Name
Playground
About
FAQ
GitHub
Playground
Shortest Path Finder
Community Detector
Connected Papers
Author Trending
Daniel P. Kennedy
Roland Zumkeller
Mostafa Salehi
Maximilian Dürr
Dan Graur
Liangliang Shang
Chen Ma
Barbara Aquilani
Gérard Chollet
Karen Elizabeth Cheng
Home
/
Author
/
WENBO SHI
Author Info
Open Visualization
Name
Affiliation
Papers
WENBO SHI
Univ British Columbia, Dept Elect & Comp Engn, Vancouver, BC V5Z 1M9, Canada
46
Collaborators
Citations
PageRank
105
171
21.33
Referers
Referees
References
555
994
429
Search Limit
100
994
Publications (46 rows)
Collaborators (100 rows)
Referers (100 rows)
Referees (100 rows)
Title
Citations
PageRank
Year
CoinLayering: An Efficient Coin Mixing Scheme for Large Scale Bitcoin Transactions
0
0.34
2022
Hash-balanced binary tree-based public auditing in vehicular edge computing and networks
0
0.34
2022
A Secure Spectrum Auction Scheme Without The Trusted Party Based On The Smart Contract
0
0.34
2021
Security Analysis Of A Lightweight Identity-Based Two-Party Authenticated Key Agreement Protocol For Iiot Environments
1
0.35
2021
Opcode sequence analysis of Android malware by a convolutional neural network
1
0.36
2020
Privacy-preserving Distributed Data Fusion Based on Attribute Protection
1
0.34
2019
Demand-Response-Based Distributed Preventive Control to Improve Short-Term Voltage Stability.
0
0.34
2018
A Privacy-Preserving, Decentralized and Functional Bitcoin E-Voting Protocol
0
0.34
2018
A novel valuation pruning optimization fuzzing test model based on mutation tree for industrial control systems.
0
0.34
2018
Lockcoin: a secure and privacy-preserving mix service for bitcoin anonymity.
0
0.34
2018
IoTChain: A Three-Tier Blockchain-based IoT Security Architecture.
0
0.34
2018
DMRS: an efficient dynamic multi-keyword ranked search over encrypted cloud data.
7
0.51
2017
Real-Time Energy Management In Microgrids
11
0.61
2017
Community-Level Geothermal Heat Pump System Management Via An Aggregation-Disaggregation Framework
0
0.34
2017
A Verifiable Sealed-Bid Multi-Qualitative-Attribute Based Auction Scheme in the Semi-Honest Model.
0
0.34
2017
Decentralized and Distributed Temperature Control via HVAC Systems in Energy Efficient Buildings.
1
0.36
2017
A privacy-preserving degree-matching multi-attribute auction scheme in smart grid auction market.
0
0.34
2017
Distributed Temperature Control Via Geothermal Heat Pump Systems In Energy Efficient Buildings
0
0.34
2017
Physics-Integrated Hierarchical/Distributed Hvac Optimization For Multiple Buildings With Robustness Against Time Delays
0
0.34
2017
Decentralized Temperature Control Via Hvac Systems In Energy Efficient Buildings: An Approximate Solution Procedure
0
0.34
2016
Entry and exit of service providers under cost uncertainty: a real options approach.
1
0.35
2016
A Secure Reverse Multi-Attribute First-Price E-Auction Mechanism Using Multiple Auctioneer Servers (Work in Progress).
0
0.34
2016
Integration of IEC 61850 into a Vehicle-to-Grid system with networked electric vehicles
0
0.34
2015
On the security of a certificateless online/offline signcryption for Internet of Things
7
0.56
2015
Performance optimization of the echo state network for time series prediction and spoken digit recognition
0
0.34
2015
Distributed Optimal Energy Management in Microgrids
23
1.31
2015
Cryptanalysis and improvement of a certificateless signcryption scheme without bilinear pairing
11
0.63
2014
Cryptanalysis and improvement of a DoS-resistant ID-based password authentication scheme without using smart card
0
0.34
2014
Optimal Residential Demand Response in Distribution Networks
24
1.29
2014
A distributed optimal energy management strategy for microgrids
2
0.44
2014
Evaluating microgrid management and control with an implementable energy management system
4
0.52
2014
A single-station location method based on long baseline interferometer
0
0.34
2014
Product Remanufacturing: A Real Options Approach
6
0.57
2014
Chaos characteristics analysis of transient signals for phase-locked synthesizer based FHC system
0
0.34
2014
Optimal power allocation for heterogeneous data traffic in NAF relay-assisted uplink transmission
0
0.34
2014
On the security of an authentication scheme for multi-server architecture
4
0.39
2013
A New User Authentication Protocol For Wireless Sensor Networks Using Elliptic Curves Cryptography
48
1.34
2013
An Energy-Efficient k-connected Scheme for Wireless Sensor Networks.
0
0.34
2011
MDS-Based Localization Algorithm for RFID Systems
8
1.19
2011
A Two-Phase Algorithm for Locating Sensors in Irregular Areas
0
0.34
2010
Efficient Password-Proven Key Exchange Protocol against Relay Attack on Ad Hoc Networks
0
0.34
2010
An Improved Fuzzy Identity-Based Encryption Scheme With Constant Size Ciphertext
2
0.37
2010
Energy-Efficient Location-Independent k -connected Scheme in Wireless Sensor Networks.
1
0.39
2008
Policy Negotiation System Architecture for Privacy Protection
5
0.60
2008
A provable secure authentication protocol given forward secure session key
3
0.41
2008
Short wavelength infrared images for indigenous coke-making sites monitoring in China
0
0.34
2005
1