Wenbo Shi

Orcid: 0000-0003-4889-0834

According to our database1, Wenbo Shi authored at least 110 papers between 2005 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Provable secure authentication key agreement for wireless body area networks.
Frontiers Comput. Sci., October, 2024

STCLA: An Efficient Certificateless Authenticated Key Agreement Scheme for the Internet of Vehicles.
IEEE Trans. Veh. Technol., April, 2024

ARdetector: android ransomware detection framework.
J. Supercomput., April, 2024

Traceable ring signature schemes based on SM2 digital signature algorithm and its applications in the data sharing scheme.
Frontiers Comput. Sci., April, 2024

Probabilistic Model-Based Reinforcement Learning Unmanned Surface Vehicles Using Local Update Sparse Spectrum Approximation.
IEEE Trans. Ind. Informatics, February, 2024

Quantum Routing for Emerging Quantum Networks.
IEEE Netw., January, 2024

Practical Privacy-Preserving Scheme With Fault Tolerance for Smart Grids.
IEEE Internet Things J., January, 2024

A precise method of identifying Android application family.
Expert Syst. J. Knowl. Eng., January, 2024

Adaptive Denoising-Enhanced LiDAR Odometry for Degeneration Resilience in Diverse Terrains.
IEEE Trans. Instrum. Meas., 2024

V-Digger: An Efficient and Secure Vulnerability Assessment for Large-Scale ISP Network.
IEEE Trans. Dependable Secur. Comput., 2024

SG-Audit: An Efficient and Robust Cloud Auditing Scheme for Smart Grid.
IEEE Trans. Dependable Secur. Comput., 2024

Verifiable Random Function Schemes Based on SM2 Digital Signature Algorithm and its Applications for Committee Elections.
IEEE Open J. Comput. Soc., 2024

PACTA: An IoT Data Privacy Regulation Compliance Scheme Using TEE and Blockchain.
IEEE Internet Things J., 2024

A fair multi-attribute data transaction mechanism supporting cross-chain.
Internet Things, 2024

An Integrated Burst-Mode 2R Receiver Employing Fast Residual Offset Canceller for XGS-PON in 40-nm CMOS.
Proceedings of the IEEE Custom Integrated Circuits Conference, 2024

2023
OWL: A data sharing scheme with controllable anonymity and integrity for group users.
Comput. Commun., September, 2023

Entanglement of Signal Paths via Noisy Superconducting Quantum Devices.
Entropy, January, 2023

Dense Normal Based Degeneration-Aware 2-D Lidar Odometry for Correlative Scan Matching.
IEEE Trans. Instrum. Meas., 2023

HoloParser: Holistic Visual Parsing for Real-Time Semantic Segmentation in Autonomous Driving.
IEEE Trans. Instrum. Meas., 2023

A Deep Learning Framework for Predicting Protein Functions With Co-Occurrence of GO Terms.
IEEE ACM Trans. Comput. Biol. Bioinform., 2023

Ambient-Aware LiDAR Odometry in Variable Terrains.
CoRR, 2023

Towards Carbon-Free Electricity: A Comprehensive Flow-Based Framework for Power Grid Carbon Accounting and Decarbonization.
CoRR, 2023

Carbon-Aware Optimal Power Flow.
CoRR, 2023

Boosting External-Reference Image Quality Assessment by Content-Constrain Loss and Attention-based Adaptive Feature Fusion.
Proceedings of the International Joint Conference on Neural Networks, 2023

Semantic and Gradient Guided Scene Text Image Super-Resolution.
Proceedings of the Image and Graphics - 12th International Conference, 2023

Robust Content-Variant Reference Image Quality Assessment Via Similar Patch Matching.
Proceedings of the IEEE International Conference on Acoustics, 2023

Signal Processing And Quantum State Tomography on Noisy Devices.
Proceedings of the IEEE International Conference on Acoustics, 2023

