Yu Wen

Orcid: 0009-0002-3458-0819

According to our database1, Yu Wen authored at least 67 papers between 2001 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Improved YOLOv8-Based Target Precision Detection Algorithm for Train Wheel Tread Defects.
Sensors, June, 2024

Efficient one-shot Neural Architecture Search with progressive choice freezing evolutionary search.
Neurocomputing, 2024

Detection of fruit tree diseases in natural environments: A novel approach based on stereo camera and deep learning.
Eng. Appl. Artif. Intell., 2024

CarePlus: A general framework for hardware performance counter based malware detection under system resource competition.
Comput. Secur., 2024

TurboLog: A Turbocharged Lossless Compression Method for System Logs via Transformer.
Proceedings of the International Joint Conference on Neural Networks, 2024

ASSC: Adaptively Stochastic Smoothing based Adversarial Robustness Certification of Malware Detection Models.
Proceedings of the 27th International Conference on Computer Supported Cooperative Work in Design, 2024

Small Sample Succulent Image Classification Based on Transfer Learning.
Proceedings of the 2024 3rd Asia Conference on Algorithms, Computing and Machine Learning, 2024

2023
High-breakdown-voltage (>3000 V) and low-power-dissipation Al0.3Ga0.7N/GaN/Al0.1Ga0.9N double-heterostructure HEMTs with Ohmic/Schottky hybrid drains and Al2O3/SiO2 passivation.
Sci. China Inf. Sci., December, 2023

High-precision target ranging in complex orchard scenes by utilizing semantic segmentation results and binocular vision.
Comput. Electron. Agric., December, 2023

SparkAC: Fine-Grained Access Control in Spark for Secure Data Sharing and Analytics.
IEEE Trans. Dependable Secur. Comput., 2023

Representation-enhanced APT Detection Using Contrastive Learning.
Proceedings of the 22nd IEEE International Conference on Trust, 2023

BadLiDet: A Simple Backdoor Attack against LiDAR Object Detection in Autonomous Driving.
Proceedings of the 22nd IEEE International Conference on Trust, 2023

Towards Dynamic Backdoor Attacks against LiDAR Semantic Segmentation in Autonomous Driving.
Proceedings of the 22nd IEEE International Conference on Trust, 2023

PRISPARK: Differential Privacy Enforcement for Big Data Computing in Apache Spark.
Proceedings of the 42nd International Symposium on Reliable Distributed Systems, 2023

Design and Research of Mobile Moxibustion Robot Based on AprilTag.
Proceedings of the 29th International Conference on Mechatronics and Machine Vision in Practice, 2023

HUND: Enhancing Hardware Performance Counter Based Malware Detection Under System Resource Competition Using Explanation Method.
Proceedings of the IEEE Symposium on Computers and Communications, 2023

DAMUS: Adaptively Updating Hardware Performance Counter Based Malware Detector Under System Resource Competition.
Proceedings of the IEEE Symposium on Computers and Communications, 2023

ProDE: Interpretable APT Detection Method Based on Encoder-decoder Architecture.
Proceedings of the 29th IEEE International Conference on Parallel and Distributed Systems, 2023

Robust Controller Design for an Active Hexapod Platform with Prescribed Performance.
Proceedings of the International Conference on Advanced Robotics and Mechatronics, 2023

Post0-VR: Enabling Universal Realistic Rendering for Modern VR via Exploiting Architectural Similarity and Data Sharing.
Proceedings of the IEEE International Symposium on High-Performance Computer Architecture, 2023

A Distributed Storage System for System Logs Based on Hybrid Compression Scheme.
Proceedings of the IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2023

2022
GAN-Based Dual Active Learning for Nosocomial Infection Detection.
IEEE Trans. Netw. Sci. Eng., 2022

A Multimodal Retrieval and Ranking Method for Scientific Documents Based on HFS and XLNet.
Sci. Program., 2022

Investigating the impact of vulnerability datasets on deep learning-based vulnerability detectors.
PeerJ Comput. Sci., 2022

MVE-FLK: A multi-task legal judgment prediction via multi-view encoder fusing legal keywords.
Knowl. Based Syst., 2022

CQACD: A Concept Question-Answering System for Intelligent Tutoring Using a Domain Ontology With Rich Semantics.
IEEE Access, 2022

Deepro: Provenance-based APT Campaigns Detection via GNN.
Proceedings of the IEEE International Conference on Trust, 2022

A General Backdoor Attack to Graph Neural Networks Based on Explanation Method.
Proceedings of the IEEE International Conference on Trust, 2022

DEPCOMM: Graph Summarization on System Audit Logs for Attack Investigation.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

Towards Improving Multiple Authorship Attribution of Source Code.
Proceedings of the 22nd IEEE International Conference on Software Quality, 2022

Surface Defect Detection of Cable Based on Improved YOLO V3.
Proceedings of the 28th International Conference on Mechatronics and Machine Vision in Practice, 2022

Generating Adversarial Source Programs Using Important Tokens-based Structural Transformations.
Proceedings of the 26th International Conference on Engineering of Complex Computer Systems, 2022

CARE: Enabling Hardware Performance Counter based Malware Detection Resilient to System Resource Competition.
Proceedings of the 24th IEEE Int Conf on High Performance Computing & Communications; 8th Int Conf on Data Science & Systems; 20th Int Conf on Smart City; 8th Int Conf on Dependability in Sensor, 2022

T-Tracer: A Blockchain-Aided Symbol Mapping Watermarking Scheme for Traitor Tracing in Non-Repudiation Data Delivery.
Proceedings of the BSCI 2022: Proceedings of the 4th ACM International Symposium on Blockchain and Secure Critical Infrastructure, 2022

2021
DeepMal: maliciousness-Preserving adversarial instruction learning against static malware detection.
Cybersecur., 2021

Simulation of LCC-MMC HVDC Systems Using Dynamic Phasors.
IEEE Access, 2021

Generating Adversarial Examples of Source Code Classification Models via Q-Learning-Based Markov Decision Process.
Proceedings of the 21st IEEE International Conference on Software Quality, 2021

FederatedReverse: A Detection and Defense Method Against Backdoor Attacks in Federated Learning.
Proceedings of the IH&MMSec '21: ACM Workshop on Information Hiding and Multimedia Security, 2021

Malicious Login Detection Using Long Short-Term Memory with an Attention Mechanism.
Proceedings of the Advances in Digital Forensics XVII, 2021

Black-Box Buster: A Robust Zero-Shot Transfer-Based Adversarial Attack Method.
Proceedings of the Information and Communications Security - 23rd International Conference, 2021

Generating Adversarial Point Clouds on Multi-modal Fusion Based 3D Object Detection Model.
Proceedings of the Information and Communications Security - 23rd International Conference, 2021

ACGVD: Vulnerability Detection Based on Comprehensive Graph via Graph Neural Network with Attention.
Proceedings of the Information and Communications Security - 23rd International Conference, 2021

Research on Composite Tracking Control Technology of Single Detector in Laser Communication.
Proceedings of the 13th International Conference on Advanced Infocomm Technology, 2021

2020
Built-in Security Computer: Deploying Security-First Architecture Using Active Security Processor.
IEEE Trans. Computers, 2020

Malware Detection Based on Opcode Dynamic Analysis.
EAI Endorsed Trans. Security Safety, 2020

Multifocus image fusion using convolutional neural network.
Multim. Tools Appl., 2020

An Approach for Poisoning Attacks against RNN-Based Cyber Anomaly Detection.
Proceedings of the 19th IEEE International Conference on Trust, 2020

MLTracer: Malicious Logins Detection System via Graph Neural Network.
Proceedings of the 19th IEEE International Conference on Trust, 2020

Multi-phase and Multi-level Selective Feature Fusion for Automated Pancreas Segmentation from CT Images.
Proceedings of the Medical Image Computing and Computer Assisted Intervention - MICCAI 2020, 2020

GuardSpark++: Fine-Grained Purpose-Aware Access Control for Secure Data Sharing and Analysis in Spark.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020

2019
Log2vec: A Heterogeneous Graph Embedding Based Approach for Detecting Cyber Threats within Enterprise.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
Integrated Rudder/Fin Control With Disturbance Compensation Distributed Model Predictive Control.
IEEE Access, 2018

Aggregated Multimodal Bidirectional Recurrent Model for Audiovisual Speech Recognition.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

DCMIX: Generating Mixed Workloads for the Cloud Data Center.
Proceedings of the Benchmarking, Measuring, and Optimizing, 2018

2017
Efficient tamper-evident logging of distributed systems via concurrent authenticated tree.
Proceedings of the 36th IEEE International Performance Computing and Communications Conference, 2017

2016
Study of cognitive distraction detection based on GMA analysis.
Proceedings of the IEEE International Conference on Vehicular Electronics and Safety, 2016

2015
Predicting driver lane change intent using HCRF.
Proceedings of the IEEE International Conference on Vehicular Electronics and Safety, 2015

2014
Automated Power Control for Virtualized Infrastructures.
J. Comput. Sci. Technol., 2014

2007
The design methodology of Phoenix cluster system software stack.
Proceedings of the CHINA HPC 2007, 2007

A layered design methodology of cluster system stack.
Proceedings of the 2007 IEEE International Conference on Cluster Computing, 2007

2006
A robust past algorithm for subspace tracking in impulsive noise.
IEEE Trans. Signal Process., 2006

2005
Application of genetic algorithm in estimating origin-destination matrices of traffic network.
Proceedings of the 2005 IEEE International Conference on Granular Computing, 2005

2003
Dynamic window search of ant colony optimization for complex multi-stage decision problems.
Proceedings of the IEEE International Conference on Systems, 2003

Robust recursive bi-iteration singular value decomposition (SVD) for subspace tracking and adaptive filtering.
Proceedings of the 2003 International Symposium on Circuits and Systems, 2003

2002
A robust subspace tracking algorithm for subspace-based blind multiuser detection in impulsive noise.
Proceedings of the 14th International Conference on Digital Signal Processing, 2002

Robust subspace tracking based blind channel identification in impulsive noise environment.
Proceedings of the 11th European Signal Processing Conference, 2002

2001
Robust subspace tracking in impulsive noise.
Proceedings of the IEEE International Conference on Communications, 2001


  Loading...