Wei You

Orcid: 0000-0003-1009-6627

According to our database1, Wei You authored at least 128 papers between 2007 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
PSMA: Layered Deployment Scheme for Secure VNF Multiplexing Based on Primary and Secondary Multiplexing Architecture.
IEEE Trans. Netw. Serv. Manag., June, 2024

Optimizing the Numerical Simulation of the Dust Event of March 2021: Integrating Aerosol Observations through Multi-Scale 3D Variational Assimilation in the WRF-Chem Model.
Remote. Sens., June, 2024

Drought Dynamics in the Nile River Basin: Meteorological, Agricultural, and Groundwater Drought Propagation.
Remote. Sens., March, 2024

Practical Charger Placement Scheme for Wireless Rechargeable Sensor Networks with Obstacles.
ACM Trans. Sens. Networks, January, 2024

Privacy-preserving multiobjective task assignment scheme with differential obfuscation in mobile crowdsensing.
J. Netw. Comput. Appl., 2024

Workload Distribution with Rateless Encoding: A Low-Latency Computation Offloading Method within Edge Networks.
CoRR, 2024

EventAug: Multifaceted Spatio-Temporal Data Augmentation Methods for Event-based Learning.
CoRR, 2024

Raptor Encoding for Low-Latency Concurrent Multi-PDU Session Transmission with Security Consideration in B5G Edge Network.
CoRR, 2024

DDQN-SFCAG: A service function chain recovery method against network attacks in 6G networks.
Comput. Networks, 2024

Toward Unbiased Multiple-Target Fuzzing with Path Diversity.
Proceedings of the 33rd USENIX Security Symposium, 2024

SICode: Embedding-Based Subgraph Isomorphism Identification for Bug Detection.
Proceedings of the 32nd IEEE/ACM International Conference on Program Comprehension, 2024

Define-Use Guided Path Exploration for Better Forced Execution.
Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2024

FuzzInMem: Fuzzing Programs via In-memory Structures.
Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024

Raisin: Identifying Rare Sensitive Functions for Bug Detection.
Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024

2023
FLPP: A Federated-Learning-Based Scheme for Privacy Protection in Mobile Edge Computing.
Entropy, November, 2023

LERMS: A Low-Latency and Reliable Downlink Packet-Level Encoding Transmission Method in Untrusted 5GA Edge Network.
Entropy, July, 2023

Delay optimal for reliability-guaranteed concurrent transmissions with raptor code in multi-access 6G edge network.
Comput. Networks, June, 2023

SECHO: A deep reinforcement learning-based scheme for secure handover in mobile edge computing.
Comput. Networks, June, 2023

Scalably Detecting Third-Party Android Libraries With Two-Stage Bloom Filtering.
IEEE Trans. Software Eng., April, 2023

A Linearly Polarized Wavelength-Tunable Q-Switched Fiber Laser with a Narrow Spectral Bandwidth of 112 MHz.
Sensors, 2023

Fight Fire with Fire: Combating Adversarial Patch Attacks using Pattern-randomized Defensive Patches.
CoRR, 2023

Dual-Directed Algorithm Design for Efficient Pure Exploration.
CoRR, 2023

AIFORE: Smart Fuzzing Based on Automatic Input Format Reverse Engineering.
Proceedings of the 32nd USENIX Security Symposium, 2023

Operand-Variation-Oriented Differential Analysis for Fuzzing Binding Calls in PDF Readers.
Proceedings of the 45th IEEE/ACM International Conference on Software Engineering, 2023

Improved Task Allocation in Mobile Crowd Sensing Based on Mobility Prediction and Multi-objective Optimization.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2023

Information-Directed Selection for Top-Two Algorithms.
Proceedings of the Thirty Sixth Annual Conference on Learning Theory, 2023

A Good Fishman Knows All the Angles: A Critical Evaluation of Google's Phishing Page Classifier.
Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications Security, 2023

2022
Who Are the Phishers? Phishing Scam Detection on Ethereum via Network Embedding.
IEEE Trans. Syst. Man Cybern. Syst., 2022

Precise Dynamic Symbolic Execution for Nonuniform Data Access in Smart Contracts.
IEEE Trans. Computers, 2022

3DVAR Aerosol Data Assimilation and Evaluation Using Surface PM2.5, Himawari-8 AOD and CALIPSO Profile Observations in the North China.
Remote. Sens., 2022

Optimization and Evaluation of SO2 Emissions Based on WRF-Chem and 3DVAR Data Assimilation.
Remote. Sens., 2022

New decomposition approximations for queueing networks.
Queueing Syst. Theory Appl., 2022

Generic enhanced ensemble learning with multi-level kinematic constraints for 3D action recognition.
Multim. Tools Appl., 2022

Discussion on a new paradigm of endogenous security towards 6G networks.
Frontiers Inf. Technol. Electron. Eng., 2022

Research on 5G Core Network Trust Model Based on NF Interaction Behavior.
KSII Trans. Internet Inf. Syst., 2022

Traffic Forecast Assisted Adaptive VNF Dynamic Scaling.
KSII Trans. Internet Inf. Syst., 2022

A Privacy-preserving and Energy-efficient Offloading Algorithm based on Lyapunov Optimization.
KSII Trans. Internet Inf. Syst., 2022

Robust service provisioning of service function chain under demand uncertainty.
IET Commun., 2022

NDFuzz: a non-intrusive coverage-guided fuzzing framework for virtualized network devices.
Cybersecur., 2022

Optimality Conditions and Algorithms for Top-K Arm Identification.
CoRR, 2022

View Enhanced Jigsaw Puzzle for Self-Supervised Feature Learning in 3D Human Action Recognition.
IEEE Access, 2022

Hunting bugs with accelerated optimal graph vertex matching.
Proceedings of the ISSTA '22: 31st ACM SIGSOFT International Symposium on Software Testing and Analysis, Virtual Event, South Korea, July 18, 2022

TensileFuzz: facilitating seed input generation in fuzzing via string constraint solving.
Proceedings of the ISSTA '22: 31st ACM SIGSOFT International Symposium on Software Testing and Analysis, Virtual Event, South Korea, July 18, 2022

2021
Hunting Vulnerable Smart Contracts via Graph Embedding Based Bytecode Matching.
IEEE Trans. Inf. Forensics Secur., 2021

Detecting the Capacitance-Based Gamepad for Protecting Mobile Game Fairness.
IEEE Trans. Computers, 2021

Hydroclimatic Extremes Evaluation Using GRACE/GRACE-FO and Multidecadal Climatic Variables over the Nile River Basin.
Remote. Sens., 2021

Android SmartTVs Vulnerability Discovery via Log-Guided Fuzzing.
Proceedings of the 30th USENIX Security Symposium, 2021

OSPREY: Recovery of Variable and Data Structure via Probabilistic Analysis for Stripped Binary.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

StochFuzz: Sound and Cost-effective Fuzzing of Stripped Binaries by Incremental and Stochastic Rewriting.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

2020
RESLS: Region and Edge Synergetic Level Set Framework for Image Segmentation.
IEEE Trans. Image Process., 2020

A New Hybrid Level Set Approach.
IEEE Trans. Image Process., 2020

TaintMan: An ART-Compatible Dynamic Taint Analysis Framework on Unmodified and Non-Rooted Android Devices.
IEEE Trans. Dependable Secur. Comput., 2020

A Certificateless Noninteractive Key Exchange Protocol with Provable Security.
Secur. Commun. Networks, 2020

Spatio-Temporal Evaluation of Water Storage Trends from Hydrological Models over Australia Using GRACE Mascon Solutions.
Remote. Sens., 2020

Heavy-traffic limits for stationary network flows.
Queueing Syst. Theory Appl., 2020

Achieving secure and convenient WLAN sharing in personal.
IET Inf. Secur., 2020

A Robust Queueing Network Analyzer Based on Indices of Dispersion.
CoRR, 2020

Toward Latency-Optimal Placement and Autoscaling of Monitoring Functions in MEC.
IEEE Access, 2020

An Intelligent Deep Feature Learning Method With Improved Activation Functions for Machine Fault Diagnosis.
IEEE Access, 2020

PMP: Cost-effective Forced Execution with Probabilistic Memory Pre-planning.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

Finding client-side business flow tampering vulnerabilities.
Proceedings of the ICSE '20: 42nd International Conference on Software Engineering, Seoul, South Korea, 27 June, 2020

A Preliminary Analysis of Password Guessing Algorithm.
Proceedings of the 29th International Conference on Computer Communications and Networks, 2020

A Weight-based k-prototypes Algorithm for Anomaly Detection in Smart Grid.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

2019
Non-Intrusive Load Monitoring by Voltage-Current Trajectory Enabled Transfer Learning.
IEEE Trans. Smart Grid, 2019

BDA: practical dependence analysis for binary executables by unbiased whole-program path sampling and per-path abstract interpretation.
Proc. ACM Program. Lang., 2019

The advantage of indices of dispersion in queueing approximations.
Oper. Res. Lett., 2019

一种基于差分隐私的数据查询分级控制策略 (Hierarchical Control Strategy for Data Querying Based on Differential Privacy).
计算机科学, 2019

Time-Varying Robust Queueing.
Oper. Res., 2019

A Systematic Analysis Method for 5G Non-Access Stratum Signalling Security.
IEEE Access, 2019

ProFuzzer: On-the-fly Input Type Probing for Better Zero-Day Vulnerability Discovery.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019

SLF: fuzzing without valid seed inputs.
Proceedings of the 41st International Conference on Software Engineering, 2019

2018
Deep Learning-Based Automatic Clutter/Interference Detection for HFSWR.
Remote. Sens., 2018

Implicit relative attribute enabled cross-modality hashing for face image-video retrieval.
Multim. Tools Appl., 2018

区块链技术在政府部门的应用综述 (Survey of Applications Based on Blockchain in Government Department).
计算机科学, 2018

Using Robust Queueing to Expose the Impact of Dependence in Single-Server Queues.
Oper. Res., 2018

Virtual network function scheduling via multilayer encoding genetic algorithm with distributed bandwidth allocation.
Sci. China Inf. Sci., 2018

Overview of 5G security technology.
Sci. China Inf. Sci., 2018

A Method of Network Slicing Mapping Supporting Random Route Mutation.
Proceedings of the 10th International Conference on Wireless Communications and Signal Processing, 2018

Signalling Security Analysis: Is HTTP/2 Secure in 5G Core Network?
Proceedings of the 10th International Conference on Wireless Communications and Signal Processing, 2018

2017
Transients Extraction Based on Averaged Random Orthogonal Matching Pursuit Algorithm for Machinery Fault Diagnosis.
IEEE Trans. Instrum. Meas., 2017

Feature Weight Driven Interactive Mutual Information Modeling for Heterogeneous Bio-Signal Fusion to Estimate Mental Workload.
Sensors, 2017

一种基于动态插桩的JavaScript反事实执行方法 (JavaScript Counterfactual Execution Method Based on Dynamic Instrumentation).
计算机科学, 2017

The Applications of Finite Element Analysis in Proximal Humeral Fractures.
Comput. Math. Methods Medicine, 2017

A Path Planning Algorithm Based on Fluid Simulation.
Proceedings of the 10th International Symposium on Computational Intelligence and Design, 2017

A self-adaptive deep belief network with Nesterov momentum for the fault diagnosis of rolling element bearings.
Proceedings of the 2017 International Conference on Deep Learning Technologies, 2017

SemFuzz: Semantics-based Automatic Generation of Proof-of-Concept Exploits.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

Mass Discovery of Android Traffic Imprints through Instantiated Partial Execution.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017

2016
National-Scale Estimates of Ground-Level PM2.5 Concentration in China Using Geographically Weighted Regression Based on 3 km Resolution MODIS AOD.
Remote. Sens., 2016

Detecting the Boundaries of Urban Areas in India: A Dataset for Pixel-Based Image Classification in Google Earth Engine.
Remote. Sens., 2016

Cracking Classifiers for Evasion: A Case Study on the Google's Phishing Pages Filter.
Proceedings of the 25th International Conference on World Wide Web, 2016

Reference hijacking: patching, protecting and analyzing on unmodified and non-rooted android devices.
Proceedings of the 38th International Conference on Software Engineering, 2016

AntMiner: mining more bugs by reducing noise interference.
Proceedings of the 38th International Conference on Software Engineering, 2016

Sparse representation of gearbox compound fault features by combining Majorization-Minimization algorithm and wavelet bases.
Proceedings of the IEEE International Instrumentation and Measurement Technology Conference, 2016

2015
Information centric network: Research challenges and opportunities.
J. Netw. Comput. Appl., 2015

Kernel subspace-based real-time anomaly detection for hyperspectral imagery.
Proceedings of the 2015 IEEE International Geoscience and Remote Sensing Symposium, 2015

GPU implementation for real-time hyperspectral anomaly detection.
Proceedings of the 2015 IEEE International Conference on Digital Signal Processing, 2015

Android Implicit Information Flow Demystified.
Proceedings of the 10th ACM Symposium on Information, 2015

2014
A Content-Centric Networking Node for a Realistic Efficient Implementation and Deployment. (Un noeud de réseaux orientés contenus réaliste et performant).
PhD thesis, 2014

Scriptless Timing Attacks on Web Browser Privacy.
Proceedings of the 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2014

2013
An automatic keyphrase extraction system for scientific documents.
Knowl. Inf. Syst., 2013

Optimal point-to-point motion planning of heavy-duty industry robot with indirect method.
Proceedings of the IEEE International Conference on Robotics and Biomimetics, 2013

How to make content-centric networks interwork with CDN networks.
Proceedings of the Fourth International Conference on the Network of the Future, 2013

Exploiting End-Users Caching Capacities to Improve Content-centric Networking Delivery.
Proceedings of the Eighth International Conference on P2P, 2013

2012
Control system design for heavy duty industrial robot.
Ind. Robot, 2012

Two classes of sequences derived from single cycle T-functions.
Finite Fields Their Appl., 2012

Ionospheric decontamination for skywave OTH radar based on complex energy detector.
EURASIP J. Adv. Signal Process., 2012

Information-centric networking: a natural design for social network applications.
IEEE Commun. Mag., 2012

An improved design method of LLC resonant converter.
Proceedings of the 21st IEEE International Symposium on Industrial Electronics, 2012

DiPIT: A Distributed Bloom-Filter Based PIT Table for CCN Nodes.
Proceedings of the 21st International Conference on Computer Communications and Networks, 2012

Realistic storage of pending requests in Content-Centric Network routers.
Proceedings of the 2012 1st IEEE International Conference on Communications in China (ICCC), 2012

ISP Offload Infrastructure to minimize cost and time deployment.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

E2E: An Optimized IPsec Architecture for Secure and Fast Offload.
Proceedings of the Seventh International Conference on Availability, 2012

2011
Automatic detection of contrast injection on fluoroscopy and angiography for image guided trans-catheter aortic valve implantations (TAVI).
Proceedings of the Medical Imaging 2011: Visualization, 2011

Spatio-temporal analysis for automatic contrast injection detection on angiography during trans-catheter aortic valve implantation.
Proceedings of the 8th IEEE International Symposium on Biomedical Imaging: From Nano to Macro, 2011

Detecting stealthy malware with inter-structure and imported signatures.
Proceedings of the 6th ACM Symposium on Information, Computer and Communications Security, 2011

2010
Modeling and simulating the nonlinear characters of robot joints.
Proceedings of the 2010 IEEE International Conference on Robotics and Biomimetics, 2010

2009
Automatic Keyphrase Extraction with a Refined Candidate Set.
Proceedings of the 2009 IEEE/WIC/ACM International Conference on Web Intelligence, 2009

Recognition of Coronary Heart Disease Patients by RBF Neural Network Basing on Contents of Microelements in Human Blood.
Proceedings of the 2009 Second International Symposium on Computational Intelligence and Design, 2009

Prediction of the Coal and Gas Outburst by Neural Network.
Proceedings of the 2009 Second International Symposium on Computational Intelligence and Design, 2009

Classification of DNA Sequences Basing on the Dinucleotide Compositions.
Proceedings of the 2009 Second International Symposium on Computational Intelligence and Design, 2009

Predicting the Aging Rate of Capacity in Ni/H Battery Using Artificial Neural Network.
Proceedings of the 2009 Second International Symposium on Computational Intelligence and Design, 2009

Predicting the Dielectric Constants of (Zr0.7Sn0.3)TiO4 Ceramics Using Artificial Neural Network.
Proceedings of the 2009 Second International Symposium on Computational Intelligence and Design, 2009

Similarity Analysis of DNA Sequences Using .
Proceedings of the Sixth International Conference on Fuzzy Systems and Knowledge Discovery, 2009

2008
Real-time multiple object tracking in smart environments.
Proceedings of the IEEE International Conference on Robotics and Biomimetics, 2008

Studying vision-based multiple-user interaction with in-home large displays.
Proceedings of the 3rd ACM Workshop on Human-Centered Computing, 2008

Predicting the Initial Discharge Capacity of AB5-Based Hydrogen Storage Alloy Using Artificial Neural Network.
Proceedings of the Fourth International Conference on Natural Computation, 2008

Predicting the Corrosion Rates of Steels in Sea Water Using Artificial Neural Network.
Proceedings of the Fourth International Conference on Natural Computation, 2008

2007
Polyphonic Music Note Onset Detection Using Semi-Supervised Learning.
Proceedings of the 8th International Conference on Music Information Retrieval, 2007


  Loading...