Wenbo He

According to our database1, Wenbo He authored at least 95 papers between 2002 and 2018.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Uplink-Downlink Duality for Integer-Forcing.
IEEE Trans. Information Theory, 2018

Dynamic Optimal Countermeasure Selection for Intrusion Response System.
IEEE Trans. Dependable Sec. Comput., 2018

A Fine-Grained Stateful Data Analytics Method Based on Resilient State Table.
IJSSCI, 2018

2017
PLP: Protecting Location Privacy Against Correlation Analyze Attack in Crowdsensing.
IEEE Trans. Mob. Comput., 2017

Compressive sensing based data quality improvement for crowd-sensing applications.
J. Network and Computer Applications, 2017

Boosting The Benefits of Hybrid SDN.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

Enhancing the effectiveness of traffic engineering in hybrid SDN.
Proceedings of the IEEE International Conference on Communications, 2017

Privacy aware web services in the cloud.
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017

A Content-Based Indexing Scheme for Large-Scale Unstructured Data.
Proceedings of the Third IEEE International Conference on Multimedia Big Data, 2017

A RST-based stateful data analytics within spark.
Proceedings of the 16th IEEE International Conference on Cognitive Informatics & Cognitive Computing, 2017

2016
Guest Editorial: Special Issue on Cyber-Physical Systems and Services.
IEEE Trans. Services Computing, 2016

Fast and Adaptive Continuous Scanning in Large-Scale RFID Systems.
IEEE/ACM Trans. Netw., 2016

Efficiently Estimating Statistics of Points of Interests on Maps.
IEEE Trans. Knowl. Data Eng., 2016

An Empirical Study of the Textual Content of Online Videos.
Int. J. Semantic Computing, 2016

PFO: A ParallelFriendly High Performance System for Online Query and Update of Nearest Neighbors.
CoRR, 2016

Uplink-Downlink Duality for Integer-Forcing.
CoRR, 2016

Achieving Consistent SDN Control With Declarative Applications.
Proceedings of the ACM SIGCOMM 2016 Conference, Florianopolis, Brazil, August 22-26, 2016, 2016

SafeCam: Analyzing intersection-related driver behaviors using multi-sensor smartphones.
Proceedings of the 2016 IEEE International Conference on Pervasive Computing and Communications, 2016

Integer-forcing source coding: Successive cancellation and source-channel duality.
Proceedings of the IEEE International Symposium on Information Theory, 2016

Cupid: Congestion-free consistent data plane update in software defined networks.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

CompoundEyes: Near-duplicate detection in large scale online video systems in the cloud.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

Consistent replication protocol for Named Data Networking.
Proceedings of the 24th IEEE International Conference on Network Protocols, 2016

Redactor: Reconcile network control with declarative control programs In SDN.
Proceedings of the 24th IEEE International Conference on Network Protocols, 2016

An Empirical Study of the Textual Content of Online Videos.
Proceedings of the IEEE Second International Conference on Multimedia Big Data, 2016

2015
Quality of experience and quality of protection provisions in emerging mobile networks [Guest Editorial].
IEEE Wireless Commun., 2015

Rumor Identification in Microblogging Systems Based on Users' Behavior.
IEEE Trans. Comput. Social Systems, 2015

End-to-end delay analysis for networked systems.
Frontiers of IT & EE, 2015

Collision Scheduling for Cellular Networks with Spatial Connectivity Constraints.
Proceedings of the IEEE 82nd Vehicular Technology Conference, 2015

M2SDN: Achieving multipath and multihoming in data centers with software defined networking.
Proceedings of the 23rd IEEE International Symposium on Quality of Service, 2015

Deco: False data detection and correction framework for participatory sensing.
Proceedings of the 23rd IEEE International Symposium on Quality of Service, 2015

Collision scheduling for cellular networks.
Proceedings of the IEEE International Symposium on Information Theory, 2015

Integer-forcing interference alignment: Iterative optimization via aligned lattice reduction.
Proceedings of the IEEE International Symposium on Information Theory, 2015

ScalaSEM: Scalable validation of SDN design with deployable code.
Proceedings of the 34th IEEE International Performance Computing and Communications Conference, 2015

Network intrusion detection and prevention middlebox management in SDN.
Proceedings of the 34th IEEE International Performance Computing and Communications Conference, 2015

SmartEye: Real-time and efficient cloud image sharing for disaster environments.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

