Yuanda Wang

Orcid: 0009-0008-2062-9013

According to our database1, Yuanda Wang authored at least 41 papers between 2016 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Discovering Latent Variables for the Tasks With Confounders in Multi-Agent Reinforcement Learning.
IEEE CAA J. Autom. Sinica, July, 2024

Hierarchical multi-agent reinforcement learning for cooperative tasks with sparse rewards in continuous domain.
Neural Comput. Appl., January, 2024

Protecting Activity Sensing Data Privacy Using Hierarchical Information Dissociation.
CoRR, 2024

The Dark Side of Human Feedback: Poisoning Large Language Models via User Inputs.
CoRR, 2024

ViC: Virtual Compiler Is All You Need For Assembly Code Search.
CoRR, 2024

Learning Autonomous Race Driving with Action Mapping Reinforcement Learning.
CoRR, 2024

Reinforcement Learning with Safe Action Generation for Autonomous Racing.
Proceedings of the IEEE Congress on Evolutionary Computation, 2024

Virtual Compiler Is All You Need For Assembly Code Search.
Proceedings of the 62nd Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers), 2024

2023
Credit assignment in heterogeneous multi-agent reinforcement learning for fully cooperative tasks.
Appl. Intell., December, 2023

Action Mapping: A Reinforcement Learning Method for Constrained-Input Systems.
IEEE Trans. Neural Networks Learn. Syst., October, 2023

Multi-objective deep reinforcement learning for crowd-aware robot navigation with dynamic human preference.
Neural Comput. Appl., August, 2023

Policy enforcement in traditional non-SDN networks.
J. Parallel Distributed Comput., July, 2023

XuanCe: A Comprehensive and Unified Deep Reinforcement Learning Library.
CoRR, 2023

A Practical Survey on Emerging Threats from AI-driven Voice Attacks: How Vulnerable are Commercial Voice Control Systems?
CoRR, 2023

Beyond Boundaries: A Comprehensive Survey of Transferable Attacks on AI Systems.
CoRR, 2023

VSMask: Defending Against Voice Synthesis Attack via Real-Time Predictive Perturbation.
Proceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2023

PhantomSound: Black-Box, Query-Efficient Audio Adversarial Attack via Split-Second Phoneme Injection.
Proceedings of the 26th International Symposium on Research in Attacks, 2023

Understanding Multi-Turn Toxic Behaviors in Open-Domain Chatbots.
Proceedings of the 26th International Symposium on Research in Attacks, 2023

2022
Fast and Accurate Cardinality Estimation by Self-Morphing Bitmaps.
IEEE/ACM Trans. Netw., 2022

URadio: Wideband Ultrasound Communication for Smart Home Applications.
IEEE Internet Things J., 2022

GhostTalk: Interactive Attack on Smartphone Voice System Through Power Line.
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022

Online Cardinality Estimation by Self-morphing Bitmaps.
Proceedings of the 38th IEEE International Conference on Data Engineering, 2022

Supporting Real-time Networkwide T-Queries in High-speed Networks.
Proceedings of the 42nd IEEE International Conference on Distributed Computing Systems, 2022

SPECPATCH: Human-In-The-Loop Adversarial Audio Spectrogram Patch Attack on Speech Recognition.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

2021
Cooperative control with designated convergence rate for high-order integrators under heterogeneous couplings.
J. Frankl. Inst., 2021

Rumor Remove Order Strategy on Social Networks.
Proceedings of the ICISDM 2021: 2021 the 5th International Conference on Information System and Data Mining, Silicon Valley, CA, USA, May 27, 2021

A Survey on Mainstream Dimensions of Edge Computing.
Proceedings of the ICISDM 2021: 2021 the 5th International Conference on Information System and Data Mining, Silicon Valley, CA, USA, May 27, 2021

A Full Mirror Computation Model for Edge-Cloud Computing.
Proceedings of the IC3 2021: Thirteenth International Conference on Contemporary Computing, Noida, India, August 5, 2021

Supporting Real-Time ${T}$-Queries on Network Traffic with a Cloud-Based Offloading Model.
Proceedings of the 14th IEEE International Conference on Cloud Computing, 2021

Dynamic Edge-Twin Computing for Vehicle Tracking.
Proceedings of the 14th IEEE International Conference on Cloud Computing, 2021

2020
Deterministic Policy Gradient With Integral Compensator for Robust Quadrotor Control.
IEEE Trans. Syst. Man Cybern. Syst., 2020

Cooperative control for multi-player pursuit-evasion games with reinforcement learning.
Neurocomputing, 2020

Fixed-time event-triggered synchronization of a multilayer Kuramoto-oscillator network.
Neurocomputing, 2020

SDR receiver using commodity wifi via physical-layer signal reconstruction.
Proceedings of the MobiCom '20: The 26th Annual International Conference on Mobile Computing and Networking, 2020

Accurate Hierarchical Traffic Measurement in Datacenters Through Differentiated Memory Allocation.
Proceedings of the 6th International Conference on Big Data Computing and Communications, 2020

An Experimental Study on the Impact of Execution Location in Edge-Cloud Computing.
Proceedings of the 6th International Conference on Big Data Computing and Communications, 2020

2019
Nonlinear Robust Compensation Method for Trajectory Tracking Control of Quadrotors.
IEEE Access, 2019

Dependable Policy Enforcement in Traditional Non-SDN Networks.
Proceedings of the 39th IEEE International Conference on Distributed Computing Systems, 2019

2018
Learning to Navigate Through Complex Dynamic Environment With Modular Deep Reinforcement Learning.
IEEE Trans. Games, 2018

2016
Exponential Consensus in Directed Networks of Multi-Agents with Saturated Protocols.
J. Interconnect. Networks, 2016

Pole placement for discrete-time systems via multiple parametric Lyapunov equations.
Proceedings of the 14th International Workshop on Variable Structure Systems, 2016


  Loading...