Baoyi Wang

Orcid: 0000-0002-4276-8777

According to our database1, Baoyi Wang authored at least 28 papers between 2003 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A Secure and Efficient Pairing-Free Certificateless Aggregate Signcryption Scheme for V2G Networks.
IEEE Syst. J., March, 2024

2023
A Multidimensional Data Aggregation Scheme of Smart Home in Microgrid With Fault Tolerance and Billing for Demand Response.
IEEE Syst. J., September, 2023

Antiquantum Privacy Protection Scheme in Advanced Metering Infrastructure of Smart Grid Based on Consortium Blockchain and RLWE.
IEEE Syst. J., June, 2023

A Privacy Protection Scheme for Bidding Users of Peer-to-Peer Electricity Call Auction Trading in Microgrids.
IEEE Syst. J., June, 2023

2021
Iterative Visual Relationship Detection via Commonsense Knowledge Graph.
Big Data Res., 2021

2019
A Privacy Protection Scheme of Microgrid Direct Electricity Transaction Based on Consortium Blockchain and Continuous Double Auction.
IEEE Access, 2019

Design and Analysis of Chipless RFID Tags Based on Retro-Radiators.
IEEE Access, 2019

Iterative Visual Relationship Detection via Commonsense Knowledge Graph.
Proceedings of the Semantic Technology - 9th Joint International Conference, 2019

2018
Position-based simulation of cloth wetting phenomena.
Comput. Animat. Virtual Worlds, 2018

2016
Unified particle-based coupling algorithm for stable soft tissue-blood interaction.
Proceedings of the 14th International Conference on Control, 2016

2009
A Novel Grid Trust Model Based on Fuzzy Theory.
Proceedings of the Third International Conference on Network and System Security, 2009

Study on Centralized Authorization Model Supporting Multiple Access Control Models.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

History and Future Information Based Trust Model in C2C E-commerce.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

Scanning Task Scheduling Strategy in Distributed Vulnerability Detection System.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

Research on Gravity-Based Anomaly Intrusion Detection Algorithm.
Proceedings of the Fifth International Conference on Information Assurance and Security, 2009

2008
Study on Role-Spliting and Its Ontology-Based Evaluation Methods during Role Mapping of Inter-domain.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008

Rough Set Page Recommendation Algorithm Based on Information Entropy.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008

2007
An Organization and Task Based Access Control Model for Workflow System.
Proceedings of the Advances in Web and Network Technologies, and Information Management, 2007

2006
Research and Implementation of the AC Cache Mechanism and Its Update Algorithm in Grid.
Proceedings of the 2006 International Conference on Semantics, 2006

An Extended OCSP Protocol for Grid CA Cross-certification.
Proceedings of the 2006 International Conference on Semantics, 2006

2005
Research on a Fine-grained Access Control Mechanism for Cross-domain Grid.
Proceedings of the 2005 International Conference on Semantics, 2005

The Research on Decision Approach of Data Dependence in Dynamic Workflow System.
Proceedings of the Sixth International Conference on Parallel and Distributed Computing, 2005

Research on Improved Role Hierarchy Model in Extended Organization PKI Networks.
Proceedings of the Sixth International Conference on Parallel and Distributed Computing, 2005

A Novel Text Classification Algorithm Based on Naïve Bayes and KL-Divergence.
Proceedings of the Sixth International Conference on Parallel and Distributed Computing, 2005

2004
Managing Access in Extended Enterprise Networks Web Service-Based.
Proceedings of the Grid and Cooperative Computing, 2004

The Research on Role-Based Access Control Mechanism for Workflow Management System.
Proceedings of the Grid and Cooperative Computing, 2004

2003
Constructing Secure Web Service Based on XML.
Proceedings of the Grid and Cooperative Computing, Second International Workshop, 2003

The Application Research of Role-Based Access Control Model in Workflow Management System.
Proceedings of the Grid and Cooperative Computing, Second International Workshop, 2003


  Loading...