default search action
Wu Yang 0001
Person information
- affiliation: Harbin Engineering University, Information Security Research Center, China
- affiliation (PhD): Harbin Institute of Technology, China
Other persons with the same name
- Wu Yang — disambiguation page
- Wu Yang 0002 — Sichuan University, Chengdu, China
- Wu Yang 0003 — Guangxi University, Nanning, China (and 1 more)
- Wu Yang 0004 — Zhejiang University, Hangzhou, China
Other persons with a similar name
- Jyh-Yang Wu
- Shiow-Yang Wu
- Tsu-Yang Wu
- Yang Wu — disambiguation page
- Zi-Yang Wu
- Yang Wu 0001 — Tencent AI Laboratory, Shenzhen, China (and 5 more)
- Yang Wu 0009 — Tsinghua University, Department of Electrical Engineering, Beijing, China
- Yang Wu 0010 — Harbin Institute of Technology, Research Center for Social Computing and Information Retrieval, China
- Wu-Chuan Yang
- Wu-E Yang — Central South University, ChangSha, China
- show all similar names
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j66]Hao Li, Wu Yang, Wei Wang, Huanran Wang:
Neural network approaches for rumor stance detection: Simulating complex rumor propagation systems. Concurr. Comput. Pract. Exp. 36(16) (2024) - [j65]Shichang Xuan, Mengda Wang, Jingyi Zhang, Wei Wang, Dapeng Man, Wu Yang:
An incentive mechanism design for federated learning with multiple task publishers by contract theory approach. Inf. Sci. 664: 120330 (2024) - [j64]Hao Li, Wu Yang, Wei Wang, Huanran Wang:
Harmfulness metrics in digital twins of social network rumors detection in cloud computing environment. J. Cloud Comput. 13(1): 36 (2024) - [j63]Huanran Wang, Wu Yang, Dapeng Man, Jiguang Lv, Shuai Han, Jingwen Tan, Tao Liu:
Anchor Link Prediction for Cross-Network Digital Forensics From Local and Global Perspectives. IEEE Trans. Inf. Forensics Secur. 19: 3620-3635 (2024) - [j62]Jingwen Tan, Huanran Wang, Shuai Han, Dapeng Man, Wu Yang:
An Adaptability-Enhanced Few-Shot Website Fingerprinting Attack Based on Collusion. IEEE Trans. Inf. Forensics Secur. 19: 8220-8235 (2024) - [j61]Qianqian Pan, Jun Wu, Jianhua Li, Wu Yang, Mohsen Guizani:
Blockchain and Multi-Agent Learning Empowered Incentive IRS Resource Scheduling for Intelligent Reconfigurable Networks. IEEE/ACM Trans. Netw. 32(2): 943-958 (2024) - [c58]Tao Liu, Yuhang Zhang, Zhu Feng, Zhiqin Yang, Chen Xu, Dapeng Man, Wu Yang:
Beyond Traditional Threats: A Persistent Backdoor Attack on Federated Learning. AAAI 2024: 21359-21367 - [c57]Chen Xu, Jie Wang, Xiaoqian Liu, Qian Dong, Chunliang Zhang, Tong Xiao, JingBo Zhu, Dapeng Man, Wu Yang:
Revisiting Interpolation Augmentation for Speech-to-Text Generation. ACL (Findings) 2024: 9488-9499 - [c56]Jiguang Lv, Shuchun Xu, Xiaodong Zhan, Tao Liu, Dapeng Man, Wu Yang:
FedGG: Leveraging Generative Adversarial Networks and Gradient Smoothing for Privacy Protection in Federated Learning. Euro-Par (2) 2024: 393-407 - [c55]Chen Xu, Xiaoqian Liu, Erfeng He, Yuhao Zhang, Qianqian Dong, Tong Xiao, Jingbo Zhu, Dapeng Man, Wu Yang:
Bridging the Gaps of Both Modality and Language: Synchronous Bilingual CTC for Speech Translation and Speech Recognition. ICASSP 2024: 12176-12180 - [c54]Hanbo Wang, Dapeng Man, Shuai Han, Huanran Wang, Wu Yang:
Detection and Defense of Cache Pollution Attack Using State Transfer Matrix in Named Data Networks. ICWS 2024: 545-556 - [c53]Xin Song, Lixing Chen, Junhua Tang, Jianhua Li, Yang Bai, Wu Yang:
Adaptively Compressed Swarm Learning for Distributed Traffic Prediction over IoV-Web3.0. IJCNN 2024: 1-8 - [c52]Xiaoqin Xie, Shuangyuan Liu, Jiaqi Zhang, Shuai Han, Wei Wang, Wu Yang:
Efficient Community Search Based on Relaxed k-Truss Index. SIGIR 2024: 1691-1700 - [i3]Tao Liu, Yuhang Zhang, Zhu Feng, Zhiqin Yang, Chen Xu, Dapeng Man, Wu Yang:
Beyond Traditional Threats: A Persistent Backdoor Attack on Federated Learning. CoRR abs/2404.17617 (2024) - [i2]Chen Xu, Jie Wang, Xiaoqian Liu, Qianqian Dong, Chunliang Zhang, Tong Xiao, Jingbo Zhu, Dapeng Man, Wu Yang:
Revisiting Interpolation Augmentation for Speech-to-Text Generation. CoRR abs/2406.15846 (2024) - 2023
- [j60]Qiaolun Zhang, Jun Wu, Michele Zanella, Wu Yang, Ali Kashif Bashir, William Fornaciari:
Sema-IIoVT: Emergent Semantic-Based Trustworthy Information-Centric Fog System and Testbed for Intelligent Internet of Vehicles. IEEE Consumer Electron. Mag. 12(1): 70-79 (2023) - [j59]Dapeng Man, Fanyi Zeng, Jiguang Lv, Shichang Xuan, Wu Yang, Mohsen Guizani:
AI-based Intrusion Detection for Intelligence Internet of Vehicles. IEEE Consumer Electron. Mag. 12(1): 109-116 (2023) - [j58]Yihang Tao, Jun Wu, Xi Lin, Wu Yang:
DRL-Driven Digital Twin Function Virtualization for Adaptive Service Response in 6G Networks. IEEE Netw. Lett. 5(2): 125-129 (2023) - [j57]Wei Zhao, Wu Yang, Huanran Wang, Tairong Zhang, Dapeng Man, Tao Liu, Jiguang Lv, Mohsen Guizani:
Privacy-Preserving Outsourcing of K-Means Clustering for Cloud-Device Collaborative Computing in Space-Air-Ground Integrated IoT. IEEE Internet Things J. 10(23): 20396-20407 (2023) - [j56]Xinzheng Feng, Jun Wu, Yulei Wu, Jianhua Li, Wu Yang:
Blockchain and digital twin empowered trustworthy self-healing for edge-AI enabled industrial Internet of things. Inf. Sci. 642: 119169 (2023) - [j55]Jiang Zhu, Jun Wu, Ali Kashif Bashir, Qianqian Pan, Wu Yang:
Privacy-Preserving Federated Learning of Remote Sensing Image Classification With Dishonest Majority. IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens. 16: 4685-4698 (2023) - [j54]Kuan Wang, Jun Wu, James Xi Zheng, Jianhua Li, Wu Yang, Athanasios V. Vasilakos:
Cloud-Edge Orchestrated Power Dispatching for Smart Grid With Distributed Energy Resources. IEEE Trans. Cloud Comput. 11(2): 1194-1203 (2023) - [j53]Huanran Wang, Wu Yang, Dapeng Man, Wei Wang, Jiguang Lv:
Anchor Link Prediction for Privacy Leakage via De-Anonymization in Multiple Social Networks. IEEE Trans. Dependable Secur. Comput. 20(6): 5197-5213 (2023) - [j52]Gaolei Li, Jun Wu, Shenghong Li, Wu Yang, Changlian Li:
Multitentacle Federated Learning Over Software-Defined Industrial Internet of Things Against Adaptive Poisoning Attacks. IEEE Trans. Ind. Informatics 19(2): 1260-1269 (2023) - [j51]Huanran Wang, Wu Yang, Wei Wang, Dapeng Man, Jiguang Lv:
A Novel Cross-Network Embedding for Anchor Link Prediction with Social Adversarial Attacks. ACM Trans. Priv. Secur. 26(1): 7:1-7:32 (2023) - [j50]Yuxin Qi, Jun Wu, Ali Kashif Bashir, Xi Lin, Wu Yang, Mohammad Dahman Alshehri:
Privacy-Preserving Cross-Area Traffic Forecasting in ITS: A Transferable Spatial-Temporal Graph Neural Network Approach. IEEE Trans. Intell. Transp. Syst. 24(12): 15499-15512 (2023) - [j49]Xi Lin, Jun Wu, Jianhua Li, Wu Yang, Mohsen Guizani:
Stochastic Digital-Twin Service Demand With Edge Response: An Incentive-Based Congestion Control Approach. IEEE Trans. Mob. Comput. 22(4): 2402-2416 (2023) - [j48]Huanran Wang, Wu Yang, Dapeng Man, Wei Wang, Jiguang Lv, Meng Joo Er:
A novel cross-network node pair embedding methodology for anchor link prediction. World Wide Web (WWW) 26(5): 2495-2520 (2023) - [c51]Xiao Yang, Gaolei Li, Chaofeng Zhang, Meng Han, Wu Yang:
PerCBA: Persistent Clean-label Backdoor Attacks on Semi-Supervised Graph Node Classification. AISafety/SafeRL@IJCAI 2023 - [c50]Huanran Wang, Wu Yang, Jiguang Lv, Hanbo Wang, Jingwen Tan, Dapeng Man:
Anchor Link Prediction via Network Structural Role for Privacy Leakage in Edge Computing. GLOBECOM 2023: 6030-6036 - [c49]Jiajin Yang, Lixing Chen, Junhua Tang, Jianhua Li, Wu Yang:
Swarm Reinforcement Learning for Collaborative Content Caching in Information Centric Networks. ICC 2023: 384-390 - [c48]Xuewei Hou, Lixing Chen, Junhua Tang, Jianhua Li, Wu Yang:
Hierarchical Swarm Learning for Edge-Assisted Collaborative Vehicle Trajectory Prediction. ICC 2023: 4144-4149 - [c47]Chao Sang, Jianhua Li, Jun Wu, Wu Yang:
ECADA: An Edge Computing Assisted Delay-Aware Anomaly Detection Scheme for ICS. MSN 2023: 215-222 - [c46]Jiguang Lv, Shuchun Xu, Yi Ling, Dapeng Man, Shuai Han, Wu Yang:
Data Poisoning Attack Based on Privacy Reasoning and Countermeasure in Federated Learning. MSN 2023: 472-479 - [i1]Chen Xu, Xiaoqian Liu, Erfeng He, Yuhao Zhang, Qianqian Dong, Tong Xiao, Jingbo Zhu, Dapeng Man, Wu Yang:
Bridging the Gaps of Both Modality and Language: Synchronous Bilingual CTC for Speech Translation and Speech Recognition. CoRR abs/2309.12234 (2023) - 2022
- [j47]Jiana Li, Jun Wu, Changlian Li, Wu Yang, Ali Kashif Bashir, Jianhua Li, Yasser D. Al-Otaibi:
Information-Centric Wireless Sensor Networking Scheme With Water-Depth-Awareness Content Caching for Underwater IoT. IEEE Internet Things J. 9(2): 858-867 (2022) - [j46]Xi Lin, Jun Wu, Ali Kashif Bashir, Jianhua Li, Wu Yang, Md. Jalil Piran:
Blockchain-Based Incentive Energy-Knowledge Trading in IoT: Joint Power Transfer and AI Design. IEEE Internet Things J. 9(16): 14685-14698 (2022) - [j45]Qianqian Pan, Jun Wu, James Xi Zheng, Wu Yang, Jianhua Li:
Differential Privacy and IRS Empowered Intelligent Energy Harvesting for 6G Internet of Things. IEEE Internet Things J. 9(22): 22109-22122 (2022) - [j44]Liangyi Gong, Chaocan Xiang, Xiaochen Fan, Tao Wu, Chao Chen, Miao Yu, Wu Yang:
Device-free near-field human sensing using WiFi signals. Pers. Ubiquitous Comput. 26(3): 461-474 (2022) - [j43]Lianxiao Meng, Lin Yang, Wu Yang, Long Zhang:
A Survey of GNSS Spoofing and Anti-Spoofing Technology. Remote. Sens. 14(19): 4826 (2022) - [j42]Qianqian Pan, Jun Wu, Ali Kashif Bashir, Jianhua Li, Wu Yang, Yasser D. Al-Otaibi:
Joint Protection of Energy Security and Information Privacy for Energy Harvesting: An Incentive Federated Learning Approach. IEEE Trans. Ind. Informatics 18(5): 3473-3483 (2022) - [j41]Xi Lin, Jun Wu, Ali Kashif Bashir, Wu Yang, Aman Singh, Ahmad Ali AlZubi:
FairHealth: Long-Term Proportional Fairness-Driven 5G Edge Healthcare in Internet of Medical Things. IEEE Trans. Ind. Informatics 18(12): 8905-8915 (2022) - [j40]Siyi Liao, Jun Wu, Ali Kashif Bashir, Wu Yang, Jianhua Li, Usman Tariq:
Digital Twin Consensus for Blockchain-Enabled Intelligent Transportation Systems in Smart Cities. IEEE Trans. Intell. Transp. Syst. 23(11): 22619-22629 (2022) - [c45]Zheng Yang, Gaolei Li, Jun Wu, Wu Yang:
Propagable Backdoors over Blockchain-based Federated Learning via Sample-Specific Eclipse. GLOBECOM 2022: 2579-2584 - [c44]Yang Wang, Xi Lin, Jun Wu, Ali Kashif Bashir, Wu Yang, Jianhua Li, Muhammad Imran:
Contrastive GNN-based Traffic Anomaly Analysis Against Imbalanced Dataset in IoT-based ITS. GLOBECOM 2022: 3557-3562 - 2021
- [j39]Shiwei Che, Wu Yang, Wei Wang:
An Improved Artificial Bee Colony Algorithm for Community Detection in Bipartite Networks. IEEE Access 9: 10025-10040 (2021) - [j38]Dapeng Man, Qi Lu, Hanbo Wang, Jiafei Guo, Wu Yang, Jiguang Lv:
On-path caching based on content relevance in Information-Centric Networking. Comput. Commun. 176: 272-281 (2021) - [j37]Shichang Xuan, Zhiyu Chen, Ilyong Chung, Haowen Tan, Dapeng Man, Xiaojiang Du, Wu Yang, Mohsen Guizani:
ECBCM: A prestige-based edge computing blockchain security consensus model. Trans. Emerg. Telecommun. Technol. 32(6) (2021) - [j36]Siyi Liao, Jun Wu, Jianhua Li, Ali Kashif Bashir, Wu Yang:
Securing Collaborative Environment Monitoring in Smart Cities Using Blockchain Enabled Software-Defined Internet of Drones. IEEE Internet Things Mag. 4(1): 12-18 (2021) - [j35]Jian Zhang, Cheng Gao, Liangyi Gong, Zhaojun Gu, Dapeng Man, Wu Yang, Wenzhen Li:
Malware Detection Based on Multi-level and Dynamic Multi-feature Using Ensemble Learning at Hypervisor. Mob. Networks Appl. 26(4): 1668-1685 (2021) - [j34]Wei Wang, Yuchen Qiu, Shichang Xuan, Wu Yang:
Early Rumor Detection Based on Deep Recurrent Q-Learning. Secur. Commun. Networks 2021: 5569064:1-5569064:13 (2021) - [j33]Dapeng Man, Yongjia Mu, Jiafei Guo, Wu Yang, Jiguang Lv, Wei Wang:
Cache Pollution Detection Method Based on GBDT in Information-Centric Network. Secur. Commun. Networks 2021: 6658066:1-6658066:10 (2021) - [j32]Dapeng Man, Fanyi Zeng, Wu Yang, Miao Yu, Jiguang Lv, Yijing Wang:
Intelligent Intrusion Detection Based on Federated Learning for Edge-Assisted Internet of Things. Secur. Commun. Networks 2021: 9361348:1-9361348:11 (2021) - [j31]Shichang Xuan, Ming Jin, Xin Li, Zhaoyuan Yao, Wu Yang, Dapeng Man:
DAM-SE: A Blockchain-Based Optimized Solution for the Counterattacks in the Internet of Federated Learning Systems. Secur. Commun. Networks 2021: 9965157:1-9965157:14 (2021) - [j30]Ge Chen, Jun Wu, Wu Yang, Ali Kashif Bashir, Gaolei Li, Mohammad Hammoudeh:
Leveraging Graph Convolutional-LSTM for Energy-Efficient Caching in Blockchain-Based Green IoT. IEEE Trans. Green Commun. Netw. 5(3): 1154-1164 (2021) - [j29]Lianxiao Meng, Lin Yang, Shuangyin Ren, Gaigai Tang, Long Zhang, Feng Yang, Wu Yang:
