Rongwei Yu

Orcid: 0000-0002-8967-2692

According to our database1, Rongwei Yu authored at least 20 papers between 2009 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
AMAD: Active learning-based multivariate time series anomaly detection for large-scale IT systems.
Comput. Secur., February, 2024

Personalized and privacy-enhanced federated learning framework via knowledge distillation.
Neurocomputing, 2024

DG-RainDiff: Depth-Guided Dynamic Message Passing Diffusion Model for Mixture of Rain Removal.
Proceedings of the IEEE International Conference on Acoustics, 2024

Diff-HOD: Diffusion Model for Object Detection in Hazy Weather Conditions.
Proceedings of the IEEE International Conference on Acoustics, 2024

2023
Semi-RainGAN: A Semisupervised Coarse-to-Fine Guided Generative Adversarial Network for Mixture of Rain Removal.
Symmetry, October, 2023

GANAD: A GAN-based method for network anomaly detection.
World Wide Web (WWW), September, 2023

TxMirror: When the Dynamic EVM Stack Meets Transactions for Smart Contract Vulnerability Detection.
Symmetry, July, 2023

ImLiDAR: Cross-Sensor Dynamic Message Propagation Network for 3-D Object Detection.
IEEE Trans. Geosci. Remote. Sens., 2023

A Modified Gray Wolf Optimizer-Based Negative Selection Algorithm for Network Anomaly Detection.
Int. J. Intell. Syst., 2023

HLA-HOD: Joint High-Low Adaptation for Object Detection in Hazy Weather Conditions.
Int. J. Intell. Syst., 2023

2022
Retrofitting LBR Profiling to Enhance Virtual Machine Introspection.
IEEE Trans. Inf. Forensics Secur., 2022

ImLiDAR: Cross-Sensor Dynamic Message Propagation Network for 3D Object Detection.
CoRR, 2022

BSB: Bringing Safe Browsing to Blockchain Platform.
Proceedings of the Network and System Security - 16th International Conference, 2022

Multi-timescale History Modeling for Temporal Knowledge Graph Completion.
Proceedings of the 18th International Conference on Mobility, Sensing and Networking, 2022

2020
Real-Time Prediction of Welding Penetration Mode and Depth Based on Visual Characteristics of Weld Pool in GMAW Process.
IEEE Access, 2020

2018
Controlled Channel Attack Detection Based on Hardware Virtualization.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018

2011
Statistical Fault Localization via Semi-dynamic Program Slicing.
Proceedings of the IEEE 10th International Conference on Trust, 2011

2010
Behavior-based Attestation of Policy Enforcement among Trusted Virtual Domains.
J. Networks, 2010

2009
An Optimized Anonymous Attestation Protocol from Bilinear Pairing.
Proceedings of the International Conference on Scalable Computing and Communications / Eighth International Conference on Embedded Computing, 2009

A Direct Anonymous Attestation Protocol Based on Hierarchical Group Signature.
Proceedings of the 12th IEEE International Conference on Computational Science and Engineering, 2009


  Loading...