default search action
Baosheng Wang
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j36]Cui Li, Rongmao Chen, Yi Wang, Qianqian Xing, Baosheng Wang:
REEDS: An Efficient Revocable End-to-End Encrypted Message Distribution System for IoT. IEEE Trans. Dependable Secur. Comput. 21(5): 4526-4542 (2024) - [c102]Enze Wang, Jianjun Chen, Wei Xie, Chuhan Wang, Yifei Gao, Zhenhua Wang, Haixin Duan, Yang Liu, Baosheng Wang:
Where URLs Become Weapons: Automated Discovery of SSRF Vulnerabilities in Web Applications. SP 2024: 239-257 - [i4]Zhenhua Wang, Wei Xie, Baosheng Wang, Enze Wang, Zhiwen Gui, Shuoyoucheng Ma, Kai Chen:
Foot In The Door: Understanding Large Language Model Jailbreaking via Cognitive Psychology. CoRR abs/2402.15690 (2024) - 2023
- [j35]Cong Zhou, Jing Tao, Baosheng Wang, Na Zhao:
iMon: Network Function Virtualisation Monitoring Based on a Unique Agent. IEICE Trans. Commun. 106(3): 230-240 (2023) - [j34]Zhenhao Luo, Pengfei Wang, Wei Xie, Xu Zhou, Baosheng Wang:
IoTSim: Internet of Things-Oriented Binary Code Similarity Detection with Multiple Block Relations. Sensors 23(18): 7789 (2023) - [j33]Qianqian Xing, Xiaofeng Wang, Xinyue Xu, Jiaqi Lin, Fei Wang, Cui Li, Baosheng Wang:
BRT: An Efficient and Scalable Blockchain-Based Revocation Transparency System for TLS Connections. Sensors 23(21): 8816 (2023) - [j32]Chenzhe Li, Zijun Xi, Gaofei Jin, Weichao Jiang, Baosheng Wang, Xiran Cai, Xiong Wang:
Deep-Learning-Enabled Microwave-Induced Thermoacoustic Tomography Based on ResAttU-Net for Transcranial Brain Hemorrhage Detection. IEEE Trans. Biomed. Eng. 70(8): 2350-2361 (2023) - [j31]Chenglong Li, Zonghui Li, Tao Li, Cunlu Li, Baosheng Wang:
A Deterministic Embedded End-System Tightly Coupled With TSN Schedule. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 42(11): 3707-3719 (2023) - [j30]Danjun Liu, Pengfei Wang, Xu Zhou, Wei Xie, Gen Zhang, Zhenhao Luo, Tai Yue, Baosheng Wang:
From Release to Rebirth: Exploiting Thanos Objects in Linux Kernel. IEEE Trans. Inf. Forensics Secur. 18: 533-548 (2023) - [c101]Cong Zhou, Baokang Zhao, Baosheng Wang:
cUPFCard: High-Performance User Plane Function based on FPGA. APNet 2023: 164-165 - [c100]Xianhe Zhang, Baosheng Wang:
Enhancing Children's Cultural Empowerment Through Participatory Game Design Based on Hometown Ceramic Culture. HCI (37) 2023: 105-114 - [c99]Xinliu Li, Baosheng Wang:
AgroEdu Through Co-crafting: Incorporating Minecraft into Co-design Activities for Agricultural Education. HCI (30) 2023: 619-630 - [c98]Jiaqi Liu, Peng Xun, Baosheng Wang:
Brownfield Measurement: A Practical Grey Failure Identification and Localization Method in Incremental Deployment Network. ICPADS 2023: 2395-2402 - [c97]Chenglong Li, Cunlu Li, Wenwen Fu, Tao Li, Baosheng Wang:
Poster Abstract: A Network-on-Chip Router Architecture for Industrial Internet-of-Thing Gateways. IPSN 2023: 302-303 - [c96]Baosheng Wang, Yijun Cui, Chongyan Gu, Chenghua Wang, Weiqiang Liu:
Novel Intrinsic Physical Unclonable Function Design for Post-quantum Cryptography. ISCAS 2023: 1-5 - [c95]Chenglong Li, Tao Li, Junnan Li, Wenwen Fu, Baosheng Wang:
