Keke Wu

Orcid: 0000-0003-2361-7284

According to our database1, Keke Wu authored at least 39 papers between 2008 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Asymptotic-Preserving Neural Networks for Multiscale Time-Dependent Linear Transport Equations.
J. Sci. Comput., February, 2023

Pythagorean Fuzzy Partial Correlation Measure and Its Application.
Symmetry, 2023

An Unsupervised Deep Learning Approach for the Wave Equation Inverse Problem.
CoRR, 2023

Empowering People with Intellectual and Developmental Disabilities through Cognitively Accessible Visualizations.
CoRR, 2023

Asymptotic-Preserving Convolutional DeepONets Capture the Diffusive Behavior of the Multiscale Linear Transport Equations.
CoRR, 2023

Asymptotic-Preserving Neural Networks for Multiscale Kinetic Equations.
CoRR, 2023

Data, Data, Everywhere: Uncovering Everyday Data Experiences for People with Intellectual and Developmental Disabilities.
Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems, 2023

Designing Accessible Visualizations for People with Intellectual and Developmental Disabilities.
Proceedings of the Extended Abstracts of the 2023 CHI Conference on Human Factors in Computing Systems, 2023

Roughness Index for Loss Landscapes of Neural Network Models of Partial Differential Equations<sup>*</sup>.
Proceedings of the IEEE International Conference on Big Data, 2023

2022
Some Enhanced Distance Measuring Approaches Based on Pythagorean Fuzzy Information with Applications in Decision Making.
Symmetry, 2022

How and when abusive supervision influences knowledge hiding behavior: evidence from India.
J. Knowl. Manag., 2022

Metagenomic Analysis Reveals A Possible Association Between Respiratory Infection and Periodontitis.
Genom. Proteom. Bioinform., 2022

2021
A 14bit 500MS/s 85.62dBc SFDR 66.29dB SNDR SHA-less pipelined ADC with a stable and high-linearity input buffer and aperture-error calibration in 40nm CMOS.
IEICE Electron. Express, 2021

Multimodal emotion recognition with hierarchical memory networks.
Intell. Data Anal., 2021

Understanding Loss Landscapes of Neural Network Models in Solving Partial Differential Equations.
CoRR, 2021

Understanding Data Accessibility for People with Intellectual and Developmental Disabilities.
Proceedings of the CHI '21: CHI Conference on Human Factors in Computing Systems, 2021

2020
Designing for Mobile and Immersive Visual Analytics in the Field.
IEEE Trans. Vis. Comput. Graph., 2020

Color Crafting: Automating the Construction of Designer Quality Color Ramps.
IEEE Trans. Vis. Comput. Graph., 2020

Improved JPEG Phase-Aware Steganalysis Features Using Multiple Filter Sizes and Difference Images.
IEEE Trans. Circuits Syst. Video Technol., 2020

A Decomposition-Based Local Search for Large-Scale Many-Objective Vehicle Routing Problems With Simultaneous Delivery and Pickup and Time Windows.
IEEE Syst. J., 2020

A Coefficient of Variation Method to Measure the Extents of Decentralization for Bitcoin and Ethereum Networks.
Int. J. Netw. Secur., 2020

Enforcing exact boundary and initial conditions in the deep mixed residual method.
CoRR, 2020

A comprehensive study of boundary conditions when solving PDEs by DNNs.
CoRR, 2020

2019
Correction to Improved PHARM for JPEG Steganalysis: Making PHARM More Efficient and Effective.
IEEE Access, 2019

Improved PHARM for JPEG Steganalysis: Making PHARM More Efficient and Effective.
IEEE Access, 2019

2018
A multi-objective tabu search algorithm based on decomposition for multi-objective unconstrained binary quadratic programming problem.
Knowl. Based Syst., 2018

2017
Identification of Abnormal Network Traffic Using Support Vector Machine.
Proceedings of the 18th International Conference on Parallel and Distributed Computing, 2017

A Service Scheduling Policy for Improving Playback Quality of Mesh-Based P2P VoD Systems.
Proceedings of the 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), 2017

A Bandwidth Allocation Policy for Helpers in Cloud-Assisted P2P Video-on-Demand Systems.
Proceedings of the Fifth International Conference on Advanced Cloud and Big Data, 2017

2016
Directional Derivative and Feature Line Based Subspace Learning Algorithm for Classification.
J. Inf. Hiding Multim. Signal Process., 2016

2012
Fast and scalable parallel processing of scalar multiplication in elliptic curve cryptosystems.
Secur. Commun. Networks, 2012

2011
Enhanced correlation power analysis attack against trusted systems.
Secur. Commun. Networks, 2011

Simple power analysis attacks using chosen message against ECC hardware implementations.
Proceedings of the 2011 World Congress on Internet Security, 2011

Elliptic Curve Isogenies to Resist Differential Side-Channel Analysis Attacks.
Proceedings of the Seventh International Conference on Computational Intelligence and Security, 2011

2010
Retrieving Lost Efficiency of Scalar Multiplications for Resisting against Side-Channel Attacks.
J. Comput., 2010

Evaluation Metrics of Physical Non-invasive Security.
Proceedings of the Information Security Theory and Practices. Security and Privacy of Pervasive Systems and Smart Devices, 2010

2009
Partitioned Computation to Accelerate Scalar Multiplication for Elliptic Curve Cryptosystems.
Proceedings of the 15th IEEE International Conference on Parallel and Distributed Systems, 2009

2008
Correlation Power Analysis Attack against Synchronous Stream Ciphers.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

Enhanced Correlation Power Analysis Attack on Smart Card.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008


  Loading...