​
Login / Signup
Yue Wu
ORCID
Publication Activity (10 Years)
Years Active: 2008-2024
Publications (10 Years): 16
Top Topics
Dominating Set
Top Venues
CoRR
Comput. Secur.
CSE
SSIC
</>
Publications
</>
Yue Bi
,
Yue Wu
,
Cunqing Hua
DoF Analysis for (M, N)-Channels through a Number-Filling Puzzle.
CoRR
(2024)
Yunbo Li
,
Jiaping Gui
,
Yue Wu
An Experimental Study of Different Aggregation Schemes in Semi-Asynchronous Federated Learning.
CoRR
(2024)
Tianming Zheng
,
Haojun Liu
,
Hang Xu
,
Xiang Chen
,
Ping Yi
,
Yue Wu
Few-VulD: A Few-shot learning framework for software vulnerability detection.
Comput. Secur.
144 (2024)
Yue Bi
,
Michèle A. Wigger
,
Yue Wu
A New Interference-Alignment Scheme for Wireless MapReduce.
GLOBECOM
(2023)
Futai Zou
,
Yuelin Hu
,
Wenliang Xu
,
Yue Wu
Link Prediction-Based Multi-Identity Recognition of Darknet Vendors.
ICICS
(2023)
Bolun Wu
,
Futai Zou
,
Ping Yi
,
Yue Wu
,
Liang Zhang
SlicedLocator: Code vulnerability locator based on sliced dependence graph.
Comput. Secur.
134 (2023)
Jingcheng Yang
,
Hongwei Li
,
Shuo Shao
,
Futai Zou
,
Yue Wu
FS-IDS: A framework for intrusion detection based on few-shot learning.
Comput. Secur.
122 (2022)
Tianming Zheng
,
Ming Liu
,
Deepak Puthal
,
Ping Yi
,
Yue Wu
,
Xiangjian He
Smart Grid: Cyber Attacks, Critical Defense Approaches, and Digital Twin.
CoRR
(2022)
Tianming Zheng
,
Zhixin Tong
,
Ping Yi
,
Yue Wu
Automated Generation of Bug Samples Based on Source Code Analysis.
APSEC
(2022)
Yi Qin
,
Tianming Zheng
,
Yue Wu
,
Futai Zou
Tracing Tor Hidden Service Through Protocol Characteristics.
ICCCN
(2022)
Yi Qin
,
Jiahe Wu
,
Futai Zou
,
Yue Wu
Breaking Tor's Anonymity by Modifying Cell's Command.
ISCC
(2022)
Mingjie Nie
,
Futai Zou
,
Yi Qin
,
Tianming Zheng
,
Yue Wu
QUIC-CNN: Website Fingerprinting for QUIC Traffic in Tor Network.
HPCC/DSS/SmartCity/DependSys
(2022)
Haochen Zhai
,
Futai Zou
,
Junhua Tang
,
Yue Wu
Towards High Transferability on Neural Network for Black-Box Adversarial Attacks.
SecureComm
(2022)
Kedi Wang
,
Ping Yi
,
Futai Zou
,
Yue Wu
Generating Adversarial Samples With Constrained Wasserstein Distance.
IEEE Access
7 (2019)
Junhua Tang
,
Shuli Zhao
,
Yue Wu
,
Jianhua Li
Caching Strategy for Scalable Video Coding in Information-Centric Networking.
SSIC
(2018)
Ping Yi
,
Ting Zhu
,
Qingquan Zhang
,
Yue Wu
,
Li Pan
Puppet attack: A denial of service attack in advanced metering infrastructure network.
J. Netw. Comput. Appl.
59 (2016)
Yue Wu
,
Yimeng Zhao
,
Michel Riguidel
,
Guanghao Wang
,
Ping Yi
Security and trust management in opportunistic networks: a survey.
Secur. Commun. Networks
8 (9) (2015)
Yue Wu
,
Fanchao Meng
,
Guanghao Wang
,
Ping Yi
A Dempster-Shafer theory based traffic information trust model in vehicular ad hoc networks.
SSIC
(2015)
Wenchao Li
,
Ping Yi
,
Yue Wu
,
Li Pan
,
Jianhua Li
A New Intrusion Detection System Based on KNN Classification Algorithm in Wireless Sensor Network.
J. Electr. Comput. Eng.
2014 (2014)
Sijun Ren
,
Ping Yi
,
Dapeng Hong
,
Yue Wu
,
Ting Zhu
Distributed Construction of Connected Dominating Sets Optimized by Minimum-Weight Spanning Tree in Wireless Ad-Hoc Sensor Networks.
CSE
(2014)
Ping Yi
,
Ting Zhu
,
Qingquan Zhang
,
Yue Wu
,
Jianhua Li
A denial of service attack in advanced metering infrastructure network.
ICC
(2014)
Sijun Ren
,
Ping Yi
,
Yue Wu
,
Jianhua Li
An Asynchronous Distributed Algorithm for Constructing a Connected Dominating Set Optimized by Minimum-Weight Spanning Tree.
CSE
(2014)
Sijun Ren
,
Ping Yi
,
Ting Zhu
,
Yue Wu
,
Jianhua Li
A 3-hop message relay algorithm for connected dominating sets in wireless ad-hoc sensor networks.
ICCC
(2014)
Sijun Ren
,
Ping Yi
,
Zhuqiulong Lin
,
Chenxi Guo
,
Yue Wu
Constructing Minimum Connected Dominating Sets with Constant Update Time in Wireless Ad-Hoc Sensor Networks.
CSE
(2014)
Yue Wu
,
Zhangyin Qian
,
Michel Riguidel
,
Gongliang Chen
CogTag: Cognitive tags framework for new generation Internet beyond IP & MPLS.
NOF
(2013)
Ping Yi
,
Ting Zhu
,
Jianqing Ma
,
Yue Wu
An Intrusion Prevention Mechanism in Mobile Ad Hoc Networks.
Ad Hoc Sens. Wirel. Networks
17 (3-4) (2013)
Ping Yi
,
Ting Zhu
,
Qingquan Zhang
,
Yue Wu
,
Jianhua Li
Green firewall: An energy-efficient intrusion prevention mechanism in wireless sensor network.
GLOBECOM
(2012)
Ning Liu
,
Jianhua Li
,
Ping Yi
,
Jianing Li
,
Yue Wu
Outage Behavior of Multi-Antenna Multi-Relay Non-Regenerative Cooperative Networks.
ITNG
(2009)
Ping Yi
,
Hongkai Xing
,
Yue Wu
,
Linchun Li
Alert correlation by a retrospective method.
ICOIN
(2009)
Yang Liu
,
Ping Yi
,
Yue Wu
Efficient implementation of FIR type time domain equalizers for MIMO wireless channels via M-LESQ.
PIMRC
(2009)
Ping Yi
,
Tianhao Tong
,
Ning Liu
,
Yue Wu
,
Jianqing Ma
Security in Wireless Mesh Networks: Challenges and Solutions.
ITNG
(2009)
Junhua Tang
,
Yue Wu
,
Linsen Li
,
Ping Yi
The Effect of Opportunistic Scheduling on TCP Performance over Shared Wireless Downlink.
GLOBECOM
(2008)
Linchun Li
,
Jianhua Li
,
Yue Wu
,
Ping Yi
A Group Key Management Scheme with Revocation and Loss-tolerance Capability for Wireless Sensor Networks.
PerCom
(2008)
Ning Liu
,
Jianhua Li
,
Liming Hao
,
Yue Wu
,
Ping Yi
Group-Based Trust Model in P2P System Based on Trusted Computing.
CSSE (3)
(2008)