Error-Mitigated Quantum Routing on Noisy Devices.
Proceedings of the IEEE Global Communications Conference, 2023

2022
SorTEE: Service-Oriented Routing for Payment Channel Networks With Scalability and Privacy Protection.
IEEE Trans. Netw. Serv. Manag., December, 2022

Attention Gate Based Dual-Pathway Network for Vertebra Segmentation of X-Ray Spine Images.
IEEE J. Biomed. Health Informatics, 2022

STOP: A Service Oriented Internet Purification Against Link Flooding Attacks.
IEEE Trans. Inf. Forensics Secur., 2022

CoinLayering: An Efficient Coin Mixing Scheme for Large Scale Bitcoin Transactions.
IEEE Trans. Dependable Secur. Comput., 2022

A Secure Access Control Framework for Cloud Management.
Mob. Networks Appl., 2022

A Certificateless Authentication and Key Agreement Scheme for Secure Cloud-assisted Wireless Body Area Network.
Mob. Networks Appl., 2022

Hash-balanced binary tree-based public auditing in vehicular edge computing and networks.
Int. J. Commun. Syst., 2022

DeepDISOBind: accurate prediction of RNA-, DNA- and protein-binding intrinsically disordered residues with deep multi-task learning.
Briefings Bioinform., 2022

Dynamic Self-Maintenance Obstacle Costmap Based on Instance Segmentation and Memory Storage Mechanism.
Proceedings of the IEEE International Conference on Robotics and Biomimetics, 2022

Road Defect Detection Based on Semantic Transformed Disparity Image Segmentation.
Proceedings of the IEEE International Conference on Robotics and Biomimetics, 2022

A 10/2.5-Gb/s Hyper-Supplied CMOS Low-Noise Burst-Mode TIA with Loud Burst Protection and Gearbox Automatic Offset Cancellation for XGS-PON.
Proceedings of the IEEE Custom Integrated Circuits Conference, 2022

Traceable Ring Signature Schemes Based on SM2 Digital Signature Algorithm and Its Applications in the Evidence-Storage System.
Proceedings of the Blockchain and Trustworthy Systems - 4th International Conference, 2022

2021
NeuCheck: A more practical Ethereum smart contract security analysis tool.
Softw. Pract. Exp., 2021

Security Analysis of a Lightweight Identity-Based Two-Party Authenticated Key Agreement Protocol for IIoT Environments.
Secur. Commun. Networks, 2021

A secure spectrum auction scheme without the trusted party based on the smart contract.
Digit. Commun. Networks, 2021

An efficient combined deep neural network based malware detection framework in 5G environment.
Comput. Networks, 2021

2020
Enhancing cloud storage security against a new replay attack with an efficient public auditing scheme.
J. Supercomput., 2020

Weakly Supervised Change Detection Based on Edge Mapping and SDAE Network in High-Resolution Remote Sensing Images.
Remote. Sens., 2020

Lockmix: a secure and privacy-preserving mix service for Bitcoin anonymity.
Int. J. Inf. Sec., 2020

Dredas: Decentralized, reliable and efficient remote outsourced data auditing scheme with blockchain smart contract for industrial IoT.
Future Gener. Comput. Syst., 2020

Opcode sequence analysis of Android malware by a convolutional neural network.
Concurr. Comput. Pract. Exp., 2020

A secure and scalable data integrity auditing scheme based on hyperledger fabric.
Comput. Secur., 2020

Generation of Tunable Microwave Frequency Comb Utilizing a Semiconductor Laser Subject to Optical Injection from an SFP Module Modulated by an Arbitrary Periodic Signal.
Complex., 2020

When Blockchain Meets SGX: An Overview, Challenges, and Open Issues.
IEEE Access, 2020

Incremental Network Configuration Verification.
Proceedings of the HotNets '20: The 19th ACM Workshop on Hot Topics in Networks, 2020

SDSBT: A Secure Multi-party Data Sharing Platform Based on Blockchain and TEE.
Proceedings of the Cyberspace Safety and Security - 12th International Symposium, 2020

A Survey on the Application of SGX in Blockchain Area.
Proceedings of the Blockchain and Trustworthy Systems - Second International Conference, 2020

SDABS: A Secure Cloud Data Auditing Scheme Based on Blockchain and SGX.
Proceedings of the Blockchain and Trustworthy Systems - Second International Conference, 2020

2019
Privacy-Preserving Distributed Data Fusion Based on Attribute Protection.
IEEE Trans. Ind. Informatics, 2019

A privacy-preserving spectrum auction scheme using paillier cryptosystem with public verification.
J. Intell. Fuzzy Syst., 2019

Improving efficiency of remote data audit for cloud storage.
KSII Trans. Internet Inf. Syst., 2019

2018
Demand-Response-Based Distributed Preventive Control to Improve Short-Term Voltage Stability.
IEEE Trans. Smart Grid, 2018

Lockcoin: a secure and privacy-preserving mix service for bitcoin anonymity.
CoRR, 2018

IoTChain: A Three-Tier Blockchain-based IoT Security Architecture.
CoRR, 2018

A novel valuation pruning optimization fuzzing test model based on mutation tree for industrial control systems.
Appl. Soft Comput., 2018

A Privacy-Preserving, Decentralized and Functional Bitcoin E-Voting Protocol.
Proceedings of the 2018 IEEE SmartWorld, 2018

2017
Real-Time Energy Management in Microgrids.
IEEE Trans. Smart Grid, 2017

DMRS: an efficient dynamic multi-keyword ranked search over encrypted cloud data.
Soft Comput., 2017

A privacy-preserving degree-matching multi-attribute auction scheme in smart grid auction market.
Pers. Ubiquitous Comput., 2017

Decentralized and Distributed Temperature Control via HVAC Systems in Energy Efficient Buildings.
CoRR, 2017

A Verifiable Sealed-Bid Multi-Qualitative-Attribute Based Auction Scheme in the Semi-Honest Model.
IEEE Access, 2017

Community-level Geothermal Heat Pump system management via an aggregation-disaggregation framework.
Proceedings of the 56th IEEE Annual Conference on Decision and Control, 2017

Physics-integrated hierarchical/distributed HVAC optimization for multiple buildings with robustness against time delays.
Proceedings of the 56th IEEE Annual Conference on Decision and Control, 2017

An integrated design of optimization and physical dynamics for energy efficient buildings: A passivity approach.
Proceedings of the IEEE Conference on Control Technology and Applications, 2017

Distributed temperature control via Geothermal Heat Pump systems in energy efficient buildings.
Proceedings of the 2017 American Control Conference, 2017

2016
Entry and exit of service providers under cost uncertainty: a real options approach.
J. Oper. Res. Soc., 2016

A Secure Reverse Multi-Attribute First-Price E-Auction Mechanism Using Multiple Auctioneer Servers (Work in Progress).
Proceedings of the Provable Security, 2016

Improving AGC performance of a coal-fueled generators with MW-level BESS.
Proceedings of the 2016 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference, 2016

A Privacy-Preserving Online Reverse Multi-attributes Auction Scheme Based on Degree-Matching.
Proceedings of the Cloud Computing and Security - Second International Conference, 2016

Decentralized temperature control via HVAC systems in energy efficient buildings: An approximate solution procedure.
Proceedings of the 2016 IEEE Global Conference on Signal and Information Processing, 2016

2015
Distributed Optimal Energy Management in Microgrids.
IEEE Trans. Smart Grid, 2015

Postfix automata.
Theor. Comput. Sci., 2015

On the security of a certificateless online/offline signcryption for Internet of Things.
Peer-to-Peer Netw. Appl., 2015

A Dynamic Identity Based Authentication Scheme Using Chaotic Maps for Telecare Medicine Information Systems.
J. Medical Syst., 2015

