Wenjie Ding

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Bibliography

2025
Dual-Protection Method Against Eavesdroppers for Distributed State Estimation.
IEEE Trans. Signal Inf. Process. over Networks, 2025

Security Analysis and Defense of Multi-Encoding Mechanism Against Eavesdropping Attacks.
IEEE Trans. Netw. Sci. Eng., 2025

KPAMA: A Kubernetes based tool for Mitigating ML system Aging.
J. Syst. Softw., 2025

A numerical study of the symplectic FDTD(,) method combined with matrix exponential technique for anisotropic magnetized plasma.
Comput. Phys. Commun., 2025

2024
A Resilient Distributed Kalman Filtering Under Bidirectional Stealthy Attack.
IEEE Signal Process. Lett., 2024

LAG-Sizer: A Novel Gate Sizer Based on Leak Generative Adversarial Network with Feature Fusion.
Proceedings of the 43rd IEEE/ACM International Conference on Computer-Aided Design, 2024

A Physical and Timing Aware Placement Optimization Framework Based on Graph Neural Network.
Proceedings of the 43rd IEEE/ACM International Conference on Computer-Aided Design, 2024

RCBind: An interpretable model for predicting RNA binding sites to small molecules.
Proceedings of the 5th International Conference on Artificial Intelligence and Computer Engineering, 2024

An Optimization-aware Pre-Routing Timing Prediction Framework Based on Heterogeneous Graph Learning.
Proceedings of the 29th Asia and South Pacific Design Automation Conference, 2024

2023
Efficient and Accurate ECO Leakage Optimization Framework With GNN and Bidirectional LSTM.
IEEE Trans. Very Large Scale Integr. Syst., September, 2023

Reinforcement Learning Solution for Cyber-Physical Systems Security Against Replay Attacks.
IEEE Trans. Inf. Forensics Secur., 2023

Watermarking-Based Protection Strategy Against Stealthy Integrity Attack on Distributed State Estimation.
IEEE Trans. Autom. Control., 2023

MachMap: End-to-End Vectorized Solution for Compact HD-Map Construction.
CoRR, 2023

An efficient encoding mechanism against eavesdropper with side channel information.
Autom., 2023

GRM: Gradient Rectification Module for Visual Place Retrieval.
Proceedings of the IEEE International Conference on Robotics and Automation, 2023

PivotNet: Vectorized Pivot Learning for End-to-end HD Map Construction.
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023

End-to-End Vectorized HD-map Construction with Piecewise Bézier Curve.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2023

2022
A Secure Encoding Mechanism Against Deception Attacks on Multisensor Remote State Estimation.
IEEE Trans. Inf. Forensics Secur., 2022

Privacy Preserving via Secure Summation in Distributed Kalman Filtering.
IEEE Trans. Control. Netw. Syst., 2022

Regulating the use of big data: Justifications, perspectives and the Chinese way forward.
Comput. Law Secur. Rev., 2022

Taxonomy of Aging-related Bugs in Deep Learning Libraries.
Proceedings of the IEEE 33rd International Symposium on Software Reliability Engineering, 2022

2021
Beyond Universal Person Re-Identification Attack.
IEEE Trans. Inf. Forensics Secur., 2021

Reinforcement Learning-Based Detection for State Estimation Under False Data Injection.
IEEE Access, 2021

2020
Polynomial Universal Adversarial Perturbations for Person Re-Identification.
Proceedings of the 25th International Conference on Pattern Recognition, 2020

Complex Spatial-Temporal Attention Aggregation For Video Person Re-Identification.
Proceedings of the IEEE International Conference on Image Processing, 2020

2019
Universal Adversarial Perturbations Against Person Re-Identification.
CoRR, 2019

2016
Magnetization and Giant Magnetoimpedance Effect of Co-Rich Microwires under Different Driven Currents.
J. Sensors, 2016


  Loading...