Sign in
Yu Wen
ORCID
Publication Activity (10 Years)
Years Active: 2001-2023
Publications (10 Years): 46
Top Topics
Feature Fusion
Data Sharing
Malware Detection
Authorship Attribution
Top Venues
TrustCom
IEEE Access
ISCC
M2VIP
</>
Publications
</>
Yu Wen
,
Chenhao Xie
,
Shuaiwen Leon Song
,
Xin Fu
Post0-VR: Enabling Universal Realistic Rendering for Modern VR via Exploiting Architectural Similarity and Data Sharing.
HPCA
(2023)
Tao Xue
,
Yu Wen
,
Bo Luo
,
Gang Li
,
Yingjiu Li
,
Boyang Zhang
,
Yang Zheng
,
Yanfei Hu
,
Dan Meng
SparkAC: Fine-Grained Access Control in Spark for Secure Data Sharing and Analytics.
IEEE Trans. Dependable Secur. Comput.
20 (2) (2023)
Yanfei Hu
,
Shuailou Li
,
Boyang Zhang
,
Xu Cheng
,
Yu Wen
HUND: Enhancing Hardware Performance Counter Based Malware Detection Under System Resource Competition Using Explanation Method.
ISCC
(2023)
Yanfei Hu
,
Shuai Li
,
Shuailou Li
,
Boyang Zhang
,
Yu Wen
DAMUS: Adaptively Updating Hardware Performance Counter Based Malware Detector Under System Resource Competition.
ISCC
(2023)
Yu Wen
,
Jinlin Xue
,
Han Sun
,
Yue Song
,
Pengfei Lv
,
Shaohua Liu
,
Yangyang Chu
,
Tianyu Zhang
High-precision target ranging in complex orchard scenes by utilizing semantic segmentation results and binocular vision.
Comput. Electron. Agric.
215 (2023)
Rongji Yin
,
Yi Shi
,
Wei Xie
,
Jinhui Lu
,
Yu Wen
,
Weixing Cheng
,
Weidong Zhang
Robust Controller Design for an Active Hexapod Platform with Prescribed Performance.
ICARM
(2023)
Shuailou Li
,
Yu Wen
,
Tao Xue
,
Zhaoyang Wang
,
Yanna Wu
,
Dan Meng
PRISPARK: Differential Privacy Enforcement for Big Data Computing in Apache Spark.
SRDS
(2023)
Yiwei Dong
,
Feng Yang
,
Yu Wen
,
Yinglong Zhang
,
Xingsong Wang
,
Mengqian Tian
Design and Research of Mobile Moxibustion Robot Based on AprilTag.
M2VIP
(2023)
Yanfei Hu
,
Shuangshuang Liang
,
Min Li
,
Tao Xue
,
Boyang Zhang
,
Yu Wen
CARE: Enabling Hardware Performance Counter based Malware Detection Resilient to System Resource Competition.
HPCC/DSS/SmartCity/DependSys
(2022)
Meichao Yan
,
Yu Wen
,
Qingxuan Shi
,
Xuedong Tian
A Multimodal Retrieval and Ranking Method for Scientific Documents Based on HFS and XLNet.
Sci. Program.
2022 (2022)
Liang Wang
,
Jun Li
,
Lina Zuo
,
Yu Wen
,
Haibo Liu
,
Wenyuan Liu
T-Tracer: A Blockchain-Aided Symbol Mapping Watermarking Scheme for Traitor Tracing in Non-Repudiation Data Delivery.
BSCI
(2022)
Shuxin Yang
,
Suxin Tong
,
Guixiang Zhu
,
Jie Cao
,
Youquan Wang
,
Zhengfa Xue
,
Hongliang Sun
,
Yu Wen
MVE-FLK: A multi-task legal judgment prediction via multi-view encoder fusing legal keywords.
Knowl. Based Syst.
239 (2022)
Penglong Chen
,
Zhen Li
,
Yu Wen
,
Lili Liu
Generating Adversarial Source Programs Using Important Tokens-based Structural Transformations.
ICECCS
(2022)
Lili Liu
,
Zhen Li
,
Yu Wen
,
Penglong Chen
Investigating the impact of vulnerability datasets on deep learning-based vulnerability detectors.
PeerJ Comput. Sci.
8 (2022)
Yu Wen
,
Xinhua Zhu
,
Lanfang Zhang
CQACD: A Concept Question-Answering System for Intelligent Tutoring Using a Domain Ontology With Rich Semantics.
IEEE Access
10 (2022)
Zhiqiang Xu
,
Pengcheng Fang
,
Changlin Liu
,
Xusheng Xiao
,
Yu Wen
,
Dan Meng
DEPCOMM: Graph Summarization on System Audit Logs for Attack Investigation.
IEEE Symposium on Security and Privacy
(2022)
Li Wang
,
Xin Ye
,
Jialin Li
,
Yu Wen
,
Wenbin Liao
,
Houbing Song
,
Jie Chen
,
Jianqiang Li
GAN-Based Dual Active Learning for Nosocomial Infection Detection.
