Wenbo Shi

According to our database1, Wenbo Shi authored at least 51 papers between 2005 and 2018.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2018
Demand-Response-Based Distributed Preventive Control to Improve Short-Term Voltage Stability.
IEEE Trans. Smart Grid, 2018

A privacy-preserving, decentralized and functional Bitcoin e-voting protocol.
CoRR, 2018

IoTChain: A Three-Tier Blockchain-based IoT Security Architecture.
CoRR, 2018

A novel valuation pruning optimization fuzzing test model based on mutation tree for industrial control systems.
Appl. Soft Comput., 2018

2017
Real-Time Energy Management in Microgrids.
IEEE Trans. Smart Grid, 2017

DMRS: an efficient dynamic multi-keyword ranked search over encrypted cloud data.
Soft Comput., 2017

A privacy-preserving degree-matching multi-attribute auction scheme in smart grid auction market.
Personal and Ubiquitous Computing, 2017

Decentralized and Distributed Temperature Control via HVAC Systems in Energy Efficient Buildings.
CoRR, 2017

Distributed Temperature Control via Geothermal Heat Pump Systems in Energy Efficient Buildings.
CoRR, 2017

An Integrated Design of Optimization and Physical Dynamics for Energy Efficient Buildings: A Passivity Approach.
CoRR, 2017

A Verifiable Sealed-Bid Multi-Qualitative-Attribute Based Auction Scheme in the Semi-Honest Model.
IEEE Access, 2017

Community-level Geothermal Heat Pump system management via an aggregation-disaggregation framework.
Proceedings of the 56th IEEE Annual Conference on Decision and Control, 2017

Physics-integrated hierarchical/distributed HVAC optimization for multiple buildings with robustness against time delays.
Proceedings of the 56th IEEE Annual Conference on Decision and Control, 2017

Distributed temperature control via Geothermal Heat Pump systems in energy efficient buildings.
Proceedings of the 2017 American Control Conference, 2017

2016
Entry and exit of service providers under cost uncertainty: a real options approach.
JORS, 2016

A Secure Reverse Multi-Attribute First-Price E-Auction Mechanism Using Multiple Auctioneer Servers (Work in Progress).
Proceedings of the Provable Security, 2016

Improving AGC performance of a coal-fueled generators with MW-level BESS.
Proceedings of the 2016 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference, 2016

A Privacy-Preserving Online Reverse Multi-attributes Auction Scheme Based on Degree-Matching.
Proceedings of the Cloud Computing and Security - Second International Conference, 2016

Decentralized temperature control via HVAC systems in energy efficient buildings: An approximate solution procedure.
Proceedings of the 2016 IEEE Global Conference on Signal and Information Processing, 2016

2015
Distributed Optimal Energy Management in Microgrids.
IEEE Trans. Smart Grid, 2015

Postfix automata.
Theor. Comput. Sci., 2015

On the security of a certificateless online/offline signcryption for Internet of Things.
Peer-to-Peer Networking and Applications, 2015

A Dynamic Identity Based Authentication Scheme Using Chaotic Maps for Telecare Medicine Information Systems.
J. Medical Systems, 2015

Integration of IEC 61850 into a Vehicle-to-Grid system with networked electric vehicles.
Proceedings of the 2015 IEEE Power & Energy Society Innovative Smart Grid Technologies Conference, 2015

Performance optimization of the echo state network for time series prediction and spoken digit recognition.
Proceedings of the 11th International Conference on Natural Computation, 2015

2014
Product Remanufacturing: A Real Options Approach.
IEEE Trans. Engineering Management, 2014

Optimal Residential Demand Response in Distribution Networks.
IEEE Journal on Selected Areas in Communications, 2014

Cryptanalysis and improvement of a DoS-resistant ID-based password authentication scheme without using smart card.
IJICT, 2014

A provable secure sealed-bid multi-attribute auction scheme under semi-honest model.
Int. J. Communication Systems, 2014

Cryptanalysis and improvement of a certificateless signcryption scheme without bilinear pairing.
Frontiers Comput. Sci., 2014

A distributed optimal energy management strategy for microgrids.
Proceedings of the 2014 IEEE International Conference on Smart Grid Communications, 2014

Evaluating microgrid management and control with an implementable energy management system.
Proceedings of the 2014 IEEE International Conference on Smart Grid Communications, 2014

Chaos characteristics analysis of transient signals for phase-locked synthesizer based FHC system.
Proceedings of the 14th International Symposium on Communications and Information Technologies, 2014

A single-station location method based on long baseline interferometer.
Proceedings of the 14th International Symposium on Communications and Information Technologies, 2014

Optimal power allocation for heterogeneous data traffic in NAF relay-assisted uplink transmission.
Proceedings of the 14th International Symposium on Communications and Information Technologies, 2014

2013
A Study of Product Weight and Collection Rate in Closed-Loop Supply Chains With Recycling.
IEEE Trans. Engineering Management, 2013

A sealed-bid multi-attribute auction protocol with strong bid privacy and bidder privacy.
Security and Communication Networks, 2013

On the security of an authentication scheme for multi-server architecture.
IJESDF, 2013

A New User Authentication Protocol for Wireless Sensor Networks Using Elliptic Curves Cryptography.
IJDSN, 2013

2011
An Energy-Efficient k-connected Scheme for Wireless Sensor Networks.
Ad Hoc & Sensor Wireless Networks, 2011

Real-time vehicle-to-grid control algorithm under price uncertainty.
Proceedings of the IEEE Second International Conference on Smart Grid Communications, 2011

MDS-Based Localization Algorithm for RFID Systems.
Proceedings of IEEE International Conference on Communications, 2011

2010
An Improved Fuzzy Identity-Based Encryption Scheme With Constant Size Ciphertext.
JDCTA, 2010

A Two-Phase Algorithm for Locating Sensors in Irregular Areas.
Proceedings of the Global Communications Conference, 2010

Efficient Password-Proven Key Exchange Protocol against Relay Attack on Ad Hoc Networks.
Proceedings of the 5th IEEE Asia-Pacific Services Computing Conference, 2010

2008
Policy Negotiation System Architecture for Privacy Protection.
Proceedings of the NCM 2008, The Fourth International Conference on Networked Computing and Advanced Information Management, Gyeongju, Korea, September 2-4, 2008, 2008

Energy-Efficient Location-Independent k -connected Scheme in Wireless Sensor Networks.
Proceedings of the Wireless Sensor and Actor Networks II, 2008

A Provable Secure Authentication Protocol Given Forward Secure Session Key.
Proceedings of the Progress in WWW Research and Development, 2008

An Efficient Electronic Marketplace Bidding Auction Protocol with Bid Privacy.
Proceedings of the Progress in WWW Research and Development, 2008

2006
Efficient Nonce-Based Authentication Scheme Using Token-Update.
Proceedings of the Computational Science and Its Applications, 2006

2005
Short wavelength infrared images for indigenous coke-making sites monitoring in China.
Proceedings of the IEEE International Geoscience & Remote Sensing Symposium, 2005


  Loading...