default search action
Yue Wu 0010
Person information
- affiliation: Shanghai Jiaotong University, National Engineering Laboratory of Information Content Analysis, Shanghai, China
Other persons with the same name
- Yue Wu — disambiguation page
- Yue Wu 0001 (aka: Rex Yue Wu) — University of Southern California, Information Science Institute, Marina del Rey, CA, USA (and 2 more)
- Yue Wu 0002 — Rensselaer Polytechnic Institut, ECSE Department, Troy, NY, USA
- Yue Wu 0003 — University of Sheffield, Department of Electronic and Electrical Engineering, UK
- Yue Wu 0004 — Xidian University, International Research Center for Intelligent Perception and Computation, MoE Key Laboratory of Intelligent Perception and Image Understanding, Xi'an, China
- Yue Wu 0005 — Tsinghua University, Department of Electronic Engineering, TNList, Beijing, China
- Yue Wu 0006 — National University of Defense Technology, College of Information System and Management, Changsha, China
- Yue Wu 0007 — Hunan University, College of Electrical and Information Engineering, Changsha, China (and 1 more)
- Yue Wu 0008 — Northeastern University, Boston, MA, USA
- Yue Wu 0009 — Los Alamos National Laboratory, Earth and Environmental Sciences Division, Los Alamos, NM, USA
- Yue Wu 0011 — UCLA, CA, USA (and 1 more)
- Yue Wu 0012 — Hong Kong University of Science and Technology, Hong Kong, SAR, China
- Yue Wu 0013 — University of the Chinese Academy of Sciences, Institute of Computing Technology, Shenzhen, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j12]Tianming Zheng, Haojun Liu, Hang Xu, Xiang Chen, Ping Yi, Yue Wu:
Few-VulD: A Few-shot learning framework for software vulnerability detection. Comput. Secur. 144: 103992 (2024) - [j11]Yue Bi, Michèle A. Wigger, Yue Wu:
Normalized Delivery Time of Wireless MapReduce. IEEE Trans. Inf. Theory 70(10): 7005-7022 (2024) - [c37]Yue Bi, Yue Wu, Cunqing Hua:
DoF Analysis for (M, N)-Channels through a Number-Filling Puzzle. ISIT 2024: 3130-3135 - [i4]Yue Bi, Yue Wu, Cunqing Hua:
DoF Analysis for (M, N)-Channels through a Number-Filling Puzzle. CoRR abs/2402.02189 (2024) - [i3]Yunbo Li, Jiaping Gui, Yue Wu:
An Experimental Study of Different Aggregation Schemes in Semi-Asynchronous Federated Learning. CoRR abs/2405.16086 (2024) - 2023
- [j10]Bolun Wu, Futai Zou, Ping Yi, Yue Wu, Liang Zhang:
SlicedLocator: Code vulnerability locator based on sliced dependence graph. Comput. Secur. 134: 103469 (2023) - [c36]Yue Bi, Michèle A. Wigger, Yue Wu:
A New Interference-Alignment Scheme for Wireless MapReduce. GLOBECOM 2023: 4393-4398 - [c35]Futai Zou, Yuelin Hu, Wenliang Xu, Yue Wu:
Link Prediction-Based Multi-Identity Recognition of Darknet Vendors. ICICS 2023: 317-332 - 2022
- [j9]Jingcheng Yang, Hongwei Li, Shuo Shao, Futai Zou, Yue Wu:
FS-IDS: A framework for intrusion detection based on few-shot learning. Comput. Secur. 122: 102899 (2022) - [c34]Tianming Zheng, Zhixin Tong, Ping Yi, Yue Wu:
Automated Generation of Bug Samples Based on Source Code Analysis. APSEC 2022: 51-60 - [c33]Yenan Chen, Linsen Li, Zhaoqian Zhu, Yue Wu:
Work-in-Progress: Reliability Evaluation of Power SCADA System with Three-Layer IDS. CASES 2022: 1-2 - [c32]Mingjie Nie, Futai Zou, Yi Qin, Tianming Zheng, Yue Wu:
QUIC-CNN: Website Fingerprinting for QUIC Traffic in Tor Network. HPCC/DSS/SmartCity/DependSys 2022: 663-671 - [c31]Yi Qin, Tianming Zheng, Yue Wu, Futai Zou:
