Wenbin Yao

According to our database1, Wenbin Yao authored at least 64 papers between 2003 and 2019.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
SORD: a new strategy of online replica deduplication in Cloud-P2P.
Cluster Computing, 2019

Attribute-Based Signcryption From Lattices in the Standard Model.
IEEE Access, 2019

A Convolutional Neural Network Pruning Method Based On Attention Mechanism.
Proceedings of the 31st International Conference on Software Engineering and Knowledge Engineering, 2019

An Effective Load Balance Using Link Bandwidth for SDN-Based Data Centers.
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019

Towards Multi-Controller Placement for SDN Based on Density Peaks Clustering.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

2018
Data-Driven and Feedback-Enhanced Trust Computing Pattern for Large-Scale Multi-Cloud Collaborative Services.
IEEE Trans. Services Computing, 2018

Fast and Parallel Trust Computing Scheme Based on Big Data Analysis for Collaboration Cloud Service.
IEEE Trans. Information Forensics and Security, 2018

DARS: A dynamic adaptive replica strategy under high load Cloud-P2P.
Future Generation Comp. Syst., 2018

A large scale transactional service selection approach based on skyline and ant colony optimization algorithm.
Proceedings of the 2018 IEEE/IFIP Network Operations and Management Symposium, 2018

Optimization on parametric model.
Proceedings of the 2018 IEEE/IFIP Network Operations and Management Symposium, 2018

Applying gated recurrent units pproaches for workload prediction.
Proceedings of the 2018 IEEE/IFIP Network Operations and Management Symposium, 2018

A container scheduling strategy based on neighborhood division in micro service.
Proceedings of the 2018 IEEE/IFIP Network Operations and Management Symposium, 2018

Analysis of cars' commuting behavior under license plate restriction policy: a case study in Hangzhou, China.
Proceedings of the 21st International Conference on Intelligent Transportation Systems, 2018

Maximizing Influence Propagation in Networks by User-Relational Iterative Ranking Algorithm.
Proceedings of the IEEE International Conference on Parallel & Distributed Processing with Applications, 2018

Deep Learning for Phishing Detection.
Proceedings of the IEEE International Conference on Parallel & Distributed Processing with Applications, 2018

LogoPhish: A New Two-Dimensional Code Phishing Attack Detection Method.
Proceedings of the IEEE International Conference on Parallel & Distributed Processing with Applications, 2018

2017
A Context-Aware S-Health Service System for Drivers.
Sensors, 2017

The design of a context-aware service system in intelligent transportation system.
IJDSN, 2017

Pre-image sample algorithm with irregular Gaussian distribution and construction of identity-based signature.
Concurrency and Computation: Practice and Experience, 2017

Implementing an Inference Engine for RDFS/OWL Constructs and User-Defined Rules in HBase.
Proceedings of the 13th International Conference on Semantics, Knowledge and Grids, 2017

A Novel Image Preprocessing Strategy for Foreground Extraction in Person Re-identification.
Proceedings of the Advances in Multimedia Information Processing - PCM 2017, 2017

A Virtual Machine Migration Algorithm Based on Group Selection in Cloud Data Center.
Proceedings of the Network and Parallel Computing, 2017

An Energy Efficient Virtual Machine Placement Algorithm Based on Graph Partitioning in Cloud Data Center.
Proceedings of the 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), 2017

A Trajectory Prediction Method with Sparsity Data.
Proceedings of the 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), 2017

Collaborative filtering recommendation algorithm optimization based on latent factor model clustering.
Proceedings of the 13th International Conference on Natural Computation, 2017

Integrated metric learning with adaptive constraints for person re-identification.
Proceedings of the 2017 IEEE International Conference on Image Processing, 2017

Cross-site Scripting Attacks on Android Hybrid Applications.
Proceedings of the 2017 International Conference on Cryptography, Security and Privacy, 2017

A Group-Based Replica Consistency Schema for Cloud Storage.
Proceedings of the Cloud Computing and Security - Third International Conference, 2017

A Credibility Evaluation Method in Opportunistic Networks.
Proceedings of the Cloud Computing and Security - Third International Conference, 2017

Cloud Multimedia Files Assured Deletion Based on Bit Stream Transformation with Chaos Sequence.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2017

UR Rank: Micro-blog User Influence Ranking Algorithm Based on User Relationship.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2017

Ranking the Influence of Micro-blog Users Based on Activation Forwarding Relationship.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2017

Cloud Data Assured Deletion Based on Information Hiding and Secondary Encryption with Chaos Sequence.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2017

2016
Diversity regularized metric learning for person re-identification.
Proceedings of the 2016 IEEE International Conference on Image Processing, 2016

Asymmetric distance for spherical hashing.
Proceedings of the 2016 IEEE International Conference on Image Processing, 2016

An Effective Buffer Management Policy for Opportunistic Networks.
Proceedings of the Collaborate Computing: Networking, Applications and Worksharing, 2016

2015
LKH++ Based Group Key Management Scheme for Wireless Sensor Network.
Wireless Personal Communications, 2015

T-Broker: A Trust-Aware Service Brokering Scheme for Multiple Cloud Collaborative Services.
IEEE Trans. Information Forensics and Security, 2015

Identity-based signcryption from lattices.
Security and Communication Networks, 2015

A Selection Algorithm of Service Providers for Optimized Data Placement in Multi-Cloud Storage Environment.
Proceedings of the Intelligent Computation in Big Data Era, 2015

2014
OPUVRE: Overall Performance for Urban Vehicle Routing Environments.
Proceedings of the Internet of Vehicles - Technologies and Services, 2014

2013
Simdedup: A New Deduplication Scheme Based on Simhash.
Proceedings of the Web-Age Information Management, 2013

2012
Multiple-File Remote Data Checking for cloud storage.
Computers & Security, 2012

A Trustworthy Storage Framework on the Cloud.
Proceedings of the Trustworthy Computing and Services - International Conference, ISCTCS 2012, Beijing, China, May 28, 2012

A Trust-Based Data Backup Method on the Cloud.
Proceedings of the Trustworthy Computing and Services - International Conference, ISCTCS 2012, Beijing, China, May 28, 2012

Security and Trust Model for Data Disaster-Recovery Service on the Cloud.
Proceedings of the Trustworthy Computing and Services - International Conference, ISCTCS 2012, Beijing, China, May 28, 2012

2010
Advertising Keywords Extraction from Web Pages.
Proceedings of the Web Information Systems and Mining - International Conference, 2010

2009
VAOFS: A Verifiable Append-Only File System for Regulatory Compliance.
Proceedings of the Eighth International Conference on Grid and Cooperative Computing, 2009

2007
A New Reduced-Complexity Decoding Algorithm for LDPC Codes.
IEICE Transactions, 2007

A New Method of Performance Test for Network Storage.
Proceedings of the Proceeding of the Second International Multi-Symposium of Computer and Computational Sciences (IMSCCS 2007), 2007

Fault-Tolerance CMP Architecture based on SMT Technology.
Proceedings of the Proceeding of the Second International Multi-Symposium of Computer and Computational Sciences (IMSCCS 2007), 2007

An Improved RED Algorithm with Combined of Queue Length and Sending-Rate Inspection.
Proceedings of the Proceeding of the Second International Multi-Symposium of Computer and Computational Sciences (IMSCCS 2007), 2007

Performance Analysis Group-Based Key Management.
Proceedings of the Proceeding of the Second International Multi-Symposium of Computer and Computational Sciences (IMSCCS 2007), 2007

Analysis of Local Route Maintenance for Ad Hoc Network.
Proceedings of the Computational Science - ICCS 2007, 7th International Conference, Beijing, China, May 27, 2007

Group-Based Key Management for Multicast of Ad Hoc Sensor Network.
Proceedings of the Computational Science - ICCS 2007, 7th International Conference, Beijing, China, May 27, 2007

2006
Multipath passive data acknowledgement on-demand multicast protocol.
Computer Communications, 2006

A Two-Phase Time-based Consistent Checkpointing Strategy.
Proceedings of the Third International Conference on Information Technology: New Generations (ITNG 2006), 2006

Verification Environment for a SCMP Architecture.
Proceedings of the Interdisciplinary and Multidisciplinary Research in Computer Science, 2006

A New Scheduling Algorithm for Servers.
Proceedings of the Interdisciplinary and Multidisciplinary Research in Computer Science, 2006

MPoolODMRP: An Extended PoolODMRP based on Multi-path Policy.
Proceedings of the Interdisciplinary and Multidisciplinary Research in Computer Science, 2006

2004
PatchPSMP: an extension of NSMP based on pool node.
Proceedings of the 9th IEEE Symposium on Computers and Communications (ISCC 2006), June 28, 2004

PatchPSMP: A New Multicast Protocol for Ad-Hoc Network.
Proceedings of the High Speed Networks and Multimedia Communications, 2004

A Fault-Tolerant Single-Chip Multiprocessor.
Proceedings of the Advances in Computer Systems Architecture, 9th Asia-Pacific Conference, 2004

2003
A comparison between the PoolODMRP and the PatchODMRP.
Proceedings of the 11th IEEE International Conference on Networks, 2003


  Loading...