Hongbing Wang

ORCID: 0000-0002-1295-3525
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Cryptography and Data Security
  • Service-Oriented Architecture and Web Services
  • Advanced Software Engineering Methodologies
  • Color perception and design
  • Complexity and Algorithms in Graphs
  • Epoxy Resin Curing Processes
  • Color Science and Applications
  • Cryptography and Residue Arithmetic
  • Semantic Web and Ontologies
  • Cryptographic Implementations and Security
  • Advanced Authentication Protocols Security
  • Advanced Computational Techniques and Applications
  • Computational Drug Discovery Methods
  • Heat shock proteins research
  • Data Management and Algorithms
  • Internet Traffic Analysis and Secure E-voting
  • Mobile Agent-Based Network Management
  • Photopolymerization techniques and applications
  • Software System Performance and Reliability
  • Image Enhancement Techniques
  • Web Data Mining and Analysis
  • Service and Product Innovation
  • Recommender Systems and Techniques
  • Advanced Database Systems and Queries
  • Synthesis and properties of polymers

China Meteorological Administration
2025

Hong Kong Polytechnic University
2022-2024

Changsha University of Science and Technology
2024

Southeast University
2007-2022

National University of Singapore
2021-2022

Fudan University
1992-2021

Lanzhou Jiaotong University
2020

Jiangsu Institute of Meteorological Sciences
2019

Environmental Earth Sciences
2019

The University of Queensland
2019

This paper is based on the theory of Finite State Automata (FSA's), models a web service as FSA, extends WSDL for conceptually describing behaviors Web services, and introduces concept Temporal Logic Actions (short TLA) to describe specify behavior in formal way.

10.1109/wi.2007.50 article EN IEEE/WIC/ACM International Conference on Web Intelligence (WI'04) 2007-11-01

A service-oriented System of (SoS) integrates component services into a value-added and more complex system to satisfy the requirements users. Due dynamic running environment, online reliability prediction for loosely coupled systems that ensures runtime quality poses major challenge attracts growing attention. To guarantee stable continuous operation systems, we propose time series method basing on long short term memory (LSTM), which is modified Recurrent Neural Networks trained with...

10.1109/icws.2017.19 article EN 2017-06-01

Post-quantum cryptography was proposed in the past years due to foreseeable emergence of quantum computers that are able break conventional public key cryptosystems at acceptable costs. However, post-quantum schemes usually less efficient than ones, which makes them practical scenarios with limited resources or high concurrency. Server-side applications always feature multiple users, therefore requiring execution batch tasks. GPU is intrinsically well-suited tasks owing its SIMD/SIMT...

10.1109/tpds.2021.3097277 article EN IEEE Transactions on Parallel and Distributed Systems 2021-08-05

Trusted execution environment (TEE) such as Intel SGX relies on hardware protection and can perform secure multi-party computation (MPC) much more efficiently than pure software solutions.However, multiple side-channel attacks have been discovered in current implementations, leading to various levels of trust among different parties.For instance, a party might assume that an adversary is unable compromise TEE, while another only partial TEE or even does not it at all.In MPC scenario...

10.14722/ndss.2022.24173 article EN 2022-01-01

In this paper, we introduce a new cryptographic primitive, called autonomous path proxy re-encryption (AP-PRE), which is motivated by several application scenarios where the delegator would like to control whole delegation in multi-hop process. Compared with traditional re-encryption, AP-PRE provides much better fine-grained access path. Briefly speaking, an scheme, designates of his preferred delegatees. The consists delegatees privilege from high low. If delegatee cannot complete...

10.1109/tdsc.2017.2714166 article EN IEEE Transactions on Dependable and Secure Computing 2017-06-09

In a dynamic environment, some services may become unavailable, new be published and the various properties of services, such as their prices performance, change. Thus, to ensure user satisfaction in long run, it is desirable that service composition can automatically adapt these changes. To this end, we leverage technology reinforcement learning propose mechanism for adaptive composition. The requires no prior knowledge about services' quality, while being able achieve optimal solution....

10.1109/ictai.2010.28 article EN 2010-10-01

The Chinese government has recently issued a directive that calls for an end to gated communities. aim is halt the construction of new communities, and gradually open existing communities public. This paper examines challenges implementing in Shanghai, where more than 80% residential are gated. study reveals five types challenges: (1) site redesign; (2) urban governance; (3) social frictions; (4) legal status; (5) financial burden. While redesign straightforward, albeit onerous, task,...

10.1080/13574809.2019.1625707 article EN Journal of Urban Design 2019-07-03

Order-revealing encryption (ORE) is a basic cryptographic primitive for ciphertext comparisons based on the order relationship of plaintexts while maintaining privacy them. In data era we are experiencing, cross-dataset transactions become ubiquitous in practice. However, almost all previous ORE schemes can only support ciphertexts from same user, which does not meet requirement multi-user environment. this work, introduce and design with delegation functionality, referred to as delegatable...

10.1145/3321705.3329829 article EN 2019-07-02

Abstract Automated tape placement (ATP) is an important automated process adopted for the fabrication of large composite components. Trajectory planning key link ATP, which directly affects precision and efficiency layup quality final products. Presently, most existing trajectory optimization methods ATP focus on smooth surfaces. Nevertheless, as commercial CAD/CAM software generally uses NURBS (Non-uniform Rational B-Splines) modelling, difficulty finding solution low associated with...

10.1093/jcde/qwae032 article EN cc-by-nc Journal of Computational Design and Engineering 2024-03-06

In this paper, we propose a two-level path authentication protocol for object genuineness verification in RFID-based supply chain and EPCglobal Network. our solution, tag's can be generated dynamically, where each reader the verify validation of using its own private key. Our solution has few promising properties, including dynamic generation, distributed authentication, scalability. comparison, previous RFID tags is focused on static generation centralized control. The efficiency enhanced...

10.1109/rfid.2012.6193052 article EN 2012-04-01

Abstract Medium molecular weight, novel polyfunctional elastomers, namely epoxy groups on poly( n ‐butylacrylate) (ETPnBA) and carboxyl (CTPnBA) were photosynthesized for evaluation as the toughening agents in resins. The effect of functionality kind functional group elastomers upon resins modified with these rubbery copolymers a second phase was investigated by tensile tests, impact test, electron microscopy. It found that there exists an optimum maximum resistance copolymer‐modified...

10.1002/app.1992.070440506 article EN Journal of Applied Polymer Science 1992-02-15

ABSTRACT In The International Conference on Practice and Theory in Public‐Key Cryptography (PKC)'05, Baek et al . proposed the first multi‐receiver identity‐based encryption scheme. Their scheme is highly efficient that it only needs one pairing computation to encrypt a single message for n receivers. However, application scenario considered by merely ideal “single domain environment,” where all receivers are from same administrative domain. When used real‐world l different domains (i.e.,...

10.1002/sec.861 article EN Security and Communication Networks 2013-08-19

ABSTRACT In this paper, we present a more efficient chosen‐ciphertext secure proxy re‐encryption scheme in the standard model with less ciphertext size and without any strong unforgeable one‐time signature. Our is unidirectional single‐hop. The security of our under reasonable complexity assumption—the decisional bilinear Diffie–Hellman assumption groups. There are no schemes achieving signature literature. Copyright © 2012 John Wiley & Sons, Ltd.

10.1002/sec.552 article EN Security and Communication Networks 2012-06-05

Abstract Using the technique of photoelasticity, we have studied in detail magnitude residual microstress at matrix interface between epoxy resin and rubber particles or glass beads. A spheric stress‐optic equation applicable to these composites was derived. The photoelastic figures induced by interfacial microstresses factors affecting intensity light are discussed. experimental results show that independent particle size rubbers beads, but depend on nature fillers, which different thermal...

10.1002/pen.760321006 article EN Polymer Engineering and Science 1992-05-01

The existing composition approaches focus on either function-oriented or QoS-oriented composition. To our best knowledge, there is not a complete solution. Furthermore, solutions for are basically quantitative method. In many domains it desirable to assess such QoS in qualitative rather than way. So we propose new algorithm, which can implement automatic composition, considering both function and QoS. Moreover this algorithm based reinforcement learning preference logic reasoning....

10.1109/ictai.2008.31 article EN 2008-11-01

Similarity measurement is essential in many preference-based personalized applications such as collaborative recommendation and service selection. Up to date, current researches have mainly focused on the measurements for quantitative preference rather than qualitative preference, although latter has attracted much attention recently. Only a very few methods measure user similarity are proposed. This paper aims fill this gap by proposing an intuitive conditional which represented CP-nets....

10.1109/wi-iat.2012.60 article EN 2012 IEEE/WIC/ACM International Conferences on Web Intelligence and Intelligent Agent Technology 2012-12-01

Nowadays, composing previous available Web services into incremental with more powerful functions has become a new hotspot. To select during the process of them is chief task, so it becomes crucial to providing same or similar functionality by their non-functional attributes namely Quality Service (QoS). In order solve this problem, paper proposes combine functional classes service. It designs QoS- globally optimal model, which respectively solved using "simulated annealing" and "genetic "...

10.1109/icebe.2007.109 article EN 2007-10-01
Coming Soon ...