Yanjun Wu
Orcid: 0000-0002-1823-0459
According to our database1,
Yanjun Wu
authored at least 123 papers
between 1998 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
Learning to zoom: Exploiting mixed-scale contextual information for object detection.
Expert Syst. Appl., 2025
2024
The impact of the combat method on radiomics feature compensation and analysis of scanners from different manufacturers.
BMC Medical Imaging, December, 2024
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., November, 2024
IEEE Trans. Parallel Distributed Syst., August, 2024
IEEE Commun. Lett., August, 2024
<i>TEA+</i>: A Novel Temporal Graph Random Walk Engine with Hybrid Storage Architecture.
ACM Trans. Archit. Code Optim., June, 2024
Fostering green innovation for corporate competitive advantages in big data era: the role of institutional benefits.
Technol. Anal. Strateg. Manag., February, 2024
HETOCompiler: An MLIR-based crypTOgraphic Compilation Framework for HEterogeneous Devices.
CoRR, 2024
A Wolf in Sheep's Clothing: Practical Black-box Adversarial Attacks for Evading Learning-based Windows Malware Detection in the Wild.
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the IEEE Symposium on Security and Privacy, 2024
MACS: Multi-Agent Adversarial Reinforcement Learning for Finding Diverse Critical Driving Scenarios.
Proceedings of the IEEE Conference on Software Testing, Verification and Validation, 2024
When Large Language Models Confront Repository-Level Automatic Program Repair: How Well They Done?
Proceedings of the 2024 IEEE/ACM 46th International Conference on Software Engineering: Companion Proceedings, 2024
Proceedings of the IEEE International Conference on Acoustics, 2024
Proceedings of the IEEE International Conference on Acoustics, 2024
2023
IEEE Trans. Circuits Syst. Video Technol., September, 2023
IEEE Trans. Circuits Syst. Video Technol., May, 2023
Adversarial attacks against Windows PE malware detection: A survey of the state-of-the-art.
Comput. Secur., May, 2023
IEEE Trans. Software Eng., April, 2023
Coorp: Satisfying Low-Latency and High-Throughput Requirements of Wireless Network for Coordinated Robotic Learning.
IEEE Internet Things J., February, 2023
TeleRobot: Design and Implementation of a Live Remote Interaction Platform for Robots<sup>*</sup>.
Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics, 2023
A Needle is an Outlier in a Haystack: Hunting Malicious PyPI Packages with Code Clustering.
Proceedings of the 38th IEEE/ACM International Conference on Automated Software Engineering, 2023
Proceedings of the 45th IEEE/ACM International Conference on Software Engineering: Software Engineering in Practice, 2023
Proceedings of the 29th IEEE International Conference on Parallel and Distributed Systems, 2023
Proceedings of the Neural Information Processing - 30th International Conference, 2023
Design and Practice of Teaching Demonstration System for Water Quality Prediction Experiment Based on EasyDL.
Proceedings of the 2023 7th International Conference on Electronic Information Technology and Computer Engineering, 2023
Proceedings of the 32nd IEEE Asian Test Symposium, 2023
SAB: Stacking Action Blocks for Efficiently Generating Diverse Multimodal Critical Driving Scenario.
Proceedings of the 30th Asia-Pacific Software Engineering Conference, 2023
2022
IEEE Trans. Vis. Comput. Graph., 2022
Proceedings of the 55th IEEE/ACM International Symposium on Microarchitecture, 2022
Bring orders into uncertainty: enabling efficient uncertain graph processing via novel path sampling on multi-accelerator systems.
Proceedings of the ICS '22: 2022 International Conference on Supercomputing, Virtual Event, June 28, 2022
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022
LD-ConGR: A Large RGB-D Video Dataset for Long-Distance Continuous Gesture Recognition.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022
Novel Adaptive DNN Partitioning Method Based on Image-Stream Pipeline Inference between the Edge and Cloud.
Proceedings of the 3rd International Conference on Computing, 2022
Open Source Software Supply Chain Recommendation Based on Heterogeneous Information Network.
Proceedings of the Benchmarking, Measuring, and Optimizing, 2022
2021
Multi-peak Graph-based Multi-instance Learning for Weakly Supervised Object Detection.
ACM Trans. Multim. Comput. Commun. Appl., 2021
FastUDP: a highly scalable user-level UDP framework in multi-core systems for fast packet I/O.
J. Supercomput., 2021
IEEE Trans. Image Process., 2021
IEEE Trans. Inf. Forensics Secur., 2021
Non-deterministic and emotional chatting machine: learning emotional conversation generation using conditional variational autoencoders.
Neural Comput. Appl., 2021
Research on Risk Assessment of Multitarget Wireless Sensing Detection Auxiliary Engineering in Mine Geological Environment.
J. Sensors, 2021
J. Intell. Fuzzy Syst., 2021
Int. J. Softw. Informatics, 2021
Int. J. Softw. Informatics, 2021
Int. J. Softw. Informatics, 2021
Adversarial Attacks against Windows PE Malware Detection: A Survey of the State-of-the-Art.
CoRR, 2021
Proceedings of the 21st IEEE International Conference on Software Quality, 2021
Proceedings of the PPoPP '21: 26th ACM SIGPLAN Symposium on Principles and Practice of Parallel Programming, 2021
Proceedings of the 29th IEEE/ACM International Symposium on Quality of Service, 2021
MultiCode: A Unified Code Analysis Framework based on Multi-type and Multi-granularity Semantic Learning.
Proceedings of the IEEE International Symposium on Software Reliability Engineering, 2021
Proceedings of the 2021 IEEE/CVF International Conference on Computer Vision, 2021
Channel Replay Aided Modulation Classification of Underwater Acoustic Communication Signals.
Proceedings of the 10th IEEE/CIC International Conference on Communications in China, 2021
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
2020
J. Supercomput., 2020
Pattern Recognit., 2020
Proceedings of the MM '20: The 28th ACM International Conference on Multimedia, 2020
Proceedings of the 22nd IEEE International Conference on High Performance Computing and Communications; 18th IEEE International Conference on Smart City; 6th IEEE International Conference on Data Science and Systems, 2020
Proceedings of the Computer Vision - ECCV 2020, 2020
Proceedings of the Computer Vision - ECCV 2020, 2020
Proceedings of the 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2020
Proceedings of the Cyber Security - 17th China Annual Conference, 2020
Proceedings of the PPMLP'20: Proceedings of the 2020 Workshop on Privacy-Preserving Machine Learning in Practice, 2020
Proceedings of the ASSE 2020: Asia Service Sciences and Software Engineering Conference, 2020
2019
Sensors, 2019
Inf., 2019
Neurocomputing, 2019
Frontiers Comput. Sci., 2019
Proceedings of the 14th International Joint Conference on Computer Vision, 2019
Proceedings of the 27th ACM International Conference on Multimedia, 2019
Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence, 2019
RVTensor: A Light-Weight Neural Network Inference Framework Based on the RISC-V Architecture.
Proceedings of the Benchmarking, Measuring, and Optimizing, 2019
Proceedings of the Thirty-Third AAAI Conference on Artificial Intelligence, 2019
2018
J. Parallel Distributed Comput., 2018
Neurocomputing, 2018
Proceedings of the Services - SERVICES 2018, 2018
Proceedings of the Twenty-Seventh International Joint Conference on Artificial Intelligence, 2018
MAD-API: Detection, Correction and Explanation of API Misuses in Distributed Android Applications.
Proceedings of the Artificial Intelligence and Mobile Services - AIMS 2018, 2018
2017
A manifold ranking based method using hybrid features for crime scene shoeprint retrieval.
Multim. Tools Appl., 2017
MemSC: A Scan-Resistant and Compact Cache Replacement Framework for Memory-Based Key-Value Cache Systems.
J. Comput. Sci. Technol., 2017
Towards a scalable and energy-efficient resource manager for coupling cluster computing with distributed embedded computing.
Clust. Comput., 2017
Proceedings of the Advances in Multimedia Information Processing - PCM 2017, 2017
Proceedings of the Knowledge Science, Engineering and Management, 2017
Exception beyond Exception: Crashing Android System by Trapping in "Uncaught Exception".
Proceedings of the 39th IEEE/ACM International Conference on Software Engineering: Software Engineering in Practice Track, 2017
Proceedings of the Neural Information Processing - 24th International Conference, 2017
Proceedings of the 17th IEEE/ACM International Symposium on Cluster, 2017
EpCom: A parallel community detection approach for epidemic diffusion over social networks.
Proceedings of the 2017 IEEE International Conference on Bioinformatics and Biomedicine, 2017
2016
Clust. Comput., 2016
Macaca: A Scalable and Energy-Efficient Platform for Coupling Cloud Computing with Distributed Embedded Computing.
Proceedings of the 2016 IEEE International Parallel and Distributed Processing Symposium Workshops, 2016
Proceedings of the 18th IEEE International Conference on High Performance Computing and Communications; 14th IEEE International Conference on Smart City; 2nd IEEE International Conference on Data Science and Systems, 2016
Proceedings of the 2016 IEEE International Conference on Cluster Computing, 2016
2015
Proceedings of the Handbook on Data Centers, 2015
Proceedings of the 5th International Workshop on Cloud Data and Platforms, 2015
Proceedings of the 5th International Workshop on Cloud Data and Platforms, 2015
POSTER: biTheft: Stealing Your Secrets by Bidirectional Covert Channel Communication with Zero-Permission Android Application.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
POSTER: PatchGen: Towards Automated Patch Detection and Generation for 1-Day Vulnerabilities.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
2014
Secur. Commun. Networks, 2014
LSG: A Unified Multi-dimensional Latent Semantic Graph for Personal Information Retrieval.
Proceedings of the Web-Age Information Management - 15th International Conference, 2014
2013
Policykeeper: Recommending Proper Security Mechanisms Based on the Severity of Vulnerability Considering User Experience.
Proceedings of the Seventh International Conference on Software Security and Reliability, 2013
Proceedings of the Seventh International Conference on Software Security and Reliability, 2013
Proceedings of the Seventh International Conference on Software Security and Reliability, 2013
Proceedings of the Seventh International Conference on Software Security and Reliability, 2013
CIVSched: Communication-aware Inter-VM Scheduling in Virtual Machine Monitor Based on the Process.
Proceedings of the 13th IEEE/ACM International Symposium on Cluster, 2013
Proceedings of the 2013 IEEE Sixth International Conference on Cloud Computing, Santa Clara, CA, USA, June 28, 2013
2012
Virtual Machine Replay Update: Improved Implementation for Modern Hardware Architecture.
Proceedings of the Sixth International Conference on Software Security and Reliability, 2012
Proceedings of the Sixth International Conference on Software Security and Reliability, 2012
Proceedings of the Information Security and Privacy Research, 2012
Proceedings of the 23rd IEEE International Symposium on Software Reliability Engineering Workshops, 2012
Proceedings of the 26th International Conference on Advanced Information Networking and Applications Workshops, 2012
Proceedings of the Seventh International Conference on Availability, 2012
2009
Proceedings of the Advances in Information Security and Assurance, 2009
2007
A Multimodal Image Registration and Fusion Methodology Applied to Drug Discovery Research.
Proceedings of the IEEE 9th Workshop on Multimedia Signal Processing, 2007
2006
Proceedings of the 25th IEEE International Performance Computing and Communications Conference, 2006
2005
Proceedings of the Information Security Practice and Experience, 2005
Enforcing the Principle of Least Privilege with a State-Based Privilege Control Model.
Proceedings of the Information Security Practice and Experience, 2005
1998
A cepstral method for analysis of acoustic transmission characteristics of respiratory system.
IEEE Trans. Biomed. Eng., 1998