Publications
Search

Publications :: Search

Show author

On this page you see the details of the selected author.

    Author information
    First name: Feng
    Last name: Bao
    DBLP: 46/1953
    Rating: (not rated yet)
    Bookmark:

    Below you find the publications which have been written by this author.

    Show item 1 to 25 of 241  
    Select a publication
    Show Title Venue Rating Date
    Conference paper
    Yongdong Wu, Zhigang Zhao, Feng Bao, Robert H. Deng.
    Software Puzzle: A Countermeasure to Resource-Inflated Denial-of-Service Attacks.
    IEEE Transactions on Information Forensics and Security 2015, Volume 10 (0) 2015
    Conference paper
    Yue Deng, Youyong Kong, Feng Bao, Qionghai Dai.
    Sparse Coding-Inspired Optimal Trading System for HFT Industry.
    IEEE Trans. Industrial Informatics 2015, Volume 11 (0) 2015
    Conference paper
    Chunhua Su, Jianying Zhou, Feng Bao, Tsuyoshi Takagi, Kouichi Sakurai.
    Collaborative agglomerative document clustering with limited information disclosure.
    Security and Communication Networks 2014, Volume 7 (0) 2014
    Conference paper
    Feng Deng, Feng Bao, Changchun Bao.
    Speech enhancement using generalized weighted β-order spectral amplitude estimator.
    Speech Communication 2014, Volume 59 (0) 2014
    Conference paper
    Feng Bao, Mao-shen Jia, Changchun Bao, Hui-jing Dou.
    Speech enhancement based on a novel weighting spectral distortion measure.
    Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, APSIPA 2014, Chiang Mai, Thailand, December 9-12, 2014 2014 (0) 2014
    Conference paper
    Feng Bao, Hui-jing Dou, Mao-shen Jia, Changchun Bao.
    A novel speech enhancement method using power spectra smooth in Wiener filtering.
    Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, APSIPA 2014, Chiang Mai, Thailand, December 9-12, 2014 2014 (0) 2014
    Conference paper
    Naoki Tanaka, Marianne Winslett, Adam J. Lee, David K. Y. Yau, Feng Bao.
    Insured access: an approach to ad-hoc information sharing for virtual organizations.
    Third ACM Conference on Data and Application Security and Privacy, CODASPY'13, San Antonio, TX, USA, February 18-20, 2013 2013 (0) 2013
    Conference paper
    Jin Han, Su Mon Kywe, Qiang Yan, Feng Bao, Robert H. Deng, Debin Gao, Yingjiu Li, Jianying Zhou.
    Launching Generic Attacks on iOS with Approved Third-Party Applications.
    Applied Cryptography and Network Security - 11th International Conference, ACNS 2013, Banff, AB, Canada, June 25-28, 2013. Proceedings 2013 (0) 2013
    Conference paper
    Yunjie Liu, Feng Bao, Zongmin Li, Hua Li.
    3D model retrieval based on 3D fractional fourier transform.
    Int. Arab J. Inf. Technol. 2013, Volume 10 (0) 2013
    Conference paper
    Feng Deng, Changchun Bao, Feng Bao.
    A speech enhancement method by coupling speech detection and spectral amplitude estimation.
    INTERSPEECH 2013, 14th Annual Conference of the International Speech Communication Association, Lyon, France, August 25-29, 2013 2013 (0) 2013
    Conference paper
    Na Li, Changchun Bao, Bingyin Xia, Feng Bao.
    Speech Intelligibility Improvement Using the Constraints on Speech Distortion and Noise Over-estimation.
    Ninth International Conference on Intelligent Information Hiding and Multimedia Signal Processing, IIH-MSP 2013, Beijing, China, October 16-18, 2013 2013 (0) 2013
    Conference paper
    Wen Tao Zhu, Jianying Zhou, Robert H. Deng, Feng Bao.
    Detecting node replication attacks in wireless sensor networks: A survey.
    J. Network and Computer Applications 2012, Volume 35 (0) 2012
    Conference paper
    Wen Tao Zhu, Jianying Zhou, Robert H. Deng, Feng Bao.
    Detecting node replication attacks in mobile sensor networks: theory and approaches.
    Security and Communication Networks 2012, Volume 5 (0) 2012
    Journal article
    Yanjiang Yang, Jianying Zhou, Robert H. Deng, Feng Bao.
    Better security enforcement in trusted computing enabled heterogeneous wireless sensor networks.
    Security and Communication Networks 2011, Volume 4 (0) 2011
    Journal article
    Kun Peng, Ed Dawson, Feng Bao.
    Modification and optimisation of a shuffling scheme: stronger security, formal analysis and higher efficiency.
    Int. J. Inf. Sec. 2011, Volume 10 (0) 2011
    Conference paper
    Feng Bao, Robert H. Deng, Xuhua Ding, Junzuo Lai, Yunlei Zhao.
    Hierarchical Identity-Based Chameleon Hash and Its Applications.
    Applied Cryptography and Network Security - 9th International Conference, ACNS 2011, Nerja, Spain, June 7-10, 2011. Proceedings 2011 (0) 2011
    Conference paper
    Wen Tao Zhu, Yang Xiang, Jianying Zhou, Robert H. Deng, Feng Bao.
    Secure localization with attack detection in wireless sensor networks.
    Int. J. Inf. Sec. 2011, Volume 10 (0) 2011
    Conference paper
    Feng Bao, Fengzhi Zhao.
    Study on the E-government Call Center System Based on SOA.
    Computer and Information Science 2011, Volume 4 (0) 2011
    Conference paper
    Joseph K. Liu, Feng Bao, Jianying Zhou.
    Short and Efficient Certificate-Based Signature.
    NETWORKING 2011 Workshops - International IFIP TC 6 Workshops, PE-CRN, NC-Pro, WCNS, and SUNSET 2011, Held at NETWORKING 2011, Valencia, Spain, May 13, 2011, Revised Selected Papers 2011 (0) 2011
    Conference paper
    Wen Tao Zhu, Robert H. Deng, Jianying Zhou, Feng Bao.
    Applying Time-Bound Hierarchical Key Assignment in Wireless Sensor Networks.
    Information and Communications Security - 13th International Conference, ICICS 2011, Beijing, China, November 23-26, 2011. Proceedings 2011 (0) 2011
    Conference paper
    Kun Peng, Feng Bao.
    Analysing a Batch Range Proof to Address a Security Concern.
    14th IEEE International Conference on Computational Science and Engineering, CSE 2011, Dalian, China, August 24-26, 2011 2011 (0) 2011
    Conference paper
    Joseph K. Liu, Feng Bao, Jianying Zhou.
    Short and Efficient Certificate-Based Signature.
    IACR Cryptology ePrint Archive 2011, Volume 2011 (0) 2011
    Journal article
    Huaqun Guo, Yongdong Wu, Feng Bao, Hongmei Chen, Maode Ma.
    UBAPV2G: A Unique Batch Authentication Protocol for Vehicle-to-Grid Communications.
    IEEE Trans. Smart Grid 2011, Volume 2 (0) 2011
    Conference paper
    Xin Liu, Changchun Bao, Liyan Zhang, Xingtao Zhang, Feng Bao, Bing Bu.
    Nonlinear bandwidth extension of audio signals based on hidden Markov model.
    2011 IEEE International Symposium on Signal Processing and Information Technology, ISSPIT 2011, Bilbao, Spain, December 14-17, 2011 2011 (0) 2011
    Conference paper
    Kun Zhang, Hong Zhang, Yongdong Wu, Feng Bao.
    Evaluating the importance of nodes in complex networks based on principal component analysis and grey relational analysis.
    Proceedings of the 17th IEEE International Conference on Networks, ICON 2011, Singapore, December 14-16, 2011 2011 (0) 2011
    Show item 1 to 25 of 241  

    Your query returned 241 matches in the database.