Songyang Wu
Orcid: 0000-0002-9623-8894
According to our database1,
Songyang Wu
authored at least 30 papers
between 2009 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
IEEE Robotics Autom. Lett., September, 2024
Robotica, March, 2024
Proceedings of the Advanced Intelligent Computing Technology and Applications, 2024
2023
Effects of Competition and Reputation on Auditing Cloud Service Provider's Security Commitment.
IEEE Syst. J., March, 2023
Incoherent Scattering of a Bessel Vortex Electromagnetic Beam From a Nonmagnetized Plasma.
IEEE Trans. Geosci. Remote. Sens., 2023
Knowl. Based Syst., 2023
Both Sides Needed: A Two-Dimensional Measurement Study of Email Security Based on SPF and DMARC.
Proceedings of the 19th International Conference on Mobility, Sensing and Networking, 2023
Introducing Unsupervised Big Data and Multimodal Large Models for Small Tasks on Plate Recognition.
Proceedings of the 16th International Congress on Image and Signal Processing, 2023
Proceedings of the 2023 International Conference on Artificial Intelligence, 2023
2022
Peer-to-Peer Netw. Appl., 2022
Cloud Evidence Tracing System: An integrated forensics investigation system for large-scale public cloud platform.
Digit. Investig., 2022
Proceedings of the 2022 5th International Conference on Signal Processing and Machine Learning, 2022
2021
Social network node influence maximization method combined with degree discount and local node optimization.
Soc. Netw. Anal. Min., 2021
System Security Analysis of Different Link Proportions Between Nodes in the Cyber-Physical System Against Target Attack.
Proceedings of the Frontiers in Cyber Security - 4th International Conference, 2021
2018
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018
2017
Detect and Prevent SIP Flooding Attacks in VoLTE by Utilizing a Two-Tier PFilter Design.
IEICE Trans. Inf. Syst., 2017
Comput. Electr. Eng., 2017
Detect SIP Flooding Attacks in VoLTE by Utilizing and Compressing Counting Bloom Filter.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2017
2016
Secure Provenance for Data Forensics with Efficient Revocation of Anonymous Credentials in Cloud Computing.
Wirel. Pers. Commun., 2016
一种面向分布式异构网络的基于可信计算的信任模型 (Trust Model Based on Trusted Computing for Distributed Heterogeneous Networks).
计算机科学, 2016
Effective detection of android malware based on the usage of data flow APIs and machine learning.
Inf. Softw. Technol., 2016
Proceedings of the 4th International Conference on Cloud Computing and Intelligence Systems, 2016
2015
Compact Leakage-Free ID-Based Signature Scheme with Applications to Secret Handshakes.
Wirel. Pers. Commun., 2015
Secur. Commun. Networks, 2015
A Pairing-free Key-insulated Certificate-based Signature Scheme with Provable Security.
KSII Trans. Internet Inf. Syst., 2015
Analysis and Improvement of Patient Self-controllable Multi-level Privacy-preserving Cooperative Authentication Scheme.
Int. J. Netw. Secur., 2015
2009
Proceedings of the 2nd International Conference on BioMedical Engineering and Informatics, 2009