Tracing Tor Hidden Service Through Protocol Characteristics. ICCCN 2022: 1-9 - [c30]Yi Qin, Jiahe Wu, Futai Zou, Yue Wu:
Breaking Tor's Anonymity by Modifying Cell's Command. ISCC 2022: 1-7 - [c29]Yue Bi, Philippe Ciblat, Michèle A. Wigger, Yue Wu:
DoF of a Cooperative X-Channel with an Application to Distributed Computing. ISIT 2022: 566-571 - [c28]Haochen Zhai, Futai Zou, Junhua Tang, Yue Wu:
Towards High Transferability on Neural Network for Black-Box Adversarial Attacks. SecureComm 2022: 72-88 - [i2]Yue Bi, Michèle A. Wigger, Philippe Ciblat, Yue Wu:
DoF of a Cooperative X-Channel with an Application to Distributed Computing. CoRR abs/2201.11149 (2022) - [i1]Tianming Zheng, Ming Liu, Deepak Puthal, Ping Yi, Yue Wu, Xiangjian He:
Smart Grid: Cyber Attacks, Critical Defense Approaches, and Digital Twin. CoRR abs/2205.11783 (2022) - 2020
- [j8]Pengwenlong Gu, Cunqing Hua, Wenchao Xu, Rida Khatoun, Yue Wu, Ahmed Serhrouchni:
Control Channel Anti-Jamming in Vehicular Networks via Cooperative Relay Beamforming. IEEE Internet Things J. 7(6): 5064-5077 (2020)
2010 – 2019
- 2019
- [j7]Kedi Wang, Ping Yi, Futai Zou, Yue Wu:
Generating Adversarial Samples With Constrained Wasserstein Distance. IEEE Access 7: 136812-136821 (2019) - [c27]Yue Bi, Yue Wu, Cunqing Hua, Futai Zou:
Evolutionary Anti-Jamming Game in Non-Orthogonal Multiple Access System. GLOBECOM 2019: 1-6 - [c26]Yue Bi, Yue Wu, Cunqing Hua:
Deep Reinforcement Learning Based Multi-User Anti-Jamming Strategy. ICC 2019: 1-6 - [c25]Yongkang Jiang, Shenghong Li, Yue Wu, Futai Zou:
A Novel Image-Based Malware Classification Model Using Deep Learning. ICONIP (2) 2019: 150-161 - 2018
- [j6]Futai Zou, Linsen Li, Yue Wu, Jianhua Li, Siyu Zhang, Kaida Jiang:
Detecting Domain-Flux Malware Using DNS Failure Traffic. Int. J. Softw. Eng. Knowl. Eng. 28(2): 151-174 (2018) - [j5]Pengwenlong Gu, Cunqing Hua, Rida Khatoun, Yue Wu, Ahmed Serhrouchni:
Cooperative Antijamming Relaying for Control Channel Jamming in Vehicular Networks. IEEE Trans. Veh. Technol. 67(8): 7033-7046 (2018) - [c24]Boren He, Futai Zou, Yue Wu:
Multi-SDN Based Cooperation Scheme for DDoS Attack Defense. SSIC 2018: 1-7 - [c23]Junhua Tang, Shuli Zhao, Yue Wu, Jianhua Li:
Caching Strategy for Scalable Video Coding in Information-Centric Networking. SSIC 2018: 1-6 - [c22]Pengwenlong Gu, Cunqing Hua, Rida Khatoun, Yue Wu, Ahmed Serhrouchni:
Cooperative relay beamforming for control channel jamming in vehicular networks. WiOpt 2018: 1-7 - 2017
- [c21]Pengwenlong Gu, Cunqing Hua, Rida Khatoun, Yue Wu, Ahmed Serhrouchni:
Cooperative Anti-Jamming Relaying for Control Channel Jamming in Vehicular Networks. GLOBECOM 2017: 1-6 - 2016
- [j4]Ping Yi, Ting Zhu, Qingquan Zhang, Yue Wu, Li Pan:
Puppet attack: A denial of service attack in advanced metering infrastructure network. J. Netw. Comput. Appl. 59: 325-332 (2016) - [c20]Junhua Tang, Shujun Lin, Cunqing Hua, Yue Wu, Jianhua Li:
Channel aware resource allocation for device-to-device communication underlaying cellular networks. SSIC 2016: 1-5 - 2015
- [j3]Yue Wu, Yimeng Zhao, Michel Riguidel, Guanghao Wang, Ping Yi:
Security and trust management in opportunistic networks: a survey. Secur. Commun. Networks 8(9): 1812-1827 (2015) - [c19]Yue Wu, Fanchao Meng, Guanghao Wang, Ping Yi:
A Dempster-Shafer theory based traffic information trust model in vehicular ad hoc networks. SSIC 2015: 1-7 - 2014