IEEE Trans. Netw. Sci. Eng.
9 (5) (2022)
Luyao Chen
,
Na Yan
,
Boyang Zhang
,
Zhaoyang Wang
,
Yu Wen
,
Yanfei Hu
A General Backdoor Attack to Graph Neural Networks Based on Explanation Method.
TrustCom
(2022)
Chun Li
,
Yu Wen
,
Qingxuan Shi
,
Fang Yang
,
Hongyan Ma
,
Xuedong Tian
A Pavement Crack Detection Method Based on Multiscale Attention and HFS.
Comput. Intell. Neurosci.
2022 (2022)
Na Yan
,
Yu Wen
,
Luyao Chen
,
Yanna Wu
,
Boyang Zhang
,
Zhaoyang Wang
,
Dan Meng
Deepro: Provenance-based APT Campaigns Detection via GNN.
TrustCom
(2022)
PengNan Hao
,
Zhen Li
,
Cui Liu
,
Yu Wen
,
Fanming Liu
Towards Improving Multiple Authorship Attribution of Source Code.
QRS
(2022)
Yu Wen
,
Jianuo Chen
,
Linjie Dong
,
Rongkai He
,
Xingsong Wang
,
Mengqian Tian
Surface Defect Detection of Cable Based on Improved YOLO V3.
M2VIP
(2022)
Huiying Wang
,
Huixin Shen
,
Boyang Zhang
,
Yu Wen
,
Dan Meng
Generating Adversarial Point Clouds on Multi-modal Fusion Based 3D Object Detection Model.
ICICS (1)
(2021)
Chun Yang
,
Jinghui Xu
,
Shuangshuang Liang
,
Yanna Wu
,
Yu Wen
,
Boyang Zhang
,
Dan Meng
DeepMal: maliciousness-Preserving adversarial instruction learning against static malware detection.
Cybersecur.
4 (1) (2021)
Xiaoming Mao
,
Yu Wen
,
Liang Wu
,
Baorong Zhou
Simulation of LCC-MMC HVDC Systems Using Dynamic Phasors.
IEEE Access
9 (2021)
Junfeng Tian
,
Chenxin Wang
,
Zhen Li
,
Yu Wen
Generating Adversarial Examples of Source Code Classification Models via Q-Learning-Based Markov Decision Process.
QRS
(2021)
Wei Wang
,
Huilin Jiang
,
Yan Dong
,
Yansong Song
,
Shuai Chang
,
Yu Wen
Research on Composite Tracking Control Technology of Single Detector in Laser Communication.
ICAIT
(2021)
Yanna Wu
,
Fucheng Liu
,
Yu Wen
Malicious Login Detection Using Long Short-Term Memory with an Attention Mechanism.
IFIP Int. Conf. Digital Forensics
(2021)
Yuxuan Zhang
,
Zhaoyang Wang
,
Boyang Zhang
,
Yu Wen
,
Dan Meng
Black-Box Buster: A Robust Zero-Shot Transfer-Based Adversarial Attack Method.
ICICS (2)
(2021)
Chen Zhao
,
Yu Wen
,
Shuailou Li
,
Fucheng Liu
,
Dan Meng
FederatedReverse: A Detection and Defense Method Against Backdoor Attacks in Federated Learning.
IH&MMSec
(2021)
Min Li
,
Chunfang Li
,
Shuailou Li
,
Yanna Wu
,
Boyang Zhang
,
Yu Wen
ACGVD: Vulnerability Detection Based on Comprehensive Graph via Graph Neural Network with Attention.
ICICS (1)
(2021)
Tao Xue
,
Yu Wen
,
Bo Luo
,
Boyang Zhang
,
Yang Zheng
,
Yanfei Hu
,
Yingjiu Li
,
Gang Li
,
Dan Meng
GuardSpark++: Fine-Grained Purpose-Aware Access Control for Secure Data Sharing and Analysis in Spark.
ACSAC
(2020)
Yu Wen
,
Xiaomin Yang
,
Turgay Çelik
,
Olga S. Sushkova
,
Marcelo Keese Albertini
Multifocus image fusion using convolutional neural network.
Multim. Tools Appl.
79 (45-46) (2020)
Jinghui Xu
,
Yu Wen
,
Chun Yang
,
Dan Meng
An Approach for Poisoning Attacks against RNN-Based Cyber Anomaly Detection.
TrustCom
(2020)
Jing Zhang
,
Yu Wen
Malware Detection Based on Opcode Dynamic Analysis.
EAI Endorsed Trans. Security Safety
7 (26) (2020)
Fucheng Liu
,
Yu Wen
,
Yanna Wu
,
Shuangshuang Liang
,
Xihe Jiang
,
Dan Meng
MLTracer: Malicious Logins Detection System via Graph Neural Network.
TrustCom
(2020)
Dan Meng
,
Rui Hou
,
Gang Shi
,
Bibo Tu
,
Aimin Yu
,
Ziyuan Zhu
,
Xiaoqi Jia
,
Yu Wen
,
Yun Yang
Built-in Security Computer: Deploying Security-First Architecture Using Active Security Processor.
IEEE Trans. Computers
69 (11) (2020)
Xixi Jiang
,
Qingqing Luo
,
Zhiwei Wang
,
Tao Mei
,
Yu Wen
,
Xin Li
,
Kwang-Ting Cheng
,
Xin Yang
Multi-phase and Multi-level Selective Feature Fusion for Automated Pancreas Segmentation from CT Images.
MICCAI (4)
(2020)
Fucheng Liu
,
Yu Wen
,
Dongxue Zhang
,
Xihe Jiang
,
Xinyu Xing
,
Dan Meng
Log2vec: A Heterogeneous Graph Embedding Based Approach for Detecting Cyber Threats within Enterprise.
CCS
(2019)
Lihua Liang
,
Yu Wen
Integrated Rudder/Fin Control With Disturbance Compensation Distributed Model Predictive Control.
IEEE Access
6 (2018)
Yu Wen
,
Ke Yao
,
Chunlin Tian
,
Yao Wu
,
Zhongmin Zhang
,
Yaning Shi
,
Yin Tian
,
Jin Yang
,
Peiqi Wang
Aggregated Multimodal Bidirectional Recurrent Model for Audiovisual Speech Recognition.
ICCCS (6)
(2018)
Xingwang Xiong
,
Lei Wang
,
Wanling Gao
,
Rui Ren
,
Ke Liu
,
Chen Zheng
,
Yu Wen
,
Yi Liang
DCMIX: Generating Mixed Workloads for the Cloud Data Center.
Bench
(2018)
Fangxiao Ning
,
Yu Wen
,
Gang Shi
,
Dan Meng
Efficient tamper-evident logging of distributed systems via concurrent authenticated tree.
IPCCC
(2017)
Wei Wang
,
Xuetao Zhang
,
Yu Wen
,
Fei Wang
Study of cognitive distraction detection based on GMA analysis.
ICVES
(2016)
Edgar Garcia Avila
,
Yu Wen
,
Maarouf Saad
,
Jawhar Ghommam
Stable PID tracking control with application to a 7-DoF exoskeleton robot.
CCE
(2016)
Yu Wen
,
Xuetao Zhang
,
Fei Wang
,
Jinsong Han
Predicting driver lane change intent using HCRF.
ICVES
(2015)
Yu Wen
,
Weiping Wang
,
Li Guo
,
Dan Meng
Automated Power Control for Virtualized Infrastructures.
J. Comput. Sci. Technol.
29 (6) (2014)
Jianfeng Zhan
,
Lei Wang
,
Bibo Tu
,
Zhihong Zhang
,
Yu Wen
,
Yuansheng Chen
,
Wei Zhou
,
Dan Meng
,
Ninghui Sun
A layered design methodology of cluster system stack.
CLUSTER
(2007)
Jianfeng Zhan
,
Lei Wang
,
Bibo Tu
,
Hui Wang
,
Zhihong Zhang
,
Yi Jin
,
Yu Wen
,
Yuansheng Chen
,
Peng Wang
,
Bizhu Qiu
,
Dan Meng
,
Ninghui Sun
The design methodology of Phoenix cluster system software stack.
China HPC
(2007)
Yi Zhou
,
Meng Joo Er
,
Yu Wen
A Hybrid Approach for Automatic Generation of Fuzzy Inference Systems without Supervised Learning.
ACC
(2007)
Shing-Chow Chan
,
Yu Wen
,
Ka-Leung Ho
A robust past algorithm for subspace tracking in impulsive noise.
IEEE Trans. Signal Process.
54 (1) (2006)
Guang-ying Ma
,
Ping Li
,
Yu Wen
,
Xue-yan Du
Application of genetic algorithm in estimating origin-destination matrices of traffic network.
GrC
(2005)
Yu Wen
,
Shing-Chow Chan
,
Ka-Leung Ho
Robust recursive bi-iteration singular value decomposition (SVD) for subspace tracking and adaptive filtering.
ISCAS (4)
(2003)
Yu Wen
,
Tie-Jun Wu
Dynamic window search of ant colony optimization for complex multi-stage decision problems.
SMC
(2003)
Yu Wen
,
Shing-Chow Chan
,
Ka-Leung Ho
A robust subspace tracking algorithm for subspace-based blind multiuser detection in impulsive noise.
DSP
(2002)
Yu Wen
,
Shing-Chow Chan
,
Ka-Leung Ho
Robust subspace tracking based blind channel identification in impulsive noise environment.
EUSIPCO
(2002)
Yu Wen
,
Shing-Chow Chan
,
Ka-Leung Ho
Robust subspace tracking in impulsive noise.
ICC
(2001)