Wenbo Yang

Orcid: 0000-0001-5530-8844

According to our database1, Wenbo Yang authored at least 42 papers between 2010 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
SFCC: Data Augmentation with Stratified Fourier Coefficients Combination for Time Series Classification.
Neural Process. Lett., April, 2023

Joint Communication and Jamming System Design Based on Filter Bank Multicarrier Chirp Waveform: Using for Curvilinear Flight Scenario.
Remote. Sens., March, 2023

MIMO FBMC-Based Joint Radar Imaging and Electronic Jamming.
IEEE Geosci. Remote. Sens. Lett., 2023

Implementation of MIMO-SAR Imaging Based on Jamming Signal.
IEEE Geosci. Remote. Sens. Lett., 2023

A Handheld Reader with Optimized Image Analysis for HIV Lateral Flow Test.
Proceedings of the 16th International Congress on Image and Signal Processing, 2023

2022
MIMO Radar Parallel Simulation System Based on CPU/GPU Architecture.
Sensors, 2022

An adaptive optimization method for estimating the number of components in a Gaussian mixture model.
J. Comput. Sci., 2022

TSadv: Black-box adversarial attack on time series with local perturbations.
Eng. Appl. Artif. Intell., 2022

A Co-creation Interaction Framework and Its Application for Intelligent Design System.
Proceedings of the Human-Computer Interaction. Theoretical Approaches and Design Methods, 2022

A Novel Transformer-Based Model for Dialog State Tracking.
Proceedings of the Cross-Cultural Design. Applications in Business, Communication, Health, Well-being, and Inclusiveness, 2022

2021
Inferiority complex of higher vocational students based on improved random sampling.
J. Comput. Methods Sci. Eng., 2021

Dynamic early warning system of College Students' target course performance based on improved Apriori algorithm.
J. Comput. Methods Sci. Eng., 2021

Coal-Gangue Interface Detection Based on Ensemble Empirical Mode Decomposition Energy Entropy.
IEEE Access, 2021

Deep Learning-Enabled Low-light Image Enhancement In Maritime Video Surveillance.
Proceedings of the ICDSP 2021: 5th International Conference on Digital Signal Processing, 2021

Logarithmic Retinex Decomposition-Aided Convolutional Neural Networks for Low-Light Image Enhancement.
Proceedings of the ICDSP 2021: 5th International Conference on Digital Signal Processing, 2021

Research and Design of Agrometeorological Disaster Monitoring and Early Warning and Intelligent Service System Based on Data Mining.
Proceedings of the Big Data and Security - Third International Conference, 2021

2020
Certified Copy? Understanding Security Risks of Wi-Fi Hotspot based Android Data Clone Services.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020

2019
Low-Capacitance Modular Multilevel Converter Operating With High Capacitor Voltage Ripples.
IEEE Trans. Ind. Electron., 2019

Security analysis of third-party in-app payment in mobile applications.
J. Inf. Secur. Appl., 2019

Blind Deblurring Using Space Target Features.
IEEE Access, 2019

The Control Strategy of Unidirectional Current H-Bridge MMC Based Hybrid HVDC System.
Proceedings of the 28th IEEE International Symposium on Industrial Electronics, 2019

2018
Application of Third-Order Harmonic Voltage Injection in a Modular Multilevel Converter.
IEEE Trans. Ind. Electron., 2018

AppSpear: Automating the hidden-code extraction and reassembling of packed android malware.
J. Syst. Softw., 2018

Existence of Fuzzy Zhou Bargaining Sets in TU Fuzzy Games.
Int. J. Fuzzy Syst. Appl., 2018

Existence of an Aumann-Maschler fuzzy bargaining set and fuzzy kernels in TU fuzzy games.
Fuzzy Sets Syst., 2018

2017
Show Me the Money! Finding Flawed Implementations of Third-party In-app Payment in Android Apps.
Proceedings of the 24th Annual Network and Distributed System Security Symposium, 2017

Converter side phase-to-ground fault protection of full-bridge modular multilevel converter-based bipolar HVDC.
Proceedings of the IECON 2017 - 43rd Annual Conference of the IEEE Industrial Electronics Society, Beijing, China, October 29, 2017

MIRAGE: Randomizing large chunk allocation via dynamic binary instrumentation.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2017

GlobeSen: an open interconnection framework based on named sensory date for IoT.
Proceedings of the ACM Turing 50th Celebration Conference, 2017

2016
Decoupled Control of Modular Multilevel Converter Based on Intermediate Controllable Voltages.
IEEE Trans. Ind. Electron., 2016

BRR-CVR: A Collaborative Caching Strategy for Information-Centric Wireless Sensor Networks.
Proceedings of the 12th International Conference on Mobile Ad-Hoc and Sensor Networks, 2016

2015
AppSpear: Bytecode Decrypting and DEX Reassembling for Packed Android Malware.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2015

From Collision To Exploitation: Unleashing Use-After-Free Vulnerabilities in Linux Kernel.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

Vulnerability Assessment of OAuth Implementations in Android Applications.
Proceedings of the 31st Annual Computer Security Applications Conference, 2015

2014
A switch-mode information fusion filter based on ISRUKF for autonomous navigation of spacecraft.
Inf. Fusion, 2014

Set systems with restricted k-wise L-intersections modulo a prime number.
Eur. J. Comb., 2014

TagDroid: Hybrid SSL Certificate Verification in Android.
Proceedings of the Information and Communications Security - 16th International Conference, 2014

APKLancet: tumor payload diagnosis and purification for android applications.
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014

DIAS: Automated Online Analysis for Android Applications.
Proceedings of the 14th IEEE International Conference on Computer and Information Technology, 2014

2013
A Situation of Economic Management in NTU Cooperative Fuzzy Games.
Proceedings of the 12th Wuhan International Conference on E-Business, 2013

2011
Aubin cores and bargaining sets for convex cooperative fuzzy games.
Int. J. Game Theory, 2011

2010
Protecting Source Location Privacy in Wireless Sensor Networks with Data Aggregation.
Proceedings of the Ubiquitous Intelligence and Computing - 7th International Conference, 2010


  Loading...