Yuewei Dai

Orcid: 0000-0003-1522-9257

According to our database1, Yuewei Dai authored at least 104 papers between 2003 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Optimal Position Design for Unmanned Aerial Vehicle Relay-Assisted Covert Communication Based on Active Countermeasures.
IEEE Syst. J., March, 2024

Fine-grained Metrics for Point Cloud Semantic Segmentation.
CoRR, 2024

2023
A UAV-Assisted Secure Communication System by Jointly Optimizing Transmit Power and Trajectory in the Internet of Things.
IEEE Trans. Green Commun. Netw., December, 2023

Hierarchical multi-robot navigation and formation in unknown environments via deep reinforcement learning and distributed optimization.
Robotics Comput. Integr. Manuf., October, 2023

Joint data and feature augmentation for self-supervised representation learning on point clouds.
Graph. Model., October, 2023

Strategic UAV-Assisted Game Model for Detection in Covert Communication.
IEEE Trans. Veh. Technol., June, 2023

SVF-RRT*: A Stream-Based VF-RRT* for USVs Path Planning Considering Ocean Currents.
IEEE Robotics Autom. Lett., April, 2023

2022
Slicing-Tracking-Detection: Simultaneous Multi-Cylinder Detection From Large-Scale and Complex Point Clouds.
IEEE Trans. Vis. Comput. Graph., 2022

Single-Stage Underwater Target Detection Based on Feature Anchor Frame Double Optimization Network.
Sensors, 2022

A semantic element representation model for malicious domain name detection.
J. Inf. Secur. Appl., 2022

Hypergraph Convolutional Network based Weakly Supervised Point Cloud Semantic Segmentation with Scene-Level Annotations.
CoRR, 2022

Dynamic channel allocation strategy for quality of service enhancement in wireless ad hoc networks.
Concurr. Comput. Pract. Exp., 2022

Facial expression recognition based on deep learning.
Comput. Methods Programs Biomed., 2022

Super-resolution reconstruction of biometric features recognition based on manifold learning and deep residual network.
Comput. Methods Programs Biomed., 2022

2021
Contract-Based Incentive Mechanisms for Honeypot Defense in Advanced Metering Infrastructure.
IEEE Trans. Smart Grid, 2021

Detecting Multielement Algorithmically Generated Domain Names Based on Adaptive Embedding Model.
Secur. Commun. Networks, 2021

Fast3DS: A real-time full-convolutional malicious domain name detection system.
J. Inf. Secur. Appl., 2021

Honeypot Detection Strategy Against Advanced Persistent Threats in Industrial Internet of Things: A Prospect Theoretic Game.
IEEE Internet Things J., 2021

Design a Wireless Covert Channel Based on Dither Analog Chaotic Code.
Int. J. Digit. Crime Forensics, 2021

A correlation-based approach to detecting wireless physical covert channels.
Comput. Commun., 2021

Reinforcement based mobile robot path planning with improved dynamic window approach in unknown environment.
Auton. Robots, 2021

Application Behavior Identification in DNS Tunnels Based on Spatial-Temporal Information.
IEEE Access, 2021

2020
Exploiting Correlation Characteristics to Detect Covert digital communication.
KSII Trans. Internet Inf. Syst., 2020

Detecting Stealthy Domain Generation Algorithms Using Heterogeneous Deep Neural Network Framework.
IEEE Access, 2020

Prospect Theoretic Study of Honeypot Defense Against Advanced Persistent Threats in Power Grid.
IEEE Access, 2020

Partial Matching of Large Scale Process Plant Models Using Random Walk on Graphs.
IEEE Access, 2020

Mimicking Ship-Radiated Noise With Chaos Signal for Covert Underwater Acoustic Communication.
IEEE Access, 2020

2019
Detecting Word-Based Algorithmically Generated Domains Using Semantic Analysis.
Symmetry, 2019

An end-to-end generative network for environmental sound-based covert communication.
Multim. Tools Appl., 2019

Designing Rich-Secure Network Covert Timing Channels Based on Nested Lattices.
KSII Trans. Internet Inf. Syst., 2019

Quantum secret sharing by using Fourier transform on orbital angular momentum.
IET Inf. Secur., 2019

The Path Planning of Mobile Robots Based on an Improved A<sup>*</sup> Algorithm.
Proceedings of the 16th IEEE International Conference on Networking, Sensing and Control, 2019

2018
Robust 2D Engineering CAD Graphics Hashing for Joint Topology and Geometry Authentication via Covariance-Based Descriptors.
IEEE Trans. Inf. Forensics Secur., 2018

Using Insider Swapping of Time Intervals to Perform Highly Invisible Network Flow Watermarking.
Secur. Commun. Networks, 2018

A Wireless Covert Channel Based on Constellation Shaping Modulation.
Secur. Commun. Networks, 2018

Multi-dimensional quantum state sharing based on quantum Fourier transform.
Quantum Inf. Process., 2018

A Modified PSO Algorithm for Parameters Identification of the Double-Dispersion Cole Model.
J. Circuits Syst. Comput., 2018

A Modified Quantum Bacterial Foraging Algorithm for Parameters Identification of Fractional-Order System.
IEEE Access, 2018

Sound Texture Generative Model Guided by a Lossless Mel-Frequency Convolutional Neural Network.
IEEE Access, 2018

A Novel Detection Method for Word-Based DGA.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

A Comprehensive Analysis of Interval Based Network Flow Watermarking.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

An Improved ICS Honeypot Based on SNAP7 and IMUNES.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

2017
Dynamic quantum secret sharing by using <i>d</i>-dimensional GHZ state.
Quantum Inf. Process., 2017

A unified framework for authenticating topology integrity of 2D heterogeneous engineering CAD drawings.
Multim. Tools Appl., 2017

Detection of Jitterbug Covert Channel Based on Partial Entropy Test.
Proceedings of the Cloud Computing and Security - Third International Conference, 2017

2016
Designing Analog Fountain Timing Channels: Undetectability, Robustness, and Model-Adaptation.
IEEE Trans. Inf. Forensics Secur., 2016

Detecting <i>JitterBug</i> covert timing channel with sparse embedding.
Secur. Commun. Networks, 2016

Matrix embedding in multicast steganography: analysis in privacy, security and immediacy.
Secur. Commun. Networks, 2016

Efficient quantum secret sharing.
Quantum Inf. Process., 2016

<i>d</i>-Dimensional quantum state sharing with adversary structure.
Quantum Inf. Process., 2016

Novel Covert Timing Channels Implemented over Multiple Flows by Using Space-Time Trellis Codes.
J. Inf. Hiding Multim. Signal Process., 2016

A Covert Timing Channel Based on DCT Domain of Inter Packet Delay Sequence.
J. Inf. Hiding Multim. Signal Process., 2016

Detection and Parameter Estimation for Jitterbug Covert Channel Based on Coefficient of Variation.
KSII Trans. Internet Inf. Syst., 2016

Verifiable (t, n) threshold quantum secret sharing using d-dimensional Bell state.
Inf. Process. Lett., 2016

A Construction Scheme of Steganographic Codes Based on Matrix Unwrapping.
Proceedings of the Cloud Computing and Security - Second International Conference, 2016

2015
Damage-resistance matrix embedding framework: the contradiction between robustness and embedding efficiency.
Secur. Commun. Networks, 2015

(<i>t</i>, <i>n</i>) Threshold quantum secret sharing using the phase shift operation.
Quantum Inf. Process., 2015

Proactive quantum secret sharing.
Quantum Inf. Process., 2015

基于信任的反馈云模型WSN节点信任评价机制 (Trust Evaluation Mechanism for Nodes Based on Adaptive Cloud Model in Wireless Sensor Network).
计算机科学, 2015

基于Snort的Modbus TCP工控协议异常数据检测规则设计 (Design of Modbus TCP Industrial Control Network Protocol Abnormal Data Detection Rules Based on Snort).
计算机科学, 2015

Improving Reliability of Covert Timing Channel to Packet Loss.
J. Inf. Hiding Multim. Signal Process., 2015

SkyLen: a Skype-based length covert channel.
J. Inf. Hiding Multim. Signal Process., 2015

A Detection Method for Cloak Covert Channel Based on Distribution of TCP Burst Size.
J. Inf. Hiding Multim. Signal Process., 2015

Designing snort rules to detect abnormal DNP3 network data.
Proceedings of the 2015 International Conference on Control, 2015

2014
Authenticating topological integrity of process plant models through digital watermarking.
Multim. Tools Appl., 2014

Adaptive steganography based on block complexity and matrix embedding.
Multim. Syst., 2014

Network Packet Length Covert Channel Based on Empirical Distribution Function.
J. Networks, 2014

Alternative Syndrome-Trellis Codes With Reduced Trellis Complexity.
J. Inf. Hiding Multim. Signal Process., 2014

Syndrome trellis codes based on minimal span generator matrix.
Ann. des Télécommunications, 2014

Provably Secure Identity-Based Threshold Decryption on Access Structure.
Proceedings of the Tenth International Conference on Computational Intelligence and Security, 2014

2013
Detection of TCP covert channel based on Markov model.
Telecommun. Syst., 2013

Detect image splicing with artificial blurred boundary.
Math. Comput. Model., 2013

An Improved Retransmission-based Network Steganography: Design and Detection.
J. Networks, 2013

Topology authentication for CAPD models based on Laplacian coordinates.
Comput. Graph., 2013

Watermarking 3D CAPD models for topology verification.
Comput. Aided Des., 2013

2012
Network covert timing channel with distribution matching.
Telecommun. Syst., 2012

2011
Identity-based multi-receiver threshold signcryption scheme.
Secur. Commun. Networks, 2011

2010
Improved LSB-matching Steganography for Preserving Second-order Statistics.
J. Multim., 2010

Copyright Protecting Using The Secure Visible Removable Watermarking In JPEG Compression.
J. Digit. Content Technol. its Appl., 2010

Secure Multimedia Distribution Based on Watermarking and Encryption.
J. Convergence Inf. Technol., 2010

Optimal Design for 2-DOF PID Regulator Based on PSO Algorithm.
Proceedings of the Advances in Swarm Intelligence, First International Conference, 2010

2009
A secret sharing scheme based on (<i>t</i>, <i>n</i>) threshold and adversary structure.
Int. J. Inf. Sec., 2009

A Model of Intrusion Tolerant System Based on Game Theory.
Comput. Inf. Sci., 2009

An evaluation method of operational effectiveness for the emergency plans.
Proceedings of the 2009 IEEE/INFORMS International Conference on Service Operations, 2009

2008
Locally optimum detection for Barni's multiplicative watermarking in DWT domain.
Signal Process., 2008

Secure multimedia watermarking authentication in wavelet domain.
J. Electronic Imaging, 2008

Forgery-location highway monitoring systembased on video watermarking.
Proceedings of the IEEE International Conference on Networking, Sensing and Control, 2008

Optimum Decoder for Barni's Multiplicative Watermarking Based on Minimum Bayesian Risk Criterion.
Proceedings of the IEEE International Conference on Networking, Sensing and Control, 2008

Assessment of Integrated Electronic Information System survivability based on u-function.
Proceedings of the IEEE International Conference on Networking, Sensing and Control, 2008

Robust Hashing Based on Persistent Points for Video Copy Detection.
Proceedings of the 2008 International Conference on Computational Intelligence and Security, 2008

2007
A new adaptive watermarking for real-time MPEG videos.
Appl. Math. Comput., 2007

A RST-Resilient Watermarking Scheme Based on Invariant Features.
Proceedings of the Third International IEEE Conference on Signal-Image Technologies and Internet-Based System, 2007

Image Steganography Based on Quantization-Embedders Combination.
Proceedings of the 2007 IEEE International Conference on Multimedia and Expo, 2007

2006
Data Hiding in Neural Network Prediction Errors.
Proceedings of the Advances in Neural Networks - ISNN 2006, Third International Symposium on Neural Networks, Chengdu, China, May 28, 2006

Semi-Fragile Watermarking Authentication with Local and Global Watermarks.
Proceedings of the Artificial Intelligence Applications and Innovations, 2006

Robustness Analysis of Watermarking Schemes Based on Two Novel Transforms.
Proceedings of the First International Conference on Innovative Computing, Information and Control (ICICIC 2006), 30 August, 2006

2005
Image Hiding by Non-uniform Generalized LSB and Dynamic Programming.
Proceedings of the IEEE 7th Workshop on Multimedia Signal Processing, 2005

On Sequence Synchronization Analysis Against Chaos Based Spread Spectrum Image Steganography.
Proceedings of the Advances in Natural Computation, First International Conference, 2005

2004
Feature-based watermarking scheme for MPEG-I/II video authentication.
Proceedings of the Security, Steganography, and Watermarking of Multimedia Contents VI, 2004

A Multi-feature Based Invertible Authentication Watermarking for JPEG Images.
Proceedings of the Digital Watermarking, Third InternationalWorkshop, 2004

A fast video encryption scheme based-on chaos.
Proceedings of the 8th International Conference on Control, 2004

A secure voice communication system based on DSP.
Proceedings of the 8th International Conference on Control, 2004

A fast motion segmentation based watermarking for MPEG-2 video.
Proceedings of the 8th International Conference on Control, 2004

2003
A Feature-Watermarking Scheme for JPEG Image Authentication.
Proceedings of the Digital Watermarking, Second International Workshop, 2003


  Loading...