Yuewei Dai
Orcid: 0000-0003-1522-9257
According to our database1,
Yuewei Dai
authored at least 105 papers
between 2003 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
Hypergraph convolutional network based weakly supervised point cloud semantic segmentation with scene-level annotations.
Neurocomputing, 2025
2024
Data-driven iterative learning cooperative trajectory tracking control for multiple autonomous underwater vehicles with input saturation constraints.
J. Field Robotics, October, 2024
Optimal Position Design for Unmanned Aerial Vehicle Relay-Assisted Covert Communication Based on Active Countermeasures.
IEEE Syst. J., March, 2024
Proceedings of the Pattern Recognition and Computer Vision - 7th Chinese Conference, 2024
2023
A UAV-Assisted Secure Communication System by Jointly Optimizing Transmit Power and Trajectory in the Internet of Things.
IEEE Trans. Green Commun. Netw., December, 2023
Hierarchical multi-robot navigation and formation in unknown environments via deep reinforcement learning and distributed optimization.
Robotics Comput. Integr. Manuf., October, 2023
Joint data and feature augmentation for self-supervised representation learning on point clouds.
Graph. Model., October, 2023
IEEE Trans. Veh. Technol., June, 2023
IEEE Robotics Autom. Lett., April, 2023
2022
Slicing-Tracking-Detection: Simultaneous Multi-Cylinder Detection From Large-Scale and Complex Point Clouds.
IEEE Trans. Vis. Comput. Graph., 2022
Single-Stage Underwater Target Detection Based on Feature Anchor Frame Double Optimization Network.
Sensors, 2022
J. Inf. Secur. Appl., 2022
Dynamic channel allocation strategy for quality of service enhancement in wireless ad hoc networks.
Concurr. Comput. Pract. Exp., 2022
Comput. Methods Programs Biomed., 2022
Super-resolution reconstruction of biometric features recognition based on manifold learning and deep residual network.
Comput. Methods Programs Biomed., 2022
2021
Contract-Based Incentive Mechanisms for Honeypot Defense in Advanced Metering Infrastructure.
IEEE Trans. Smart Grid, 2021
Detecting Multielement Algorithmically Generated Domain Names Based on Adaptive Embedding Model.
Secur. Commun. Networks, 2021
J. Inf. Secur. Appl., 2021
Honeypot Detection Strategy Against Advanced Persistent Threats in Industrial Internet of Things: A Prospect Theoretic Game.
IEEE Internet Things J., 2021
Int. J. Digit. Crime Forensics, 2021
Comput. Commun., 2021
Reinforcement based mobile robot path planning with improved dynamic window approach in unknown environment.
Auton. Robots, 2021
Application Behavior Identification in DNS Tunnels Based on Spatial-Temporal Information.
IEEE Access, 2021
2020
KSII Trans. Internet Inf. Syst., 2020
Detecting Stealthy Domain Generation Algorithms Using Heterogeneous Deep Neural Network Framework.
IEEE Access, 2020
Prospect Theoretic Study of Honeypot Defense Against Advanced Persistent Threats in Power Grid.
IEEE Access, 2020
IEEE Access, 2020
Mimicking Ship-Radiated Noise With Chaos Signal for Covert Underwater Acoustic Communication.
IEEE Access, 2020
2019
Symmetry, 2019
Multim. Tools Appl., 2019
KSII Trans. Internet Inf. Syst., 2019
IET Inf. Secur., 2019
Proceedings of the 16th IEEE International Conference on Networking, Sensing and Control, 2019
2018
Robust 2D Engineering CAD Graphics Hashing for Joint Topology and Geometry Authentication via Covariance-Based Descriptors.
IEEE Trans. Inf. Forensics Secur., 2018
Using Insider Swapping of Time Intervals to Perform Highly Invisible Network Flow Watermarking.
Secur. Commun. Networks, 2018
Secur. Commun. Networks, 2018
Quantum Inf. Process., 2018
A Modified PSO Algorithm for Parameters Identification of the Double-Dispersion Cole Model.
J. Circuits Syst. Comput., 2018
A Modified Quantum Bacterial Foraging Algorithm for Parameters Identification of Fractional-Order System.
IEEE Access, 2018
Sound Texture Generative Model Guided by a Lossless Mel-Frequency Convolutional Neural Network.
IEEE Access, 2018
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018
2017
Quantum Inf. Process., 2017
A unified framework for authenticating topology integrity of 2D heterogeneous engineering CAD drawings.
Multim. Tools Appl., 2017
Proceedings of the Cloud Computing and Security - Third International Conference, 2017
2016
Designing Analog Fountain Timing Channels: Undetectability, Robustness, and Model-Adaptation.
IEEE Trans. Inf. Forensics Secur., 2016
Secur. Commun. Networks, 2016
Matrix embedding in multicast steganography: analysis in privacy, security and immediacy.
Secur. Commun. Networks, 2016
Quantum Inf. Process., 2016
Novel Covert Timing Channels Implemented over Multiple Flows by Using Space-Time Trellis Codes.
J. Inf. Hiding Multim. Signal Process., 2016
J. Inf. Hiding Multim. Signal Process., 2016
Detection and Parameter Estimation for Jitterbug Covert Channel Based on Coefficient of Variation.
KSII Trans. Internet Inf. Syst., 2016
Inf. Process. Lett., 2016
Proceedings of the Cloud Computing and Security - Second International Conference, 2016
2015
Damage-resistance matrix embedding framework: the contradiction between robustness and embedding efficiency.
Secur. Commun. Networks, 2015
(<i>t</i>, <i>n</i>) Threshold quantum secret sharing using the phase shift operation.
Quantum Inf. Process., 2015
基于信任的反馈云模型WSN节点信任评价机制 (Trust Evaluation Mechanism for Nodes Based on Adaptive Cloud Model in Wireless Sensor Network).
计算机科学, 2015
基于Snort的Modbus TCP工控协议异常数据检测规则设计 (Design of Modbus TCP Industrial Control Network Protocol Abnormal Data Detection Rules Based on Snort).
计算机科学, 2015
J. Inf. Hiding Multim. Signal Process., 2015
J. Inf. Hiding Multim. Signal Process., 2015
J. Inf. Hiding Multim. Signal Process., 2015
Proceedings of the 2015 International Conference on Control, 2015
2014
Authenticating topological integrity of process plant models through digital watermarking.
Multim. Tools Appl., 2014
Multim. Syst., 2014
J. Networks, 2014
J. Inf. Hiding Multim. Signal Process., 2014
Ann. des Télécommunications, 2014
Proceedings of the Tenth International Conference on Computational Intelligence and Security, 2014
2013
J. Networks, 2013
Comput. Graph., 2013
2012
2011
Secur. Commun. Networks, 2011
2010
J. Multim., 2010
Copyright Protecting Using The Secure Visible Removable Watermarking In JPEG Compression.
J. Digit. Content Technol. its Appl., 2010
J. Convergence Inf. Technol., 2010
Proceedings of the Advances in Swarm Intelligence, First International Conference, 2010
2009
A secret sharing scheme based on (<i>t</i>, <i>n</i>) threshold and adversary structure.
Int. J. Inf. Sec., 2009
Proceedings of the 2009 IEEE/INFORMS International Conference on Service Operations, 2009
2008
Signal Process., 2008
J. Electronic Imaging, 2008
Proceedings of the IEEE International Conference on Networking, Sensing and Control, 2008
Optimum Decoder for Barni's Multiplicative Watermarking Based on Minimum Bayesian Risk Criterion.
Proceedings of the IEEE International Conference on Networking, Sensing and Control, 2008
Assessment of Integrated Electronic Information System survivability based on u-function.
Proceedings of the IEEE International Conference on Networking, Sensing and Control, 2008
Proceedings of the 2008 International Conference on Computational Intelligence and Security, 2008
2007
Proceedings of the Third International IEEE Conference on Signal-Image Technologies and Internet-Based System, 2007
Proceedings of the 2007 IEEE International Conference on Multimedia and Expo, 2007
2006
Proceedings of the Advances in Neural Networks - ISNN 2006, Third International Symposium on Neural Networks, Chengdu, China, May 28, 2006
Proceedings of the Artificial Intelligence Applications and Innovations, 2006
Proceedings of the First International Conference on Innovative Computing, Information and Control (ICICIC 2006), 30 August, 2006
2005
Proceedings of the IEEE 7th Workshop on Multimedia Signal Processing, 2005
On Sequence Synchronization Analysis Against Chaos Based Spread Spectrum Image Steganography.
Proceedings of the Advances in Natural Computation, First International Conference, 2005
2004
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VI, 2004
Proceedings of the Digital Watermarking, Third InternationalWorkshop, 2004
Proceedings of the 8th International Conference on Control, 2004
Proceedings of the 8th International Conference on Control, 2004
Proceedings of the 8th International Conference on Control, 2004
2003
Proceedings of the Digital Watermarking, Second International Workshop, 2003