PLP: Protecting Location Privacy Against Correlation-Analysis Attack in Crowdsensing.
Proceedings of the 44th International Conference on Parallel Processing, 2015

A Defense-Centric Model for Multi-step Attack Damage Cost Evaluation.
Proceedings of the 3rd International Conference on Future Internet of Things and Cloud, 2015

I know what you did on your smartphone: Inferring app usage over encrypted data traffic.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

Marlin: Taming the big streaming data in large scale video similarity search.
Proceedings of the 2015 IEEE International Conference on Big Data, 2015

Cloud-assisted distributed private data sharing.
Proceedings of the 6th ACM Conference on Bioinformatics, 2015

Dirty-paper integer-forcing.
Proceedings of the 53rd Annual Allerton Conference on Communication, 2015

2014
Delay analysis in practical wireless network coding.
Wireless Communications and Mobile Computing, 2014

Thwarting Wi-Fi Side-Channel Analysis through Traffic Demultiplexing.
IEEE Trans. Wireless Communications, 2014

Design and Implementation of Holistic Scheduling and Efficient Storage for FlexRay.
IEEE Trans. Parallel Distrib. Syst., 2014

A Tale of Three Social Networks: User Activity Comparisons across Facebook, Twitter, and Foursquare.
IEEE Internet Computing, 2014

Uplink-downlink duality for integer-forcing: Effective SINRs and iterative optimization.
Proceedings of the 2014 IEEE 15th International Workshop on Signal Processing Advances in Wireless Communications (SPAWC), 2014

Necklace: An efficient cuckoo hashing scheme for cloud storage services.
Proceedings of the IEEE 22nd International Symposium of Quality of Service, 2014

Uplink-downlink duality for integer-forcing.
Proceedings of the 2014 IEEE International Symposium on Information Theory, Honolulu, HI, USA, June 29, 2014

Detecting collusive cheating in online shopping systems through characteristics of social networks.
Proceedings of the 2014 Proceedings IEEE INFOCOM Workshops, Toronto, ON, Canada, April 27, 2014

Towards adaptive continuous scanning in large-scale RFID systems.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

NetMaster: Taming Energy Devourers on Smartphones.
Proceedings of the 43rd International Conference on Parallel Processing, 2014

An efficient sampling method for characterizing points of interests on maps.
Proceedings of the IEEE 30th International Conference on Data Engineering, Chicago, 2014

Generic Composite Counting in RFID Systems.
Proceedings of the IEEE 34th International Conference on Distributed Computing Systems, 2014

WiLoVe: A WiFi-coverage based Location Verification System in LBS.
Proceedings of the 9th International Conference on Future Networks and Communications (FNC'14) / The 11th International Conference on Mobile Systems and Pervasive Computing (MobiSPC'14) / Affiliated Workshops, 2014

2013
Application and analysis of multidimensional negative surveys in participatory sensing applications.
Pervasive and Mobile Computing, 2013

Why application errors drain battery easily?: a study of memory leaks in smartphone apps.
Proceedings of the Workshop on Power-Aware Computing and Systems, 2013

2012
Enhancing privacy in participatory sensing applications with multidimensional data.
Proceedings of the 2012 IEEE International Conference on Pervasive Computing and Communications, 2012

Data perturbation with state-dependent noise for participatory sensing.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

HOSA: Holistic scheduling and analysis for scalable fault-tolerant FlexRay design.
Proceedings of the IEEE INFOCOM 2012, Orlando, FL, USA, March 25-30, 2012, 2012

Dynamic Control of Electricity Cost with Power Demand Smoothing and Peak Shaving for Distributed Internet Data Centers.
Proceedings of the 2012 IEEE 32nd International Conference on Distributed Computing Systems, 2012

2011
PDA: Privacy-Preserving Data Aggregation for Information Collection.
TOSN, 2011

Location Cheating: A Security Challenge to Location-based Social Network Services
CoRR, 2011

EISM: An Efficient ID-based Signcryption Scheme for Multi-PKG Multihop Wireless Networks of Mobile Hosts.
Ad Hoc & Sensor Wireless Networks, 2011

Inferring users' online activities through traffic analysis.
Proceedings of the Fourth ACM Conference on Wireless Network Security, 2011

Phoenix: Peer-to-Peer Location Based Notification in Mobile Networks.
Proceedings of the IEEE 8th International Conference on Mobile Adhoc and Sensor Systems, 2011

KIPDA: k-indistinguishable privacy-preserving data aggregation in wireless sensor networks.
Proceedings of the INFOCOM 2011. 30th IEEE International Conference on Computer Communications, 2011

Defending Against Traffic Analysis in Wireless Networks through Traffic Reshaping.
Proceedings of the 2011 International Conference on Distributed Computing Systems, 2011

End-to-End Delay Analysis in Wireless Network Coding: A Network Calculus-Based Approach.
Proceedings of the 2011 International Conference on Distributed Computing Systems, 2011

Location Cheating: A Security Challenge to Location-Based Social Network Services.
Proceedings of the 2011 International Conference on Distributed Computing Systems, 2011

2010
Message propagation in ad-hoc-based proximity mobile social networks.
Proceedings of the Eigth Annual IEEE International Conference on Pervasive Computing and Communications, 2010

Anycast routing in mobile opportunistic networks.
Proceedings of the 15th IEEE Symposium on Computers and Communications, 2010

Reliability Calculus: A Theoretical Framework to Analyze Communication Reliability.
Proceedings of the 2010 International Conference on Distributed Computing Systems, 2010

2009
SMOCK: a scalable method of cryptographic key management for mission-critical wireless ad-hoc networks.
IEEE Trans. Information Forensics and Security, 2009

ChainFarm: A Novel Authentication Protocol for High-rate Any Source Probabilistic Broadcast.
Proceedings of the IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, 2009

Challenges Towards Elastic Power Management in Internet Data Centers.
Proceedings of the 29th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2009 Workshops), 2009

A Cluster-Based Protocol to Enforce Integrity and Preserve Privacy in Data Aggregation.
Proceedings of the 29th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2009 Workshops), 2009

Optimizing File Retrieval in Delay-Tolerant Content Distribution Community.
Proceedings of the 29th IEEE International Conference on Distributed Computing Systems (ICDCS 2009), 2009

2008
End-to-end delay control of multimedia applications over multihop wireless links.
TOMCCAP, 2008

ORTEGA: An Efficient and Flexible Online Fault Tolerance Architecture for Real-Time Control Systems.
IEEE Trans. Industrial Informatics, 2008

Alert propagation in mobile ad hoc networks.
Mobile Computing and Communications Review, 2008

MobileAds: advertisement on mobile devices.
SIGBED Review, 2008

Energy-Aware Server Provisioning and Load Dispatching for Connection-Intensive Internet Services.
Proceedings of the 5th USENIX Symposium on Networked Systems Design & Implementation, 2008

A Certificateless Signature Scheme for Mobile Wireless Cyber-Physical Systems.
Proceedings of the 28th IEEE International Conference on Distributed Computing Systems Workshops (ICDCS 2008 Workshops), 2008

2007
A scalable public key management scheme in wireless ad hoc networks.
Mobile Computing and Communications Review, 2007

SMOCK: A Self-Contained Public Key Management Scheme for Mission-Critical Wireless Ad Hoc Networks.
Proceedings of the Fifth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom 2007), 2007

PDA: Privacy-Preserving Data Aggregation in Wireless Sensor Networks.
Proceedings of the INFOCOM 2007. 26th IEEE International Conference on Computer Communications, 2007

Active queue management design using discrete-event control.
Proceedings of the 46th IEEE Conference on Decision and Control, 2007

2006
Optimal real-time sampling rate assignment for wireless sensor networks.
TOSN, 2006

An integrated solution to delay and security support in wireless networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2006

Impact of Upper Layer Adaptation on End-to-end Delay Management in Wireless Ad Hoc Networks.
Proceedings of the 12th IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS 2006), 2006

Experimental Validation of Middleware-based QoS Control in 802.11 Wireless Networks.
Proceedings of the 3rd International Conference on Broadband Communications, 2006

2005
Building Robust Wireless LAN for Industrial Control with DSSS-CDMA Cellphone Network Paradigm.
Proceedings of the 26th IEEE Real-Time Systems Symposium (RTSS 2005), 2005

A Feedback Control Scheme for Resource Allocation in Wireless Multi-hop Ad Hoc Networks.
Proceedings of the 2nd Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2005), 2005

2003
Optimal QoS Sampling Frequency Assignment for Real-Time Wireless Sensor Networks.
Proceedings of the 24th IEEE Real-Time Systems Symposium (RTSS 2003), 2003

2002
Generalized loop-back recovery in optical mesh networks.
IEEE/ACM Trans. Netw., 2002


  Loading...