default search action
Fenye Bao
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2010 – 2019
- 2016
- [j7]Ing-Ray Chen, Fenye Bao, Jia Guo:
Trust-Based Service Management for Social Internet of Things Systems. IEEE Trans. Dependable Secur. Comput. 13(6): 684-696 (2016) - [j6]Ing-Ray Chen, Jia Guo, Fenye Bao:
Trust Management for SOA-Based IoT and Its Application to Service Composition. IEEE Trans. Serv. Comput. 9(3): 482-495 (2016) - 2014
- [j5]Ing-Ray Chen, Jia Guo, Fenye Bao, Jin-Hee Cho:
Trust management in mobile ad hoc networks for bias minimization and application performance maximization. Ad Hoc Networks 19: 59-74 (2014) - [j4]Xinghua Li, Fenye Bao, Shuxin Li, Jianfeng Ma:
FLAP: An Efficient WLAN Initial Access Authentication Protocol. IEEE Trans. Parallel Distributed Syst. 25(2): 488-497 (2014) - [j3]Ing-Ray Chen, Fenye Bao, Moonjeong Chang, Jin-Hee Cho:
Dynamic Trust Management for Delay Tolerant Networks and Its Application to Secure Routing. IEEE Trans. Parallel Distributed Syst. 25(5): 1200-1210 (2014) - [c9]Ing-Ray Chen, Jia Guo, Fenye Bao:
Trust management for service composition in SOA-based IoT systems. WCNC 2014: 3444-3449 - 2013
- [c8]Ing-Ray Chen, Jia Guo, Fenye Bao, Jin-Hee Cho:
Integrated social and quality of service trust management of mobile groups in ad hoc networks. ICICS 2013: 1-5 - [c7]Fenye Bao, Ing-Ray Chen, Jia Guo:
Scalable, adaptive and survivable trust management for community of interest based Internet of Things systems. ISADS 2013: 1-7 - 2012
- [j2]Fenye Bao, Ing-Ray Chen, Moonjeong Chang, Jin-Hee Cho:
Hierarchical Trust Management for Wireless Sensor Networks and its Applications to Trust-Based Routing and Intrusion Detection. IEEE Trans. Netw. Serv. Manag. 9(2): 169-183 (2012) - [j1]Ing-Ray Chen, Fenye Bao, Moonjeong Chang, Jin-Hee Cho:
Integrated Social and QoS Trust-Based Routing in Delay Tolerant Networks. Wirel. Pers. Commun. 66(2): 443-459 (2012) - [c6]Fenye Bao, Ing-Ray Chen:
Trust management for the internet of things and its application to service composition. WOWMOM 2012: 1-6 - 2011
- [c5]Sumit Shah, Fenye Bao, Chang-Tien Lu, Ing-Ray Chen:
CROWDSAFE: crowd sourcing of crime incidents and safe routing on mobile devices. GIS 2011: 521-524 - [c4]Fenye Bao, Ing-Ray Chen, Moonjeong Chang, Jin-Hee Cho:
Trust-Based Intrusion Detection in Wireless Sensor Networks. ICC 2011: 1-6 - [c3]Moonjeong Chang, Ing-Ray Chen, Fenye Bao, Jin-Hee Cho:
Trust-Threshold Based Routing in Delay Tolerant Networks. IFIPTM 2011: 265-276 - [c2]Fenye Bao, Ing-Ray Chen, Moonjeong Chang, Jin-Hee Cho:
Hierarchical trust management for wireless sensor networks and its application to trust-based routing. SAC 2011: 1732-1738 - 2010
- [c1]Ing-Ray Chen, Fenye Bao, Moonjeong Chang, Jin-Hee Cho:
Trust Management for Encounter-Based Routing in Delay Tolerant Networks. GLOBECOM 2010: 1-6
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-04-24 22:50 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint