Wei Yang

Orcid: 0000-0003-0332-2649

Affiliations:
  • University of Science and Technology of China, School of Computer Science and Technology, Hefei, China
  • University of Science and Technology of China, Suzhou Institute for Advanced Study, China


According to our database1, Wei Yang authored at least 171 papers between 2006 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
TIKP: Text-to-Image Knowledge Preservation for Continual Semantic Segmentation.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

Attacks on Continual Semantic Segmentation by Perturbing Incremental Samples.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

2023
Avalon: A Scalable and Secure Distributed Transaction Ledger Based on Proof-of-Market.
IEEE Trans. Computers, December, 2023

IMep: Device-Free Multiplayer Step Counting With WiFi Signals.
IEEE Trans. Mob. Comput., October, 2023

AFall: Wi-Fi-Based Device-Free Fall Detection System Using Spatial Angle of Arrival.
IEEE Trans. Mob. Comput., August, 2023

Analyzing Preference Data With Local Privacy: Optimal Utility and Enhanced Robustness.
IEEE Trans. Knowl. Data Eng., August, 2023

AutoProfile: An Intelligent Profile Switching System for Smartphones.
IEEE Trans. Mob. Comput., June, 2023

Shuffle Differential Private Data Aggregation for Random Population.
IEEE Trans. Parallel Distributed Syst., May, 2023

Locally Differentially Private Heterogeneous Graph Aggregation with Utility Optimization.
Entropy, January, 2023

A Scale-out Decentralized Blockchain Ledger System for Web3.0.
CoRR, 2023

Entangled View-Epipolar Information Aggregation for Generalizable Neural Radiance Fields.
CoRR, 2023

Reinforcement Learning-based Adversarial Attacks on Object Detectors using Reward Shaping.
Proceedings of the 31st ACM International Conference on Multimedia, 2023

FGNet: Towards Filling the Intra-class and Inter-class Gaps for Few-shot Segmentation.
Proceedings of the Thirty-Second International Joint Conference on Artificial Intelligence, 2023

BAProto: Boundary-Aware Prototype for High-quality Instance Segmentation.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2023

C2F2NeUS: Cascade Cost Frustum Fusion for High Fidelity and Generalizable Neural Surface Reconstruction.
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023

Adaptive Patch Deformation for Textureless-Resilient Multi-View Stereo.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2023

Interpretable Image/Video Compression by Extracting the Least Context Map.
Proceedings of the 2023 4th International Conference on Computing, 2023

2022
Attention-Based Gait Recognition and Walking Direction Estimation in Wi-Fi Networks.
IEEE Trans. Mob. Comput., 2022

Achieving Secure and Dynamic Range Queries Over Encrypted Cloud Data.
IEEE Trans. Knowl. Data Eng., 2022

Public Curb Parking Demand Estimation With POI Distribution.
IEEE Trans. Intell. Transp. Syst., 2022

STBC: A Novel Blockchain-Based Spectrum Trading Solution.
IEEE Trans. Cogn. Commun. Netw., 2022

Segment as Points for Efficient and Effective Online Multi-Object Tracking and Segmentation.
IEEE Trans. Pattern Anal. Mach. Intell., 2022

A Blockchain-Based Protocol for Malicious Price Discrimination.
J. Comput. Sci. Technol., 2022

IMar: Multi-user Continuous Action Recognition with WiFi Signals.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2022

Federated synthetic data generation with differential privacy.
Neurocomputing, 2022

Fine-grained Private Knowledge Distillation.
CoRR, 2022

Self-Supervised Multi-view Stereo via Adjacent Geometry Guided Volume Completion.
Proceedings of the MM '22: The 30th ACM International Conference on Multimedia, Lisboa, Portugal, October 10, 2022

AtHom: Two Divergent Attentions Stimulated By Homomorphic Training in Text-to-Image Synthesis.
Proceedings of the MM '22: The 30th ACM International Conference on Multimedia, Lisboa, Portugal, October 10, 2022

Block-term Dropout For Robust Adversarial Defense.
Proceedings of the 34th IEEE International Conference on Tools with Artificial Intelligence, 2022

BSOLO: Boundary-Aware One-Stage Instance Segmentation SOLO.
Proceedings of the IEEE International Conference on Acoustics, 2022

Against Backdoor Attacks In Federated Learning With Differential Privacy.
Proceedings of the IEEE International Conference on Acoustics, 2022

Shape Prior Guided Attack: Sparser Perturbations on 3D Point Clouds.
Proceedings of the Thirty-Sixth AAAI Conference on Artificial Intelligence, 2022

