Wei Yang
Orcid: 0000-0003-0332-2649Affiliations:
- University of Science and Technology of China, School of Computer Science and Technology, Hefei, China
- University of Science and Technology of China, Suzhou Institute for Advanced Study, China
According to our database1,
Wei Yang
authored at least 185 papers
between 2006 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
-
on dl.acm.org
On csauthors.net:
Bibliography
2025
Expert Syst. Appl., 2025
2024
IEEE Trans. Mob. Comput., August, 2024
Proc. VLDB Endow., April, 2024
IEEE ACM Trans. Audio Speech Lang. Process., 2024
EfficientGS: Streamlining Gaussian Splatting for Large-Scale High-Resolution Scene Representation.
CoRR, 2024
PFFAA: Prototype-based Feature and Frequency Alteration Attack for Semantic Segmentation.
Proceedings of the 32nd ACM International Conference on Multimedia, MM 2024, Melbourne, VIC, Australia, 28 October 2024, 2024
Proceedings of the IEEE INFOCOM 2024, 2024
Proceedings of the Thirty-Third International Joint Conference on Artificial Intelligence, 2024
Entangled View-Epipolar Information Aggregation for Generalizable Neural Radiance Fields.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2024
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024
2023
Avalon: A Scalable and Secure Distributed Transaction Ledger Based on Proof-of-Market.
IEEE Trans. Computers, December, 2023
IEEE Trans. Mob. Comput., October, 2023
IEEE Trans. Mob. Comput., August, 2023
Analyzing Preference Data With Local Privacy: Optimal Utility and Enhanced Robustness.
IEEE Trans. Knowl. Data Eng., August, 2023
IEEE Trans. Mob. Comput., June, 2023
IEEE Trans. Parallel Distributed Syst., May, 2023
Locally Differentially Private Heterogeneous Graph Aggregation with Utility Optimization.
Entropy, January, 2023
Reinforcement Learning-based Adversarial Attacks on Object Detectors using Reward Shaping.
Proceedings of the 31st ACM International Conference on Multimedia, 2023
FGNet: Towards Filling the Intra-class and Inter-class Gaps for Few-shot Segmentation.
Proceedings of the Thirty-Second International Joint Conference on Artificial Intelligence, 2023
Proceedings of the IEEE International Conference on Multimedia and Expo, 2023
C2F2NeUS: Cascade Cost Frustum Fusion for High Fidelity and Generalizable Neural Surface Reconstruction.
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023
Proceedings of the IEEE International Conference on Acoustics, 2023
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2023
Proceedings of the 2023 4th International Conference on Computing, 2023
2022
IEEE Trans. Mob. Comput., 2022
IEEE Trans. Knowl. Data Eng., 2022
IEEE Trans. Intell. Transp. Syst., 2022
IEEE Trans. Cogn. Commun. Netw., 2022
Detaching and Boosting: Dual Engine for Scale-Invariant Self-Supervised Monocular Depth Estimation.
IEEE Robotics Autom. Lett., 2022
Segment as Points for Efficient and Effective Online Multi-Object Tracking and Segmentation.
IEEE Trans. Pattern Anal. Mach. Intell., 2022
J. Comput. Sci. Technol., 2022
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2022
Proceedings of the MM '22: The 30th ACM International Conference on Multimedia, Lisboa, Portugal, October 10, 2022
AtHom: Two Divergent Attentions Stimulated By Homomorphic Training in Text-to-Image Synthesis.
Proceedings of the MM '22: The 30th ACM International Conference on Multimedia, Lisboa, Portugal, October 10, 2022
Proceedings of the 34th IEEE International Conference on Tools with Artificial Intelligence, 2022
Proceedings of the IEEE International Conference on Acoustics, 2022
Proceedings of the IEEE International Conference on Acoustics, 2022
Proceedings of the Thirty-Sixth AAAI Conference on Artificial Intelligence, 2022
2021
F3SNet: A Four-Step Strategy for QIM Steganalysis of Compressed Speech Based on Hierarchical Attention Network.
Secur. Commun. Networks, 2021
Estimating Clustering Coefficient of Multiplex Graphs with Local Differential Privacy.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2021
Proceedings of the Wireless Algorithms, Systems, and Applications, 2021
Proceedings of the MM '21: ACM Multimedia Conference, Virtual Event, China, October 20, 2021
Proceedings of the MM '21: ACM Multimedia Conference, Virtual Event, China, October 20, 2021
Proceedings of the ICMR '21: International Conference on Multimedia Retrieval, 2021
Proceedings of the International Joint Conference on Neural Networks, 2021
Proceedings of the Thirtieth International Joint Conference on Artificial Intelligence, 2021
Proceedings of the IEEE International Conference on Robotics and Automation, 2021
Proceedings of the 2021 IEEE/CVF International Conference on Computer Vision, 2021
Revealing the Reciprocal Relations between Self-Supervised Stereo and Monocular Depth Estimation.
Proceedings of the 2021 IEEE/CVF International Conference on Computer Vision, 2021
Proceedings of the IEEE International Conference on Acoustics, 2021
Proceedings of the IEEE International Conference on Acoustics, 2021
Proceedings of the IEEE International Conference on Acoustics, 2021
Proceedings of the IEEE International Conference on Acoustics, 2021
VK-Net: Category-Level Point Cloud Registration with Unsupervised Rotation Invariant Keypoints.
Proceedings of the IEEE International Conference on Acoustics, 2021
Proceedings of the 24th IEEE International Conference on Computer Supported Cooperative Work in Design, 2021
2020
OLAP over Probabilistic Data Cubes II: Parallel Materialization and Extended Aggregates.
IEEE Trans. Knowl. Data Eng., 2020
Set-valued Data Publication with Local Privacy: Tight Error Bounds and Efficient Mechanisms.
Proc. VLDB Endow., 2020
Proc. VLDB Endow., 2020
DCNet: Dense Correspondence Neural Network for 6DoF Object Pose Estimation in Occluded Scenes.
Proceedings of the MM '20: The 28th ACM International Conference on Multimedia, 2020
Proceedings of the 26th IEEE International Conference on Parallel and Distributed Systems, 2020
Private FL-GAN: Differential Privacy Synthetic Data Generation Based on Federated Learning.
Proceedings of the 2020 IEEE International Conference on Acoustics, 2020
Proceedings of the Computer Vision - ECCV 2020, 2020
Proceedings of the Database Systems for Advanced Applications, 2020
Proceedings of the Database Systems for Advanced Applications, 2020
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020
2019
IEEE Trans. Parallel Distributed Syst., 2019
IEEE Trans. Knowl. Data Eng., 2019
Quantum Inf. Process., 2019
Cryptanalysis and improvement of the novel quantum scheme for secure two-party distance computation.
Quantum Inf. Process., 2019
Multim. Tools Appl., 2019
Aggregating Votes with Local Differential Privacy: Usefulness, Soundness vs. Indistinguishability.
CoRR, 2019
Aust. J. Intell. Inf. Process. Syst., 2019
A Utility-Optimized Framework for Personalized Private Histogram Estimation (Extended Abstract).
Proceedings of the 35th IEEE International Conference on Data Engineering, 2019
Proceedings of the IEEE International Conference on Acoustics, 2019
2018
物联网通信协议的安全研究综述 (Security for Communication Protocols in Internet of Things: A Survey).
计算机科学, 2018
J. Netw. Comput. Appl., 2018
IET Inf. Secur., 2018
Proceedings of the Wireless Algorithms, Systems, and Applications, 2018
Proceedings of the 2018 IEEE SmartWorld, 2018
Proceedings of the 15th Annual IEEE International Conference on Sensing, 2018
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018
Proceedings of the 2nd International Conference on Video and Image Processing, 2018
Proceedings of the 24th International Conference on Pattern Recognition, 2018
Proceedings of the Computational Science - ICCS 2018, 2018
Towards End-to-End License Plate Detection and Recognition: A Large Dataset and Baseline.
Proceedings of the Computer Vision - ECCV 2018, 2018
Proceedings of the Database Systems for Advanced Applications, 2018
Proceedings of the Database Systems for Advanced Applications, 2018
Proceedings of the 22nd IEEE International Conference on Computer Supported Cooperative Work in Design, 2018
Incorporating Latent Meanings of Morphological Compositions to Enhance Word Embeddings.
Proceedings of the 56th Annual Meeting of the Association for Computational Linguistics, 2018
2017
Pervasive Mob. Comput., 2017
IEEE802.15.4e 标准的安全多跳时间同步协议设计 (Design of Secure Multi-hop Time Synchronization Protocol for IEEE802.15.4e).
计算机科学, 2017
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2017
Int. J. Embed. Syst., 2017
Enhanced secure time synchronisation protocol for IEEE802.15.4e-based industrial Internet of Things.
IET Inf. Secur., 2017
CoRR, 2017
Proceedings of the Wireless Algorithms, Systems, and Applications, 2017
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017
Proceedings of the Neural Information Processing - 24th International Conference, 2017
Achieving personalized and privacy-preserving range queries over outsourced cloud data.
Proceedings of the IEEE International Conference on Communications, 2017
Proceedings of the 2017 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2017
2016
Privacy-Preserving Collaborative Web Services QoS Prediction via Yao's Garbled Circuits and Homomorphic Encryption.
J. Web Eng., 2016
Int. J. Wirel. Inf. Networks, 2016
CoRR, 2016
Proceedings of the Wireless Algorithms, Systems, and Applications, 2016
Proceedings of the Wireless Algorithms, Systems, and Applications, 2016
Proceedings of the 2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, 2016
Proceedings of the 13th Annual IEEE International Conference on Sensing, 2016
Proceedings of the Service-Oriented Computing - 14th International Conference, 2016
Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2016
Security Vulnerabilities and Countermeasures for Time Synchronization in IEEE802.15.4e Networks.
Proceedings of the 3rd IEEE International Conference on Cyber Security and Cloud Computing, 2016
Proceedings of the Collaborate Computing: Networking, Applications and Worksharing, 2016
Proceedings of the Web Technologies and Applications - 18th Asia-Pacific Web Conference, 2016
Proceedings of the Web Technologies and Applications - 18th Asia-Pacific Web Conference, 2016
2015
A novel comprehensive steganalysis of transmission control protocol/Internet protocol covert channels based on protocol behaviors and support vector machine.
Secur. Commun. Networks, 2015
Ad Hoc Sens. Wirel. Networks, 2015
Proceedings of the Web-Age Information Management - 16th International Conference, 2015
Deadline-sensitive opportunistic utility-based routing in cyclic mobile social networks.
Proceedings of the 12th Annual IEEE International Conference on Sensing, 2015
Proceedings of the Knowledge Science, Engineering and Management, 2015
Hamburger attack: A collusion attack against privacy-preserving data aggregation schemes.
Proceedings of the 23rd IEEE International Symposium on Quality of Service, 2015
Proceedings of the 23rd IEEE International Symposium on Quality of Service, 2015
Proceedings of the 34th IEEE International Performance Computing and Communications Conference, 2015
Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security, 2015
STRUCTURE: A Strategyproof Double Auction for Heterogeneous Secondary Spectrum Markets.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015
Proceedings of the 2015 IEEE Global Communications Conference, 2015
Proceedings of the 2015 IEEE Global Communications Conference, 2015
Proceedings of the Fifth IEEE International Conference on Big Data and Cloud Computing, 2015
Proceedings of the Web Technologies and Applications, 2015
2014
J. Inf. Hiding Multim. Signal Process., 2014
J. Circuits Syst. Comput., 2014
Int. J. Electron. Secur. Digit. Forensics, 2014
Fundam. Informaticae, 2014
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014
Proceedings of the International Conference on Identification, 2014
A privacy preserving scheme for change increment of electricity big data base on symmetric cryptography.
Proceedings of the IEEE 3rd International Conference on Cloud Computing and Intelligence Systems, 2014
2013
Int. J. Electron. Secur. Digit. Forensics, 2013
Proceedings of the Security and Privacy in Communication Networks, 2013
Near-optimal truthful spectrum auction mechanisms with spatial and temporal reuse in wireless networks.
Proceedings of the Fourteenth ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2013
2012
Cryptanalysis and melioration of secure quantum sealed-bid auction with post-confirmation.
Quantum Inf. Process., 2012
J. Comput., 2012
A New Hierarchical Identity-based Signature Scheme From Lattices In The Standard Model.
Int. J. Netw. Secur., 2012
More than Word Frequencies: Authorship Attribution via Natural Frequency Zoned Word Distribution Analysis
CoRR, 2012
Comput. Electr. Eng., 2012
Proceedings of the 2012 IEEE Wireless Communications and Networking Conference, 2012
2011
Quantum Inf. Process., 2011
Quantum Inf. Process., 2011
Detection of substitution-based linguistic steganography by relative frequency analysis.
Digit. Investig., 2011
Steganalysis against substitution-based linguistic steganography based on context clusters.
Comput. Electr. Eng., 2011
Proceedings of the Information Hiding - 13th International Conference, 2011
Proceedings of the Information Computing and Applications, 2011
2010
J. Networks, 2010
A Novel Real-Time Coal Miner Localization and Tracking System Based on Self-Organized Sensor Networks.
EURASIP J. Wirel. Commun. Netw., 2010
A wifi-based low-cost mobile video surveillance system for dynamic police force deployment and real-time guard for public security.
Proceedings of the 8th International Conference on Embedded Networked Sensor Systems, 2010
Proceedings of the Digital Watermarking - 9th International Workshop, 2010
Proceedings of the 15th IEEE Symposium on Computers and Communications, 2010
Proceedings of the Information Hiding - 12th International Conference, 2010
2009
Three New Approaches to Privacy-preserving Add to Multiply Protocol and its Application.
Proceedings of the Second International Workshop on Knowledge Discovery and Data Mining, 2009
Proceedings of the Second International Workshop on Knowledge Discovery and Data Mining, 2009
Proceedings of the Digital Watermarking, 8th International Workshop, 2009
2008
Proceedings of the 4th International ICST Conference on Security and Privacy in Communication Networks, 2008
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008
Linguistic Steganography Detection Using Statistical Characteristics of Correlations between Words.
Proceedings of the Information Hiding, 10th International Workshop, 2008
Proceedings of the IEEE International Conference on Networking, Sensing and Control, 2008
Proceedings of the Japan-China Joint Workshop on Frontier of Computer Science and Technology, 2008
Proceedings of the Japan-China Joint Workshop on Frontier of Computer Science and Technology, 2008
A Statistical Algorithm for Linguistic Steganography Detection Based on Distribution of Words.
Proceedings of the The Third International Conference on Availability, 2008
2007
Proceedings of the 2nf International Conference on Scalable Information Systems, 2007
Proceedings of the Future Generation Communication and Networking, 2007
2006
Proceedings of the Advances in Natural Computation, Second International Conference, 2006
Quantum Oblivious Transfer Based on POVM Measurements.
Proceedings of the 2006 International Conference on Foundations of Computer Science, 2006