An Approach of Linear Regression-Based UAV GPS Spoofing Detection. Wirel. Commun. Mob. Comput. 2021: 5517500:1-5517500:16 (2021) - 2020
- [j28]Shichang Xuan, Dezhi Tang, Ilyong Chung, Youngju Cho, Xiaojiang Du, Wu Yang:
Network Traffic Sampling System Based on Storage Compression for Application Classification Detection. IEEE Access 8: 63106-63120 (2020) - [j27]Shiwei Che, Wu Yang, Wei Wang:
A Memetic Algorithm for Community Detection in Signed Networks. IEEE Access 8: 123585-123602 (2020) - [j26]Shichang Xuan, Li Zheng, Ilyong Chung, Wei Wang, Dapeng Man, Xiaojiang Du, Wu Yang, Mohsen Guizani:
An incentive mechanism for data sharing based on blockchain with smart contracts. Comput. Electr. Eng. 83: 106587 (2020) - [j25]Dapeng Man, Qi Lu, Yao Wang, Wu Yang, Xiaojiang Du, Mohsen Guizani:
An adaptive cache management approach in ICN with pre-filter queues. Comput. Commun. 153: 250-263 (2020) - [j24]Shiwei Che, Wu Yang, Wei Wang:
Improved streaming quotient filter: a duplicate detection approach for data streams. Int. Arab J. Inf. Technol. 17(5): 769-777 (2020) - [j23]Jun Wu, Mianxiong Dong, Kaoru Ota, Jianhua Li, Wu Yang:
Application-Aware Consensus Management for Software-Defined Intelligent Blockchain in IoT. IEEE Netw. 34(1): 69-75 (2020) - [j22]Qianqian Pan, Jun Wu, Jianhua Li, Wu Yang, Zhitao Guan:
Blockchain and AI Empowered Trust-Information-Centric Network for Beyond 5G. IEEE Netw. 34(6): 38-45 (2020) - [j21]Jun Wu, Mianxiong Dong, Kaoru Ota, Jianhua Li, Wu Yang:
Sustainable Secure Management Against APT Attacks for Intelligent Embedded-Enabled Smart Manufacturing. IEEE Trans. Sustain. Comput. 5(3): 341-352 (2020) - [c43]Mingzhe Han, Jun Wu, Ali Kashif Bashir, Wu Yang, Muhammad Imran, Nidal Nasser:
Adversarial Learning-based Bias Mitigation for Fatigue Driving Detection in Fair-Intelligent IoV. GLOBECOM 2020: 1-6 - [c42]Lianxiao Meng, Lin Yang, Gaigai Tang, Shuangyin Ren, Wu Yang:
An Optimization of Deep Sensor Fusion Based on Generalized Intersection over Union. ICA3PP (2) 2020: 552-562 - [c41]Shichang Xuan, Hao Tang, Wei Wang, Wu Yang:
Application of Block Chain Technology in Constructing Network Threat Intelligence System. ICBCT 2020: 144-149 - [c40]Wei Wang, Qilin Mu, Yanhong Pu, Dapeng Man, Wu Yang, Xiaojiang Du:
Sensitive Labels Matching Privacy Protection in Multi-Social Networks. ICC 2020: 1-7 - [c39]Wentao Zhang, Mianxiong Dong, Kaoru Ota, Jianhua Li, Wu Yang, Jun Wu:
A Big Data Management Architecture for Standardized IoT Based on Smart Scalable SNMP. ICC 2020: 1-7 - [c38]Lianxiao Meng, Shuangyin Ren, Gaigai Tang, Chao Yang, Wu Yang:
UAV Sensor Spoofing Detection Algorithm Based on GPS and Optical Flow Fusion. ICCSP 2020: 146-151
2010 – 2019
- 2019
- [j20]Siyi Liao, Jianhua Li, Jun Wu, Wu Yang, Zhitao Guan:
Fog-Enabled Vehicle as a Service for Computing Geographical Migration in Smart Cities. IEEE Access 7: 8726-8736 (2019) - [j19]Wenlong Zhu, Wu Yang, Shichang Xuan, Dapeng Man, Wei Wang, Xiaojiang Du, Mohsen Guizani:
Location-Based Seeds Selection for Influence Blocking Maximization in Social Networks. IEEE Access 7: 27272-27287 (2019) - [j18]Shiwei Che, Wu Yang, Wei Wang:
A Memetic Algorithm for Community Detection in Bipartite Networks. IEEE Access 7: 126897-126912 (2019) - [j17]Tong-Yi Huang, Wu Yang, Jun Wu, Jin Ma, Xiaofei Zhang, Daoyin Zhang:
A Survey on Green 6G Network: Architecture and Technologies. IEEE Access 7: 175758-175768 (2019) - [j16]Jun Wu, Mianxiong Dong, Kaoru Ota, Jianhua Li, Wu Yang, Meng Wang:
Fog-Computing-Enabled Cognitive Network Function Virtualization for an Information-Centric Future Internet. IEEE Commun. Mag. 57(7): 48-54 (2019) - [j15]Hisham Elzain, Wu Yang:
Software Defined Wireless Mesh Network Flat Distribution Control Plane. Future Internet 11(8): 166 (2019) - [j14]Xi Lin, Jianhua Li, Jun Wu, Haoran Liang, Wu Yang:
Making Knowledge Tradable in Edge-AI Enabled IoT: A Consortium Blockchain-Based Efficient and Incentive Approach. IEEE Trans. Ind. Informatics 15(12): 6367-6378 (2019) - [c37]Shichang Xuan, Huanhong Wang, Duo Gao, Ilyong Chung, Wei Wang, Wu Yang:
Network Penetration Identification Method Based on Interactive Behavior Analysis. CBD 2019: 210-215 - [c36]Wei Wang, Shichang Xuan, Wu Yang, Yu Chen:
User Credibility Assessment Based on Trust Propagation in Microblog. ComComAP 2019: 270-275 - [c35]Wei Wang, Shichang Xuan, Wu Yang:
User anchor link identification based on integrated similarity decision in multiple heterogeneous social networks. ComComAP 2019: 438-443 - [c34]Chuanhua Xu, Mianxiong Dong, Kaoru Ota, Jianhua Li, Wu Yang, Jun Wu:
SCEH: Smart Customized E-Health Framework for Countryside Using Edge AI and Body Sensor Networks. GLOBECOM 2019: 1-6 - [c33]Gengshen Lin, Mianxiong Dong, Kaoru Ota, Jianhua Li, Wu Yang, Jun Wu:
Security Function Virtualization Based Moving Target Defense of SDN-Enabled Smart Grid. ICC 2019: 1-6 - [c32]Wenlong Zhu, Wu Yang, Shichang Xuan, Dapeng Man, Wei Wang, Jiguang Lv:
Location-Aware Targeted Influence Blocking Maximization in Social Networks. ICCCN 2019: 1-9 - [c31]Xi Lin, Jianhua Li, Wu Yang, Jun Wu, Zhifeng Zong, Xiaodong Wang:
Vehicle-to-Cloudlet: Game-Based Computation Demand Response for Mobile Edge Computing through Vehicles. VTC Spring 2019: 1-6 - 2018
- [j13]Jiguang Lv, Dapeng Man, Wu Yang, Xiaojiang Du, Miao Yu:
Robust WLAN-Based Indoor Intrusion Detection Using PHY Layer Information. IEEE Access 6: 30117-30127 (2018) - [j12]Wenlong Zhu, Wu Yang, Shichang Xuan, Dapeng Man, Wei Wang, Xiaojiang Du:
Location-Aware Influence Blocking Maximization in Social Networks. IEEE Access 6: 61462-61477 (2018) - [j11]Shichang Xuan, Dapeng Man, Wu Yang, Wei Wang, Jiashuai Zhao, Miao Yu:
Identification of unknown operating system type of Internet of Things terminal device based on RIPPER. Int. J. Distributed Sens. Networks 14(10) (2018) - [j10]Shen Wang, Jun Wu, Wu Yang, Longhua Guo:
Novel architectures and security solutions of programmable software-defined networking: a comprehensive survey. Frontiers Inf. Technol. Electron. Eng. 19(12): 1500-1521 (2018) - [j9]Shichang Xuan, Dapeng Man, Jiangchuan Zhang, Wu Yang, Miao Yu:
Mathematical Performance Evaluation Model for Mobile Network Firewall Based on Queuing. Wirel. Commun. Mob. Comput. 2018 (2018) - [c30]Shichang Xuan, Dapeng Man, Wei Wang, Kaiyue Qin, Wu Yang:
Hybrid Classification of WEB Trojan Exploiting Small Volume of Labeled Data Vectors. CIS 2018: 286-290 - [c29]Hisham Elzain, Wu Yang:
QoS-aware Topology Discovery in Decentralized Software Defined Wireless Mesh Network (D-SDWMN) Architecture. CSAI/ICIMT 2018: 158-162 - [c28]Jian Zhang, Cheng Gao, Liangyi Gong, Zhaojun Gu, Dapeng Man, Wu Yang, Xiaojiang Du:
Malware Detection Based on Dynamic Multi-Feature Using Ensemble Learning at Hypervisor. GLOBECOM 2018: 1-6 - [c27]Dapeng Man, Wu Yang, Xin Wang, Jiguang Lv, Xiaojiang Du, Miao Yu:
PWiG: A Phase-based Wireless Gesture Recognition System. ICNC 2018: 837-842 - [c26]Dapeng Man, Wu Yang, Guoqing Tian:
Multi-pattern Matching Algorithm based on Variable Step Size. ICCNS 2018: 125-128 - [c25]Dapeng Man, Wu Yang, Zeya Lu:
Research on Task Scheduling Model for Multi-core Processor. ICCNS 2018: 129-133 - [c24]Liangyi Gong, Chundong Wang, Likun Zhu, Jian Zhang, Wu Yang, Yiyang Zhao, Chaocan Xiang:
LAMP: Lightweight and Accurate Malicious Access Points Localization via Channel Phase Information. WASA 2018: 748-753 - [c23]Yumeng Fu, Wei Wang, Hao Fu, Wu Yang, Dan Yin:
Privacy Preserving Social Network Against Dopv Attacks. WISE (1) 2018: 178-188 - 2017
- [j8]Guozhong Dong, Wu Yang, Feida Zhu, Wei Wang:
Discovering burst patterns of burst topic in twitter. Comput. Electr. Eng. 58: 551-559 (2017) - [j7]Dapeng Man, Wu Yang, Shichang Xuan, Xiaojiang Du:
Thwarting Nonintrusive Occupancy Detection Attacks from Smart Meters. Secur. Commun. Networks 2017: 5350201:1-5350201:9 (2017) - [j6]Jiguang Lv, Wu Yang, Dapeng Man:
Device-Free Passive Identity Identification via WiFi Signals. Sensors 17(11): 2520 (2017) - [c22]Jiguang Lv, Wu Yang, Dapeng Man, Xiaojiang Du, Miao Yu, Mohsen Guizani:
Wii: Device-Free Passive Identity Identification via WiFi Signals. GLOBECOM 2017: 1-6 - [c21]Shichang Xuan, Dapeng Man, Wei Wang, Jiangchuan Zhang, Wu Yang, Xiaojiang Du:
Two-Stage Mixed Queuing Model for Web Security Gateway Performance Evaluation. ICCCN 2017: 1-7 - [c20]Chenyang Liu, Dan Yin, Hao Li, Wei Wang, Wu Yang:
Preserving Privacy in Social Networks Against Label Pair Attacks. WASA 2017: 381-392 - 2016
- [j5]Liangyi Gong, Wu Yang, Zimu Zhou, Dapeng Man, Haibin Cai, Xiancun Zhou, Zheng Yang:
An adaptive wireless passive human detection via fine-grained physical layer information. Ad Hoc Networks 38: 38-50 (2016) - [j4]Liangyi Gong, Wu Yang, Dapeng Man, Jiguang Lv:
iPil: improving passive indoor localisation via link-based CSI features. Int. J. Ad Hoc Ubiquitous Comput. 23(1/2): 36-45 (2016) - [c19]Guozhong Dong, Wu Yang, Feida Zhu, Wei Wang:
Detecting Community Pacemakers of Burst Topic in Twitter. APWeb (1) 2016: 245-255 - [c18]Jiguang Lv, Wu Yang, Liangyi Gong, Dapeng Man, Xiaojiang Du:
Robust WLAN-Based Indoor Fine-Grained Intrusion Detection. GLOBECOM 2016: 1-6 - [c17]Liangyi Gong, Wu Yang, Chaocan Xiang, Dapeng Man, Miao Yu, Zuwei Yin:
WiSal: Ubiquitous WiFi-Based Device-Free Passive Subarea Localization without Intensive Site-Survey. Trustcom/BigDataSE/ISPA 2016: 1129-1136 - 2015
- [j3]Wu Yang, Liangyi Gong, Dapeng Man, Jiguang Lv, Haibin Cai, Xiancun Zhou, Zheng Yang:
Enhancing the Performance of Indoor Device-Free Passive Localization. Int. J. Distributed Sens. Networks 11: 256162:1-256162:11 (2015) - [j2]Wu Yang, Guowei Shen, Wei Wang, Liangyi Gong, Miao Yu, Guozhong Dong:
Anomaly Detection in Microblogging via Co-Clustering. J. Comput. Sci. Technol. 30(5): 1097-1108 (2015) - [j1]Liangyi Gong, Wu Yang, Dapeng Man, Guozhong Dong, Miao Yu, Jiguang Lv:
WiFi-Based Real-Time Calibration-Free Passive Human Motion Detection. Sensors 15(12): 32213-32229 (2015) - [c16]Guozhong Dong, Bo Wang, Wu Yang, Wei Wang, Rui Sun:
SAMD: A System for Abnormal Messages Detection Oriented Microblog Message Stream. BIC-TA 2015: 113-124 - [c15]Guowei Shen, Wei Wang, Wu Yang, Miao Yu, Guozhong Dong:
Heterogeneous Sparse Relational Data Co-clustering in Social Network. UIC/ATC/ScalCom 2015: 77-84 - [c14]Liangyi Gong, Dapeng Man, Jiguang Lv, Guowei Shen, Wu Yang:
FRID: Indoor Fine-Grained Real-Time Passive Human Motion Detection. UIC/ATC/ScalCom 2015: 308-311 - 2014
- [c13]Wu Yang, Guozhong Dong, Wei Wang, Guowei Shen, Liangyi Gong, Miao Yu, Jiguang Lv, Yaxue Hu:
Detecting Bots in Follower Markets. BIC-TA 2014: 525-530 - [c12]Guowei Shen, Wu Yang, Wei Wang, Miao Yu, Guozhong Dong:
Agglomerative Hierarchical Co-clustering Based on Bregman Divergence. SCDM 2014: 389-398 - [c11]Guowei Shen, Wu Yang, Wei Wang, Miao Yu, Guozhong Dong:
Detecting Anomalies in Microblogging via Nonnegative Matrix Tri-Factorization. SMP 2014: 55-66 - [c10]Miao Yu, Wu Yang, Wei Wang, Guowei Shen, Guozhong Dong:
Information Diffusion and Influence Measurement Based on Interaction in Microblogging. SMP 2014: 129-140
2000 – 2009
- 2009
- [c9]Wei Wang, Jun Zheng, Wu Yang, Yongtian Yang:
A Dual-Center Event Description Model Used in Event Tracking. CSIE (4) 2009: 443-447 - 2008
- [c8]Dapeng Man, Bing Zhang, Wu Yang, Wenjin Jin, Yongtian Yang:
A Method for Global Attack Graph Generation. ICNSC 2008: 236-241 - [c7]Jiaquan Si, Kaizhuo Wang, Wei Wang, Dapeng Man, Wu Yang:
Study of Index Weight in Network Threat Evaluation Based on Improved Grey Theory. PACIIA (2) 2008: 9-13 - 2007
- [c6]Lejun Zhang, Lin Guo, Wu Yang, Wei Wang, Yongtian Yang:
An Efficient Survivability Hierarchy Analysis Model for Networked Information System. CIS 2007: 759-762 - [c5]Dapeng Man, Wu Yang, Yongtian Yang, Wei Wang, Lejun Zhang:
A Quantitative Evaluation Model for Network Security. CIS 2007: 773-777 - [c4]Lejun Zhang, Wu Yang, Wei Wang, Lin Guo, Yongtian Yang:
A Method to Enhance Service Survivability Based on Autonomous Configuration. IMSCCS 2007: 387-390 - 2006
- [c3]Wu Yang, Xiao-chun Yun, Jianhua Li:
An Efficient SVM-Based Method to Detect Malicious Attacks for Web Servers. APWeb Workshops 2006: 835-841 - 2005
- [c2]Wu Yang, Xiao-chun Yun, Yongtian Yang:
Using Boosting Learning Method for Intrusion Detection. ADMA 2005: 634-641 - [c1]Wu Yang, Xiao-chun Yun, Jianhua Li:
An Improved Network Intrusion Detection Method based on VQ-SVM. IASTED PDCS 2005: 583-587
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-02 21:30 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint