Ting Wu

Orcid: 0000-0001-5102-1934

Affiliations:
  • Hangzhou Dianzi University, School of Cyberspace, Hangzhou, China
  • Shandong University, Jinan, China (PhD 2002)


According to our database1, Ting Wu authored at least 56 papers between 2005 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Structure attack on full-round DBST.
Frontiers Comput. Sci., August, 2024

2023
DAFuzz: data-aware fuzzing of in-memory data stores.
PeerJ Comput. Sci., 2023

Fine-grained Face Anti-Spoofing based on Recursive Self-Attention and Multi-Scale Fusion.
Proceedings of the Asia Pacific Signal and Information Processing Association Annual Summit and Conference, 2023

2022
A GAN-Based Intrusion Detection Model for 5G Enabled Future Metaverse.
Mob. Networks Appl., December, 2022

Multi-Step Attack Detection Based on Pre-Trained Hidden Markov Models.
Sensors, 2022

Correction to: A lossless secret image sharing scheme using a larger finite field.
Multim. Tools Appl., 2022

A survey of lattice based expressive attribute based encryption.
Comput. Sci. Rev., 2022

Improved Collision Detection Of MD5 Using Sufficient Condition Combination.
Comput. J., 2022

Multiple Genetic Syndromes Recognition Based on a Deep Learning Framework and Cross-Loss Training.
IEEE Access, 2022

Weighted Mean-Field Multi-Agent Reinforcement Learning via Reward Attribution Decomposition.
Proceedings of the Database Systems for Advanced Applications. DASFAA 2022 International Workshops, 2022

2021
Fiden: Intelligent Fingerprint Learning for Attacker Identification in the Industrial Internet of Things.
IEEE Trans. Ind. Informatics, 2021

Adaptive Steganalysis Based on Statistical Model of Quantized DCT Coefficients for JPEG Images.
IEEE Trans. Dependable Secur. Comput., 2021

Identification of Private ICS Protocols Based on Raw Traffic.
Symmetry, 2021

A lossless secret image sharing scheme using a larger finite field.
Multim. Tools Appl., 2021

Intrusion Detecting System Based on Temporal Convolutional Network for In-Vehicle CAN Networks.
Mob. Inf. Syst., 2021

An Identity-Based Cross-Domain Authenticated Asymmetric Group Key Agreement.
Inf., 2021

2020
DSM: Delayed Signature Matching in Deep Packet Inspection.
Symmetry, 2020

MultiFuzz: A Coverage-Based Multiparty-Protocol Fuzzer for IoT Publish/Subscribe Protocols.
Sensors, 2020

Improved Single-Key Attacks on 2-GOST.
Secur. Commun. Networks, 2020

Attribute Based Encryption with Efficient Revocation from Lattices.
Int. J. Netw. Secur., 2020

HSE-Voting: A secure high-efficiency electronic voting scheme based on homomorphic signcryption.
Future Gener. Comput. Syst., 2020

Query-efficient label-only attacks against black-box machine learning models.
Comput. Secur., 2020

An eigenvalue-based immunization scheme for node attacks in networks with uncertainty.
Sci. China Inf. Sci., 2020

2019
Deep Learning for Secure Mobile Edge Computing in Cyber-Physical Transportation Systems.
IEEE Netw., 2019

When Traffic Flow Prediction and Wireless Big Data Analytics Meet.
IEEE Netw., 2019

A Game Theoretic Reward and Punishment Unwanted Traffic Control Mechanism.
Mob. Networks Appl., 2019

Editorial: Securing Internet of Things Through Big Data Analytics.
Mob. Networks Appl., 2019

Designing Statistical Model-based Discriminator for Identifying Computer-generated Graphics from Natural Images.
J. Univers. Comput. Sci., 2019

Cyberspace-Oriented Access Control: A Cyberspace Characteristics-Based Model and its Policies.
IEEE Internet Things J., 2019

Editorial: Dependable wireless industrial communications.
Trans. Emerg. Telecommun. Technol., 2019

A Vulnerability Assessment Method for Network System Based on Cooperative Game Theory.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2019

DHS-Voting: A Distributed Homomorphic Signcryption E-Voting.
Proceedings of the Dependability in Sensor, Cloud, and Big Data Systems and Applications, 2019

2018
Distinguishing Computer-Generated Graphics from Natural Images Based on Sensor Pattern Noise and Deep Learning.
Sensors, 2018

Large universe attribute based access control with efficient decryption in cloud storage system.
J. Syst. Softw., 2018

Generating stable biometric keys for flexible cloud computing authentication using finger vein.
Inf. Sci., 2018

Multi-User Searchable Symmetric Encryption with Dynamic Updates for Cloud Computing.
Inf., 2018

Neighbor-considered migration facilitates cooperation in prisoner's dilemma games.
Appl. Math. Comput., 2018

Identifying WeChat Red Packets and Fund Transfers Via Analyzing Encrypted Network Traffic.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Node Immunization in Networks with Uncertainty.
Proceedings of the 17th IEEE International Conference On Trust, 2018

A deep learning model for secure cyber-physical transportation systems.
Proceedings of the IEEE INFOCOM 2018, 2018

Resilient Consensus for Multi-agent Networks with Mobile Detectors.
Proceedings of the Neural Information Processing - 25th International Conference, 2018

Evolution of Resource Sharing Cooperation Based on Reciprocity in Social Networks.
Proceedings of the 27th International Conference on Computer Communication and Networks, 2018

CPS: A Community Priority Based Vaccine Distribution Strategy in Different Networks.
Proceedings of the 2018 IEEE 16th Intl Conf on Dependable, 2018

A Location Spoofing Detection Method for Social Networks (Short Paper).
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2018

2017
DeepTFP: Mobile Time Series Data Analytics based Traffic Flow Prediction.
CoRR, 2017

Poster: DeepTFP: Mobile Time Series Data Analytics based Traffic Flow Prediction.
Proceedings of the 23rd Annual International Conference on Mobile Computing and Networking, 2017

Cyberspace-Oriented Access Control: Model and Policies.
Proceedings of the Second IEEE International Conference on Data Science in Cyberspace, 2017

An Efficient Black-Box Vulnerability Scanning Method for Web Application.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2017

2016
Fine-grained Database Field Search Using Attribute-Based Encryption for E-Healthcare Clouds.
J. Medical Syst., 2016

A MapReduce-Based Distributed SVM for Scalable Data Type Classification.
Proceedings of the Collaborate Computing: Networking, Applications and Worksharing, 2016

2015
AN H.264/AVC HDTV watermarking algorithm robust to camcorder recording.
J. Vis. Commun. Image Represent., 2015

Geo-Localization Based Scene Recognition.
Proceedings of the 2015 IEEE International Conference on Multimedia Big Data, BigMM 2015, 2015

A Fragment Classification Method Depending on Data Type.
Proceedings of the 15th IEEE International Conference on Computer and Information Technology, 2015

2014
Improvement of a Uniqueness-and-Anonymity-Preserving User Authentication Scheme for Connected Health Care.
J. Medical Syst., 2014

2008
Improved Algorithm for Tate Pairing Computation.
Proceedings of The International Symposium on Electronic Commerce and Security, 2008

2005
Comment: A new blind signature based on the discrete logarithm problem for untraceability.
Appl. Math. Comput., 2005


  Loading...