Yanjun Wu

Orcid: 0000-0002-1823-0459

According to our database1, Yanjun Wu authored at least 123 papers between 1998 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Learning to zoom: Exploiting mixed-scale contextual information for object detection.
Expert Syst. Appl., 2025

2024
The impact of the combat method on radiomics feature compensation and analysis of scanners from different manufacturers.
BMC Medical Imaging, December, 2024

D-Linker: Debloating Shared Libraries by Relinking From Object Files.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., November, 2024

TeGraph+: Scalable Temporal Graph Processing Enabling Flexible Edge Modifications.
IEEE Trans. Parallel Distributed Syst., August, 2024

Analog Beamforming Enabled Multicasting: Finite-Alphabet Inputs and Statistical CSI.
IEEE Commun. Lett., August, 2024

<i>TEA+</i>: A Novel Temporal Graph Random Walk Engine with Hybrid Storage Architecture.
ACM Trans. Archit. Code Optim., June, 2024

Fostering green innovation for corporate competitive advantages in big data era: the role of institutional benefits.
Technol. Anal. Strateg. Manag., February, 2024

HETOCompiler: An MLIR-based crypTOgraphic Compilation Framework for HEterogeneous Devices.
CoRR, 2024

A Wolf in Sheep's Clothing: Practical Black-box Adversarial Attacks for Evading Learning-based Windows Malware Detection in the Wild.
Proceedings of the 33rd USENIX Security Symposium, 2024

APP-Miner: Detecting API Misuses via Automatically Mining API Path Patterns.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

MACS: Multi-Agent Adversarial Reinforcement Learning for Finding Diverse Critical Driving Scenarios.
Proceedings of the IEEE Conference on Software Testing, Verification and Validation, 2024

When Large Language Models Confront Repository-Level Automatic Program Repair: How Well They Done?
Proceedings of the 2024 IEEE/ACM 46th International Conference on Software Engineering: Companion Proceedings, 2024

Text Region Multiple Information Perception Network for Scene Text Detection.
Proceedings of the IEEE International Conference on Acoustics, 2024

BPDO: Boundary Points Dynamic Optimization for Arbitrary Shape Scene Text Detection.
Proceedings of the IEEE International Conference on Acoustics, 2024

2023
Dual Transformer With Multi-Grained Assembly for Fine-Grained Visual Classification.
IEEE Trans. Circuits Syst. Video Technol., September, 2023

Bridging Multi-Scale Context-Aware Representation for Object Detection.
IEEE Trans. Circuits Syst. Video Technol., May, 2023

Adversarial attacks against Windows PE malware detection: A survey of the state-of-the-art.
Comput. Secur., May, 2023

Scalably Detecting Third-Party Android Libraries With Two-Stage Bloom Filtering.
IEEE Trans. Software Eng., April, 2023

Coorp: Satisfying Low-Latency and High-Throughput Requirements of Wireless Network for Coordinated Robotic Learning.
IEEE Internet Things J., February, 2023

TeleRobot: Design and Implementation of a Live Remote Interaction Platform for Robots<sup>*</sup>.
Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics, 2023

A Needle is an Outlier in a Haystack: Hunting Malicious PyPI Packages with Code Clustering.
Proceedings of the 38th IEEE/ACM International Conference on Automated Software Engineering, 2023

An Empirical Study of License Conflict in Free and Open Source Software.
Proceedings of the 45th IEEE/ACM International Conference on Software Engineering: Software Engineering in Practice, 2023

Automatic Program Repair via Learning Edits on Sequence Code Property Graph.
Proceedings of the 29th IEEE International Conference on Parallel and Distributed Systems, 2023

CMFN: Cross-Modal Fusion Network for Irregular Scene Text Recognition.
Proceedings of the Neural Information Processing - 30th International Conference, 2023

Design and Practice of Teaching Demonstration System for Water Quality Prediction Experiment Based on EasyDL.
Proceedings of the 2023 7th International Conference on Electronic Information Technology and Computer Engineering, 2023

ECSAS: Exploring Critical Scenarios from Action Sequence in Autonomous Driving.
Proceedings of the 32nd IEEE Asian Test Symposium, 2023

SAB: Stacking Action Blocks for Efficiently Generating Diverse Multimodal Critical Driving Scenario.
Proceedings of the 30th Asia-Pacific Software Engineering Conference, 2023

2022
MVNet: Multi-Variate Multi-View Brain Network Comparison Over Uncertain Data.
IEEE Trans. Vis. Comput. Graph., 2022

ROG: A High Performance and Robust Distributed Training System for Robotic IoT.
Proceedings of the 55th IEEE/ACM International Symposium on Microarchitecture, 2022

Bring orders into uncertainty: enabling efficient uncertain graph processing via novel path sampling on multi-accelerator systems.
Proceedings of the ICS '22: 2022 International Conference on Supercomputing, Virtual Event, June 28, 2022

Multi-Granularity Alignment Domain Adaptation for Object Detection.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022

LD-ConGR: A Large RGB-D Video Dataset for Long-Distance Continuous Gesture Recognition.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022

Novel Adaptive DNN Partitioning Method Based on Image-Stream Pipeline Inference between the Edge and Cloud.
Proceedings of the 3rd International Conference on Computing, 2022

Open Source Software Supply Chain Recommendation Based on Heterogeneous Information Network.
Proceedings of the Benchmarking, Measuring, and Optimizing, 2022

2021
Multi-peak Graph-based Multi-instance Learning for Weakly Supervised Object Detection.
ACM Trans. Multim. Comput. Commun. Appl., 2021

Iterative Knowledge Distillation for Automatic Check-Out.
IEEE Trans. Multim., 2021

FastUDP: a highly scalable user-level UDP framework in multi-core systems for fast packet I/O.
J. Supercomput., 2021

SiamCAN: Real-Time Visual Tracking Based on Siamese Center-Aware Network.
IEEE Trans. Image Process., 2021

Hunting Vulnerable Smart Contracts via Graph Embedding Based Bytecode Matching.
IEEE Trans. Inf. Forensics Secur., 2021

Non-deterministic and emotional chatting machine: learning emotional conversation generation using conditional variational autoencoders.
Neural Comput. Appl., 2021

Research on Risk Assessment of Multitarget Wireless Sensing Detection Auxiliary Engineering in Mine Geological Environment.
J. Sensors, 2021

AI-CTO: Knowledge graph for automated and dependable software stack solution.
J. Intell. Fuzzy Syst., 2021

Hybrid Access Cache Indexing Framework Adapted to GPU.
Int. J. Softw. Informatics, 2021

Preface: Special Issue on Advances in System Software.
Int. J. Softw. Informatics, 2021

Open Source Software Supply Chain for Reliability Assurance of Operating Systems.
Int. J. Softw. Informatics, 2021

FindCmd: A personalised command retrieval tool.
IET Softw., 2021

Adversarial Attacks against Windows PE Malware Detection: A Survey of the State-of-the-Art.
CoRR, 2021

A Large-Scale Study on Vulnerabilities in Linux using Vtopia.
Proceedings of the 21st IEEE International Conference on Software Quality, 2021

An efficient uncertain graph processing framework for heterogeneous architectures.
Proceedings of the PPoPP '21: 26th ACM SIGPLAN Symposium on Principles and Practice of Parallel Programming, 2021

Practical Root Cause Localization for Microservice Systems via Trace Analysis.
Proceedings of the 29th IEEE/ACM International Symposium on Quality of Service, 2021

MultiCode: A Unified Code Analysis Framework based on Multi-type and Multi-granularity Semantic Learning.
Proceedings of the IEEE International Symposium on Software Reliability Engineering, 2021

Towards Real-World Prohibited Item Detection: A Large-Scale X-ray Benchmark.
Proceedings of the 2021 IEEE/CVF International Conference on Computer Vision, 2021

Channel Replay Aided Modulation Classification of Underwater Acoustic Communication Signals.
Proceedings of the 10th IEEE/CIC International Conference on Communications in China, 2021

V-Shuttle: Scalable and Semantics-Aware Hypervisor Virtual Device Fuzzing.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

CPscan: Detecting Bugs Caused by Code Pruning in IoT Kernels.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

2020
Correction to: Rio: a personal storage system in multi-device and cloud.
J. Supercomput., 2020

Rio: a personal storage system in multi-device and cloud.
J. Supercomput., 2020

Dual Encoding for Abstractive Text Summarization.
IEEE Trans. Cybern., 2020

Towards interpretable and robust hand detection via pixel-wise prediction.
Pattern Recognit., 2020

Guided Attention Network for Object Detection and Counting on Drones.
Proceedings of the MM '20: The 28th ACM International Conference on Multimedia, 2020

Keyword Search Technology in Content Addressable Storage System.
Proceedings of the 22nd IEEE International Conference on High Performance Computing and Communications; 18th IEEE International Conference on Smart City; 6th IEEE International Conference on Data Science and Systems, 2020

Spatial Attention Pyramid Network for Unsupervised Domain Adaptation.
Proceedings of the Computer Vision - ECCV 2020, 2020

Learning Semantic Neural Tree for Human Parsing.
Proceedings of the Computer Vision - ECCV 2020, 2020

Attention Convolutional Binary Neural Tree for Fine-Grained Visual Categorization.
Proceedings of the 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2020

PassEye: Sniffing Your Password from HTTP Sessions by Deep Neural Network.
Proceedings of the Cyber Security - 17th China Annual Conference, 2020

Information Leakage by Model Weights on Federated Learning.
Proceedings of the PPMLP'20: Proceedings of the 2020 Workshop on Privacy-Preserving Machine Learning in Practice, 2020

Human-Neural Net Collaborative Programming.
Proceedings of the ASSE 2020: Asia Service Sciences and Software Engineering Conference, 2020

2019
Multi-Layer Feature Based Shoeprint Verification Algorithm for Camera Sensor Images.
Sensors, 2019

Crime Scene Shoeprint Retrieval Using Hybrid Features and Neighboring Images.
Inf., 2019

Gradient-aware blind face inpainting for deep face verification.
Neurocomputing, 2019

Prefetch-aware fingerprint cache management for data deduplication systems.
Frontiers Comput. Sci., 2019

SiamMan: Siamese Motion-aware Network for Visual Tracking.
CoRR, 2019

LOSGSR: Learned Opinion Score Guided Shoeprint Retrieval.
IEEE Access, 2019

ID-Softmax: A Softmax-like Loss for ID Face Recognition.
Proceedings of the 14th International Joint Conference on Computer Vision, 2019

Data Priming Network for Automatic Check-Out.
Proceedings of the 27th ACM International Conference on Multimedia, 2019

VulSniper: Focus Your Attention to Shoot Fine-Grained Vulnerabilities.
Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence, 2019

RVTensor: A Light-Weight Neural Network Inference Framework Based on the RISC-V Architecture.
Proceedings of the Benchmarking, Measuring, and Optimizing, 2019

Scale Invariant Fully Convolutional Network: Detecting Hands Efficiently.
Proceedings of the Thirty-Third AAAI Conference on Artificial Intelligence, 2019

2018
MixHeter: A global scheduler for mixed workloads in heterogeneous environments.
J. Parallel Distributed Comput., 2018

Deep reinforcement learning for extractive document summarization.
Neurocomputing, 2018

A Recommendation Model Based on Deep Neural Network.
IEEE Access, 2018

Pre-Patch: Find Hidden Threats in Open Software Based on Machine Learning Method.
Proceedings of the Services - SERVICES 2018, 2018

Teaching Machines to Ask Questions.
Proceedings of the Twenty-Seventh International Joint Conference on Artificial Intelligence, 2018

MAD-API: Detection, Correction and Explanation of API Misuses in Distributed Android Applications.
Proceedings of the Artificial Intelligence and Mobile Services - AIMS 2018, 2018

2017
A manifold ranking based method using hybrid features for crime scene shoeprint retrieval.
Multim. Tools Appl., 2017

MemSC: A Scan-Resistant and Compact Cache Replacement Framework for Memory-Based Key-Value Cache Systems.
J. Comput. Sci. Technol., 2017

Towards a scalable and energy-efficient resource manager for coupling cluster computing with distributed embedded computing.
Clust. Comput., 2017

An Obstacle Detection Method Based on Binocular Stereovision.
Proceedings of the Advances in Multimedia Information Processing - PCM 2017, 2017

Learning Path Generation Method Based on Migration Between Concepts.
Proceedings of the Knowledge Science, Engineering and Management, 2017

Exception beyond Exception: Crashing Android System by Trapping in "Uncaught Exception".
Proceedings of the 39th IEEE/ACM International Conference on Software Engineering: Software Engineering in Practice Track, 2017

Accelerating Core Decomposition in Large Temporal Networks Using GPUs.
Proceedings of the Neural Information Processing - 24th International Conference, 2017

PCSsampler: Sample-based, Private-state Cluster Scheduling.
Proceedings of the 17th IEEE/ACM International Symposium on Cluster, 2017

EpCom: A parallel community detection approach for epidemic diffusion over social networks.
Proceedings of the 2017 IEEE International Conference on Bioinformatics and Biomedicine, 2017

2016
MrHeter: improving MapReduce performance in heterogeneous environments.
Clust. Comput., 2016

Macaca: A Scalable and Energy-Efficient Platform for Coupling Cloud Computing with Distributed Embedded Computing.
Proceedings of the 2016 IEEE International Parallel and Distributed Processing Symposium Workshops, 2016

Searching Time Period-Based Longest Frequent Path in Big Trajectory Data.
Proceedings of the 18th IEEE International Conference on High Performance Computing and Communications; 14th IEEE International Conference on Smart City; 2nd IEEE International Conference on Data Science and Systems, 2016

Tiresias: Low-Overhead Sample Based Scheduling with Task Hopping.
Proceedings of the 2016 IEEE International Conference on Cluster Computing, 2016

2015
C2Hunter: Detection and Mitigation of Covert Channels in Data Centers.
Proceedings of the Handbook on Data Centers, 2015

Characterizing the spatio-temporal burstiness of storage workloads.
Proceedings of the 5th International Workshop on Cloud Data and Platforms, 2015

Sparkle: adaptive sample based scheduling for cluster computing.
Proceedings of the 5th International Workshop on Cloud Data and Platforms, 2015

POSTER: biTheft: Stealing Your Secrets by Bidirectional Covert Channel Communication with Zero-Permission Android Application.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

POSTER: PatchGen: Towards Automated Patch Detection and Generation for 1-Day Vulnerabilities.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
C<sup>2</sup>Detector: a covert channel detection framework in cloud computing.
Secur. Commun. Networks, 2014

LSG: A Unified Multi-dimensional Latent Semantic Graph for Personal Information Retrieval.
Proceedings of the Web-Age Information Management - 15th International Conference, 2014

2013
Systemic threats to hypervisor non-control data.
IET Inf. Secur., 2013

Policykeeper: Recommending Proper Security Mechanisms Based on the Severity of Vulnerability Considering User Experience.
Proceedings of the Seventh International Conference on Software Security and Reliability, 2013

Vulcloud: Scalable and Hybrid Vulnerability Detection in Cloud Computing.
Proceedings of the Seventh International Conference on Software Security and Reliability, 2013

hGuard: A Framework to Measure Hypervisor Critical Files.
Proceedings of the Seventh International Conference on Software Security and Reliability, 2013

HyperVerify: A VM-assisted Architecture for Monitoring Hypervisor Non-control Data.
Proceedings of the Seventh International Conference on Software Security and Reliability, 2013

CIVSched: Communication-aware Inter-VM Scheduling in Virtual Machine Monitor Based on the Process.
Proceedings of the 13th IEEE/ACM International Symposium on Cluster, 2013

Vulnerability Detection of Android System in Fuzzing Cloud.
Proceedings of the 2013 IEEE Sixth International Conference on Cloud Computing, Santa Clara, CA, USA, June 28, 2013

2012
Virtual Machine Replay Update: Improved Implementation for Modern Hardware Architecture.
Proceedings of the Sixth International Conference on Software Security and Reliability, 2012

A Novel Security Scheme for Online Banking Based on Virtual Machine.
Proceedings of the Sixth International Conference on Software Security and Reliability, 2012

Improving Flask Implementation Using Hardware Assisted In-VM Isolation.
Proceedings of the Information Security and Privacy Research, 2012

Baggy Bounds with Accurate Checking.
Proceedings of the 23rd IEEE International Symposium on Software Reliability Engineering Workshops, 2012

Deterministic Replay of Multithread Applications Using Virtual Machine.
Proceedings of the 26th International Conference on Advanced Information Networking and Applications Workshops, 2012

Return-Oriented Programming Attack on the Xen Hypervisor.
Proceedings of the Seventh International Conference on Availability, 2012

2009
Efficient and Automatic Instrumentation for Packed Binaries.
Proceedings of the Advances in Information Security and Assurance, 2009

2007
A Multimodal Image Registration and Fusion Methodology Applied to Drug Discovery Research.
Proceedings of the IEEE 9th Workshop on Multimedia Signal Processing, 2007

2006
Portal monitoring based anti-malware framework: design and implementation.
Proceedings of the 25th IEEE International Performance Computing and Communications Conference, 2006

2005
Security On-demand Architecture with Multiple Modules Support.
Proceedings of the Information Security Practice and Experience, 2005

Enforcing the Principle of Least Privilege with a State-Based Privilege Control Model.
Proceedings of the Information Security Practice and Experience, 2005

1998
A cepstral method for analysis of acoustic transmission characteristics of respiratory system.
IEEE Trans. Biomed. Eng., 1998


  Loading...