Songyang Wu

According to our database1, Songyang Wu authored at least 26 papers between 2009 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
BA-LIOM: tightly coupled laser-inertial odometry and mapping with bundle adjustment.
Robotica, March, 2024

2023
Effects of Competition and Reputation on Auditing Cloud Service Provider's Security Commitment.
IEEE Syst. J., March, 2023

Incoherent Scattering of a Bessel Vortex Electromagnetic Beam From a Nonmagnetized Plasma.
IEEE Trans. Geosci. Remote. Sens., 2023

Scalable one-stage multi-view subspace clustering with dictionary learning.
Knowl. Based Syst., 2023

Introducing Unsupervised Big Data and Multimodal Large Models for Small Tasks on Plate Recognition.
Proceedings of the 16th International Congress on Image and Signal Processing, 2023

2022
Updatable privacy-preserving itK-nearest neighbor query in location-based s-ervice.
Peer-to-Peer Netw. Appl., 2022

Cloud Evidence Tracing System: An integrated forensics investigation system for large-scale public cloud platform.
Digit. Investig., 2022

Measurement of the Usage of Web Clips in Underground Economy.
CoRR, 2022

Face Forgery Detection of Deepfake Based on Multiple Convolutional Neural Networks.
Proceedings of the 2022 5th International Conference on Signal Processing and Machine Learning, 2022

2021
Social network node influence maximization method combined with degree discount and local node optimization.
Soc. Netw. Anal. Min., 2021

A Secure Quantum Protocol for Anonymous One-Vote Veto Voting.
IEEE Access, 2021

System Security Analysis of Different Link Proportions Between Nodes in the Cyber-Physical System Against Target Attack.
Proceedings of the Frontiers in Cyber Security - 4th International Conference, 2021

2018
Reversible Embedding to Covers Full of Boundaries.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

2017
Detect and Prevent SIP Flooding Attacks in VoLTE by Utilizing a Two-Tier PFilter Design.
IEICE Trans. Inf. Syst., 2017

Forensic analysis of WeChat on Android smartphones.
Digit. Investig., 2017

Network security assessment using a semantic reasoning and graph based approach.
Comput. Electr. Eng., 2017

Detect SIP Flooding Attacks in VoLTE by Utilizing and Compressing Counting Bloom Filter.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2017

2016
Secure Provenance for Data Forensics with Efficient Revocation of Anonymous Credentials in Cloud Computing.
Wirel. Pers. Commun., 2016

一种面向分布式异构网络的基于可信计算的信任模型 (Trust Model Based on Trusted Computing for Distributed Heterogeneous Networks).
计算机科学, 2016

Effective detection of android malware based on the usage of data flow APIs and machine learning.
Inf. Softw. Technol., 2016

Efficient verification of data possession in cloud computing.
Proceedings of the 4th International Conference on Cloud Computing and Intelligence Systems, 2016

2015
Compact Leakage-Free ID-Based Signature Scheme with Applications to Secret Handshakes.
Wirel. Pers. Commun., 2015

Secure cloud storage using anonymous and blackbox traceable data access control.
Secur. Commun. Networks, 2015

A Pairing-free Key-insulated Certificate-based Signature Scheme with Provable Security.
KSII Trans. Internet Inf. Syst., 2015

Analysis and Improvement of Patient Self-controllable Multi-level Privacy-preserving Cooperative Authentication Scheme.
Int. J. Netw. Secur., 2015

2009
A High Security Framework for SMS.
Proceedings of the 2nd International Conference on BioMedical Engineering and Informatics, 2009


  Loading...