DRA: Ultra-Low Latency Network I/O for TSN Embedded End-Systems. IWQoS 2023: 1-10 - [c94]Zhenhao Luo, Pengfei Wang, Baosheng Wang, Yong Tang, Wei Xie, Xu Zhou, Danjun Liu, Kai Lu:
VulHawk: Cross-architecture Vulnerability Detection with Entropy-based Binary Code Search. NDSS 2023 - 2022
- [j29]Yi Wang, Rongmao Chen, Chi Liu, Baosheng Wang, Yongjun Wang:
Asymmetric subversion attacks on signature and identification schemes. Pers. Ubiquitous Comput. 26(3): 849-862 (2022) - [j28]Yi Wang, Rongmao Chen, Xinyi Huang, Baosheng Wang:
Secure Anonymous Communication on Corrupted Machines With Reverse Firewalls. IEEE Trans. Dependable Secur. Comput. 19(6): 3837-3854 (2022) - [c93]Cong Zhou, Baokang Zhao, Baosheng Wang:
A 100Gbps User Plane Function Prototype Based on Programmable Switch for 5G Network. APNet 2022: 83-84 - [c92]Yuliang Lin, Rongmao Chen, Yi Wang, Baosheng Wang, Lin Liu:
Substitution Attacks Against Sigma Protocols. CSS 2022: 192-208 - [c91]Jiayao Wang, Ziling Wei, Baosheng Wang, Jincheng Zhong, Shuhui Chen:
FATSS: Filter-Assisted Tuple Space Search for Packet Classification. IPCCC 2022: 305-312 - [c90]Runhao Liu, Bo Yu, Baosheng Wang, Jianbin Ye:
Anatomist: Enhanced Firmware Vulnerability Discovery Based on Program State Abnormality Determination with Whole-System Replay. ISC 2022: 390-407 - [c89]Jiayao Wang, Ziling Wei, Baosheng Wang, Baokang Zhao, Jincheng Zhong:
Robust Packet Classification with Field Missing. LCN 2022: 395-398 - [c88]Cong Zhou, Baokang Zhao, Jing Tao, Baosheng Wang:
Applications of Reinforcement Learning in Virtual Network Function Placement: A Survey. MSN 2022: 871-876 - [c87]Jiayao Wang, Ziling Wei, Baosheng Wang, Shuhui Chen, Jincheng Zhong:
RTSS: Robust Tuple Space Search for Packet Classification. MSN 2022: 972-977 - [c86]Runhao Liu, Bo Yu, Baosheng Wang, Jianbin Ye, Jianxin Huang, Xiangdong Kong:
SEEKER: A Root Cause Analysis Method Based on Deterministic Replay for Multi-Type Network Protocol Vulnerabilities. TrustCom 2022: 131-138 - [c85]Wei Xie, Jiongyi Chen, Zhenhua Wang, Chao Feng, Enze Wang, Yifei Gao, Baosheng Wang, Kai Lu:
Game of Hide-and-Seek: Exposing Hidden Interfaces in Embedded Web Applications of IoT Devices. WWW 2022: 524-532 - 2021
- [j27]Jianian Li, Baosheng Wang, Dajun Zhang, Chenzhe Li, Yihui Zhu, Yi Zou, Baile Chen, Tao Wu, Xiong Wang:
A Preclinical System Prototype for Focused Microwave Breast Hyperthermia Guided by Compressive Thermoacoustic Tomography. IEEE Trans. Biomed. Eng. 68(7): 2289-2300 (2021) - [c84]Chen Duan, Wei Peng, Baosheng Wang:
CO-BPG: A Centralized Optimizer for Routing in BGP-Based Data Center Networks. AINA (1) 2021: 307-319 - [c83]Yi Su, Baosheng Wang, Qianqian Xing, Xiaofeng Wang:
DISCA: Decentralized Infrastructure for Secure Community Attribute certifying. AISS 2021: 38:1-38:8 - [c82]Yi Wang, Rongmao Chen, Xinyi Huang, Jianting Ning, Baosheng Wang, Moti Yung:
Identity-Based Encryption for Fair Anonymity Applications: Defining, Implementing, and Applying Rerandomizable RCCA-Secure IBE. ASIACRYPT (2) 2021: 427-455 - [c81]Yi Wang, Rongmao Chen, Guomin Yang, Xinyi Huang, Baosheng Wang, Moti Yung:
Receiver-Anonymity in Rerandomizable RCCA-Secure Cryptosystems Resolved. CRYPTO (4) 2021: 270-300 - [c80]Yi Su, Baosheng Wang, Qianqian Xing, Pengkun Li, Xiaofeng Wang, Cui Li:
Research on Blockchain-Based Inter-Domain Routing Authentication Technology. ICCT 2021: 810-816 - [c79]Cong Zhou, Baokang Zhao, Baosheng Wang, Yulei Yuan:
CeUPF: Offloading 5G User Plane Function to Programmable Hardware Base on Co-existence Architecture. ICEA 2021: 34-39 - [c78]Lusha Mo, Gaofeng Lv, Baosheng Wang, Guanjie Qiao, Jing Tan:
The Design and Implementation of an Efficient Quaternary Network Flow Watermark Technology. MSN 2021: 746-751 - [i3]Yi Wang, Rongmao Chen, Guomin Yang, Xinyi Huang, Baosheng Wang, Moti Yung:
Receiver-Anonymity in Rerandomizable RCCA-Secure Cryptosystems Resolved. IACR Cryptol. ePrint Arch. 2021: 862 (2021) - [i2]Yi Wang, Rongmao Chen, Xinyi Huang, Jianting Ning, Baosheng Wang, Moti Yung:
Identity-Based Encryption for Fair Anonymity Applications: Defining, Implementing, and Applying Rerandomizable RCCA-secure IBE. IACR Cryptol. ePrint Arch. 2021: 1261 (2021) - 2020
- [j26]Zilin Shi, Hui Yang, Junnan Li, Chenglong Li, Tao Li, Baosheng Wang:
MsBV: A Memory Compression Scheme for Bit-Vector-Based Classification Lookup Tables. IEEE Access 8: 38673-38681 (2020) - [j25]Lei Hong, Baosheng Wang, Xiaolan Yang, Yuguo Wang, Zhong Lin:
Offline programming method and implementation of industrial robot grinding based on VTK. Ind. Robot 47(4): 547-557 (2020) - [j24]Sirui Peng, Biao Han, Celimuge Wu, Baosheng Wang:
A Secure Communication System in Self-Organizing Networks via Lightweight Group Key Generation. IEEE Open J. Comput. Soc. 1: 182-192 (2020) - [j23]Biao Han, Sirui Peng, Celimuge Wu, Xiaoyan Wang, Baosheng Wang:
LoRa-Based Physical Layer Key Generation for Secure V2V/V2I Communications. Sensors 20(3): 682 (2020) - [c77]Jiaxin Xu, Baosheng Wang:
Efficacy of VR-Based Reminiscence Therapy in Improving Autobiographical Memory for Chinese Patients with AD. AHFE (3) 2020: 339-349 - [c76]Chenglong Li, Tao Li, Junnan Li, Zilin Shi, Baosheng Wang:
Update Latency Optimization of Packet Classification for SDN Switch on FPGA. FCCM 2020: 213 - [c75]Li Ding, Biao Han, Xiaoyan Wang, Peng Li, Baosheng Wang:
Distributed Intelligence Empowered Data Aggregation and Distribution for Multi-robot Cooperative Communication. INFOCOM Workshops 2020: 622-627 - [c74]Zhu Tang, Sudan Li, Peng Xun, Chengsong Wang, Wenping Deng, Baosheng Wang:
Demo Abstract: AutoPCT: An Agile Protocol Conformance Automatic Test Platform Based on Editable EFSM. INFOCOM Workshops 2020: 1286-1287 - [c73]Biao Han, Li Ding, Yusheng Ji, Xiaoyan Wang, Baosheng Wang:
A TORA-based Wireless Protocol for MANET with Low Routing Overhead at Link Layer. MASS 2020: 283-291
2010 – 2019
- 2019
- [j22]Baosheng Wang, Yi Wang, Rongmao Chen:
A Practical Authentication Framework for VANETs. Secur. Commun. Networks 2019: 4752612:1-4752612:11 (2019) - [j21]Zhenhao Luo, Wei Xie, Baosheng Wang, Yong Tang, Qianqian Xing:
EasyStego: Robust Steganography Based on Quick-Response Barcodes for Crossing Domains. Symmetry 11(2): 222 (2019) - [c72]Gantian Bian, Baosheng Wang:
The Design of a WebGL-Based 3D Virtual Roaming System for the "Batu Hitam" Shipwreck. AHFE (22) 2019: 224-232 - [c71]Tiantian Tan, Baosheng Wang, Yong Tang, Xu Zhou:
An Improved K-means Algorithm for Test Case Optimization. ICCCS 2019: 169-172 - [c70]Tiantian Tan, Baosheng Wang, Yong Tang, Xu Zhou:
An Improved Sequence Alignment Method for Fuzzing. ICCCS 2019: 347-350 - [c69]Tiantian Tan, Baosheng Wang, Yong Tang, Xu Zhou:
Crash Analysis Mechanisms in Vulnerability Mining Research. ICCCS 2019: 355-359 - [c68]Zhu Tang, Sudan Li, Peng Xun, Wenping Deng, Baosheng Wang:
Security enhancement for MPLS data-plane forwarding based on dynamic signature label calculation. ComComAP 2019: 327-332 - [c67]Tiantian Tan, Baosheng Wang, Haitao Zhang, Guangxuan Chen, Junbin Wang, Yong Tang, Xu Zhou:
A New Quantitative Evaluation Method for Fuzzing. ICAIS (2) 2019: 181-190 - [c66]Biao Han, Sirui Peng, Xiaoyan Wang, Baosheng Wang:
Distributed Physical Layer Key Generation for Secure LPWAN Communication. ICPADS 2019: 225-232 - [c65]Chenglong Li, Tao Li, Junnan Li, Hui Yang, Baosheng Wang:
A Memory Optimized Architecture for Multi-Field Packet Classification (Brief Announcement). SPAA 2019: 395-397 - 2018
- [j20]Wei Han, Baosheng Wang, Zhenqian Feng, Baokang Zhao, Wanrong Yu, Zhu Tang:
Exploring the Gateway-Based Distributed Location Management Schemes in LEO Satellite Networks. IEICE Trans. Commun. 101-B(3): 825-834 (2018) - [j19]Qianqian Xing, Baosheng Wang, Xiaofeng Wang:
BGPcoin: Blockchain-Based Internet Number Resource Authority and BGP Security Solution. Symmetry 10(9): 408 (2018) - [c64]Fangyu Gai, Baosheng Wang, Wenping Deng, Wei Peng:
Proof of Reputation: A Reputation-Based Consensus Protocol for Peer-to-Peer Network. DASFAA (2) 2018: 666-681 - [c63]Tiantian Tan, Baosheng Wang, Zhou Xu, Yong Tang:
The New Progress in the Research of Binary Vulnerability Analysis. ICCCS (2) 2018: 265-276 - [c62]Tiantian Tan, Baosheng Wang, Zhou Xu, Yong Tang:
The New Progress in the Research of Binary Vulnerability Exploits. ICCCS (2) 2018: 277-286 - [c61]Danjun Liu, Yong Tang, Baosheng Wang, Wei Xie, Bo Yu:
Automated Vulnerability Detection in Embedded Devices. IFIP Int. Conf. Digital Forensics 2018: 313-329 - [c60]Danjun Liu, Jingyuan Wang, Zelin Rong, Xianya Mi, Fangyu Gai, Yong Tang, Baosheng Wang:
Pangr: A Behavior-Based Automatic Vulnerability Detection and Exploitation Framework. TrustCom/BigDataSE 2018: 705-712 - [c59]Danjun Liu, Yao Li, Yong Tang, Baosheng Wang, Wei Xie:
VMPBL: Identifying Vulnerable Functions Based on Machine Learning Combining Patched Information and Binary Comparison Technique by LCS. TrustCom/BigDataSE 2018: 800-807 - [c58]Weiqi Zhang, Baosheng Wang, Wenping Deng, Hao Zeng:
Network Control for Large-Scale Container Clusters. WASA 2018: 827-833 - 2017
- [j18]Yue-Bin Luo, Baosheng Wang, Xiaofeng Wang, Bo-Feng Zhang, Wei Hu:
RPAH: A Moving Target Network Defense Mechanism Naturally Resists Reconnaissances and Attacks. IEICE Trans. Inf. Syst. 100-D(3): 496-510 (2017) - [j17]Wei Han, Baosheng Wang, Zhenqian Feng, Baokang Zhao, Wanrong Yu, Zhu Tang:
Exploring the Reliable Multicast Transport of BGP in Geostationary Satellite Networks Based on Network Coding. IEICE Trans. Commun. 100-B(4): 627-637 (2017) - [j16]Yue-Bin Luo, Baosheng Wang, Xiaofeng Wang, Bo-Feng Zhang:
A keyed-hashing based self-synchronization mechanism for port address hopping communication. Frontiers Inf. Technol. Electron. Eng. 18(5): 719-728 (2017) - [j15]Liu Liu, Baosheng Wang, Bo Yu, Qiuxi Zhong:
Automatic malware classification and new malware detection using machine learning. Frontiers Inf. Technol. Electron. Eng. 18(9): 1336-1347 (2017) - [j14]Guilin Cai, Baosheng Wang, Qianqian Xing:
Game theoretic analysis for the mechanism of moving target defense. Frontiers Inf. Technol. Electron. Eng. 18(12): 2017-2034 (2017) - [c57]Qianqian Xing, Baosheng Wang, Xiaofeng Wang:
POSTER: BGPCoin: A Trustworthy Blockchain-based Resource Management Solution for BGP Security. CCS 2017: 2591-2593 - [c56]Hao Zeng, Baosheng Wang, Wenping Deng, Xianming Gao:
CENTRA: CENtrally Trusted Routing vAlidation for IGP. CyberC 2017: 21-24 - [c55]Hao Zeng, Baosheng Wang, Wenping Deng, Weiqi Zhang:
Measurement and Evaluation for Docker Container Networking. CyberC 2017: 105-108 - [c54]Hao Zeng, Xianming Gao, Baosheng Wang:
POPBrick: A High-Elasticity, Reconfigurable Network Infrastructure to Support POP Applications. CyberC 2017: 109-112 - [c53]Qianqian Xing, Baosheng Wang, Xiaofeng Wang, Yong Tang, Yi Wang:
Deja Q Encore RIBE: Anonymous Revocable Identity-Based Encryption with Short Parameters. GLOBECOM 2017: 1-6 - [c52]Liu Liu, Baosheng Wang:
Automatic Malware Detection Using Deep Learning Based on Static Analysis. ICPCSEE (1) 2017: 500-507 - [c51]Hao Zeng, Baosheng Wang, Wenping Deng, Junxing Tang:
A Prototype for Analyzing the Internet Routing System Based on Spark and Docker. SC² 2017: 267-270 - [c50]Yao Li, Weiyang Xu, Yong Tang, Xianya Mi, Baosheng Wang:
SemHunt: Identifying Vulnerability Type with Double Validation in Binary Code. SEKE 2017: 491-494 - [c49]Qianqian Xing, Baosheng Wang, Xiaofeng Wang, Jing Tao, Liu Liu:
A Practical Anti-Collusion Hierarchical Identity-Based Non-interactive Key Agreement for Wireless Networks. TrustCom/BigDataSE/ICESS 2017: 89-95 - [c48]Xianming Gao, Baosheng Wang, Wenping Deng:
Software Defined Routing System. WASA 2017: 617-628 - [c47]Zhu Tang, Yuexian Zhou, Wenping Deng, Baosheng Wang:
LISP-HNM: Integrated fast host and network mobility control in LISP networks. WiOpt 2017: 1-6 - 2016
- [j13]Xianming Gao, Baosheng Wang, Hua-Wei Xue, Jing Tao:
On flow isolation mechanism for different applications in NFV controller. Int. J. High Perform. Syst. Archit. 6(3): 179-186 (2016) - [j12]Zhihong Liu, Qi Zhang, Raouf Boutaba, Yaping Liu, Baosheng Wang:
OPTIMA: On-Line Partitioning Skew Mitigation for MapReduce with Resource Adjustment. J. Netw. Syst. Manag. 24(4): 859-883 (2016) - [j11]Gui-Lin Cai, Baosheng Wang, Wei Hu, Tianzuo Wang:
Moving target defense: state of the art and characteristics. Frontiers Inf. Technol. Electron. Eng. 17(11): 1122-1153 (2016) - [j10]Xianming Gao, Baosheng Wang, Xiaozhe Zhang:
VR-Cluster: Dynamic Migration for Resource Fragmentation Problem in Virtual Router Platform. Sci. Program. 2016: 3976965:1-3976965:14 (2016) - [c46]Guilin Cai, Baosheng Wang, Yue-Bin Luo, Wei Hu:
A Model for Evaluating and Comparing Moving Target Defense Techniques Based on Generalized Stochastic Petri Net. ACA 2016: 184-197 - [c45]Qianqian Xing, Baosheng Wang, Xiaofeng Wang, Peixin Chen, Bo Yu, Yong Tang, Xianming Gao:
Unbounded Revocable Hierarchical Identity-Based Encryption with Adaptive-ID Security. HPCC/SmartCity/DSS 2016: 430-437 - [c44]Liu Liu, Baosheng Wang, Bo Yu, Qiuxi Zhong:
A Novel Selective Ensemble Learning Based on K-means and Negative Correlation. ICCCS (2) 2016: 578-588 - [c43]Wei Han, Baosheng Wang, Zhenqian Feng, Baokang Zhao, Wanrong Yu:
Distributed mobility management in IP/LEO satellite networks. ICSAI 2016: 691-695 - [c42]Liu Liu, Baosheng Wang:
Malware classification using gray-scale images and ensemble learning. ICSAI 2016: 1018-1022 - 2015
- [j9]Xianming Gao, Baosheng Wang, Xu An Wang, Xiaozhe Zhang:
FE-brick: Re-definition and Re-design of FE Model in Next-Generation Router Architecture. J. Interconnect. Networks 15(3-4): 1540001:1-1540001:16 (2015) - [j8]Xiaofeng Wang, Jinshu Su, Baosheng Wang, Guojun Wang, Ho-fung Leung:
Trust Description and Propagation System: Semantics and axiomatization. Knowl. Based Syst. 90: 81-91 (2015) - [c41]Shicong Ma, Baosheng Wang, Xianming Gao, Xiaozhe Zhang:
Two-Tier Model for Supporting Network Functions Virtualization with FoCES. 3PGCIC 2015: 121-126 - [c40]Xianming Gao, Baosheng Wang, Xiaozhe Zhang, Xu An Wang:
Software Data Plane and Flow Switching Plane Separation in Next-Generation Router Architecture. 3PGCIC 2015: 194-199 - [c39]Shicong Ma, Baosheng Wang, Xianming Gao, Xiaozhe Zhang:
A Sharing-Memory Based Ring Framework. ICA3PP (Workshops and Symposiums) 2015: 364-369 - [c38]Xianming Gao, Baosheng Wang, Xiaozhe Zhang, Shicong Ma:
Evaluation and Analysis of Three Typical Resource Allocation Algorithms in Virtual Router Platform. ICA3PP (4) 2015: 549-568 - [c37]Shuwei Wang, Baosheng Wang, Yong Tang, Bo Yu:
Malware Clustering Based on SNN Density Using System Calls. ICCCS 2015: 181-191 - [c36]Shicong Ma, Baosheng Wang, Xiaozhe Zhang, Xianming Gao:
PDNI: A Distributed Framework for NFV Infrastructure. PAAP 2015: 34-40 - [c35]Yue-Bin Luo, Baosheng Wang, Xiaofeng Wang, Xiao-Feng Hu, Gui-Lin Cai, Hao Sun:
RPAH: Random Port and Address Hopping for Thwarting Internal and External Adversaries. TrustCom/BigDataSE/ISPA (1) 2015: 263-270 - 2014
- [j7]Yifan Zhang, Gexin Yu, Qun Li, Haodong Wang, Xiaojun Zhu, Baosheng Wang:
Channel-Hopping-Based Communication Rendezvous in Cognitive Radio Networks. IEEE/ACM Trans. Netw. 22(3): 889-902 (2014) - [c34]Feng Zhao, Yaping Liu, Baosheng Wang:
DROUND: Direct routing on unique network-layer identifier. ICUFN 2014: 328-333 - [c33]Xianming Gao, Xiaozhe Zhang, Baosheng Wang, Huiting Shi:
An Improved Authorization Model in Trust Network. SecureComm (2) 2014: 10-16 - [c32]Shicong Ma, Baosheng Wang, Xiaozhe Zhang, Tao Li:
An Evolving Architecture for Network Virtualization. TRIDENTCOM 2014: 379-386 - 2013
- [j6]Yaping Liu, Zhihong Liu, Baosheng Wang, Qianming Yang:
SIR: A Secure Identifier-Based Inter-Domain Routing for Identifier/Locator Split Network. IEICE Trans. Commun. 96-B(7): 1742-1752 (2013) - [j5]Feng Zhao, Baosheng Wang, Xiaofeng Hu, Wei Peng, Chunqing Wu:
Understanding the Influence of Network Topology and Network-layer Naming on the Scalability of Routing. J. Commun. 8(10): 672-680 (2013) - [j4]Dan Cao, Baokang Zhao, Jinshu Su, Baosheng Wang, Xiaofeng Wang:
A privacy preserving authentication scheme with flexible identity revocation in people-centric sensing. Math. Comput. Model. 58(5-6): 1175-1188 (2013) - [c31]Shuo Zhang, Yaping Liu, Baosheng Wang, Ruixin Zhang:
A Novel Resource Allocation Algorithm for a Heterogeneous Data Center. ICISA 2013: 1-4 - [c30]Shuo Zhang, Baosheng Wang, Baokang Zhao, Zhenghu Gong, Jing Tao:
A Novel Resource Allocation Heuristic for a Power Constrained Data Center. NBiS 2013: 255-260 - [c29]Shuo Zhang, Baosheng Wang, Baokang Zhao, Jing Tao:
An Energy-Aware Task Scheduling Algorithm for a Heterogeneous Data Center. TrustCom/ISPA/IUCC 2013: 1471-1477 - 2012
- [c28]Yaping Liu, Shuo Zhang, Baosheng Wang:
MR-PBGP: A Multi-Root Tree Model for Parallel BGP. HPCC-ICESS 2012: 1211-1218 - [c27]Feng Zhao, Dan Zhao, Xiaofeng Hu, Wei Peng, Baosheng Wang, Zexin Lu:
A 3N Approach to Network Control and Management. IPDPS Workshops 2012: 1237-1242 - 2011
- [c26]Xiaozhe Zhang, Xicheng Lu, Jinshu Su, Baosheng Wang, Zexin Lu:
SDBGP: A scalable, distributed BGP routing protocol implementation. HPSR 2011: 191-196 - [c25]Wei Chen, Weixia Xu, Zhiying Wang, Qiang Dou, Yongwen Wang, Baokang Zhao, Baosheng Wang:
A Formalization of an Emulation Based Co-designed Virtual Machine. IMIS 2011: 164-168 - [c24]Jing Tao, Baosheng Wang:
Towards Practical IPSec over Challenged Networks. IMIS 2011: 398-402 - [c23]Fengyuan Xu, Zhengrui Qin, Chiu C. Tan, Baosheng Wang, Qun Li:
IMDGuard: Securing implantable medical devices with the external wearable guardian. INFOCOM 2011: 1862-1870 - [c22]Yifan Zhang, Qun Li, Gexin Yu, Baosheng Wang:
ETCH: Efficient Channel Hopping for communication rendezvous in dynamic spectrum access networks. INFOCOM 2011: 2471-2479 - [c21]Hui Wang, Zhigang Sun, Baosheng Wang, Hua Zhang, Li Liu:
A Point-to-Multipoint Distribution Mechanism for IPTV Video Network. NAS 2011: 214-219 - [c20]Baosheng Wang, Jayalakshmi Rajaraman, Kanwaldeep Sobti, Derrick Losli, Jeff Rearick:
Structural tests of slave clock gating in low-power flip-flop. VTS 2011: 254-259 - 2010
- [c19]Mahmut Yilmaz, Baosheng Wang, Jayalakshmi Rajaraman, Tom Olsen, Kanwaldeep Sobti, Dwight Elvey, Jeff Fitzgerald, Grady Giles, Wei-Yu Chen:
The scan-DFT features of AMD's next-generation microprocessor core. ITC 2010: 39-48
2000 – 2009
- 2008
- [c18]Hong Wang, Zhenghu Gong, Qing Guan, Baosheng Wang:
Detection Network Anomalies Based on Packet and Flow Analysis. ICN 2008: 497-502 - [c17]Wei Cheng, Kai Xing, Xiuzhen Cheng, Xicheng Lu, Zexin Lu, Jinshu Su, Baosheng Wang, Yujun Liu:
Route recovery in vertex-disjoint multipath routing for many-to-one sensor networks. MobiHoc 2008: 209-220 - 2007
- [j3]Qiang Xu, Baosheng Wang, André Ivanov, Fung Yu Young:
