Yuwei Xu

Orcid: 0000-0002-1611-9167

According to our database1, Yuwei Xu authored at least 60 papers between 2010 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
An Efficient Cross-Modal Privacy-Preserving Image-Text Retrieval Scheme.
Symmetry, August, 2024

TIGER: Training Inductive Graph Neural Network for Large-scale Knowledge Graph Reasoning.
Proc. VLDB Endow., June, 2024

GateKeeper: An UltraLite malicious traffic identification method with dual-aspect optimization strategies on IoT gateways.
Comput. Networks, 2024

NuanceTracker: A Website Fingerprinting Attack against Tor Hidden Services through Burst patterns.
Proceedings of the IEEE Symposium on Computers and Communications, 2024

LLM as Prompter: Low-resource Inductive Reasoning on Arbitrary Knowledge Graphs.
Proceedings of the Findings of the Association for Computational Linguistics, 2024

2023
ChainKeeper: A cross-chain scheme for governing the chain by chain.
IET Blockchain, December, 2023

Corrigendum to "FastTraffic: A lightweight method for encrypted traffic fast classification" [Computer Networks, Volume 235, November 2023, 109965].
Comput. Networks, December, 2023

FastTraffic: A lightweight method for encrypted traffic fast classification.
Comput. Networks, November, 2023

$\mathcal {R}$-Tracing: Consortium Blockchain-Based Vehicle Reputation Management for Resistance to Malicious Attacks and Selfish Behaviors.
IEEE Trans. Veh. Technol., June, 2023

SmartBuoy: A Machine Learning-Based Detection Method for Interest Flooding Attacks in VNDN.
Proceedings of the Ubiquitous Security, 2023

ChainPass: A Privacy-preserving Complete Cross-chain Authentication for Consortium Blockchains.
Proceedings of the 22nd IEEE International Conference on Trust, 2023

SharpEye: Identify mKCP Camouflage Traffic through Feature Optimization.
Proceedings of the 22nd IEEE International Conference on Trust, 2023

Cerberus: Efficient OSPS Traffic Identification through Multi-Task Learning.
Proceedings of the 22nd IEEE International Conference on Trust, 2023

DarkTrans: A Blockchain-based Covert Communication Scheme with High Channel Capacity and Strong Concealment.
Proceedings of the 29th IEEE International Conference on Parallel and Distributed Systems, 2023

S-chain: A Shard-based Blockchain Scheme for Cross-chain Supervision.
Proceedings of the 29th IEEE International Conference on Parallel and Distributed Systems, 2023

SCOPE: A Cross-Chain Supervision Scheme for Consortium Blockchains.
Proceedings of the Information and Communications Security - 25th International Conference, 2023

Zoomer: A Website Fingerprinting Attack Against Tor Hidden Services.
Proceedings of the Information and Communications Security - 25th International Conference, 2023

$\mathcal{L}{-}$ ETC: A Lightweight Model Based on Key Bytes Selection for Encrypted Traffic Classification.
Proceedings of the IEEE International Conference on Communications, 2023

2022
A Lightweight Authentication Scheme Based on Consortium Blockchain for Cross-Domain IoT.
Secur. Commun. Networks, 2022

MG-Conv: A spatiotemporal multi-graph convolutional neural network for stock market index trend prediction.
Comput. Electr. Eng., 2022

2021
Low-light image enhancement based on Retinex decomposition and adaptive gamma correction.
IET Image Process., 2021

A variable neighborhood search algorithm for energy conscious task scheduling in heterogeneous computing systems.
Concurr. Comput. Pract. Exp., 2021

Streaming-Aware Cellular Resource Allocation for UHD Video Streaming over Ultra Dense Network.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2021

Camera Pose Estimation Based on Feature Extraction and Description for Robotic Gastrointestinal Endoscopy.
Proceedings of the Intelligent Robotics and Applications - 14th International Conference, 2021

2020
Gradient structural similarity based gradient filtering for multi-modal image fusion.
Inf. Fusion, 2020

COMPASS: Directing Named Data Transmission in VANETs by Dynamic Directional Interfaces.
IEEE Access, 2020

A Privacy-Preserving Authentication Scheme for VANETs based on Consortium Blockchain.
Proceedings of the 92nd IEEE Vehicular Technology Conference, 2020

2018
Classification of Bent Monomials, Constructions of Bent Multinomials and Upper Bounds on the Nonlinearity of Vectorial Functions.
IEEE Trans. Inf. Theory, 2018

WOODY: A Post-Process Method for Smartphone-Based Activity Recognition.
IEEE Access, 2018

N-Guide: Achieving Efficient Named Data Transmission in Smart Buildings.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2018

SACP: A Signcryption-Based Authentication Scheme with Conditional Privacy Preservation for VANET.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2018

FlowCop: Detecting "Stranger" in Network Traffic Classification.
Proceedings of the 27th International Conference on Computer Communication and Networks, 2018

Motion Trajectory Sequence-Based Map Matching Assisted Indoor Autonomous Mobile Robot Positioning.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018

2017
Further Characterization of H Vectorial Functions.
Int. J. Netw. Secur., 2017

On the construction of differentially 4-uniform involutions.
Finite Fields Their Appl., 2017

A Smartphone-Based Online Pedestrian Positioning Approach for Both Structured and Open Indoor Spaces.
Proceedings of the 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), 2017

CO-RTO: Achieving efficient data retransmission in VNDN by correlations implied in names.
Proceedings of the 2017 IEEE Conference on Computer Communications Workshops, 2017

2016
SW-HMM: A Method for Evaluating Confidence of Smartphone-Based Activity Recognition.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

A Model with Hierarchical Classifiers for Activity Recognition on Mobile Devices.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

COPO: A Novel Position-Adaptive Method for Smartphone-Based Human Activity Recognition.
Proceedings of the Advances in Services Computing, 2016

2015
Optimized routing for video streaming in multi-hop wireless networks using analytical capacity estimation.
J. Comput. Syst. Sci., 2015

On the Existence and Constructions of Vectorial Boolean Bent Functions.
IACR Cryptol. ePrint Arch., 2015

Detecting Urban Road Condition and Disseminating Traffic Information by VANETs.
Proceedings of the 2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom), 2015

2014
Privacy-preserving authentication protocols with efficient verification in VANETs.
Int. J. Commun. Syst., 2014

An efficient detection scheme for urban traffic condition using volunteer probes.
Proceedings of the 20th IEEE International Conference on Parallel and Distributed Systems, 2014

A Smartphone Location Independent Activity Recognition Method Based on the Angle Feature.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2014

Converting Ptolemy II Models to SpaceEx for Applied Verification.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2014

2013
Augmented Broadcaster Identity-based Broadcast Encryption.
J. Digit. Inf. Manag., 2013

Comment on Wang et al.'s anonymous multi-receiver ID-based encryption scheme and its improved schemes.
Int. J. Intell. Inf. Database Syst., 2013

On the security of an ID-based anonymous proxy signature scheme and its improved scheme.
Int. J. Embed. Syst., 2013

Quality of service for video streaming over multi-hop wireless networks: Admission control approach based on analytical capacity estimation.
Proceedings of the 2013 IEEE Eighth International Conference on Intelligent Sensors, 2013

2012
A Queue-Length-Based Detection Scheme for Urban Traffic Congestion by VANETs.
Proceedings of the Seventh IEEE International Conference on Networking, 2012

Comment on Anonymous Multi-receiver Identity-Based Encryption Scheme.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012

On the Security of an Enhanced ID-Based Anonymous Proxy Signature Scheme in ICCAE2010.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012

Optimizing Routing in Multi-hop Wireless Networks Using Analytical Capacity Estimation: A Study on Video Streaming.
Proceedings of the 14th IEEE International Conference on High Performance Computing and Communication & 9th IEEE International Conference on Embedded Software and Systems, 2012

Efficient Detection Scheme for Urban Traffic Congestion Using Buses.
Proceedings of the 26th International Conference on Advanced Information Networking and Applications Workshops, 2012

An RSU-assisted Cluster Head Selection and Backup Protocol.
Proceedings of the 26th International Conference on Advanced Information Networking and Applications Workshops, 2012

Breaking and Repairing of an Anonymous and Traceable Communication Protocol for Vehicular Ad Hoc Networks.
Proceedings of the 12th IEEE International Conference on Computer and Information Technology, 2012

2011
Multi-hop broadcast for data transmission of traffic congestion detection.
Proceedings of the 10th International Conference on Mobile and Ubiquitous Multimedia, 2011

2010
Data Collection for the Detection of Urban Traffic Congestion by VANETs.
Proceedings of the 5th IEEE Asia-Pacific Services Computing Conference, 2010


  Loading...