Yongjuan Wang
Orcid: 0000-0001-9819-404X
According to our database1,
Yongjuan Wang
authored at least 36 papers
between 2008 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
Beyond known threats: A novel strategy for isolating and detecting unknown malicious traffic.
J. Inf. Secur. Appl., 2025
2024
IEEE Trans. Software Eng., June, 2024
IEEE Netw. Lett., June, 2024
Frontiers Comput. Sci., February, 2024
MCRe: A Unified Framework for Handling Malicious Traffic With Noise Labels Based on Multidimensional Constraint Representation.
IEEE Trans. Inf. Forensics Secur., 2024
Screening Least Square Technique Assisted Multivariate Template Attack Against the Random Polynomial Generation of Dilithium.
IEEE Trans. Inf. Forensics Secur., 2024
Inf. Sci., 2024
IACR Cryptol. ePrint Arch., 2024
Observational equivalence and security games: Enhancing the formal analysis of security protocols.
Comput. Secur., 2024
Combine intra- and inter-flow: A multimodal encrypted traffic classification model driven by diverse features.
Comput. Networks, 2024
ULDC: Unsupervised Learning-Based Data Cleaning for Malicious Traffic With High Noise.
Comput. J., 2024
Research on control strategy of flexible interconnection with multi-source cooperative in various applications.
Proceedings of International Conference on Computer and Intelligent Control (ICCIC 2024), 2024
2023
Comput. Secur., 2023
2022
Composition construction of new bent functions from known dually isomorphic bent functions.
IACR Cryptol. ePrint Arch., 2022
A survey on cryptographic techniques for protecting big data security: present and forthcoming.
Sci. China Inf. Sci., 2022
Proceedings of the 7th IEEE International Conference on Smart Cloud, SmartCloud 2022, 2022
2021
A Multiple Sieve Approach Based on Artificial Intelligent Techniques and Correlation Power Analysis.
ACM Trans. Multim. Comput. Commun. Appl., 2021
IEEE Trans. Inf. Forensics Secur., 2021
2020
A Probe into Spoken English Recognition in English Education Based on Computer-Aided Comprehensive Analysis.
Int. J. Emerg. Technol. Learn., 2020
Block-oriented correlation power analysis with bitwise linear leakage: An artificial intelligence approach based on genetic algorithms.
Future Gener. Comput. Syst., 2020
Composition of Boolean functions: An application to the secondary constructions of bent functions.
Discret. Math., 2020
Proceedings of the Green Energy and Networking - 7th EAI International Conference, 2020
2019
Traceable and undeniable ciphertext-policy attribute-based encryption for cloud storage service.
Int. J. Distributed Sens. Networks, 2019
IEICE Trans. Inf. Syst., 2019
Improvement of Differential Fault Attack Based on Lightweight Ciphers with GFN Structure.
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019
Proceedings of the Blockchain and Trustworthy Systems - First International Conference, 2019
Proceedings of the Blockchain and Trustworthy Systems - First International Conference, 2019
2017
IACR Cryptol. ePrint Arch., 2017
Proceedings of the 2017 International Conference on Cryptography, Security and Privacy, 2017
2016
IACR Cryptol. ePrint Arch., 2016
IACR Cryptol. ePrint Arch., 2016
2014
2013
2008
IACR Cryptol. ePrint Arch., 2008