Yongdong Wu
Yongdong Wu
Afiliere necunoscută
Adresă de e-mail confirmată pe i2r.a-star.edu.sg - Pagina de pornire
Citat de
Citat de
On the security of an SVD-based ownership watermarking
Y Wu
IEEE transactions on Multimedia 7 (4), 624-627, 2005
Attribute-based access to scalable media in cloud-assisted content sharing networks
Y Wu, Z Wei, RH Deng
IEEE transactions on multimedia 15 (4), 778-788, 2013
Resonance attacks on load frequency control of smart grids
Y Wu, Z Wei, J Weng, X Li, RH Deng
IEEE Transactions on Smart Grid 9 (5), 4490-4502, 2017
UBAPV2G: A unique batch authentication protocol for vehicle-to-grid communications
H Guo, Y Wu, F Bao, H Chen, M Ma
IEEE Transactions on Smart Grid 2 (4), 707-714, 2011
Incentive mechanism design for heterogeneous peer-to-peer networks: A Stackelberg game approach
X Kang, Y Wu
IEEE Transactions on Mobile Computing 14 (5), 1018-1030, 2014
PowerLSTM: power demand forecasting using long short-term memory neural network
Y Cheng, C Xu, D Mashima, VLL Thing, Y Wu
Advanced Data Mining and Applications: 13th International Conference, ADMA …, 2017
Method for incremental authentication of documents
YD Wu, HR Deng
US Patent 7,315,866, 2008
Evolutionary deep belief network for cyber-attack detection in industrial automation and control system
KD Lu, GQ Zeng, X Luo, J Weng, W Luo, Y Wu
IEEE Transactions on Industrial Informatics 17 (11), 7618-7627, 2021
Compliant encryption of JPEG2000 codestreams
Y Wu, RH Deng
2004 International Conference on Image Processing, 2004. ICIP'04. 5, 3439-3442, 2004
Progressive protection of JPEG2000 codestreams
Y Wu, D Ma, RH Deng
2004 International Conference on Image Processing, 2004. ICIP'04. 5, 3447-3450, 2004
Vulnerabilities, attacks, and countermeasures in balise-based train control systems
Y Wu, J Weng, Z Tang, X Li, RH Deng
IEEE Transactions on intelligent transportation systems 18 (4), 814-823, 2016
MiR-26a and miR-144 inhibit proliferation and metastasis of esophageal squamous cell cancer by inhibiting cyclooxygenase-2
Y Shao, P Li, ST Zhu, JP Yue, XJ Ji, D Ma, L Wang, YJ Wang, Y Zong, ...
Oncotarget 7 (12), 15173, 2016
Transforming a pattern identifier into biometric key generators
Y Wu, B Qiu
2010 IEEE International Conference on Multimedia and Expo, 78-82, 2010
Software puzzle: A countermeasure to resource-inflated denial-of-service attacks
Y Wu, Z Zhao, F Bao, RH Deng
IEEE Transactions on Information Forensics and security 10 (1), 168-177, 2014
Linear combination collusion attack and its application on an anti-collusion fingerprinting [image watermarking]
Y Wu
Proceedings.(ICASSP'05). IEEE International Conference on Acoustics, Speech …, 2005
Multi-stage binary code obfuscation using improved virtual machine
H Fang, Y Wu, S Wang, Y Huang
International Conference on Information Security, 168-181, 2011
Secure smart metering based on LoRa technology
Y Cheng, H Saputra, LM Goh, Y Wu
2018 IEEE 4th International Conference on Identity, Security, and Behavior …, 2018
LPPTE: A lightweight privacy-preserving trust evaluation scheme for facilitating distributed data fusion in cooperative vehicular safety applications
Z Liu, J Ma, J Weng, F Huang, Y Wu, L Wei, Y Li
Information Fusion 73, 144-156, 2021
Method of using biometric information for secret generation
US Patent App. 10/472,696, 2004
BTMPP: Balancing trust management and privacy preservation for emergency message dissemination in vehicular networks
Z Liu, F Huang, J Weng, K Cao, Y Miao, J Guo, Y Wu
IEEE Internet of Things Journal 8 (7), 5386-5407, 2020
Sistemul nu poate realiza operația în acest moment. Încercați din nou mai târziu.
Articole 1–20