Systems and Applications, 2022

Cyber Threat Analysis and Trustworthy Artificial Intelligence.
Proceedings of the 6th International Conference on Cryptography, Security and Privacy, 2022

2021
Quantum Algorithms: Overviews, Foundations, and Speedups.
Proceedings of the 5th IEEE International Conference on Cryptography, Security and Privacy, 2021

Code Structures for Quantum Encryption and Decryption.
Proceedings of the 5th IEEE International Conference on Cryptography, Security and Privacy, 2021

Computer Architecture and Organization - Fundamentals and Architecture Security
Springer, ISBN: 978-981-16-5661-3, 2021

2020
Quantum Cryptography and Simulation: Tools and Techniques.
Proceedings of the ICCSP 2020: 4th International Conference on Cryptography, 2020

2019
CyberMaster: An Expert System to Guide the Development of Cybersecurity Curricula.
Int. J. Online Biomed. Eng., 2019

viCyber: An Intelligent Curriculum Design Tool for Cybersecurity Education.
Proceedings of the 50th ACM Technical Symposium on Computer Science Education, 2019

2017
Video-based Big Data Analytics in Cyberlearning.
J. Learn. Anal., July, 2017

NFC Unlock: Secure Two-Factor Computer Authentication Using NFC.
Proceedings of the 14th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2017

2014
The Research on Controlling the Iteration of Quantum-Inspired Evolutionary Algorithms for Artificial Neural Networks.
Proceedings of the Algorithmic Aspects in Information and Management, 2014

2008
PPL: A whole-image processing language.
Comput. Lang. Syst. Struct., 2008

Agent-based ubiquitous m-learning portal for K-12 teachers.
Proceedings of the CSTST 2008: Proceedings of the 5th International Conference on Soft Computing as Transdisciplinary Science and Technology, 2008

2007
RPW: A hybrid reverse prediction method for level of detail.
Comput. Medical Imaging Graph., 2007

2006
Connputer - A Framework of Intrusion-Free Secure Computer Architecture.
Proceedings of the 2006 International Conference on Security & Management, 2006

2004
SMIS - A Real-Time Stereoscopic Medical Imaging System.
Proceedings of the 17th IEEE Symposium on Computer-Based Medical Systems (CBMS 2004), 2004

2001
Data visualization: parallel coordinates and dimension reduction.
Comput. Sci. Eng., 2001


  Loading...