Publications
Search

Publications :: Search

Show author

On this page you see the details of the selected author.

    Author information
    First name: Feng
    Last name: Bao
    DBLP: 46/1953
    Rating: (not rated yet)
    Bookmark:

    Below you find the publications which have been written by this author.

    Show item 1 to 10 of 233  
    Select a publication
    Show Title Venue Rating Date
    Conference paper
    Chunhua Su, Jianying Zhou, Feng Bao, Tsuyoshi Takagi, Kouichi Sakurai.
    Collaborative agglomerative document clustering with limited information disclosure.
    Security and Communication Networks 2014, Volume 7 (0) 2014
    Conference paper
    Naoki Tanaka, Marianne Winslett, Adam J. Lee, David K. Y. Yau, Feng Bao.
    Insured access: an approach to ad-hoc information sharing for virtual organizations.
    Third ACM Conference on Data and Application Security and Privacy, CODASPY'13, San Antonio, TX, USA, February 18-20, 2013 2013 (0) 2013
    Conference paper
    Jin Han, Su Mon Kywe, Qiang Yan, Feng Bao, Robert H. Deng, Debin Gao, Yingjiu Li, Jianying Zhou.
    Launching Generic Attacks on iOS with Approved Third-Party Applications.
    Applied Cryptography and Network Security - 11th International Conference, ACNS 2013, Banff, AB, Canada, June 25-28, 2013. Proceedings 2013 (0) 2013
    Conference paper
    Yunjie Liu, Feng Bao, Zongmin Li, Hua Li.
    3D model retrieval based on 3D fractional fourier transform.
    Int. Arab J. Inf. Technol. 2013, Volume 10 (0) 2013
    Conference paper
    Feng Deng, Changchun Bao, Feng Bao.
    A speech enhancement method by coupling speech detection and spectral amplitude estimation.
    INTERSPEECH 2013, 14th Annual Conference of the International Speech Communication Association, Lyon, France, August 25-29, 2013 2013 (0) 2013
    Conference paper
    Na Li, Changchun Bao, Bingyin Xia, Feng Bao.
    Speech Intelligibility Improvement Using the Constraints on Speech Distortion and Noise Over-estimation.
    Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2013, Beijing, China, October 16-18, 2013 2013 (0) 2013
    Conference paper
    Wen Tao Zhu, Jianying Zhou, Robert H. Deng, Feng Bao.
    Detecting node replication attacks in wireless sensor networks: A survey.
    J. Network and Computer Applications 2012, Volume 35 (0) 2012
    Conference paper
    Wen Tao Zhu, Jianying Zhou, Robert H. Deng, Feng Bao.
    Detecting node replication attacks in mobile sensor networks: theory and approaches.
    Security and Communication Networks 2012, Volume 5 (0) 2012
    Journal article
    Yanjiang Yang, Jianying Zhou, Robert H. Deng, Feng Bao.
    Better security enforcement in trusted computing enabled heterogeneous wireless sensor networks.
    Security and Communication Networks 2011, Volume 4 (0) 2011
    Journal article
    Kun Peng, Ed Dawson, Feng Bao.
    Modification and optimisation of a shuffling scheme: stronger security, formal analysis and higher efficiency.
    Int. J. Inf. Sec. 2011, Volume 10 (0) 2011
    Show item 1 to 10 of 233  

    Your query returned 233 matches in the database.