Wenbin Yao

Orcid: 0000-0002-5746-7715

According to our database1, Wenbin Yao authored at least 89 papers between 2003 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
EM-IFCM: Fuzzy c-means clustering algorithm based on edge modification for imbalanced data.
Inf. Sci., February, 2024

2023
Research on Dynamic Task Scheduling of Transmission and Generation of Schedule Based on Improved Genetic Algorithm.
J. Circuits Syst. Comput., December, 2023

Practical NTRU Signcryption in the Standard Model.
Entropy, December, 2023

Provisioning network slice for mobile content delivery in uncertain MEC environment.
Comput. Networks, April, 2023

A Lightweight Intelligent Network Intrusion Detection System Using One-Class Autoencoder and Ensemble Learning for IoT.
Sensors, 2023

An energy-efficient load balance strategy based on virtual machine consolidation in cloud environment.
Future Gener. Comput. Syst., 2023

An Adaptive Model Filtering Algorithm Based on Grubbs Test in Federated Learning.
Entropy, 2023

Learning-based RSU Placement for C-V2X with Uncertain Traffic Density and Task Demand.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2023

A Joint Entity and Relation Extraction Approach Using Dilated Convolution and Context Fusion.
Proceedings of the Natural Language Processing and Chinese Computing, 2023

Malicious Relay Detection for Tor Network Using Hybrid Multi-Scale CNN-LSTM with Attention.
Proceedings of the IEEE Symposium on Computers and Communications, 2023

An Efficient Method based on Multi-view Semantic Alignment for Cross-view Geo-localization.
Proceedings of the International Joint Conference on Neural Networks, 2023

2022
FASR: An Efficient Feature-Aware Deduplication Method in Distributed Storage Systems.
IEEE Access, 2022

Hierarchical Structure-Feature Aware Graph Neural Network for Node Classification.
IEEE Access, 2022

A Two-Layer Soft-Voting Ensemble Learning Model For Network Intrusion Detection.
Proceedings of the 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2022

A Node-labeling-based Method for Evaluating the Anonymity of Tor Network.
Proceedings of the 46th IEEE Annual Computers, Software, and Applications Conferenc, 2022

2021
Deep Attributed Network Embedding with Community Information.
Proceedings of the MultiMedia Modeling - 27th International Conference, 2021

Friends Recommendation Based on KBERT-CNN Text Classification Model.
Proceedings of the International Joint Conference on Neural Networks, 2021

2020
Cross-Scale Correlation Stereo Network.
Proceedings of the 2020 International Joint Conference on Neural Networks, 2020

Expanding Training Set for Graph-Based Semi-supervised Classification.
Proceedings of the Database and Expert Systems Applications, 2020

2019
Trust-Aware and Fast Resource Matchmaking for Personalized Collaboration Cloud Service.
IEEE Trans. Netw. Serv. Manag., 2019

RRSD: A file replication method for ensuring data reliability and reducing storage consumption in a dynamic Cloud-P2P environment.
Future Gener. Comput. Syst., 2019

SORD: a new strategy of online replica deduplication in Cloud-P2P.
Clust. Comput., 2019

A Weighted PageRank-Based Algorithm for Virtual Machine Placement in Cloud Computing.
IEEE Access, 2019

Attribute-Based Signcryption From Lattices in the Standard Model.
IEEE Access, 2019

A Convolutional Neural Network Pruning Method Based On Attention Mechanism.
Proceedings of the 31st International Conference on Software Engineering and Knowledge Engineering, 2019

Hippocampus Segmentation in MRI Using Side U-Net Model.
Proceedings of the Neural Information Processing - 26th International Conference, 2019

An Effective Load Balance Using Link Bandwidth for SDN-Based Data Centers.
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019

Towards Multi-Controller Placement for SDN Based on Density Peaks Clustering.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

Person Search with Joint Detection, Segmentation and Re-identification.
Proceedings of the Human Centered Computing - 5th International Conference, 2019

2018
Data-Driven and Feedback-Enhanced Trust Computing Pattern for Large-Scale Multi-Cloud Collaborative Services.
IEEE Trans. Serv. Comput., 2018

Fast and Parallel Trust Computing Scheme Based on Big Data Analysis for Collaboration Cloud Service.
IEEE Trans. Inf. Forensics Secur., 2018

DARS: A dynamic adaptive replica strategy under high load Cloud-P2P.
Future Gener. Comput. Syst., 2018

A large scale transactional service selection approach based on skyline and ant colony optimization algorithm.
Proceedings of the 2018 IEEE/IFIP Network Operations and Management Symposium, 2018

Optimization on parametric model.
Proceedings of the 2018 IEEE/IFIP Network Operations and Management Symposium, 2018

Applying gated recurrent units pproaches for workload prediction.
Proceedings of the 2018 IEEE/IFIP Network Operations and Management Symposium, 2018

A container scheduling strategy based on neighborhood division in micro service.
Proceedings of the 2018 IEEE/IFIP Network Operations and Management Symposium, 2018

Analysis of cars' commuting behavior under license plate restriction policy: a case study in Hangzhou, China.
Proceedings of the 21st International Conference on Intelligent Transportation Systems, 2018

Maximizing Influence Propagation in Networks by User-Relational Iterative Ranking Algorithm.
Proceedings of the IEEE International Conference on Parallel & Distributed Processing with Applications, 2018

Deep Learning for Phishing Detection.
Proceedings of the IEEE International Conference on Parallel & Distributed Processing with Applications, 2018

LogoPhish: A New Two-Dimensional Code Phishing Attack Detection Method.
Proceedings of the IEEE International Conference on Parallel & Distributed Processing with Applications, 2018

2017
A Context-Aware S-Health Service System for Drivers.
Sensors, 2017

The design of a context-aware service system in intelligent transportation system.
Int. J. Distributed Sens. Networks, 2017

Pre-image sample algorithm with irregular Gaussian distribution and construction of identity-based signature.
Concurr. Comput. Pract. Exp., 2017

Implementing an Inference Engine for RDFS/OWL Constructs and User-Defined Rules in HBase.
Proceedings of the 13th International Conference on Semantics, Knowledge and Grids, 2017

A Novel Image Preprocessing Strategy for Foreground Extraction in Person Re-identification.
Proceedings of the Advances in Multimedia Information Processing - PCM 2017, 2017

A Virtual Machine Migration Algorithm Based on Group Selection in Cloud Data Center.
Proceedings of the Network and Parallel Computing, 2017

An Energy Efficient Virtual Machine Placement Algorithm Based on Graph Partitioning in Cloud Data Center.
Proceedings of the 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), 2017

A Trajectory Prediction Method with Sparsity Data.
Proceedings of the 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), 2017

Collaborative filtering recommendation algorithm optimization based on latent factor model clustering.
Proceedings of the 13th International Conference on Natural Computation, 2017

Integrated metric learning with adaptive constraints for person re-identification.
Proceedings of the 2017 IEEE International Conference on Image Processing, 2017

Cross-site Scripting Attacks on Android Hybrid Applications.
Proceedings of the 2017 International Conference on Cryptography, Security and Privacy, 2017

A Group-Based Replica Consistency Schema for Cloud Storage.
Proceedings of the Cloud Computing and Security - Third International Conference, 2017

A Credibility Evaluation Method in Opportunistic Networks.
Proceedings of the Cloud Computing and Security - Third International Conference, 2017

Cloud Multimedia Files Assured Deletion Based on Bit Stream Transformation with Chaos Sequence.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2017

UR Rank: Micro-blog User Influence Ranking Algorithm Based on User Relationship.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2017

Ranking the Influence of Micro-blog Users Based on Activation Forwarding Relationship.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2017

Cloud Data Assured Deletion Based on Information Hiding and Secondary Encryption with Chaos Sequence.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2017

2016
Diversity regularized metric learning for person re-identification.
Proceedings of the 2016 IEEE International Conference on Image Processing, 2016

Asymmetric distance for spherical hashing.
Proceedings of the 2016 IEEE International Conference on Image Processing, 2016

An Effective Buffer Management Policy for Opportunistic Networks.
Proceedings of the Collaborate Computing: Networking, Applications and Worksharing, 2016

2015
LKH++ Based Group Key Management Scheme for Wireless Sensor Network.
Wirel. Pers. Commun., 2015

T-Broker: A Trust-Aware Service Brokering Scheme for Multiple Cloud Collaborative Services.
IEEE Trans. Inf. Forensics Secur., 2015

Identity-based signcryption from lattices.
Secur. Commun. Networks, 2015

基于云模型的灾难恢复能力评价方法研究 (Study on Disaster Recovery Capability Evaluation Approach Based on Cloud Model).
计算机科学, 2015

A Selection Algorithm of Service Providers for Optimized Data Placement in Multi-Cloud Storage Environment.
Proceedings of the Intelligent Computation in Big Data Era, 2015

2014
OPUVRE: Overall Performance for Urban Vehicle Routing Environments.
Proceedings of the Internet of Vehicles - Technologies and Services, 2014

2013
Simdedup: A New Deduplication Scheme Based on Simhash.
Proceedings of the Web-Age Information Management, 2013

2012
Multiple-File Remote Data Checking for cloud storage.
Comput. Secur., 2012

A Trustworthy Storage Framework on the Cloud.
Proceedings of the Trustworthy Computing and Services - International Conference, ISCTCS 2012, Beijing, China, May 28, 2012

A Trust-Based Data Backup Method on the Cloud.
Proceedings of the Trustworthy Computing and Services - International Conference, ISCTCS 2012, Beijing, China, May 28, 2012

Security and Trust Model for Data Disaster-Recovery Service on the Cloud.
Proceedings of the Trustworthy Computing and Services - International Conference, ISCTCS 2012, Beijing, China, May 28, 2012

2010
Advertising Keywords Extraction from Web Pages.
Proceedings of the Web Information Systems and Mining - International Conference, 2010

2009
VAOFS: A Verifiable Append-Only File System for Regulatory Compliance.
Proceedings of the Eighth International Conference on Grid and Cooperative Computing, 2009

2007
A New Reduced-Complexity Decoding Algorithm for LDPC Codes.
IEICE Trans. Commun., 2007

A New Method of Performance Test for Network Storage.
Proceedings of the Proceeding of the Second International Multi-Symposium of Computer and Computational Sciences (IMSCCS 2007), 2007

Fault-Tolerance CMP Architecture based on SMT Technology.
Proceedings of the Proceeding of the Second International Multi-Symposium of Computer and Computational Sciences (IMSCCS 2007), 2007

An Improved RED Algorithm with Combined of Queue Length and Sending-Rate Inspection.
Proceedings of the Proceeding of the Second International Multi-Symposium of Computer and Computational Sciences (IMSCCS 2007), 2007

Performance Analysis Group-Based Key Management.
Proceedings of the Proceeding of the Second International Multi-Symposium of Computer and Computational Sciences (IMSCCS 2007), 2007

Analysis of Local Route Maintenance for Ad Hoc Network.
Proceedings of the Computational Science - ICCS 2007, 7th International Conference, Beijing, China, May 27, 2007

Group-Based Key Management for Multicast of Ad Hoc Sensor Network.
Proceedings of the Computational Science - ICCS 2007, 7th International Conference, Beijing, China, May 27, 2007

2006
Multipath passive data acknowledgement on-demand multicast protocol.
Comput. Commun., 2006

A Two-Phase Time-based Consistent Checkpointing Strategy.
Proceedings of the Third International Conference on Information Technology: New Generations (ITNG 2006), 2006

Verification Environment for a SCMP Architecture.
Proceedings of the Interdisciplinary and Multidisciplinary Research in Computer Science, 2006

A New Scheduling Algorithm for Servers.
Proceedings of the Interdisciplinary and Multidisciplinary Research in Computer Science, 2006

MPoolODMRP: An Extended PoolODMRP based on Multi-path Policy.
Proceedings of the Interdisciplinary and Multidisciplinary Research in Computer Science, 2006

2004
PatchPSMP: an extension of NSMP based on pool node.
Proceedings of the 9th IEEE Symposium on Computers and Communications (ISCC 2006), June 28, 2004

PatchPSMP: A New Multicast Protocol for Ad-Hoc Network.
Proceedings of the High Speed Networks and Multimedia Communications, 2004

A Fault-Tolerant Single-Chip Multiprocessor.
Proceedings of the Advances in Computer Systems Architecture, 9th Asia-Pacific Conference, 2004

2003
A comparison between the PoolODMRP and the PatchODMRP.
Proceedings of the 11th IEEE International Conference on Networks, 2003


  Loading...