Weiyu Jiang

Orcid: 0000-0003-2337-6097

According to our database1, Weiyu Jiang authored at least 15 papers between 2005 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
An ATC instruction processing-based trajectory prediction algorithm designing.
Neural Comput. Appl., November, 2023

An optimisation for a two-round good-case latency protocol.
IET Inf. Secur., July, 2023

2021
Adaptive event-triggered control for master-slave switched systems subject to attacked state-dependent switching law.
Trans. Inst. Meas. Control, 2021

Security-Oriented Network Architecture.
Secur. Commun. Networks, 2021

TAP: A Traffic-Aware Probabilistic Packet Marking for Collaborative DDoS Mitigation.
Proceedings of the 17th International Conference on Mobility, Sensing and Networking, 2021

EAP-ZKP: A Zero-Knowledge Proof based Authentication Protocol to Prevent DDoS Attacks at the Edge in Beyond 5G.
Proceedings of the 4th IEEE 5G World Forum, 2021

2020
Identification of Tiny Surface Cracks in a Rugged Weld by Signal Gradient Algorithm Using the ACFM Technique.
Sensors, 2020

Decentralised event-triggered control for uncertain switched T-S fuzzy systems with asynchronous adaptive sampling communication.
Int. J. Syst. Sci., 2020

Poster: Enhancing Remote Healthiness Attestation for Constrained IoT Devices.
Proceedings of the 28th IEEE International Conference on Network Protocols, 2020

2018
CNN-Based Chinese Character Recognition with Skeleton Feature.
Proceedings of the Neural Information Processing - 25th International Conference, 2018

2017
How to Make Information-Flow Analysis Based Defense Ineffective: An ART Behavior-Mask Attack.
Proceedings of the Information Security - 20th International Conference, 2017

2015
LightCore: Lightweight Collaborative Editing Cloud Services for Sensitive Data.
Proceedings of the Applied Cryptography and Network Security, 2015

2014
Towards Efficient Update of Access Control Policy for Cryptographic Cloud Storage.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

2013
From Mini House Game to Hobby-Driven Behavioral Biometrics-Based Password.
Proceedings of the 12th IEEE International Conference on Trust, 2013

2005
High accuracy frequency offset correction with adjustable acquisition range in OFDM systems.
IEEE Trans. Wirel. Commun., 2005


  Loading...