Wenqian Yu

Orcid: 0000-0002-5956-5650

According to our database1, Wenqian Yu authored at least 17 papers between 2008 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

2008
2010
2012
2014
2016
2018
2020
2022
2024
0
1
2
3
4
5
2
2
1
2
3
1
1
1
1
1
1
1

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A Survey on Transferability of Adversarial Examples Across Deep Neural Networks.
Trans. Mach. Learn. Res., 2024

Red Teaming GPT-4V: Are GPT-4V Safe Against Uni/Multi-Modal Jailbreak Attacks?
CoRR, 2024

A Dynamic Model of Multi-state LVAD Based on LSTM Neural Network.
Proceedings of the Advanced Intelligent Computing Technology and Applications, 2024

2023
QKPT: Securing Your Private Keys in Cloud With Performance, Scalability and Transparency.
IEEE Trans. Dependable Secur. Comput., 2023

Reliable Evaluation of Adversarial Transferability.
CoRR, 2023

The Analysis of Phase Synchronisation in the Uniform Scale-Free Hypernetwork.
Proceedings of the Data Science, 2023

2021
Virtual Inertia Control Strategy of Traction Converter in High-Speed Railways Based on Feedback Linearization of Sliding Mode Observer.
IEEE Trans. Veh. Technol., 2021

2020
Early detection of technology opportunity based on analogy design and phrase semantic representation.
Scientometrics, 2020

Low-Frequency Instability Induced by Hopf Bifurcation in a Single-Phase Converter Connected to Non-Ideal Power Grid.
IEEE Access, 2020

2019
Double-image encryption based on spatiotemporal chaos and DNA operations.
Multim. Tools Appl., 2019

Variable Frequency Constant Current Control Method for Switched-Capacitor Converter Based Automotive LED Driver.
IEEE Access, 2019

High Voltage Gain Ratio Isolated Resonant Switched-Capacitor Converter for Sustainable Energy.
IEEE Access, 2019

Citation2vec: A New Method for Citation Recommendation Based on Semantic Representation of Citation Context.
Proceedings of the 17th International Conference on Scientometrics and Informetrics, 2019

2018
Bit-level image cryptosystem combining 2D hyper-chaos with a modified non-adjacent spatiotemporal chaos.
Multim. Tools Appl., 2018

Protecting Your Own Private Key in Cloud: Security, Scalability and Performance.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

2016
A study of HSM based key protection in encryption file system.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016

2008
Abnormal Traffic Detection in VoIP by Using Machine Learning Approaches.
Proceedings of the 2008 International Conference on Artificial Intelligence, 2008


  Loading...