Integration of IEC 61850 into a Vehicle-to-Grid system with networked electric vehicles.
Proceedings of the 2015 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference, 2015

Performance optimization of the echo state network for time series prediction and spoken digit recognition.
Proceedings of the 11th International Conference on Natural Computation, 2015

2014
Product Remanufacturing: A Real Options Approach.
IEEE Trans. Engineering Management, 2014

Optimal Residential Demand Response in Distribution Networks.
IEEE J. Sel. Areas Commun., 2014

Cryptanalysis and improvement of a DoS-resistant ID-based password authentication scheme without using smart card.
Int. J. Inf. Commun. Technol., 2014

A provable secure sealed-bid multi-attribute auction scheme under semi-honest model.
Int. J. Commun. Syst., 2014

Cryptanalysis and improvement of a certificateless signcryption scheme without bilinear pairing.
Frontiers Comput. Sci., 2014

A distributed optimal energy management strategy for microgrids.
Proceedings of the 2014 IEEE International Conference on Smart Grid Communications, 2014

Evaluating microgrid management and control with an implementable energy management system.
Proceedings of the 2014 IEEE International Conference on Smart Grid Communications, 2014

Chaos characteristics analysis of transient signals for phase-locked synthesizer based FHC system.
Proceedings of the 14th International Symposium on Communications and Information Technologies, 2014

A single-station location method based on long baseline interferometer.
Proceedings of the 14th International Symposium on Communications and Information Technologies, 2014

Optimal power allocation for heterogeneous data traffic in NAF relay-assisted uplink transmission.
Proceedings of the 14th International Symposium on Communications and Information Technologies, 2014

2013
A Study of Product Weight and Collection Rate in Closed-Loop Supply Chains With Recycling.
IEEE Trans. Engineering Management, 2013

A sealed-bid multi-attribute auction protocol with strong bid privacy and bidder privacy.
Secur. Commun. Networks, 2013

On the security of an authentication scheme for multi-server architecture.
Int. J. Electron. Secur. Digit. Forensics, 2013

A New User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography.
Int. J. Distributed Sens. Networks, 2013

2011
An Energy-Efficient k-connected Scheme for Wireless Sensor Networks.
Ad Hoc Sens. Wirel. Networks, 2011

Real-time vehicle-to-grid control algorithm under price uncertainty.
Proceedings of the IEEE Second International Conference on Smart Grid Communications, 2011

MDS-Based Localization Algorithm for RFID Systems.
Proceedings of IEEE International Conference on Communications, 2011

2010
An Improved Fuzzy Identity-Based Encryption Scheme With Constant Size Ciphertext.
J. Digit. Content Technol. its Appl., 2010

A Two-Phase Algorithm for Locating Sensors in Irregular Areas.
Proceedings of the Global Communications Conference, 2010

Efficient Password-Proven Key Exchange Protocol against Relay Attack on Ad Hoc Networks.
Proceedings of the 5th IEEE Asia-Pacific Services Computing Conference, 2010

2008
Policy Negotiation System Architecture for Privacy Protection.
Proceedings of the NCM 2008, The Fourth International Conference on Networked Computing and Advanced Information Management, Gyeongju, Korea, September 2-4, 2008, 2008

Energy-Efficient Location-Independent <i>k</i> -connected Scheme in Wireless Sensor Networks.
Proceedings of the Wireless Sensor and Actor Networks II, 2008

A Provable Secure Authentication Protocol Given Forward Secure Session Key.
Proceedings of the Progress in WWW Research and Development, 2008

An Efficient Electronic Marketplace Bidding Auction Protocol with Bid Privacy.
Proceedings of the Progress in WWW Research and Development, 2008

2006
Efficient Nonce-Based Authentication Scheme Using Token-Update.
Proceedings of the Computational Science and Its Applications, 2006

2005
Short wavelength infrared images for indigenous coke-making sites monitoring in China.
Proceedings of the IEEE International Geoscience & Remote Sensing Symposium, 2005


  Loading...