Test scheduling for built-in self-tested embedded SRAMs with data retention faults. IET Comput. Digit. Tech. 1(3): 256-264 (2007) - [c16]Feng Zhao, Xicheng Lu, Baosheng Wang, Peidong Zhu:
Evaluating Internal BGP Networks from the Data Plane. Networking 2007: 1192-1195 - [c15]Feng Zhao, Peidong Zhu, Meng Wang, Baosheng Wang:
Optimizing Network Configurations Based on Potential Profit Loss. SNPD (1) 2007: 327-332 - [i1]Baosheng Wang, Yuejian Wu, André Ivanov:
A Fast Diagnosis Scheme for Distributed Small Embedded SRAMs. CoRR abs/0710.4655 (2007) - 2006
- [j2]Josh Yang, Baosheng Wang, Yuejian Wu, André Ivanov:
Fast detection of data retention faults and other SRAM cell open defects. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 25(1): 167-180 (2006) - [c14]Baosheng Wang, Qiang Xu:
Test/Repair Area Overhead Reduction for Small Embedded SRAMs. ATS 2006: 37-44 - [c13]Qiang Xu, Baosheng Wang, F. Y. Young:
Retention-Aware Test Scheduling for BISTed Embedded SRAMs. ETS 2006: 83-88 - [c12]Yaping Liu, Zhenghu Gong, Baosheng Wang, Jinshu Su:
A Routing Optimization Algorithm for BGP Egress Selection. ICDCIT 2006: 192-199 - [c11]Dongsheng Li, Xicheng Lu, Baosheng Wang, Jinshu Su, Jiannong Cao, Keith C. C. Chan, Hong Va Leong:
Delay-Bounded Range Queries in DHT-based Peer-to-Peer Systems. ICDCS 2006: 64 - 2005
- [j1]Baosheng Wang, Andy Kuo, Touraj Farahmand, André Ivanov, Yong B. Cho, Sassan Tabatabaei:
A Realistic Timing Test Model and Its Applications in High-Speed Interconnect Devices. J. Electron. Test. 21(6): 621-630 (2005) - [c10]Baosheng Wang, Josh Yang, Yuejian Wu, André Ivanov:
A retention-aware test power model for embedded SRAM. ASP-DAC 2005: 1180-1183 - [c9]Baosheng Wang, Yuejian Wu, André Ivanov:
A Fast Diagnosis Scheme for Distributed Small Embedded SRAMs. DATE 2005: 852-857 - [c8]Cristian Grecu, Partha Pratim Pande, Baosheng Wang, André Ivanov, Res Saleh:
Methodologies and Algorithms for Testing Switch-Based NoC Interconnects. DFT 2005: 238-246 - [c7]Baosheng Wang, Xicheng Lu:
Design and Implementation of Control-Extensible Router. ICCNMC 2005: 762-771 - [c6]Baosheng Wang, Yuejian Wu, Josh Yang, André Ivanov, Yervant Zorian:
SRAM Retention Testing: Zero Incremental Time Integration with March Algorithms. VTS 2005: 66-71 - 2004
- [c5]Baosheng Wang, Yuejian Wu, André Ivanov:
Designs for Reducing Test Time of Distributed Small Embedded SRAMs. DFT 2004: 120-128 - [c4]Josh Yang, Baosheng Wang, André Ivanov:
Open Defects Detection within 6T SRAM Cells using a No Write Recovery Test Mode. VLSI Design 2004: 493-498 - [c3]Baosheng Wang, Josh Yang, James Cicalo, André Ivanov, Yervant Zorian:
Reducing Embedded SRAM Test Time under Redundancy Constraints. VTS 2004: 237-242 - 2003
- [c2]Baosheng Wang, Yong B. Cho, Sassan Tabatabaei, André Ivanov:
Yield, Overall Test Environment Timing Accuracy, and Defect Level Trade-Offs for High-Speed Interconnect Device Testing. Asian Test Symposium 2003: 348-353 - [c1]Baosheng Wang, Josh Yang, André Ivanov:
Reducing Test Time of Embedded SRAMs. MTDT 2003: 47-52
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-06 20:32 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint