Yu Wen
Orcid: 0009-0002-3458-0819
According to our database1,
Yu Wen
authored at least 67 papers
between 2001 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Improved YOLOv8-Based Target Precision Detection Algorithm for Train Wheel Tread Defects.
Sensors, June, 2024
Efficient one-shot Neural Architecture Search with progressive choice freezing evolutionary search.
Neurocomputing, 2024
Detection of fruit tree diseases in natural environments: A novel approach based on stereo camera and deep learning.
Eng. Appl. Artif. Intell., 2024
CarePlus: A general framework for hardware performance counter based malware detection under system resource competition.
Comput. Secur., 2024
TurboLog: A Turbocharged Lossless Compression Method for System Logs via Transformer.
Proceedings of the International Joint Conference on Neural Networks, 2024
ASSC: Adaptively Stochastic Smoothing based Adversarial Robustness Certification of Malware Detection Models.
Proceedings of the 27th International Conference on Computer Supported Cooperative Work in Design, 2024
Proceedings of the 2024 3rd Asia Conference on Algorithms, Computing and Machine Learning, 2024
2023
High-breakdown-voltage (>3000 V) and low-power-dissipation Al0.3Ga0.7N/GaN/Al0.1Ga0.9N double-heterostructure HEMTs with Ohmic/Schottky hybrid drains and Al2O3/SiO2 passivation.
Sci. China Inf. Sci., December, 2023
High-precision target ranging in complex orchard scenes by utilizing semantic segmentation results and binocular vision.
Comput. Electron. Agric., December, 2023
IEEE Trans. Dependable Secur. Comput., 2023
Proceedings of the 22nd IEEE International Conference on Trust, 2023
BadLiDet: A Simple Backdoor Attack against LiDAR Object Detection in Autonomous Driving.
Proceedings of the 22nd IEEE International Conference on Trust, 2023
Towards Dynamic Backdoor Attacks against LiDAR Semantic Segmentation in Autonomous Driving.
Proceedings of the 22nd IEEE International Conference on Trust, 2023
Proceedings of the 42nd International Symposium on Reliable Distributed Systems, 2023
Proceedings of the 29th International Conference on Mechatronics and Machine Vision in Practice, 2023
HUND: Enhancing Hardware Performance Counter Based Malware Detection Under System Resource Competition Using Explanation Method.
Proceedings of the IEEE Symposium on Computers and Communications, 2023
DAMUS: Adaptively Updating Hardware Performance Counter Based Malware Detector Under System Resource Competition.
Proceedings of the IEEE Symposium on Computers and Communications, 2023
Proceedings of the 29th IEEE International Conference on Parallel and Distributed Systems, 2023
Proceedings of the International Conference on Advanced Robotics and Mechatronics, 2023
Post0-VR: Enabling Universal Realistic Rendering for Modern VR via Exploiting Architectural Similarity and Data Sharing.
Proceedings of the IEEE International Symposium on High-Performance Computer Architecture, 2023
Proceedings of the IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2023
2022
IEEE Trans. Netw. Sci. Eng., 2022
A Multimodal Retrieval and Ranking Method for Scientific Documents Based on HFS and XLNet.
Sci. Program., 2022
Investigating the impact of vulnerability datasets on deep learning-based vulnerability detectors.
PeerJ Comput. Sci., 2022
MVE-FLK: A multi-task legal judgment prediction via multi-view encoder fusing legal keywords.
Knowl. Based Syst., 2022
CQACD: A Concept Question-Answering System for Intelligent Tutoring Using a Domain Ontology With Rich Semantics.
IEEE Access, 2022
Proceedings of the IEEE International Conference on Trust, 2022
Proceedings of the IEEE International Conference on Trust, 2022
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022
Proceedings of the 22nd IEEE International Conference on Software Quality, 2022
Proceedings of the 28th International Conference on Mechatronics and Machine Vision in Practice, 2022
Generating Adversarial Source Programs Using Important Tokens-based Structural Transformations.
Proceedings of the 26th International Conference on Engineering of Complex Computer Systems, 2022
CARE: Enabling Hardware Performance Counter based Malware Detection Resilient to System Resource Competition.
Proceedings of the 24th IEEE Int Conf on High Performance Computing & Communications; 8th Int Conf on Data Science & Systems; 20th Int Conf on Smart City; 8th Int Conf on Dependability in Sensor, 2022
T-Tracer: A Blockchain-Aided Symbol Mapping Watermarking Scheme for Traitor Tracing in Non-Repudiation Data Delivery.
Proceedings of the BSCI 2022: Proceedings of the 4th ACM International Symposium on Blockchain and Secure Critical Infrastructure, 2022
2021
DeepMal: maliciousness-Preserving adversarial instruction learning against static malware detection.
Cybersecur., 2021
Generating Adversarial Examples of Source Code Classification Models via Q-Learning-Based Markov Decision Process.
Proceedings of the 21st IEEE International Conference on Software Quality, 2021
FederatedReverse: A Detection and Defense Method Against Backdoor Attacks in Federated Learning.
Proceedings of the IH&MMSec '21: ACM Workshop on Information Hiding and Multimedia Security, 2021
Proceedings of the Advances in Digital Forensics XVII, 2021
Proceedings of the Information and Communications Security - 23rd International Conference, 2021
Generating Adversarial Point Clouds on Multi-modal Fusion Based 3D Object Detection Model.
Proceedings of the Information and Communications Security - 23rd International Conference, 2021
ACGVD: Vulnerability Detection Based on Comprehensive Graph via Graph Neural Network with Attention.
Proceedings of the Information and Communications Security - 23rd International Conference, 2021
Research on Composite Tracking Control Technology of Single Detector in Laser Communication.
Proceedings of the 13th International Conference on Advanced Infocomm Technology, 2021
2020
Built-in Security Computer: Deploying Security-First Architecture Using Active Security Processor.
IEEE Trans. Computers, 2020
EAI Endorsed Trans. Security Safety, 2020
Multim. Tools Appl., 2020
Proceedings of the 19th IEEE International Conference on Trust, 2020
Proceedings of the 19th IEEE International Conference on Trust, 2020
Multi-phase and Multi-level Selective Feature Fusion for Automated Pancreas Segmentation from CT Images.
Proceedings of the Medical Image Computing and Computer Assisted Intervention - MICCAI 2020, 2020
GuardSpark++: Fine-Grained Purpose-Aware Access Control for Secure Data Sharing and Analysis in Spark.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020
2019
Log2vec: A Heterogeneous Graph Embedding Based Approach for Detecting Cyber Threats within Enterprise.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
2018
Integrated Rudder/Fin Control With Disturbance Compensation Distributed Model Predictive Control.
IEEE Access, 2018
Aggregated Multimodal Bidirectional Recurrent Model for Audiovisual Speech Recognition.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018
Proceedings of the Benchmarking, Measuring, and Optimizing, 2018
2017
Efficient tamper-evident logging of distributed systems via concurrent authenticated tree.
Proceedings of the 36th IEEE International Performance Computing and Communications Conference, 2017
2016
Proceedings of the IEEE International Conference on Vehicular Electronics and Safety, 2016
2015
Proceedings of the IEEE International Conference on Vehicular Electronics and Safety, 2015
2014
J. Comput. Sci. Technol., 2014
2007
Proceedings of the CHINA HPC 2007, 2007
Proceedings of the 2007 IEEE International Conference on Cluster Computing, 2007
2006
IEEE Trans. Signal Process., 2006
2005
Application of genetic algorithm in estimating origin-destination matrices of traffic network.
Proceedings of the 2005 IEEE International Conference on Granular Computing, 2005
2003
Dynamic window search of ant colony optimization for complex multi-stage decision problems.
Proceedings of the IEEE International Conference on Systems, 2003
Robust recursive bi-iteration singular value decomposition (SVD) for subspace tracking and adaptive filtering.
Proceedings of the 2003 International Symposium on Circuits and Systems, 2003
2002
A robust subspace tracking algorithm for subspace-based blind multiuser detection in impulsive noise.
Proceedings of the 14th International Conference on Digital Signal Processing, 2002
Robust subspace tracking based blind channel identification in impulsive noise environment.
Proceedings of the 11th European Signal Processing Conference, 2002
2001
Proceedings of the IEEE International Conference on Communications, 2001