- [j2]Wenchao Li, Ping Yi, Yue Wu, Li Pan, Jianhua Li:
A New Intrusion Detection System Based on KNN Classification Algorithm in Wireless Sensor Network. J. Electr. Comput. Eng. 2014: 240217:1-240217:8 (2014) - [c18]Sijun Ren, Ping Yi, Dapeng Hong, Yue Wu, Ting Zhu:
Distributed Construction of Connected Dominating Sets Optimized by Minimum-Weight Spanning Tree in Wireless Ad-Hoc Sensor Networks. CSE 2014: 901-908 - [c17]Sijun Ren, Ping Yi, Yue Wu, Jianhua Li:
An Asynchronous Distributed Algorithm for Constructing a Connected Dominating Set Optimized by Minimum-Weight Spanning Tree. CSE 2014: 1205-1212 - [c16]Sijun Ren, Ping Yi, Zhuqiulong Lin, Chenxi Guo, Yue Wu:
Constructing Minimum Connected Dominating Sets with Constant Update Time in Wireless Ad-Hoc Sensor Networks. CSE 2014: 1570-1576 - [c15]Ping Yi, Ting Zhu, Qingquan Zhang, Yue Wu, Jianhua Li:
A denial of service attack in advanced metering infrastructure network. ICC 2014: 1029-1034 - [c14]Sijun Ren, Ping Yi, Ting Zhu, Yue Wu, Jianhua Li:
A 3-hop message relay algorithm for connected dominating sets in wireless ad-hoc sensor networks. ICCC 2014: 829-834 - 2013
- [j1]Ping Yi, Ting Zhu, Jianqing Ma, Yue Wu:
An Intrusion Prevention Mechanism in Mobile Ad Hoc Networks. Ad Hoc Sens. Wirel. Networks 17(3-4): 269-292 (2013) - [c13]Yue Wu, Zhangyin Qian, Michel Riguidel, Gongliang Chen:
CogTag: Cognitive tags framework for new generation Internet beyond IP & MPLS. NOF 2013: 1-4 - 2012
- [c12]Ping Yi, Ting Zhu, Qingquan Zhang, Yue Wu, Jianhua Li:
Green firewall: An energy-efficient intrusion prevention mechanism in wireless sensor network. GLOBECOM 2012: 3037-3042 - [c11]Jiaping Gui, Yue Wu, Chenji Pan, Futai Zou, Yifei Xie:
Cost based routing in delay tolerant networks. PIMRC 2012: 1084-1089 - [c10]Chenji Pan, Jiaping Gui, Jiaju Yan, Yue Wu:
Markov Chain-Based Routing Algorithm in Delay-Tolerant Networks. SAINT 2012: 161-165 - 2010
- [c9]Yang Liu, Yue Wu, Junhua Tang:
Two tier detection model for misbehavior of low-power nodes in virtual MIMO based wireless networks. IAS 2010: 155-160 - [c8]Donglai Sun, Yue Wu, Tian Wu, Yang Liu, Ning Liu, Junhua Tang:
Design and Construction of a Prototype Secure Wireless Mesh Network Testbed. AINA Workshops 2010: 345-350
2000 – 2009
- 2009
- [c7]Ping Yi, Hongkai Xing, Yue Wu, Linchun Li:
Alert correlation by a retrospective method. ICOIN 2009: 1-3 - [c6]Ping Yi, Tianhao Tong, Ning Liu, Yue Wu, Jianqing Ma:
Security in Wireless Mesh Networks: Challenges and Solutions. ITNG 2009: 423-428 - [c5]Ning Liu, Jianhua Li, Ping Yi, Jianing Li, Yue Wu:
Outage Behavior of Multi-Antenna Multi-Relay Non-Regenerative Cooperative Networks. ITNG 2009: 541-545 - [c4]Yang Liu, Ping Yi, Yue Wu:
Efficient implementation of FIR type time domain equalizers for MIMO wireless channels via M-LESQ. PIMRC 2009: 286-290 - 2008
- [c3]Ning Liu, Jianhua Li, Liming Hao, Yue Wu, Ping Yi:
Group-Based Trust Model in P2P System Based on Trusted Computing. CSSE (3) 2008: 797-801 - [c2]Junhua Tang, Yue Wu, Linsen Li, Ping Yi:
The Effect of Opportunistic Scheduling on TCP Performance over Shared Wireless Downlink. GLOBECOM 2008: 5091-5095 - [c1]Linchun Li, Jianhua Li, Yue Wu, Ping Yi:
A Group Key Management Scheme with Revocation and Loss-tolerance Capability for Wireless Sensor Networks. PerCom 2008: 324-329
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-15 19:35 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint