Bin Zhao
Bin Zhao
Ph.D. in Electrical and Computer Engineering, Purdue University
Verified email at
Cited by
Cited by
IMBAS: Identity-Based Multi-User Broadcast Authentication in Wireless Sensor Networks
X Cao, W Kou, L Dang, B Zhao
Computer Communications [Elsevier Journal] 31 (4), 2008
Effective Watermarking Scheme in the Encrypted Domain for Buyer-Seller Watermarking Protocol
B Zhao, W Kou, H Li, L Dang, J Zhang
Information Sciences [Elsevier Journal] 180 (23), 2010
Mobile IP Registration in Certificateless Public Key Infrastructure
L Dang, W Kou, N Dang, H Li, B Zhao, K Fan
IET Information Security [IET Journal] 1 (4), 2007
Efficient ID-Based Registration Protocol Featured with User Anonymity in Mobile IP Networks
L Dang, W Kou, H Li, J Zhang, X Cao, B Zhao, K Fan
IEEE Transactions on Wireless Communications [IEEE Journal] 9 (2), 2010
ICN Based Scalable Audio-Video Conferencing on Virtualized Service Edge Router (VSER) Platform
A Chakraborti, SO Amin, B Zhao, A Azgin, R Ravindran, G Wang
ACM Conference on Information-Centric Networking (ICN), 2015
Recognition, Segmentation and Retrieval of Gang Graffiti Images on a Mobile Device
A Parra, B Zhao, J Kim, EJ Delp
IEEE International Conference on Technologies for Homeland Security (HST), 2013
Secret Sharing in the Encrypted Domain with Secure Comparison
B Zhao, EJ Delp
IEEE Global Communications Conference (GLOBECOM), 2011
Secret Sharing in the Encrypted Domain
B Zhao, EJ Delp
IEEE International Conference on Communications (ICC), 2011
Hazardous Material Sign Detection and Recognition
A Parra, B Zhao, A Haddad, M Boutin, EJ Delp
IEEE International Conference on Image Processing (ICIP), 2013
Mobile-Based Hazmat Sign Detection and Recognition
B Zhao, A Parra, EJ Delp
IEEE Global Conference on Signal and Information Processing (GlobalSIP), 2013
Inter-Layer Error Concealment for Scalable Video Coding Based on Motion Vector Averaging and Slice Interleaving
B Zhao, EJ Delp
IEEE International Conference on Multimedia and Expo (ICME), 2013
Adaptive encrypted information hiding scheme for images
B Zhao, K Fan, Y Wang, W Kou
IEEE International Conference on Computational Intelligence and Security (CIS), 2007
Design of secure watermarking scheme for watermarking protocol
B Zhao, L Dang, W Kou, J Zhang, X Cao
Pacific-Rim Conference on Multimedia (PCM), 2007
Visual Saliency Models Based on Spectrum Processing
B Zhao, EJ Delp
IEEE Winter Conference on Applications of Computer Vision (WACV), 2015
A watermarking scheme in the encrypted domain for watermarking protocol
B Zhao, L Dang, W Kou, J Zhang, Z Li, K Fan
International Conference on Information Security and Cryptology (InfoSec), 2007
A Weight-based k-prototypes Algorithm for Anomaly Detection in Smart Grid
B Zhao, K Fan, W You, K Yang, Z Wang, H Li
IEEE International Conference on Communications (ICC), 2020
Hazmat Sign Location Detection Based on Fourier Shape Descriptors
K Thongkor, AP Pozo, B Zhao, T Amornraksa, EJ Delp
IS&T International Symposium on Electronic Imaging (EI), 2016
Interleaving-Based Error Concealment For Scalable Video Coding System
B Zhao
IEEE Visual Communications and Image Processing (VCIP), 2011
Anonymous and Privacy-preserving Federated Learning with Industrial Big Data
B Zhao, K Fan, K Yang, Z Wang, H Li, Y Yang
IEEE Transactions on Industrial Informatics, 2021
Systems and methods for optimization of transmission of real-time data via network labeling
BZ Wei Li
US Patent US10,412,145, 2016
The system can't perform the operation now. Try again later.
Articles 1–20