default search action
Yu Wen
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j21]Yanfei Hu, Shuai Li, Wenchao Xue, Yanlong Zhao, Yu Wen:
CarePlus: A general framework for hardware performance counter based malware detection under system resource competition. Comput. Secur. 143: 103884 (2024) - [j20]Han Sun, Jinlin Xue, Yue Song, Peixiao Wang, Yu Wen, Tianyu Zhang:
Detection of fruit tree diseases in natural environments: A novel approach based on stereo camera and deep learning. Eng. Appl. Artif. Intell. 137: 109148 (2024) - [j19]Chen Zhang, Qiyu Wan, Lening Wang, Yu Wen, Mingsong Chen, Jingweijia Tan, Kaige Yan, Xin Fu:
Efficient one-shot Neural Architecture Search with progressive choice freezing evolutionary search. Neurocomputing 598: 127702 (2024) - [j18]Yu Wen, Xiaorong Gao, Lin Luo, Jinlong Li:
Improved YOLOv8-Based Target Precision Detection Algorithm for Train Wheel Tread Defects. Sensors 24(11): 3477 (2024) - [j17]Yu Wen, Jiangshuai Huang, Shaoxin Sun, Xiaojie Su:
Enclose and Track a Target of Mobile Robot With Motion and Field of View Constraints Based on Relative Position Measurement. IEEE Trans. Artif. Intell. 5(10): 5110-5119 (2024) - [c47]Yu Wen, Shu-Ping Zhang, Miao Huang, Zhihua Hu, Lili Tao:
Small Sample Succulent Image Classification Based on Transfer Learning. CACML 2024: 424-429 - [c46]Chun Yang, Gang Shi, Yu Wen, Xinqiang Zhao:
ASSC: Adaptively Stochastic Smoothing based Adversarial Robustness Certification of Malware Detection Models. CSCWD 2024: 2339-2344 - [c45]Baoming Chang, Zhaoyang Wang, Shuai Li, Fengxi Zhou, Yu Wen, Boyang Zhang:
TurboLog: A Turbocharged Lossless Compression Method for System Logs via Transformer. IJCNN 2024: 1-10 - 2023
- [j16]Yu Wen, Jinlin Xue, Han Sun, Yue Song, Pengfei Lv, Shaohua Liu, Yangyang Chu, Tianyu Zhang:
High-precision target ranging in complex orchard scenes by utilizing semantic segmentation results and binocular vision. Comput. Electron. Agric. 215: 108440 (2023) - [j15]Yutong Fan, Xi Liu, Ren Huang, Yu Wen, Weihang Zhang, Jincheng Zhang, Zhihong Liu, Shenglei Zhao:
High-breakdown-voltage (>3000 V) and low-power-dissipation Al0.3Ga0.7N/GaN/Al0.1Ga0.9N double-heterostructure HEMTs with Ohmic/Schottky hybrid drains and Al2O3/SiO2 passivation. Sci. China Inf. Sci. 66(12) (2023) - [j14]Tao Xue, Yu Wen, Bo Luo, Gang Li, Yingjiu Li, Boyang Zhang, Yang Zheng, Yanfei Hu, Dan Meng:
SparkAC: Fine-Grained Access Control in Spark for Secure Data Sharing and Analytics. IEEE Trans. Dependable Secur. Comput. 20(2): 1104-1123 (2023) - [c44]Baoming Chang, Fengxi Zhou, Zhaoyang Wang, Yu Wen, Boyang Zhang:
A Distributed Storage System for System Logs Based on Hybrid Compression Scheme. ISPA/BDCloud/SocialCom/SustainCom 2023: 724-735 - [c43]Yu Wen, Chenhao Xie, Shuaiwen Leon Song, Xin Fu:
Post0-VR: Enabling Universal Realistic Rendering for Modern VR via Exploiting Architectural Similarity and Data Sharing. HPCA 2023: 390-402 - [c42]Rongji Yin, Yi Shi, Wei Xie, Jinhui Lu, Yu Wen, Weixing Cheng, Weidong Zhang:
Robust Controller Design for an Active Hexapod Platform with Prescribed Performance. ICARM 2023: 113-117 - [c41]Fengxi Zhou, Baoming Chang, Yu Wen, Dan Meng:
ProDE: Interpretable APT Detection Method Based on Encoder-decoder Architecture. ICPADS 2023: 340-347 - [c40]Yanfei Hu, Shuai Li, Shuailou Li, Boyang Zhang, Yu Wen:
DAMUS: Adaptively Updating Hardware Performance Counter Based Malware Detector Under System Resource Competition. ISCC 2023: 1-7 - [c39]Yanfei Hu, Shuailou Li, Boyang Zhang, Xu Cheng, Yu Wen:
HUND: Enhancing Hardware Performance Counter Based Malware Detection Under System Resource Competition Using Explanation Method. ISCC 2023: 1020-1026 - [c38]Yiwei Dong, Feng Yang, Yu Wen, Yinglong Zhang, Xingsong Wang, Mengqian Tian:
Design and Research of Mobile Moxibustion Robot Based on AprilTag. M2VIP 2023: 1-6 - [c37]Shuailou Li, Yu Wen, Tao Xue, Zhaoyang Wang, Yanna Wu, Dan Meng:
PRISPARK: Differential Privacy Enforcement for Big Data Computing in Apache Spark. SRDS 2023: 93-106 - [c36]Fengxi Zhou, Baoming Chang, Yu Wen, Dan Meng:
Representation-enhanced APT Detection Using Contrastive Learning. TrustCom 2023: 1-9 - [c35]Shuai Li, Yu Wen, Xu Cheng:
Towards Dynamic Backdoor Attacks against LiDAR Semantic Segmentation in Autonomous Driving. TrustCom 2023: 89-98 - [c34]Shuai Li, Yu Wen, Huiying Wang, Xu Cheng:
BadLiDet: A Simple Backdoor Attack against LiDAR Object Detection in Autonomous Driving. TrustCom 2023: 99-108 - 2022
- [j13]Yu Wen, Xinhua Zhu, Lanfang Zhang:
CQACD: A Concept Question-Answering System for Intelligent Tutoring Using a Domain Ontology With Rich Semantics. IEEE Access 10: 67247-67261 (2022) - [j12]Shuxin Yang, Suxin Tong, Guixiang Zhu, Jie Cao, Youquan Wang, Zhengfa Xue, Hongliang Sun, Yu Wen:
MVE-FLK: A multi-task legal judgment prediction via multi-view encoder fusing legal keywords. Knowl. Based Syst. 239: 107960 (2022) - [j11]Lili Liu, Zhen Li, Yu Wen, Penglong Chen:
Investigating the impact of vulnerability datasets on deep learning-based vulnerability detectors. PeerJ Comput. Sci. 8: e975 (2022) - [j10]Meichao Yan, Yu Wen, Qingxuan Shi, Xuedong Tian:
A Multimodal Retrieval and Ranking Method for Scientific Documents Based on HFS and XLNet. Sci. Program. 2022: 5373531:1-5373531:11 (2022) - [j9]Li Wang, Xin Ye, Jialin Li, Yu Wen, Wenbin Liao, Houbing Song, Jie Chen, Jianqiang Li:
GAN-Based Dual Active Learning for Nosocomial Infection Detection. IEEE Trans. Netw. Sci. Eng. 9(5): 3282-3291 (2022) - [c33]Liang Wang, Jun Li, Lina Zuo, Yu Wen, Haibo Liu, Wenyuan Liu:
T-Tracer: A Blockchain-Aided Symbol Mapping Watermarking Scheme for Traitor Tracing in Non-Repudiation Data Delivery. BSCI 2022: 23-34 - [c32]Yanfei Hu, Shuangshuang Liang, Min Li, Tao Xue, Boyang Zhang, Yu Wen:
CARE: Enabling Hardware Performance Counter based Malware Detection Resilient to System Resource Competition. HPCC/DSS/SmartCity/DependSys 2022: 586-594 - [c31]Penglong Chen, Zhen Li, Yu Wen, Lili Liu:
Generating Adversarial Source Programs Using Important Tokens-based Structural Transformations. ICECCS 2022: 173-182 - [c30]Yu Wen, Jianuo Chen, Linjie Dong, Rongkai He, Xingsong Wang, Mengqian Tian:
Surface Defect Detection of Cable Based on Improved YOLO V3. M2VIP 2022: 1-6 - [c29]PengNan Hao, Zhen Li, Cui Liu, Yu Wen, Fanming Liu:
Towards Improving Multiple Authorship Attribution of Source Code. QRS 2022: 516-526 - [c28]Zhiqiang Xu, Pengcheng Fang, Changlin Liu, Xusheng Xiao, Yu Wen, Dan Meng:
DEPCOMM: Graph Summarization on System Audit Logs for Attack Investigation. SP 2022: 540-557 - [c27]Na Yan, Yu Wen, Luyao Chen, Yanna Wu, Boyang Zhang, Zhaoyang Wang, Dan Meng:
Deepro: Provenance-based APT Campaigns Detection via GNN. TrustCom 2022: 747-758 - [c26]Luyao Chen, Na Yan, Boyang Zhang, Zhaoyang Wang, Yu Wen, Yanfei Hu:
A General Backdoor Attack to Graph Neural Networks Based on Explanation Method. TrustCom 2022: 759-768 - 2021
- [j8]Xiaoming Mao, Yu Wen, Liang Wu, Baorong Zhou:
Simulation of LCC-MMC HVDC Systems Using Dynamic Phasors. IEEE Access 9: 122819-122828 (2021) - [j7]Chun Yang, Jinghui Xu, Shuangshuang Liang, Yanna Wu, Yu Wen, Boyang Zhang, Dan Meng:
DeepMal: maliciousness-Preserving adversarial instruction learning against static malware detection. Cybersecur. 4(1): 16 (2021) - [c25]Wei Wang, Huilin Jiang, Yan Dong, Yansong Song, Shuai Chang, Yu Wen:
Research on Composite Tracking Control Technology of Single Detector in Laser Communication. ICAIT 2021: 132-138 - [c24]Yuxuan Zhang, Zhaoyang Wang, Boyang Zhang, Yu Wen, Dan Meng:
Black-Box Buster: A Robust Zero-Shot Transfer-Based Adversarial Attack Method. ICICS (2) 2021: 39-54 - [c23]Huiying Wang, Huixin Shen, Boyang Zhang, Yu Wen, Dan Meng:
Generating Adversarial Point Clouds on Multi-modal Fusion Based 3D Object Detection Model. ICICS (1) 2021: 187-203 - [c22]Min Li, Chunfang Li, Shuailou Li, Yanna Wu, Boyang Zhang, Yu Wen:
ACGVD: Vulnerability Detection Based on Comprehensive Graph via Graph Neural Network with Attention. ICICS (1) 2021: 243-259 - [c21]Yanna Wu, Fucheng Liu, Yu Wen:
Malicious Login Detection Using Long Short-Term Memory with an Attention Mechanism. IFIP Int. Conf. Digital Forensics 2021: 157-173 - [c20]Chen Zhao, Yu Wen, Shuailou Li, Fucheng Liu, Dan Meng:
FederatedReverse: A Detection and Defense Method Against Backdoor Attacks in Federated Learning. IH&MMSec 2021: 51-62 - [c19]Junfeng Tian, Chenxin Wang, Zhen Li, Yu Wen:
Generating Adversarial Examples of Source Code Classification Models via Q-Learning-Based Markov Decision Process. QRS 2021: 807-818 - 2020
- [j6]Yu Wen, Xiaomin Yang, Turgay Çelik, Olga S. Sushkova, Marcelo Keese Albertini:
Multifocus image fusion using convolutional neural network. Multim. Tools Appl. 79(45-46): 34531-34543 (2020) - [j5]Jing Zhang, Yu Wen:
Malware Detection Based on Opcode Dynamic Analysis. EAI Endorsed Trans. Security Safety 7(26): e4 (2020) - [j4]Dan Meng, Rui Hou, Gang Shi, Bibo Tu, Aimin Yu, Ziyuan Zhu, Xiaoqi Jia, Yu Wen, Yun Yang:
Built-in Security Computer: Deploying Security-First Architecture Using Active Security Processor. IEEE Trans. Computers 69(11): 1571-1583 (2020) - [c18]Tao Xue, Yu Wen, Bo Luo, Boyang Zhang, Yang Zheng, Yanfei Hu, Yingjiu Li, Gang Li, Dan Meng:
GuardSpark++: Fine-Grained Purpose-Aware Access Control for Secure Data Sharing and Analysis in Spark. ACSAC 2020: 582-596 - [c17]Xixi Jiang, Qingqing Luo, Zhiwei Wang, Tao Mei, Yu Wen, Xin Li, Kwang-Ting Cheng, Xin Yang:
Multi-phase and Multi-level Selective Feature Fusion for Automated Pancreas Segmentation from CT Images. MICCAI (4) 2020: 460-469 - [c16]Fucheng Liu, Yu Wen, Yanna Wu, Shuangshuang Liang, Xihe Jiang, Dan Meng:
MLTracer: Malicious Logins Detection System via Graph Neural Network. TrustCom 2020: 715-726 - [c15]Jinghui Xu, Yu Wen, Chun Yang, Dan Meng:
An Approach for Poisoning Attacks against RNN-Based Cyber Anomaly Detection. TrustCom 2020: 1680-1687
2010 – 2019
- 2019
- [c14]Fucheng Liu, Yu Wen, Dongxue Zhang, Xihe Jiang, Xinyu Xing, Dan Meng:
Log2vec: A Heterogeneous Graph Embedding Based Approach for Detecting Cyber Threats within Enterprise. CCS 2019: 1777-1794 - 2018
- [j3]Lihua Liang, Yu Wen:
Integrated Rudder/Fin Control With Disturbance Compensation Distributed Model Predictive Control. IEEE Access 6: 72925-72938 (2018) - [c13]Xingwang Xiong, Lei Wang, Wanling Gao, Rui Ren, Ke Liu, Chen Zheng, Yu Wen, Yi Liang:
DCMIX: Generating Mixed Workloads for the Cloud Data Center. Bench 2018: 105-117 - [c12]Yu Wen, Ke Yao, Chunlin Tian, Yao Wu, Zhongmin Zhang, Yaning Shi, Yin Tian, Jin Yang, Peiqi Wang:
Aggregated Multimodal Bidirectional Recurrent Model for Audiovisual Speech Recognition. ICCCS (6) 2018: 380-391 - 2017
- [c11]Fangxiao Ning, Yu Wen, Gang Shi, Dan Meng:
Efficient tamper-evident logging of distributed systems via concurrent authenticated tree. IPCCC 2017: 1-9 - 2016
- [c10]Wei Wang, Xuetao Zhang, Yu Wen, Fei Wang:
Study of cognitive distraction detection based on GMA analysis. ICVES 2016: 1-6 - 2015
- [c9]Yu Wen, Xuetao Zhang, Fei Wang, Jinsong Han:
Predicting driver lane change intent using HCRF. ICVES 2015: 64-68 - 2014
- [j2]Yu Wen, Weiping Wang, Li Guo, Dan Meng:
Automated Power Control for Virtualized Infrastructures. J. Comput. Sci. Technol. 29(6): 1111-1122 (2014)
2000 – 2009
- 2007
- [c8]Jianfeng Zhan, Lei Wang, Bibo Tu, Zhihong Zhang, Yu Wen, Yuansheng Chen, Wei Zhou, Dan Meng, Ninghui Sun:
A layered design methodology of cluster system stack. CLUSTER 2007: 404-409 - [c7]Jianfeng Zhan, Lei Wang, Bibo Tu, Hui Wang, Zhihong Zhang, Yi Jin, Yu Wen, Yuansheng Chen, Peng Wang, Bizhu Qiu, Dan Meng, Ninghui Sun:
The design methodology of Phoenix cluster system software stack. China HPC 2007: 174-182 - 2006
- [j1]Shing-Chow Chan, Yu Wen, Ka-Leung Ho:
A robust past algorithm for subspace tracking in impulsive noise. IEEE Trans. Signal Process. 54(1): 105-116 (2006) - 2005
- [c6]Guang-Ying Ma, Ping Li, Yu Wen, Xue-yan Du:
Application of genetic algorithm in estimating origin-destination matrices of traffic network. GrC 2005: 209-212 - 2003
- [c5]Yu Wen, Shing-Chow Chan, Ka-Leung Ho:
Robust recursive bi-iteration singular value decomposition (SVD) for subspace tracking and adaptive filtering. ISCAS (4) 2003: 424-427 - [c4]Yu Wen, Tie-Jun Wu:
Dynamic window search of ant colony optimization for complex multi-stage decision problems. SMC 2003: 4091-4097 - 2002
- [c3]Yu Wen, Shing-Chow Chan, Ka-Leung Ho:
Robust subspace tracking based blind channel identification in impulsive noise environment. EUSIPCO 2002: 1-4 - [c2]Yu Wen, Shing-Chow Chan, Ka-Leung Ho:
A robust subspace tracking algorithm for subspace-based blind multiuser detection in impulsive noise. DSP 2002: 1289-1292 - 2001
- [c1]Yu Wen, Shing-Chow Chan, Ka-Leung Ho:
Robust subspace tracking in impulsive noise. ICC 2001: 892-896
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-30 20:34 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint