Wenbo He

Orcid: 0000-0001-8606-2920

According to our database1, Wenbo He authored at least 135 papers between 2002 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
3D hand reconstruction via aggregating intra and inter graphs guided by prior knowledge for hand-object interaction scenario.
J. Vis. Commun. Image Represent., 2024

Mitigating Noisy Supervision Using Synthetic Samples with Soft Labels.
CoRR, 2024

Learning with Noisy Ground Truth: From 2D Classification to 3D Reconstruction.
CoRR, 2024

3D Hand Reconstruction via Aggregating Intra and Inter Graphs Guided by Prior Knowledge for Hand-Object Interaction Scenario.
CoRR, 2024

Utility-Preserving Face Anonymization via Differentially Private Feature Operations.
Proceedings of the IEEE INFOCOM 2024, 2024

2023
Lightweight 3D hand pose estimation by cascading CNNs with reinforcement learning.
Pattern Recognit. Lett., October, 2023

CWSOGG: Catching Web Shell Obfuscation Based on Genetic Algorithm and Generative Adversarial Network.
Comput. J., May, 2023

Spatial characteristics of closed-loop TMS-EEG with occipital alpha-phase synchronized.
Biomed. Signal Process. Control., May, 2023

Homotopy Method for Optimal Motion Planning With Homotopy Class Constraints.
IEEE Control. Syst. Lett., 2023

Generation of Coherent Multi-Sentence Texts with a Coherence Mechanism.
Comput. Speech Lang., 2023

Novel Fundus Image Preprocessing for Retcam Images to Improve Deep Learning Classification of Retinopathy of Prematurity.
CoRR, 2023

Revisit Linear Transformation for Image Privacy in Machine Learning.
Proceedings of the 5th IEEE International Conference on Trust, 2023

Preventing Text Data Poisoning Attacks in Federated Machine Learning by an Encrypted Verification Key.
Proceedings of the Rough Sets - International Joint Conference, 2023

Preventing Image Data Poisoning Attacks in Federated Machine Learning by an Encrypted Verification Key.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 27th International Conference KES-2023, 2023

Value Iteration Algorithm for Solving Shortest Path Problems with Homology Class Constraints.
Proceedings of the 62nd IEEE Conference on Decision and Control, 2023

A Differential Dynamic Programming-based Approach for Balancing Energy and Time Optimality in Motion Planning.
Proceedings of the 59th Annual Allerton Conference on Communication, 2023

Rethinking Label Refurbishment: Model Robustness under Label Noise.
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023

2022
An Ensemble Model for Combating Label Noise.
Proceedings of the WSDM '22: The Fifteenth ACM International Conference on Web Search and Data Mining, Virtual Event / Tempe, AZ, USA, February 21, 2022

Noise Attention Learning: Enhancing Noise Robustness by Gradient Scaling.
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022

SELC: Self-Ensemble Label Correction Improves Learning with Noisy Labels.
Proceedings of the Thirty-First International Joint Conference on Artificial Intelligence, 2022

Motion Planning with Homotopy Class Constraints via the Auxiliary Energy Reduction Technique.
Proceedings of the American Control Conference, 2022

2021
Effective and Efficient Content Redundancy Detection of Web Videos.
IEEE Trans. Big Data, 2021

Confidence Adaptive Regularization for Deep Learning with Noisy Labels.
CoRR, 2021

Co-matching: Combating Noisy Labels by Augmentation Anchoring.
CoRR, 2021

CLTA: Contents and Length-based Temporal Attention for Few-shot Action Recognition.
CoRR, 2021

VideoLoc: Video-based Indoor Localization with Text Information.
Proceedings of the 40th IEEE Conference on Computer Communications, 2021

CryptoEyes: Privacy Preserving Classification over Encrypted Images.
Proceedings of the 40th IEEE Conference on Computer Communications, 2021

MixNN: Combating Noisy Labels in Deep Learning by Mixing with Nearest Neighbors.
Proceedings of the 2021 IEEE International Conference on Big Data (Big Data), 2021

2020
A Pornographic Images Recognition Model based on Deep One-Class Classification With Visual Attention Mechanism.
IEEE Access, 2020

Few-Shot Learning of Video Action Recognition Only Based on Video Contents.
Proceedings of the IEEE Winter Conference on Applications of Computer Vision, 2020

Tag Pollution Detection in Web Videos via Cross-Modal Relevance Estimation.
Proceedings of the 28th IEEE/ACM International Symposium on Quality of Service, 2020

An Accurate Frequency Estimation Algorithm by Using DFT and Cosine Windows.
Proceedings of the Communications and Networking, 2020

2019
A Simple Recurrent Unit Model Based Intrusion Detection System With DCGAN.
IEEE Access, 2019

VidAnomaly: LSTM-Autoencoder-Based Adversarial Learning for One-Class Video Classification With Multiple Dynamic Images.
Proceedings of the 2019 IEEE International Conference on Big Data (IEEE BigData), 2019

2018
Uplink-Downlink Duality for Integer-Forcing.
IEEE Trans. Inf. Theory, 2018

Dynamic Optimal Countermeasure Selection for Intrusion Response System.
IEEE Trans. Dependable Secur. Comput., 2018

A Fine-Grained Stateful Data Analytics Method Based on Resilient State Table.
Int. J. Softw. Sci. Comput. Intell., 2018

Towards Update-Efficient and Parallel-Friendly Content-Based Indexing Scheme in Cloud Computing.
Int. J. Semantic Comput., 2018

Naxos: A Named Data Networking Consensus Protocol.
Proceedings of the 20th IEEE International Conference on High Performance Computing and Communications; 16th IEEE International Conference on Smart City; 4th IEEE International Conference on Data Science and Systems, 2018

Random Draw Forest: A Salient Index for Similarity Search Over Multimedia Data.
Proceedings of the Fourth IEEE International Conference on Multimedia Big Data, 2018

DVD: Constructing a Discriminative Video Descriptor by Convolving Frame Features.
Proceedings of the Fourth IEEE International Conference on Multimedia Big Data, 2018

Dynamic Partition Forest: An Efficient and Distributed Indexing Scheme for Similarity Search based on Hashing.
Proceedings of the IEEE International Conference on Big Data (IEEE BigData 2018), 2018

2017
PLP: Protecting Location Privacy Against Correlation Analyze Attack in Crowdsensing.
IEEE Trans. Mob. Comput., 2017

Compressive sensing based data quality improvement for crowd-sensing applications.
J. Netw. Comput. Appl., 2017

Boosting The Benefits of Hybrid SDN.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

Enhancing the effectiveness of traffic engineering in hybrid SDN.
Proceedings of the IEEE International Conference on Communications, 2017

Privacy aware web services in the cloud.
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017

A Content-Based Indexing Scheme for Large-Scale Unstructured Data.
Proceedings of the Third IEEE International Conference on Multimedia Big Data, 2017

A RST-based stateful data analytics within spark.
Proceedings of the 16th IEEE International Conference on Cognitive Informatics & Cognitive Computing, 2017

2016
Guest Editorial: Special Issue on Cyber-Physical Systems and Services.
IEEE Trans. Serv. Comput., 2016

Fast and Adaptive Continuous Scanning in Large-Scale RFID Systems.
IEEE/ACM Trans. Netw., 2016

Efficiently Estimating Statistics of Points of Interests on Maps.
IEEE Trans. Knowl. Data Eng., 2016

An Empirical Study of the Textual Content of Online Videos.
Int. J. Semantic Comput., 2016

PFO: A ParallelFriendly High Performance System for Online Query and Update of Nearest Neighbors.
CoRR, 2016

Achieving Consistent SDN Control With Declarative Applications.
Proceedings of the ACM SIGCOMM 2016 Conference, Florianopolis, Brazil, August 22-26, 2016, 2016

SafeCam: Analyzing intersection-related driver behaviors using multi-sensor smartphones.
Proceedings of the 2016 IEEE International Conference on Pervasive Computing and Communications, 2016

Integer-forcing source coding: Successive cancellation and source-channel duality.
Proceedings of the IEEE International Symposium on Information Theory, 2016

Cupid: Congestion-free consistent data plane update in software defined networks.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

CompoundEyes: Near-duplicate detection in large scale online video systems in the cloud.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

Consistent replication protocol for Named Data Networking.
Proceedings of the 24th IEEE International Conference on Network Protocols, 2016

Redactor: Reconcile network control with declarative control programs In SDN.
Proceedings of the 24th IEEE International Conference on Network Protocols, 2016

An Empirical Study of the Textual Content of Online Videos.
Proceedings of the IEEE Second International Conference on Multimedia Big Data, 2016

2015
Quality of experience and quality of protection provisions in emerging mobile networks [Guest Editorial].
IEEE Wirel. Commun., 2015

Rumor Identification in Microblogging Systems Based on Users' Behavior.
IEEE Trans. Comput. Soc. Syst., 2015

End-to-end delay analysis for networked systems.
Frontiers Inf. Technol. Electron. Eng., 2015

Collision Scheduling for Cellular Networks with Spatial Connectivity Constraints.
Proceedings of the IEEE 82nd Vehicular Technology Conference, 2015

M2SDN: Achieving multipath and multihoming in data centers with software defined networking.
Proceedings of the 23rd IEEE International Symposium on Quality of Service, 2015

Deco: False data detection and correction framework for participatory sensing.
Proceedings of the 23rd IEEE International Symposium on Quality of Service, 2015

Collision scheduling for cellular networks.
Proceedings of the IEEE International Symposium on Information Theory, 2015

Integer-forcing interference alignment: Iterative optimization via aligned lattice reduction.
Proceedings of the IEEE International Symposium on Information Theory, 2015

ScalaSEM: Scalable validation of SDN design with deployable code.
Proceedings of the 34th IEEE International Performance Computing and Communications Conference, 2015

Network intrusion detection and prevention middlebox management in SDN.
Proceedings of the 34th IEEE International Performance Computing and Communications Conference, 2015

SmartEye: Real-time and efficient cloud image sharing for disaster environments.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

PLP: Protecting Location Privacy Against Correlation-Analysis Attack in Crowdsensing.
Proceedings of the 44th International Conference on Parallel Processing, 2015

A Defense-Centric Model for Multi-step Attack Damage Cost Evaluation.
Proceedings of the 3rd International Conference on Future Internet of Things and Cloud, 2015

I know what you did on your smartphone: Inferring app usage over encrypted data traffic.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

Marlin: Taming the big streaming data in large scale video similarity search.
Proceedings of the 2015 IEEE International Conference on Big Data (IEEE BigData 2015), Santa Clara, CA, USA, October 29, 2015

Cloud-assisted distributed private data sharing.
Proceedings of the 6th ACM Conference on Bioinformatics, 2015

Dirty-paper integer-forcing.
Proceedings of the 53rd Annual Allerton Conference on Communication, 2015

2014
Delay analysis in practical wireless network coding.
Wirel. Commun. Mob. Comput., 2014

Thwarting Wi-Fi Side-Channel Analysis through Traffic Demultiplexing.
IEEE Trans. Wirel. Commun., 2014

Design and Implementation of Holistic Scheduling and Efficient Storage for FlexRay.
IEEE Trans. Parallel Distributed Syst., 2014

A Tale of Three Social Networks: User Activity Comparisons across Facebook, Twitter, and Foursquare.
IEEE Internet Comput., 2014

Uplink-downlink duality for integer-forcing: Effective SINRs and iterative optimization.
Proceedings of the 2014 IEEE 15th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC), 2014

Necklace: An efficient cuckoo hashing scheme for cloud storage services.
Proceedings of the IEEE 22nd International Symposium of Quality of Service, 2014

Detecting collusive cheating in online shopping systems through characteristics of social networks.
Proceedings of the 2014 Proceedings IEEE INFOCOM Workshops, Toronto, ON, Canada, April 27, 2014

Towards adaptive continuous scanning in large-scale RFID systems.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

NetMaster: Taming Energy Devourers on Smartphones.
Proceedings of the 43rd International Conference on Parallel Processing, 2014

An efficient sampling method for characterizing points of interests on maps.
Proceedings of the IEEE 30th International Conference on Data Engineering, Chicago, 2014

Generic Composite Counting in RFID Systems.
Proceedings of the IEEE 34th International Conference on Distributed Computing Systems, 2014

WiLoVe: A WiFi-coverage based Location Verification System in LBS.
Proceedings of the 9th International Conference on Future Networks and Communications (FNC'14) / The 11th International Conference on Mobile Systems and Pervasive Computing (MobiSPC'14) / Affiliated Workshops, 2014

2013
Application and analysis of multidimensional negative surveys in participatory sensing applications.
Pervasive Mob. Comput., 2013

Why application errors drain battery easily?: a study of memory leaks in smartphone apps.
Proceedings of the Workshop on Power-Aware Computing and Systems, 2013

2012
Enhancing privacy in participatory sensing applications with multidimensional data.
Proceedings of the 2012 IEEE International Conference on Pervasive Computing and Communications, 2012

Data perturbation with state-dependent noise for participatory sensing.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

HOSA: Holistic scheduling and analysis for scalable fault-tolerant FlexRay design.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

Dynamic Control of Electricity Cost with Power Demand Smoothing and Peak Shaving for Distributed Internet Data Centers.
Proceedings of the 2012 IEEE 32nd International Conference on Distributed Computing Systems, 2012

2011
PDA: Privacy-Preserving Data Aggregation for Information Collection.
ACM Trans. Sens. Networks, 2011

EISM: An Efficient ID-based Signcryption Scheme for Multi-PKG Multihop Wireless Networks of Mobile Hosts.
Ad Hoc Sens. Wirel. Networks, 2011

Inferring users' online activities through traffic analysis.
Proceedings of the Fourth ACM Conference on Wireless Network Security, 2011

Phoenix: Peer-to-Peer Location Based Notification in Mobile Networks.
Proceedings of the IEEE 8th International Conference on Mobile Adhoc and Sensor Systems, 2011

KIPDA: k-indistinguishable privacy-preserving data aggregation in wireless sensor networks.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

Defending Against Traffic Analysis in Wireless Networks through Traffic Reshaping.
Proceedings of the 2011 International Conference on Distributed Computing Systems, 2011

End-to-End Delay Analysis in Wireless Network Coding: A Network Calculus-Based Approach.
Proceedings of the 2011 International Conference on Distributed Computing Systems, 2011

Location Cheating: A Security Challenge to Location-Based Social Network Services.
Proceedings of the 2011 International Conference on Distributed Computing Systems, 2011

2010
Message propagation in ad-hoc-based proximity mobile social networks.
Proceedings of the Eigth Annual IEEE International Conference on Pervasive Computing and Communications, 2010

Anycast routing in mobile opportunistic networks.
Proceedings of the 15th IEEE Symposium on Computers and Communications, 2010

Reliability Calculus: A Theoretical Framework to Analyze Communication Reliability.
Proceedings of the 2010 International Conference on Distributed Computing Systems, 2010

2009
Security in Wireless Ad Hoc Networks.
Proceedings of the Guide to Wireless Ad Hoc Networks, 2009

Delay Management in Wireless Ad Hoc Networks.
Proceedings of the Guide to Wireless Ad Hoc Networks, 2009

SMOCK: a scalable method of cryptographic key management for mission-critical wireless ad-hoc networks.
IEEE Trans. Inf. Forensics Secur., 2009

ChainFarm: A Novel Authentication Protocol for High-rate Any Source Probabilistic Broadcast.
Proceedings of the IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, 2009

Challenges Towards Elastic Power Management in Internet Data Centers.
Proceedings of the 29th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2009 Workshops), 2009

A Cluster-Based Protocol to Enforce Integrity and Preserve Privacy in Data Aggregation.
Proceedings of the 29th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2009 Workshops), 2009

Optimizing File Retrieval in Delay-Tolerant Content Distribution Community.
Proceedings of the 29th IEEE International Conference on Distributed Computing Systems (ICDCS 2009), 2009

2008
Achieving Privacy and Integrity of Data Aggregation in Wireless Sensor Networks
PhD thesis, 2008

End-to-end delay control of multimedia applications over multihop wireless links.
ACM Trans. Multim. Comput. Commun. Appl., 2008

ORTEGA: An Efficient and Flexible Online Fault Tolerance Architecture for Real-Time Control Systems.
IEEE Trans. Ind. Informatics, 2008

Alert propagation in mobile ad hoc networks.
ACM SIGMOBILE Mob. Comput. Commun. Rev., 2008

MobileAds: advertisement on mobile devices.
SIGBED Rev., 2008

McCLS: Certificateless Signature Scheme for Emergency Mobile Wireless Cyber-Physical Systems.
Int. J. Comput. Commun. Control, 2008

Energy-Aware Server Provisioning and Load Dispatching for Connection-Intensive Internet Services.
Proceedings of the 5th USENIX Symposium on Networked Systems Design & Implementation, 2008

A Certificateless Signature Scheme for Mobile Wireless Cyber-Physical Systems.
Proceedings of the 28th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2008 Workshops), 2008

2007
A scalable public key management scheme in wireless ad hoc networks.
ACM SIGMOBILE Mob. Comput. Commun. Rev., 2007

SMOCK: A Self-Contained Public Key Management Scheme for Mission-Critical Wireless Ad Hoc Networks.
Proceedings of the Fifth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom 2007), 2007

PDA: Privacy-Preserving Data Aggregation in Wireless Sensor Networks.
Proceedings of the INFOCOM 2007. 26th IEEE International Conference on Computer Communications, 2007

Active queue management design using discrete-event control.
Proceedings of the 46th IEEE Conference on Decision and Control, 2007

2006
Optimal real-time sampling rate assignment for wireless sensor networks.
ACM Trans. Sens. Networks, 2006

An integrated solution to delay and security support in wireless networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2006

Impact of Upper Layer Adaptation on End-to-end Delay Management in Wireless Ad Hoc Networks.
Proceedings of the 12th IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS 2006), 2006

Experimental Validation of Middleware-based QoS Control in 802.11 Wireless Networks.
Proceedings of the 3rd International Conference on Broadband Communications, 2006

2005
Building Robust Wireless LAN for Industrial Control with DSSS-CDMA Cellphone Network Paradigm.
Proceedings of the 26th IEEE Real-Time Systems Symposium (RTSS 2005), 2005

A Feedback Control Scheme for Resource Allocation in Wireless Multi-hop Ad Hoc Networks.
Proceedings of the 2nd Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2005), 2005

2003
Optimal QoS Sampling Frequency Assignment for Real-Time Wireless Sensor Networks.
Proceedings of the 24th IEEE Real-Time Systems Symposium (RTSS 2003), 2003

2002
Generalized loop-back recovery in optical mesh networks.
IEEE/ACM Trans. Netw., 2002


  Loading...