Ruoyu Wu

Orcid: 0009-0008-7931-4550

According to our database1, Ruoyu Wu authored at least 28 papers between 2009 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
ChatScratch: An AI-Augmented System Toward Autonomous Visual Programming Learning for Children Aged 6-12.
CoRR, 2024

2023
Self-supervised transfer learning framework driven by visual attention for benign-malignant lung nodule classification on chest CT.
Expert Syst. Appl., April, 2023

Masked Spectral Bands Modeling With Shifted Windows: An Excellent Self-Supervised Learner for Classification of Medical Hyperspectral Images.
IEEE Signal Process. Lett., 2023

Are You Spying on Me? Large-Scale Analysis on IoT Data Exposure through Companion Apps.
Proceedings of the 32nd USENIX Security Symposium, 2023

Sparkybot: An Embodied AI Agent-Powered Robot with Customizable Characters andInteraction Behavior for Children.
Proceedings of the Adjunct Proceedings of the 36th Annual ACM Symposium on User Interface Software and Technology, 2023

Lightweight Cryptography Implementation for Internet of Things Network on FPGA.
Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics, 2023

CoalUMLP: Slice and Dice! A Fast, MLP-Like 3D Medical Image Segmentation Network.
Proceedings of the PRICAI 2023: Trends in Artificial Intelligence, 2023

ASRSR: Adaptive Sending Resolution and Super-resolution for Real-time Video Streaming.
Proceedings of the 19th ACM International Symposium on QoS and Security for Wireless and Mobile Networks, 2023

Online Task Assignment with Controllable Processing Time.
Proceedings of the Thirty-Second International Joint Conference on Artificial Intelligence, 2023

2022
Self-Supervised Transfer Learning Based on Domain Adaptation for Benign-Malignant Lung Nodule Classification on Thoracic CT.
IEEE J. Biomed. Health Informatics, 2022

Research on Self-Adaptive Algorithm of Transient Performance Analysis for DC Electronic Instrument Transformer Calibration.
IEEE Trans. Instrum. Meas., 2022

Efficient High-Radix GF(p) Montgomery Modular Multiplication Via Deep Use Of Multipliers.
IEEE Trans. Circuits Syst. II Express Briefs, 2022

Large Deviations for the Single-Server Queue and the Reneging Paradox.
Math. Oper. Res., 2022

Exploiting Data Locality to Improve Performance of Heterogeneous Server Clusters.
CoRR, 2022

Benign-malignant classification of pulmonary nodule with deep feature optimization framework.
Biomed. Signal Process. Control., 2022

DnD: A Cross-Architecture Deep Neural Network Decompiler.
Proceedings of the 31st USENIX Security Symposium, 2022

Formal Model-Driven Discovery of Bluetooth Protocol Design Vulnerabilities.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

2021
LIGHTBLUE: Automatic Profile-Aware Debloating of Bluetooth Stacks.
Proceedings of the 30th USENIX Security Symposium, 2021

2013
ACaaS: Access Control as a Service for IaaS Cloud.
Proceedings of the International Conference on Social Computing, SocialCom 2013, 2013

The Research of Image Detail Enhancement Algorithm with Laplacian Pyramid.
Proceedings of the 2013 IEEE International Conference on Green Computing and Communications (GreenCom) and IEEE Internet of Things (iThings) and IEEE Cyber, 2013

2012
Risk-Aware Mitigation for MANET Routing Attacks.
IEEE Trans. Dependable Secur. Comput., 2012

Towards HIPAA-Compliant Healthcare Systems in Cloud Computing.
Int. J. Comput. Model. Algorithms Medicine, 2012

Towards HIPAA-compliant healthcare systems.
Proceedings of the ACM International Health Informatics Symposium, 2012

Secure sharing of electronic health records in clouds.
Proceedings of the 8th International Conference on Collaborative Computing: Networking, 2012

2011
Identifying computer generated graphics VIA histogram features.
Proceedings of the 18th IEEE International Conference on Image Processing, 2011

2010
Risk-Aware Response for Mitigating MANET Routing Attacks.
Proceedings of the Global Communications Conference, 2010

Information flow control in cloud computing.
Proceedings of the 6th International Conference on Collaborative Computing: Networking, 2010

2009
Colored Petri Nets Based Modeling of Information Flow Security.
Proceedings of the Second International Workshop on Knowledge Discovery and Data Mining, 2009


  Loading...