2021
F3SNet: A Four-Step Strategy for QIM Steganalysis of Compressed Speech Based on Hierarchical Attention Network.
Secur. Commun. Networks, 2021

Estimating Clustering Coefficient of Multiplex Graphs with Local Differential Privacy.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2021

Private Frequent Itemset Mining in the Local Setting.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2021

ABPNet: Adaptive Background Modeling for Generalized Few Shot Segmentation.
Proceedings of the MM '21: ACM Multimedia Conference, Virtual Event, China, October 20, 2021

AggNet for Self-supervised Monocular Depth Estimation: Go An Aggressive Step Furthe.
Proceedings of the MM '21: ACM Multimedia Conference, Virtual Event, China, October 20, 2021

Private FLI: Anti-Gradient Leakage Recovery Data Privacy Architecture.
Proceedings of the International Joint Conference on Neural Networks, 2021

Hiding Numerical Vectors in Local Private and Shuffled Messages.
Proceedings of the Thirtieth International Joint Conference on Artificial Intelligence, 2021

MDANet: Multi-Modal Deep Aggregation Network for Depth Completion.
Proceedings of the IEEE International Conference on Robotics and Automation, 2021

Continuous Copy-Paste for One-stage Multi-object Tracking and Segmentation.
Proceedings of the 2021 IEEE/CVF International Conference on Computer Vision, 2021

Revealing the Reciprocal Relations between Self-Supervised Stereo and Monocular Depth Estimation.
Proceedings of the 2021 IEEE/CVF International Conference on Computer Vision, 2021

Pointer Networks for Arbitrary-Shaped Text Spotting.
Proceedings of the IEEE International Conference on Acoustics, 2021

Environment-Independent Wi-Fi Human Activity Recognition with Adversarial Network.
Proceedings of the IEEE International Conference on Acoustics, 2021

Adversarial Attacks on Object Detectors with Limited Perturbations.
Proceedings of the IEEE International Conference on Acoustics, 2021

Mask4D: 4D Convolution Network for Light Field Occlusion Removal.
Proceedings of the IEEE International Conference on Acoustics, 2021

VK-Net: Category-Level Point Cloud Registration with Unsupervised Rotation Invariant Keypoints.
Proceedings of the IEEE International Conference on Acoustics, 2021

Study on Multi-Vehicle Scheduling Problem.
Proceedings of the 24th IEEE International Conference on Computer Supported Cooperative Work in Design, 2021

2020
OLAP over Probabilistic Data Cubes II: Parallel Materialization and Extended Aggregates.
IEEE Trans. Knowl. Data Eng., 2020

Set-valued Data Publication with Local Privacy: Tight Error Bounds and Efficient Mechanisms.
Proc. VLDB Endow., 2020

TransNet: Training Privacy-Preserving Neural Network over Transformed Layer.
Proc. VLDB Endow., 2020

PointTrack++ for Effective Online Multi-Object Tracking and Segmentation.
CoRR, 2020

DCNet: Dense Correspondence Neural Network for 6DoF Object Pose Estimation in Occluded Scenes.
Proceedings of the MM '20: The 28th ACM International Conference on Multimedia, 2020

PrivAG: Analyzing Attributed Graph Data with Local Differential Privacy.
Proceedings of the 26th IEEE International Conference on Parallel and Distributed Systems, 2020

Private FL-GAN: Differential Privacy Synthetic Data Generation Based on Federated Learning.
Proceedings of the 2020 IEEE International Conference on Acoustics, 2020

Segment as Points for Efficient Online Multi-Object Tracking and Segmentation.
Proceedings of the Computer Vision - ECCV 2020, 2020

GDS: General Distributed Strategy for Functional Dependency Discovery Algorithms.
Proceedings of the Database Systems for Advanced Applications, 2020

PrivGMM: Probability Density Estimation with Local Differential Privacy.
Proceedings of the Database Systems for Advanced Applications, 2020

ZoomNet: Part-Aware Adaptive Zooming Neural Network for 3D Object Detection.
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020

2019
Local Differential Private Data Aggregation for Discrete Distribution Estimation.
IEEE Trans. Parallel Distributed Syst., 2019

A Utility-Optimized Framework for Personalized Private Histogram Estimation.
IEEE Trans. Knowl. Data Eng., 2019

Practical quantum Byzantine protocol via nearly optimal entanglement resources.
Quantum Inf. Process., 2019

Cryptanalysis and improvement of the novel quantum scheme for secure two-party distance computation.
Quantum Inf. Process., 2019

An improved entropy-based approach to steganalysis of compressed speech.
Multim. Tools Appl., 2019

Aggregating Votes with Local Differential Privacy: Usefulness, Soundness vs. Indistinguishability.
CoRR, 2019

GAN Generate Adversarial Examples to Fool Deep Networks.
Aust. J. Intell. Inf. Process. Syst., 2019

How Bob in Quantum Private Query Protocol Gets the Element?
IEEE Access, 2019

A Utility-Optimized Framework for Personalized Private Histogram Estimation (Extended Abstract).
Proceedings of the 35th IEEE International Conference on Data Engineering, 2019

Differentially Private Greedy Decision Forest.
Proceedings of the IEEE International Conference on Acoustics, 2019

2018
物联网通信协议的安全研究综述 (Security for Communication Protocols in Internet of Things: A Survey).
计算机科学, 2018

Hybrid covert channel in LTE-A: Modeling and analysis.
J. Netw. Comput. Appl., 2018

Concealed in web surfing: Behavior-based covert channels in HTTP.
J. Netw. Comput. Appl., 2018

Supervised learning framework for covert channel detection in LTE-A.
IET Inf. Secur., 2018

A Detection-Resistant Covert Timing Channel Based on Geometric Huffman Coding.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2018

DopGest: Dual-Frequency Based Ultrasonic Gesture Recognition.
Proceedings of the 2018 IEEE SmartWorld, 2018

Link Us if You Can: Enabling Unlinkable Communication on the Internet.
Proceedings of the 15th Annual IEEE International Conference on Sensing, 2018

PrivSet: Set-Valued Data Analyses with Locale Differential Privacy.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

Automatic Recognition for Arbitrarily Tilted License Plate.
Proceedings of the 2nd International Conference on Video and Image Processing, 2018

A robust and efficient method for license plate recognition.
Proceedings of the 24th International Conference on Pattern Recognition, 2018

Anomalous Trajectory Detection Between Regions of Interest Based on ANPR System.
Proceedings of the Computational Science - ICCS 2018, 2018

Towards End-to-End License Plate Detection and Recognition: A Large Dataset and Baseline.
Proceedings of the Computer Vision - ECCV 2018, 2018

TRQED: Secure and Fast Tree-Based Private Range Queries over Encrypted Cloud.
Proceedings of the Database Systems for Advanced Applications, 2018

Classification Learning from Private Data in Heterogeneous Settings.
Proceedings of the Database Systems for Advanced Applications, 2018

An Entropy-based Method for Detection of Covert Channels over LTE.
Proceedings of the 22nd IEEE International Conference on Computer Supported Cooperative Work in Design, 2018

Incorporating Latent Meanings of Morphological Compositions to Enhance Word Embeddings.
Proceedings of the 56th Annual Meeting of the Association for Computational Linguistics, 2018

2017
Achieving fully privacy-preserving private range queries over outsourced cloud data.
Pervasive Mob. Comput., 2017

IEEE802.15.4e 标准的安全多跳时间同步协议设计 (Design of Secure Multi-hop Time Synchronization Protocol for IEEE802.15.4e).
计算机科学, 2017

WiStep: Device-free Step Counting with WiFi Signals.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2017

Time synchronisation attacks and defences in IEEE802.15.4e networks.
Int. J. Embed. Syst., 2017

Enhanced secure time synchronisation protocol for IEEE802.15.4e-based industrial Internet of Things.
IET Inf. Secur., 2017

Personalized Classifier Ensemble Pruning Framework for Mobile Crowdsourcing.
CoRR, 2017

AIS: An Inaudible Guider in Your Smartphone.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2017

Local private ordinal data distribution estimation.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017

Exploiting Cantor Expansion for Covert Channels over LTE-Advanced.
Proceedings of the Neural Information Processing - 24th International Conference, 2017

Achieving personalized and privacy-preserving range queries over outsourced cloud data.
Proceedings of the IEEE International Conference on Communications, 2017

A Classifier Method for Detection of Covert Channels over LTE.
Proceedings of the 2017 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2017

2016
Privacy-Preserving Collaborative Web Services QoS Prediction via Yao's Garbled Circuits and Homomorphic Encryption.
J. Web Eng., 2016

STS_4e: Secure Time Synchronization in IEEE802.15.4e Networks.
Int. J. Wirel. Inf. Networks, 2016

Mutual Information Optimally Local Private Discrete Distribution Estimation.
CoRR, 2016

Private Weighted Histogram Aggregation in Crowdsourcing.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2016

Temporal-Spatial Aggregated Urban Air Quality Inference with Heterogeneous Big Data.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2016

Concealed in the Internet: A Novel Covert Channel with Normal Traffic Imitating.
Proceedings of the 2016 Intl IEEE Conferences on Ubiquitous Intelligence & Computing, 2016

CAE: Collusion Attack Emulator for Privacy-Preserving Data Aggregation Schemes.
Proceedings of the 13th Annual IEEE International Conference on Sensing, 2016

WiCare: A Synthesized Healthcare Service System Based on WiFi Signals.
Proceedings of the Service-Oriented Computing - 14th International Conference, 2016

WiFinger: talk to your smart devices with finger-grained gesture.
Proceedings of the 2016 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2016

Security Vulnerabilities and Countermeasures for Time Synchronization in IEEE802.15.4e Networks.
Proceedings of the 3rd IEEE International Conference on Cyber Security and Cloud Computing, 2016

Geospatial Streams Publish with Differential Privacy.
Proceedings of the Collaborate Computing: Networking, Applications and Worksharing, 2016

A Secure and Robust Covert Channel Based on Secret Sharing Scheme.
Proceedings of the Web Technologies and Applications - 18th Asia-Pacific Web Conference, 2016

A Real Time Wireless Interactive Multimedia System.
Proceedings of the Web Technologies and Applications - 18th Asia-Pacific Web Conference, 2016

2015
A novel comprehensive steganalysis of transmission control protocol/Internet protocol covert channels based on protocol behaviors and support vector machine.
Secur. Commun. Networks, 2015

Privacy-preserving LOF outlier detection.
Knowl. Inf. Syst., 2015

Spectrum Allocation Mechanisms in Wireless Networks with Performance Guarantee.
Ad Hoc Sens. Wirel. Networks, 2015

Private Range Queries on Outsourced Databases.
Proceedings of the Web-Age Information Management - 16th International Conference, 2015

Deadline-sensitive opportunistic utility-based routing in cyclic mobile social networks.
Proceedings of the 12th Annual IEEE International Conference on Sensing, 2015

Privacy-Preserving Naive Bayes Classification.
Proceedings of the Knowledge Science, Engineering and Management, 2015

Hamburger attack: A collusion attack against privacy-preserving data aggregation schemes.
Proceedings of the 23rd IEEE International Symposium on Quality of Service, 2015

Secure double spectrum auctions.
Proceedings of the 23rd IEEE International Symposium on Quality of Service, 2015

Privacy preserving big histogram aggregation for spatial crowdsensing.
Proceedings of the 34th IEEE International Performance Computing and Communications Conference, 2015

LiHB: Lost in HTTP Behaviors - A Behavior-Based Covert Channel in HTTP.
Proceedings of the 3rd ACM Workshop on Information Hiding and Multimedia Security, 2015

STRUCTURE: A Strategyproof Double Auction for Heterogeneous Secondary Spectrum Markets.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2015

Personalized Privacy-Preserving Data Aggregation for Histogram Estimation.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

Towards Preserving Worker Location Privacy in Spatial Crowdsourcing.
Proceedings of the 2015 IEEE Global Communications Conference, 2015

Efficient Privacy-Preserving Aggregation for Mobile Crowdsensing.
Proceedings of the Fifth IEEE International Conference on Big Data and Cloud Computing, 2015

Protecting Location Privacy in Spatial Crowdsourcing.
Proceedings of the Web Technologies and Applications, 2015

2014
Improvement of a Lattice-based Signature Scheme.
J. Inf. Hiding Multim. Signal Process., 2014

Security Analysis of a fuzzy Identity-Based Encryption Scheme.
J. Circuits Syst. Comput., 2014

On the security of an enhanced signature scheme.
Int. J. Inf. Commun. Technol., 2014

Practical certificateless short signature scheme.
Int. J. Electron. Secur. Digit. Forensics, 2014

Cryptanalysis and Improvement of a Certificateless Multi-proxy Signature Scheme.
Fundam. Informaticae, 2014

PS-TRUST: Provably secure solution for truthful double spectrum auctions.
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014

A privacy preserving scheme for change increment of electricity big data base on symmetric cryptography.
Proceedings of the IEEE 3rd International Conference on Cloud Computing and Intelligence Systems, 2014

2013
Secret sharing based on quantum Fourier transform.
Quantum Inf. Process., 2013

Efficient hierarchical identity-based signatures from lattices.
Int. J. Electron. Secur. Digit. Forensics, 2013

Near-Optimal Truthful Auction Mechanisms in Secondary Spectrum Markets
CoRR, 2013

A Novel Web Tunnel Detection Method Based on Protocol Behaviors.
Proceedings of the Security and Privacy in Communication Networks, 2013

Near-optimal truthful spectrum auction mechanisms with spatial and temporal reuse in wireless networks.
Proceedings of the Fourteenth ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2013

2012
Cryptanalysis and melioration of secure quantum sealed-bid auction with post-confirmation.
Quantum Inf. Process., 2012

Privacy-preserving Judgment of the Intersection for Convex Polygons.
J. Comput., 2012

Security of a Biometric Identity-based Encryption Scheme.
Int. J. Netw. Secur., 2012

A New Hierarchical Identity-based Signature Scheme From Lattices In The Standard Model.
Int. J. Netw. Secur., 2012

More than Word Frequencies: Authorship Attribution via Natural Frequency Zoned Word Distribution Analysis
CoRR, 2012

On the Security of an identity-based short signature scheme
CoRR, 2012

A new scheme for covert communication via 3G encoded speech.
Comput. Electr. Eng., 2012

Compressive Sensing based on local regional data in Wireless Sensor Networks.
Proceedings of the 2012 IEEE Wireless Communications and Networking Conference, 2012

2011
Multi-party quantum state sharing of an arbitrary two-qubit state with Bell states.
Quantum Inf. Process., 2011

Asymmetric multi-party quantum state sharing of an arbitrary <i>m</i>-qubit state.
Quantum Inf. Process., 2011

Detection of substitution-based linguistic steganography by relative frequency analysis.
Digit. Investig., 2011

Steganalysis against substitution-based linguistic steganography based on context clusters.
Comput. Electr. Eng., 2011

LinL: Lost in n-best List.
Proceedings of the Information Hiding - 13th International Conference, 2011

Protocol to Compute Polygon Intersection in STC Model.
Proceedings of the Information Computing and Applications, 2011

2010
Efficient protocols for point-convex hull inclusion decision problems.
J. Networks, 2010

Privacy Preserving Aggregate Query of OLAP for Accurate Answers.
J. Comput., 2010

A Novel Real-Time Coal Miner Localization and Tracking System Based on Self-Organized Sensor Networks.
EURASIP J. Wirel. Commun. Netw., 2010

A wifi-based low-cost mobile video surveillance system for dynamic police force deployment and real-time guard for public security.
Proceedings of the 8th International Conference on Embedded Networked Sensor Systems, 2010

Blind Linguistic Steganalysis against Translation Based Steganography.
Proceedings of the Digital Watermarking - 9th International Workshop, 2010

Relation of PPAtMP and scalar product protocol and their applications.
Proceedings of the 15th IEEE Symposium on Computers and Communications, 2010

STBS: A Statistical Algorithm for Steganalysis of Translation-Based Steganography.
Proceedings of the Information Hiding - 12th International Conference, 2010

2009
Three New Approaches to Privacy-preserving Add to Multiply Protocol and its Application.
Proceedings of the Second International Workshop on Knowledge Discovery and Data Mining, 2009

Steganalysis on Character Substitution Using Support Vector Machine.
Proceedings of the Second International Workshop on Knowledge Discovery and Data Mining, 2009

Hiding Information by Context-Based Synonym Substitution.
Proceedings of the Digital Watermarking, 8th International Workshop, 2009

2008
Detection of word shift steganography in PDF document.
Proceedings of the 4th International ICST Conference on Security and Privacy in Communication Networks, 2008

A Statistical Attack on a Kind of Word-Shift Text-Steganography.
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP 2008), 2008

Linguistic Steganography Detection Using Statistical Characteristics of Correlations between Words.
Proceedings of the Information Hiding, 10th International Workshop, 2008

Building QKD Networks Based On a Novel QKD Scheme.
Proceedings of the IEEE International Conference on Networking, Sensing and Control, 2008

Privacy-Preserving Practical Convex Hulls Protocol.
Proceedings of the Japan-China Joint Workshop on Frontier of Computer Science and Technology, 2008

A Practical Three-Dimensional Privacy-Preserving Approximate Convex Hulls Protocol.
Proceedings of the Japan-China Joint Workshop on Frontier of Computer Science and Technology, 2008

A Statistical Algorithm for Linguistic Steganography Detection Based on Distribution of Words.
Proceedings of the The Third International Conference on Availability, 2008

2007
Privacy-preserving technology and its applications in statistics measurements.
Proceedings of the 2nf International Conference on Scalable Information Systems, 2007

Quantum Oblivious Transfer Using Tripartite Entangled States.
Proceedings of the Future Generation Communication and Networking, 2007

2006
Quantum ANDOS Protocol with Unconditional Security.
Proceedings of the Advances in Natural Computation, Second International Conference, 2006

Quantum Oblivious Transfer Based on POVM Measurements.
Proceedings of the 2006 International Conference on Foundations of Computer Science, 2006


  Loading...