Wenjia Niu

Orcid: 0000-0003-4706-4266

According to our database1, Wenjia Niu authored at least 99 papers between 2008 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Recognition of Signal Modulation Pattern Based on Multi-task Self-supervised Learning.
Proceedings of the Intelligent Information Processing XII, 2024

2023
A Mutual Information-Based Assessment of Reverse Engineering on Rewards of Reinforcement Learning.
IEEE Trans. Artif. Intell., October, 2023

Traffic Signal Timing Optimization Based on Intersection Importance in Vehicle-Road Collaboration.
Proceedings of the Machine Learning for Cyber Security - 5th International Conference, 2023

Mitigating Overfitting for Deep Learning-based Aging-related Bug Prediction via Brain-inspired Regularization in Spiking Neural Networks.
Proceedings of the 34th IEEE International Symposium on Software Reliability Engineering, ISSRE 2023, 2023

Robust Reinforcement Learning via Progressive Task Sequence.
Proceedings of the Thirty-Second International Joint Conference on Artificial Intelligence, 2023

2022
A Missing QoS Prediction Approach via Time-Aware Collaborative Filtering.
IEEE Trans. Serv. Comput., 2022

Multiagent Reinforcement Learning-Based Signal Planning for Resisting Congestion Attack in Green Transportation.
IEEE Trans. Green Commun. Netw., 2022

Four-player GroupGAN for weak expression recognition via latent expression magnification.
Knowl. Based Syst., 2022

Toward Blockchain-Based Spoofing Defense for Controlled Optimization of Phases in Traffic Signal System.
IEICE Trans. Inf. Syst., 2022

Adapting on Road Traffic-Oriented Controlled Optimization of Phases to Heterogeneous Intersections.
Proceedings of the Intelligent Information Processing XI, 2022

Efficient-HotStuff: A BFT Blockchain Consensus with Higher Efficiency and Stronger Robustness.
Proceedings of the 28th IEEE International Conference on Parallel and Distributed Systems, 2022

2021
Blind Motion Deblurring Super-Resolution: When Dynamic Spatio-Temporal Learning Meets Static Image Understanding.
IEEE Trans. Image Process., 2021

A Hierarchical Energy-Efficient Service Selection Approach With QoS Constraints for Internet of Things.
IEEE Trans. Green Commun. Netw., 2021

Contiguous Loss for Motion-Based, Non-Aligned Image Deblurring.
Symmetry, 2021

Towards Revealing Parallel Adversarial Attack on Politician Socialnet of Graph Structure.
Secur. Commun. Networks, 2021

Robustness Assessment of Asynchronous Advantage Actor-Critic Based on Dynamic Skewness and Sparseness Computation: A Parallel Computing View.
J. Comput. Sci. Technol., 2021

A Training-Based Identification Approach to VIN Adversarial Examples in Path Planning.
J. Circuits Syst. Comput., 2021

Deep robust image deblurring via blur distilling and information comparison in latent space.
Neurocomputing, 2021

Adversarial retraining attack of asynchronous advantage actor-critic based pathfinding.
Int. J. Intell. Syst., 2021

Blind Motion Deblurring Super-Resolution: When Dynamic Spatio-Temporal Learning Meets Static Image Understanding.
CoRR, 2021

Protecting Reward Function of Reinforcement Learning via Minimal and Non-catastrophic Adversarial Trajectory.
Proceedings of the 40th International Symposium on Reliable Distributed Systems, 2021

Improving Convolutional Neural Network-Based Webshell Detection Through Reinforcement Learning.
Proceedings of the Information and Communications Security - 23rd International Conference, 2021

Security Analysis of Poisoning Attacks Against Multi-agent Reinforcement Learning.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2021

Blockchain-based decentralized federated learning: A secure and privacy-preserving system.
Proceedings of the 2021 IEEE 23rd Int Conf on High Performance Computing & Communications; 7th Int Conf on Data Science & Systems; 19th Int Conf on Smart City; 7th Int Conf on Dependability in Sensor, 2021

2020
An Empirical Study on GAN-Based Traffic Congestion Attack Analysis: A Visualized Method.
Wirel. Commun. Mob. Comput., 2020

Exposing Spoofing Attack on Flocking-Based Unmanned Aerial Vehicle Cluster: A Threat to Swarm Intelligence.
Secur. Commun. Networks, 2020

A C-IFGSM Based Adversarial Approach for Deep Learning Based Intrusion Detection.
Proceedings of the Verification and Evaluation of Computer and Communication Systems, 2020

A Configurable off-Policy Evaluation with Key State-Based Bias Constraints in AI Reinforcement Learning.
Proceedings of the Security and Privacy in Social Networks and Big Data, 2020

Adapt Swarm Path Planning for UAV Based on Artificial Potential Field with Birds Intelligence Extensions.
Proceedings of the Security and Privacy in Social Networks and Big Data, 2020

Constructing Optimal Sparse Decision Tree for Analying I-SIG System Attack.
Proceedings of the IEEE International Conference on Parallel & Distributed Processing with Applications, 2020

Queue Length Estimation Based Defence Against Data Poisoning Attack for Traffic Signal Control.
Proceedings of the Intelligent Information Processing X, 2020

Explainable Congestion Attack Prediction and Software-level Reinforcement in Intelligent Traffic Signal System.
Proceedings of the 26th IEEE International Conference on Parallel and Distributed Systems, 2020

Exploring Data Correlation between Feature Pairs for Generating Constraint-based Adversarial Examples.
Proceedings of the 26th IEEE International Conference on Parallel and Distributed Systems, 2020

Bidirectional RNN-Based Few-Shot Training for Detecting Multi-stage Attack.
Proceedings of the Information Security and Cryptology - 16th International Conference, 2020

2019
Adversarial attack and defense in reinforcement learning-from AI security view.
Cybersecur., 2019

Bidirectional RNN-based Few-shot Training for Detecting Multi-stage Attack.
CoRR, 2019

2018
A Training-based Identification Approach to VIN Adversarial Examples.
CoRR, 2018

Gradient Band-based Adversarial Training for Generalized Attack Immunity of A3C Path Finding.
CoRR, 2018

A Novel Group Recommendation Mechanism From the Perspective of Preference Distribution.
IEEE Access, 2018

A DeepWalk-Based Approach to Defend Profile Injection Attack in Recommendation System.
Proceedings of the Intelligent Information Processing IX, 2018

A PCA-Based Model to Predict Adversarial Examples on Q-Learning of Path Finding.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018

Intention-Aware Multi-channel Keyword Extension for Content Security.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018

An Approach to Generate Topic Similar Document by Seed Extraction-Based SeqGAN Training for Bait Document.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018

Adversarial Examples Construction Towards White-Box Q Table Variation in DQN Pathfinding Training.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018

2017
Boosting imbalanced data learning with Wiener process oversampling.
Frontiers Comput. Sci., 2017

Request routing through collaborative in-network caching for bandwidth optimization: a methodology.
Trans. Emerg. Telecommun. Technol., 2017

Curbing collusive cyber-gossips for business brand management.
Enterp. Inf. Syst., 2017

New advances in securing cyberspace and curbing crowdturfing.
Concurr. Comput. Pract. Exp., 2017

A Novel Graph Constructor for Semisupervised Discriminant Analysis: Combined Low-Rank and k-Nearest Neighbor Graph.
Comput. Intell. Neurosci., 2017

Efficient Multiple Kernel Learning Algorithms Using Low-Rank Representation.
Comput. Intell. Neurosci., 2017

Fine-Grained Recommendation Mechanism to Curb Astroturfing in Crowdsourcing Systems.
IEEE Access, 2017

Beyond the Aggregation of Its Members - A Novel Group Recommender System from the Perspective of Preference Distribution.
Proceedings of the Knowledge Science, Engineering and Management, 2017

A Hidden Astroturfing Detection Approach Base on Emotion Analysis.
Proceedings of the Knowledge Science, Engineering and Management, 2017

A Method to Effectively Detect Vulnerabilities on Path Planning of VIN.
Proceedings of the Information and Communications Security - 19th International Conference, 2017

A Cross-Modal CCA-Based Astroturfing Detection Approach.
Proceedings of the Information and Communications Security - 19th International Conference, 2017

2016
A differentially private algorithm for location data release.
Knowl. Inf. Syst., 2016

Exploring probabilistic follow relationship to prevent collusive peer-to-peer piracy.
Knowl. Inf. Syst., 2016

Energy Efficient Sleep Schedule with Service Coverage Guarantee in Wireless Sensor Networks.
J. Netw. Syst. Manag., 2016

Securing cyberspace.
Concurr. Comput. Pract. Exp., 2016

Riemannian optimization with subspace tracking for low-rank recovery.
Proceedings of the 2016 International Joint Conference on Neural Networks, 2016

2015
Recover Fault Services via Complex Service-to-Node Mappings in Wireless Sensor Networks.
J. Netw. Syst. Manag., 2015

Two-Phased Event Causality Acquisition: Coupling the Boundary Identification and Argument Identification Approaches.
Proceedings of the Knowledge Science, Engineering and Management, 2015

Lingo: Linearized Grassmannian Optimization for Nuclear Norm Minimization.
Proceedings of the 24th ACM International Conference on Information and Knowledge Management, 2015

Cross-Modal Similarity Learning: A Low Rank Bilinear Formulation.
Proceedings of the 24th ACM International Conference on Information and Knowledge Management, 2015

2014
Context-Aware Service Ranking in Wireless Sensor Networks.
J. Netw. Syst. Manag., 2014

A novel cache size optimization scheme based on manifold learning in Content Centric Networking.
J. Netw. Comput. Appl., 2014

Bloom filter-based workflow management to enable QoS guarantee in wireless sensor networks.
J. Netw. Comput. Appl., 2014

Interaction relationships of caches in agent-based HD video surveillance: Discovery and utilization.
J. Netw. Comput. Appl., 2014

A block-aware hybrid data dissemination with hotspot elimination in wireless sensor network.
J. Netw. Comput. Appl., 2014

Special issue on behavior data security issues in network information propagation.
Future Gener. Comput. Syst., 2014

Privacy Preserving in Location Data Release: A Differential Privacy Approach.
Proceedings of the PRICAI 2014: Trends in Artificial Intelligence, 2014

A DBN-Based Classifying Approach to Discover the Internet Water Army.
Proceedings of the Intelligent Information Processing VII, 2014

Online Nonparametric Max-Margin Matrix Factorization for Collaborative Prediction.
Proceedings of the 2014 IEEE International Conference on Data Mining, 2014

2013
A Policy-Based Web Service Redundancy Detection in Wireless Sensor Networks.
J. Netw. Syst. Manag., 2013

Dynamic User Behavior-Based Piracy Propagation Monitoring in Wireless Peer-to-Peer Networks.
Proceedings of the Behavior and Social Computing, 2013

An Actor Network-Based Approach to Pirates Community Discovery in Peer-to-Peer Network.
Proceedings of the Behavior and Social Computing, 2013

2012
Guest Editorial.
J. Networks, 2012

Hierarchical Workflow Management in Wireless Sensor Network.
Proceedings of the PRICAI 2012: Trends in Artificial Intelligence, 2012

Frequency-Adaptive Cluster Head Election in Wireless Sensor Network.
Proceedings of the Intelligent Information Processing VI, 2012

A Reference Model for Virtual Resource Description and Discovery in Virtual Networks.
Proceedings of the Computational Science and Its Applications - ICCSA 2012, 2012

Aggregating user rating and service context for WSN service ranking.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

An Agent Collaboration-Based Data Hierarchical Caching Approach for HD Video Surveillance.
Proceedings of the Agents and Data Mining Interaction - 8th International Workshop, 2012

Traffic Load-Based Dynamic Bandwidth Allocation for Balancing the Packet Loss in DiffServ Network.
Proceedings of the 2012 IEEE/ACIS 11th International Conference on Computer and Information Science, Shanghai, China, May 30, 2012

2011
Multi-granularity context model for dynamic Web service composition.
J. Netw. Comput. Appl., 2011

CARSA: A context-aware reasoning-based service agent model for AI planning of web service composition.
J. Netw. Comput. Appl., 2011

Tolerance granular computing towards incomplete information system.
Int. J. Granul. Comput. Rough Sets Intell. Syst., 2011

An approach for adaptive associative classification.
Expert Syst. Appl., 2011

Reasoning-Based Context-Aware Workflow Management in Wireless Sensor Network.
Proceedings of the Service-Oriented Computing - ICSOC 2011 Workshops, 2011

Mining Frequent Agent Action Patterns for Effective Multi-agent-Based Web Service Composition.
Proceedings of the Agents and Data Mining Interaction, 2011

2010
Similarity-Based Bayesian Learning from Semi-structured Log Files for Fault Diagnosis of Web Services.
Proceedings of the 2010 IEEE/WIC/ACM International Conference on Web Intelligence, 2010

Multi-agent and Workflow-Based Web Service Management Model.
Proceedings of the Intelligent Information Processing V, 2010

Tolerance-Based Adaptive Online Outlier Detection for Internet of Things.
Proceedings of the 2010 IEEE/ACM Int'l Conference on Green Computing and Communications, 2010

2009
Similarity Based Semantic Web Service Match.
Proceedings of the Web Information Systems and Mining, International Conference, 2009

Facilitating dynamic web service composition with fine-granularity context management.
Proceedings of the 2009 IEEE International Conference on Granular Computing, 2009

An Approach for Diagnosing Unexpected Faults in Web Service Flows.
Proceedings of the Eighth International Conference on Grid and Cooperative Computing, 2009

2008
Semantic Filtering for DDL-Based Service Composition.
Proceedings of the PRICAI 2008: Trends in Artificial Intelligence, 2008

A Context Model for Service Composition Based on Dynamic Description Logic.
Proceedings of the Intelligent Information Processing IV, 2008

A DDL-Based Model for Web Service Composition in Context-Aware Environment.
Proceedings of the 2008 IEEE International Conference on Web Services (ICWS 2008), 2008

Improving Grade Match to Value Match for Semantic Web Service Discovery.
Proceedings of the Fourth International Conference on Natural Computation, 2008


  Loading...