Yuwei Xu
Orcid: 0000-0002-1611-9167
According to our database1,
Yuwei Xu
authored at least 60 papers
between 2010 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Symmetry, August, 2024
TIGER: Training Inductive Graph Neural Network for Large-scale Knowledge Graph Reasoning.
Proc. VLDB Endow., June, 2024
GateKeeper: An UltraLite malicious traffic identification method with dual-aspect optimization strategies on IoT gateways.
Comput. Networks, 2024
NuanceTracker: A Website Fingerprinting Attack against Tor Hidden Services through Burst patterns.
Proceedings of the IEEE Symposium on Computers and Communications, 2024
Proceedings of the Findings of the Association for Computational Linguistics, 2024
2023
IET Blockchain, December, 2023
Corrigendum to "FastTraffic: A lightweight method for encrypted traffic fast classification" [Computer Networks, Volume 235, November 2023, 109965].
Comput. Networks, December, 2023
Comput. Networks, November, 2023
$\mathcal {R}$-Tracing: Consortium Blockchain-Based Vehicle Reputation Management for Resistance to Malicious Attacks and Selfish Behaviors.
IEEE Trans. Veh. Technol., June, 2023
SmartBuoy: A Machine Learning-Based Detection Method for Interest Flooding Attacks in VNDN.
Proceedings of the Ubiquitous Security, 2023
ChainPass: A Privacy-preserving Complete Cross-chain Authentication for Consortium Blockchains.
Proceedings of the 22nd IEEE International Conference on Trust, 2023
Proceedings of the 22nd IEEE International Conference on Trust, 2023
Proceedings of the 22nd IEEE International Conference on Trust, 2023
DarkTrans: A Blockchain-based Covert Communication Scheme with High Channel Capacity and Strong Concealment.
Proceedings of the 29th IEEE International Conference on Parallel and Distributed Systems, 2023
Proceedings of the 29th IEEE International Conference on Parallel and Distributed Systems, 2023
Proceedings of the Information and Communications Security - 25th International Conference, 2023
Proceedings of the Information and Communications Security - 25th International Conference, 2023
$\mathcal{L}{-}$ ETC: A Lightweight Model Based on Key Bytes Selection for Encrypted Traffic Classification.
Proceedings of the IEEE International Conference on Communications, 2023
2022
A Lightweight Authentication Scheme Based on Consortium Blockchain for Cross-Domain IoT.
Secur. Commun. Networks, 2022
MG-Conv: A spatiotemporal multi-graph convolutional neural network for stock market index trend prediction.
Comput. Electr. Eng., 2022
2021
Low-light image enhancement based on Retinex decomposition and adaptive gamma correction.
IET Image Process., 2021
A variable neighborhood search algorithm for energy conscious task scheduling in heterogeneous computing systems.
Concurr. Comput. Pract. Exp., 2021
Streaming-Aware Cellular Resource Allocation for UHD Video Streaming over Ultra Dense Network.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2021
Camera Pose Estimation Based on Feature Extraction and Description for Robotic Gastrointestinal Endoscopy.
Proceedings of the Intelligent Robotics and Applications - 14th International Conference, 2021
2020
Gradient structural similarity based gradient filtering for multi-modal image fusion.
Inf. Fusion, 2020
COMPASS: Directing Named Data Transmission in VANETs by Dynamic Directional Interfaces.
IEEE Access, 2020
A Privacy-Preserving Authentication Scheme for VANETs based on Consortium Blockchain.
Proceedings of the 92nd IEEE Vehicular Technology Conference, 2020
2018
Classification of Bent Monomials, Constructions of Bent Multinomials and Upper Bounds on the Nonlinearity of Vectorial Functions.
IEEE Trans. Inf. Theory, 2018
IEEE Access, 2018
Proceedings of the Wireless Algorithms, Systems, and Applications, 2018
SACP: A Signcryption-Based Authentication Scheme with Conditional Privacy Preservation for VANET.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2018
Proceedings of the 27th International Conference on Computer Communication and Networks, 2018
Motion Trajectory Sequence-Based Map Matching Assisted Indoor Autonomous Mobile Robot Positioning.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018
2017
Finite Fields Their Appl., 2017
A Smartphone-Based Online Pedestrian Positioning Approach for Both Structured and Open Indoor Spaces.
Proceedings of the 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), 2017
CO-RTO: Achieving efficient data retransmission in VNDN by correlations implied in names.
Proceedings of the 2017 IEEE Conference on Computer Communications Workshops, 2017
2016
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016
COPO: A Novel Position-Adaptive Method for Smartphone-Based Human Activity Recognition.
Proceedings of the Advances in Services Computing, 2016
2015
Optimized routing for video streaming in multi-hop wireless networks using analytical capacity estimation.
J. Comput. Syst. Sci., 2015
IACR Cryptol. ePrint Arch., 2015
Proceedings of the 2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom), 2015
2014
Int. J. Commun. Syst., 2014
Proceedings of the 20th IEEE International Conference on Parallel and Distributed Systems, 2014
A Smartphone Location Independent Activity Recognition Method Based on the Angle Feature.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2014
Proceedings of the Algorithms and Architectures for Parallel Processing, 2014
2013
J. Digit. Inf. Manag., 2013
Comment on Wang et al.'s anonymous multi-receiver ID-based encryption scheme and its improved schemes.
Int. J. Intell. Inf. Database Syst., 2013
On the security of an ID-based anonymous proxy signature scheme and its improved scheme.
Int. J. Embed. Syst., 2013
Quality of service for video streaming over multi-hop wireless networks: Admission control approach based on analytical capacity estimation.
Proceedings of the 2013 IEEE Eighth International Conference on Intelligent Sensors, 2013
2012
Proceedings of the Seventh IEEE International Conference on Networking, 2012
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012
On the Security of an Enhanced ID-Based Anonymous Proxy Signature Scheme in ICCAE2010.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012
Optimizing Routing in Multi-hop Wireless Networks Using Analytical Capacity Estimation: A Study on Video Streaming.
Proceedings of the 14th IEEE International Conference on High Performance Computing and Communication & 9th IEEE International Conference on Embedded Software and Systems, 2012
Proceedings of the 26th International Conference on Advanced Information Networking and Applications Workshops, 2012
Proceedings of the 26th International Conference on Advanced Information Networking and Applications Workshops, 2012
Breaking and Repairing of an Anonymous and Traceable Communication Protocol for Vehicular Ad Hoc Networks.
Proceedings of the 12th IEEE International Conference on Computer and Information Technology, 2012
2011
Proceedings of the 10th International Conference on Mobile and Ubiquitous Multimedia, 2011
2010
Proceedings of the 5th IEEE Asia-Pacific Services Computing Conference, 2010