default search action
Wenbin Yao
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j32]Zeyu Li, Wenbin Yao:
A two stage lightweight approach for intrusion detection in Internet of Things. Expert Syst. Appl. 257: 124965 (2024) - [j31]Xikang Zhu, Wenbin Yao, Wenhao Wang:
Load-aware task migration algorithm toward adaptive load balancing in Edge Computing. Future Gener. Comput. Syst. 157: 303-312 (2024) - [j30]Yingying Hou, Wenbin Yao, Xiaoyong Li, Yamei Xia, Mingqing Wang:
Lattice-Based Semantic-Aware Searchable Encryption for Internet of Things. IEEE Internet Things J. 11(17): 28370-28384 (2024) - [j29]Yue Pu, Wenbin Yao, Xiaoyong Li:
EM-IFCM: Fuzzy c-means clustering algorithm based on edge modification for imbalanced data. Inf. Sci. 659: 120029 (2024) - [j28]Yue Pu, Wenbin Yao, Xiaoyong Li, Adi Alhudhaif:
An adaptive highly improving the accuracy of clustering algorithm based on kernel density estimation. Inf. Sci. 663: 120187 (2024) - [j27]Donglei Rong, Sheng Jin, Wenbin Yao, Chengcheng Yang, Congcong Bai, Jeremie Adje Alagbe:
Hybrid Trajectory Planning for Connected and Autonomous Vehicle Considering Communication Spoofing Attacks. IEEE Trans. Intell. Transp. Syst. 25(9): 11961-11976 (2024) - [c64]Ziyi Wu, Juanjuan Luo, Mingxin Du, Shigang Li, Wenbin Yao, Zhibin Huang:
HE-ASR-IT: Hybrid Excitation and Adaptive Style Recombination for Unpaired Image-to-Image Translation. IJCNN 2024: 1-8 - [c63]Wenbin Yao, Youwei Hu, Wei Ji, Xinyi Shen, Sheng Jin:
Discretionary Lane-Changing Decision Making Framework Combining Cumulative Prospect Theory and Discrete Choice Model. IV 2024: 10-15 - 2023
- [j26]Jiayi Liu, Wenbin Yao, Chen Wang, Qinghai Yang:
Provisioning network slice for mobile content delivery in uncertain MEC environment. Comput. Networks 224: 109629 (2023) - [j25]Wenbin Yao, Bangli Pan, Yingying Hou, Xiaoyong Li, Yamei Xia:
An Adaptive Model Filtering Algorithm Based on Grubbs Test in Federated Learning. Entropy 25(5): 715 (2023) - [j24]Jianhua Yan, Xiuhua Lu, Muzi Li, Licheng Wang, Jingxian Zhou, Wenbin Yao:
Practical NTRU Signcryption in the Standard Model. Entropy 25(12): 1651 (2023) - [j23]Wenbin Yao, Zhuqing Wang, Yingying Hou, Xikang Zhu, Xiaoyong Li, Yamei Xia:
An energy-efficient load balance strategy based on virtual machine consolidation in cloud environment. Future Gener. Comput. Syst. 146: 222-233 (2023) - [j22]Xinzhe Wang, Wenbin Yao:
Research on Dynamic Task Scheduling of Transmission and Generation of Schedule Based on Improved Genetic Algorithm. J. Circuits Syst. Comput. 32(18): 2350318:1-2350318:25 (2023) - [j21]Wenbin Yao, Longcan Hu, Yingying Hou, Xiaoyong Li:
A Lightweight Intelligent Network Intrusion Detection System Using One-Class Autoencoder and Ensemble Learning for IoT. Sensors 23(8): 4141 (2023) - [c62]Yifeng Wang, Yamei Xia, Tianbo Lu, Xiaoyan Zhang, Wenbin Yao:
An Efficient Method based on Multi-view Semantic Alignment for Cross-view Geo-localization. IJCNN 2023: 1-8 - [c61]Qiaozhi Feng, Yamei Xia, Wenbin Yao, Tianbo Lu, Xiaoyan Zhang:
Malicious Relay Detection for Tor Network Using Hybrid Multi-Scale CNN-LSTM with Attention. ISCC 2023: 1242-1247 - [c60]Wenjun Kong, Yamei Xia, Wenbin Yao, Tianbo Lu:
A Joint Entity and Relation Extraction Approach Using Dilated Convolution and Context Fusion. NLPCC (1) 2023: 135-146 - [c59]Wenbin Yao, Jiayi Liu, Chen Wang, Qinghai Yang:
Learning-based RSU Placement for C-V2X with Uncertain Traffic Density and Task Demand. WCNC 2023: 1-6 - 2022
- [j20]Wenbin Yao, Mengyao Hao, Yingying Hou, Xiaoyong Li:
FASR: An Efficient Feature-Aware Deduplication Method in Distributed Storage Systems. IEEE Access 10: 15311-15321 (2022) - [j19]Wenbin Yao, Ke Guo, Yingying Hou, Xiaoyong Li:
Hierarchical Structure-Feature Aware Graph Neural Network for Node Classification. IEEE Access 10: 36846-36855 (2022) - [c58]Feng Jiang, Yamei Xia, Wenbin Yao, Tianbo Lu, Xiaoyan Zhang:
A Node-labeling-based Method for Evaluating the Anonymity of Tor Network. COMPSAC 2022: 773-778 - [c57]Wenbin Yao, Longcan Hu, Yingying Hou, Xiaoyong Li:
A Two-Layer Soft-Voting Ensemble Learning Model For Network Intrusion Detection. DSN Workshops 2022: 155-161 - 2021
- [c56]Ning Pan, Wenbin Yao, Xiaoyong Li:
Friends Recommendation Based on KBERT-CNN Text Classification Model. IJCNN 2021: 1-6 - [c55]Li Xue, Wenbin Yao, Yamei Xia, Xiaoyong Li:
Deep Attributed Network Embedding with Community Information. MMM (1) 2021: 653-665 - 2020
- [c54]Li Tan, Wenbin Yao, Xiaoyong Li:
Expanding Training Set for Graph-Based Semi-supervised Classification. DEXA (2) 2020: 245-258 - [c53]Chao Yang, Wenbin Yao, Xiaoyong Li:
Cross-Scale Correlation Stereo Network. IJCNN 2020: 1-6
2010 – 2019
- 2019
- [j18]Jianhua Yan, Licheng Wang, Muzi Li, Haseeb Ahmad, Jun Yue, Wenbin Yao:
Attribute-Based Signcryption From Lattices in the Standard Model. IEEE Access 7: 56039-56050 (2019) - [j17]Wenbin Yao, Yue Shen, Dongbin Wang:
A Weighted PageRank-Based Algorithm for Virtual Machine Placement in Cloud Computing. IEEE Access 7: 176369-176381 (2019) - [j16]Sheng-Yao Su, Wenbin Yao, Xiaoyong Li:
SORD: a new strategy of online replica deduplication in Cloud-P2P. Clust. Comput. 22(1): 1-23 (2019) - [j15]Sheng-Yao Su, Wenbin Yao, Baojun Qiao, Ming Zong, Xin He, Xiaoyong Li:
RRSD: A file replication method for ensuring data reliability and reducing storage consumption in a dynamic Cloud-P2P environment. Future Gener. Comput. Syst. 100: 844-858 (2019) - [j14]Xiaoyong Li, Jie Yuan, Erxia Li, Wenbin Yao, Junping Du:
Trust-Aware and Fast Resource Matchmaking for Personalized Collaboration Cloud Service. IEEE Trans. Netw. Serv. Manag. 16(3): 1240-1254 (2019) - [c52]Rui Xue, Huadong Ma, Huiyuan Fu, Wenbin Yao:
Person Search with Joint Detection, Segmentation and Re-identification. HCC 2019: 518-529 - [c51]Yuezhen Qi, Dongbin Wang, Wenbin Yao, Haifeng Li, Yuhua Cao:
Towards Multi-Controller Placement for SDN Based on Density Peaks Clustering. ICC 2019: 1-6 - [c50]Xiaosen Zeng, Dongbin Wang, Shuwen Han, Wenbin Yao, Zhao Wang, Rui Chen:
An Effective Load Balance Using Link Bandwidth for SDN-Based Data Centers. ICAIS (4) 2019: 256-265 - [c49]Wenbin Yao, Shan Wang, Huiyuan Fu:
Hippocampus Segmentation in MRI Using Side U-Net Model. ICONIP (3) 2019: 143-150 - [c48]Xiao-Jie Wang, Wenbin Yao, Huiyuan Fu:
A Convolutional Neural Network Pruning Method Based On Attention Mechanism. SEKE 2019: 343-452 - 2018
- [j13]Sheng-Yao Su, Wenbin Yao, Xiaoyong Li:
DARS: A dynamic adaptive replica strategy under high load Cloud-P2P. Future Gener. Comput. Syst. 78: 31-40 (2018) - [j12]Xiaoyong Li, Jie Yuan, Huadong Ma, Wenbin Yao:
Fast and Parallel Trust Computing Scheme Based on Big Data Analysis for Collaboration Cloud Service. IEEE Trans. Inf. Forensics Secur. 13(8): 1917-1931 (2018) - [j11]Xiaoyong Li, Huadong Ma, Wenbin Yao, Xiaolin Gui:
Data-Driven and Feedback-Enhanced Trust Computing Pattern for Large-Scale Multi-Cloud Collaborative Services. IEEE Trans. Serv. Comput. 11(4): 671-684 (2018) - [c47]Wenbin Yao, Yuanhao Ding, Xiaoyong Li:
LogoPhish: A New Two-Dimensional Code Phishing Attack Detection Method. ISPA/IUCC/BDCloud/SocialCom/SustainCom 2018: 231-236 - [c46]Wenbin Yao, Lijuan Zhang, Xiaoyong Li:
Maximizing Influence Propagation in Networks by User-Relational Iterative Ranking Algorithm. ISPA/IUCC/BDCloud/SocialCom/SustainCom 2018: 517-524 - [c45]Wenbin Yao, Yuanhao Ding, Xiaoyong Li:
Deep Learning for Phishing Detection. ISPA/IUCC/BDCloud/SocialCom/SustainCom 2018: 645-650 - [c44]Wenbin Yao, Yuhao Ding, Fangming Xu, Sheng Jin:
Analysis of cars' commuting behavior under license plate restriction policy: a case study in Hangzhou, China. ITSC 2018: 236-241 - [c43]Yanghu Guo, Wenbin Yao:
A container scheduling strategy based on neighborhood division in micro service. NOMS 2018: 1-6 - [c42]Yanghu Guo, Wenbin Yao:
Applying gated recurrent units pproaches for workload prediction. NOMS 2018: 1-6 - [c41]Fenfen Huang, Wenbin Yao:
Optimization on parametric model. NOMS 2018: 1-5 - [c40]Lin Qi, Wenbin Yao, Jingkun Chang:
A large scale transactional service selection approach based on skyline and ant colony optimization algorithm. NOMS 2018: 1-7 - 2017
- [j10]Jianhua Yan, Licheng Wang, Jing Li, Muzi Li, Yixan Yang, Wenbin Yao:
Pre-image sample algorithm with irregular Gaussian distribution and construction of identity-based signature. Concurr. Comput. Pract. Exp. 29(20) (2017) - [j9]Jingkun Chang, Wenbin Yao, Xiaoyong Li:
The design of a context-aware service system in intelligent transportation system. Int. J. Distributed Sens. Networks 13(10) (2017) - [j8]Jingkun Chang, Wenbin Yao, Xiaoyong Li:
A Context-Aware S-Health Service System for Drivers. Sensors 17(3): 609 (2017) - [c39]Yiwei Yang, Wenbin Yao, Dongbin Wang:
Ranking the Influence of Micro-blog Users Based on Activation Forwarding Relationship. CollaborateCom 2017: 383-393 - [c38]Wenbin Yao, Yiwei Yang, Dongbin Wang:
UR Rank: Micro-blog User Influence Ranking Algorithm Based on User Relationship. CollaborateCom 2017: 394-404 - [c37]Yijie Chen, Wenbin Yao:
Cloud Data Assured Deletion Based on Information Hiding and Secondary Encryption with Chaos Sequence. CollaborateCom 2017: 613-623 - [c36]Wenbin Yao, Yijie Chen, Dongbin Wang:
Cloud Multimedia Files Assured Deletion Based on Bit Stream Transformation with Chaos Sequence. ICA3PP 2017: 441-451 - [c35]Guoping Du, Wenbin Yao, Dongbin Wang, Xiaole Wen:
A Group-Based Replica Consistency Schema for Cloud Storage. ICCCS (1) 2017: 214-225 - [c34]Jinxia Dou, Wenbin Yao, Dongbin Wang:
A Credibility Evaluation Method in Opportunistic Networks. ICCCS (1) 2017: 385-397 - [c33]Wenying Bao, Wenbin Yao, Ming Zong, Dongbin Wang:
Cross-site Scripting Attacks on Android Hybrid Applications. ICCSP 2017: 56-61 - [c32]Lei Hao, Wenbin Yao, Chao Pei, Yuesheng Zhu:
Integrated metric learning with adaptive constraints for person re-identification. ICIP 2017: 161-165 - [c31]Erxin Wang, Wenbin Yao, Dongbin Wang:
Collaborative filtering recommendation algorithm optimization based on latent factor model clustering. ICNC-FSKD 2017: 1715-1719 - [c30]Wenbin Yao, Zhen Guo, Dongbin Wang:
An Energy Efficient Virtual Machine Placement Algorithm Based on Graph Partitioning in Cloud Data Center. ISPA/IUCC 2017: 412-416 - [c29]Hengfei Fan, Wenbin Yao:
A Trajectory Prediction Method with Sparsity Data. ISPA/IUCC 2017: 1261-1265 - [c28]Zhen Guo, Wenbin Yao, Dongbin Wang:
A Virtual Machine Migration Algorithm Based on Group Selection in Cloud Data Center. NPC 2017: 24-36 - [c27]Daiyin Wang, Wenbin Yao, Yuesheng Zhu:
A Novel Image Preprocessing Strategy for Foreground Extraction in Person Re-identification. PCM (1) 2017: 161-171 - [c26]Zhengbo Liu, Wenbin Yao, Dongbin Wang:
Implementing an Inference Engine for RDFS/OWL Constructs and User-Defined Rules in HBase. SKG 2017: 159-164 - 2016
- [c25]Yin Chen, Wenbin Yao, Ming Zong, Dongbin Wang:
An Effective Buffer Management Policy for Opportunistic Networks. CollaborateCom 2016: 242-251 - [c24]Zhenyu Weng, Wenbin Yao, Ziqiang Sun, Yuesheng Zhu:
Asymmetric distance for spherical hashing. ICIP 2016: 206-210 - [c23]Wenbin Yao, Zhenyu Weng, Yuesheng Zhu:
Diversity regularized metric learning for person re-identification. ICIP 2016: 4264-4268 - 2015
- [j7]Wenbin Yao, Zhen Wang, Ling Zhao, Xiang Yao:
基于云模型的灾难恢复能力评价方法研究 (Study on Disaster Recovery Capability Evaluation Approach Based on Cloud Model). 计算机科学 42(8): 152-156 (2015) - [j6]Jianhua Yan, Licheng Wang, Mianxiong Dong, Yixian Yang, Wenbin Yao:
Identity-based signcryption from lattices. Secur. Commun. Networks 8(18): 3751-3770 (2015) - [j5]Xiaoyong Li, Huadong Ma, Feng Zhou, Wenbin Yao:
T-Broker: A Trust-Aware Service Brokering Scheme for Multiple Cloud Collaborative Services. IEEE Trans. Inf. Forensics Secur. 10(7): 1402-1415 (2015) - [j4]Wenbin Yao, Si Han, Xiaoyong Li:
LKH++ Based Group Key Management Scheme for Wireless Sensor Network. Wirel. Pers. Commun. 83(4): 3057-3073 (2015) - [c22]Wenbin Yao, Liang Lu:
A Selection Algorithm of Service Providers for Optimized Data Placement in Multi-Cloud Storage Environment. ICYCSEE 2015: 81-92 - 2014
- [c21]Mengchao Song, Wenbin Yao:
OPUVRE: Overall Performance for Urban Vehicle Routing Environments. IOV 2014: 120-129 - 2013
- [c20]Wenbin Yao, Pengdi Ye:
Simdedup: A New Deduplication Scheme Based on Simhash. WAIM Workshops 2013: 79-88 - 2012
- [j3]Da Xiao, Yan Yang, Wenbin Yao, Chunhua Wu, Jianyi Liu, Yixian Yang:
Multiple-File Remote Data Checking for cloud storage. Comput. Secur. 31(2): 192-205 (2012) - [c19]Xiang Yao, Wenbin Yao:
A Trustworthy Storage Framework on the Cloud. ISCTCS 2012: 69-77 - [c18]Zhao Chen, Wenbin Yao, Cong Wang:
Security and Trust Model for Data Disaster-Recovery Service on the Cloud. ISCTCS 2012: 140-147 - [c17]Mingtao Lei, Wenbin Yao, Cong Wang:
A Trust-Based Data Backup Method on the Cloud. ISCTCS 2012: 178-185 - 2010
- [c16]Jianyi Liu, Cong Wang, Zhengyang Liu, Wenbin Yao:
Advertising Keywords Extraction from Web Pages. WISM 2010: 336-343
2000 – 2009
- 2009
- [c15]Da Xiao, Wenbin Yao, Chunhua Wu, Cong Wang, Yixian Yang:
VAOFS: A Verifiable Append-Only File System for Regulatory Compliance. GCC 2009: 325-330 - 2007
- [j2]Guohui Sun, Jing Jin, Wenbin Yao, Hongwen Yang:
A New Reduced-Complexity Decoding Algorithm for LDPC Codes. IEICE Trans. Commun. 90-B(7): 1835-1838 (2007) - [c14]Shaobin Cai, Wenbin Yao, Nianmin Yao, Yong Li, Guochang Gu:
Group-Based Key Management for Multicast of Ad Hoc Sensor Network. International Conference on Computational Science (3) 2007: 50-57 - [c13]Shaobin Cai, Nianmin Yao, Wenbin Yao, Yong Li, Guochang Gu:
Analysis of Local Route Maintenance for Ad Hoc Network. International Conference on Computational Science (3) 2007: 157-161 - [c12]Shaobin Cai, Jianping Wang, Guochang Gu, Wenbin Yao, Nianmin Yao:
Performance Analysis Group-Based Key Management. IMSCCS 2007: 330-336 - [c11]Nianmin Yao, Feng Gao, Shaobin Cai, Wenbin Yao:
A New Method of Performance Test for Network Storage. IMSCCS 2007: 416-420 - [c10]Chunna Cao, Wenbin Yao, Jun Ni, Shaobin Cai:
An Improved RED Algorithm with Combined of Queue Length and Sending-Rate Inspection. IMSCCS 2007: 421-424 - [c9]Linzhi Ning, Wenbin Yao, Jun Ni, Nianmin Yao:
Fault-Tolerance CMP Architecture based on SMT Technology. IMSCCS 2007: 425-429 - 2006
- [j1]Shaobin Cai, Nianmin Yao, Nianbin Wang, Wenbin Yao, Guochang Gu:
Multipath passive data acknowledgement on-demand multicast protocol. Comput. Commun. 29(11): 2074-2083 (2006) - [c8]Shaobin Cai, Wenbin Yao, Nianmin Yao, Guochang Gu:
MPoolODMRP: An Extended PoolODMRP based on Multi-path Policy. IMSCCS (2) 2006: 75-80 - [c7]Nianmin Yao, Wenbin Yao, Shaobin Cai, Jun Ni:
A New Scheduling Algorithm for Servers. IMSCCS (1) 2006: 639-643 - [c6]Wenbin Yao, Nianmin Yao, Shaobin Cai, Jun Ni:
Verification Environment for a SCMP Architecture. IMSCCS (2) 2006: 787-791 - [c5]Chaoguang Men, Yunlong Zhao, Wenbin Yao:
A Two-Phase Time-based Consistent Checkpointing Strategy. ITNG 2006: 518-523 - 2004
- [c4]Wenbin Yao, Dongsheng Wang, Weimin Zheng:
A Fault-Tolerant Single-Chip Multiprocessor. Asia-Pacific Computer Systems Architecture Conference 2004: 137-145 - [c3]Shao-Bin Cai, Xiao-Zong Yang, Wenbin Yao, Jing Zhao:
PatchPSMP: A New Multicast Protocol for Ad-Hoc Network. HSNMC 2004: 636-645 - [c2]Shaobin Cai, Xiao-Zong Yang, Wenbin Yao:
PatchPSMP: an extension of NSMP based on pool node. ISCC 2004: 208-213 - 2003
- [c1]Shaobin Cai, Xiao-Zong Yang, Wenbin Yao:
A comparison between the PoolODMRP and the PatchODMRP. ICON 2003: 729-735
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-09-21 23:38 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint