Wenqian Yu

Orcid: 0000-0002-5956-5650

According to our database1, Wenqian Yu authored at least 15 papers between 2008 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
QKPT: Securing Your Private Keys in Cloud With Performance, Scalability and Transparency.
IEEE Trans. Dependable Secur. Comput., 2023

A Survey on Transferability of Adversarial Examples across Deep Neural Networks.
CoRR, 2023

Reliable Evaluation of Adversarial Transferability.
CoRR, 2023

The Analysis of Phase Synchronisation in the Uniform Scale-Free Hypernetwork.
Proceedings of the Data Science, 2023

2021
Virtual Inertia Control Strategy of Traction Converter in High-Speed Railways Based on Feedback Linearization of Sliding Mode Observer.
IEEE Trans. Veh. Technol., 2021

2020
Early detection of technology opportunity based on analogy design and phrase semantic representation.
Scientometrics, 2020

Low-Frequency Instability Induced by Hopf Bifurcation in a Single-Phase Converter Connected to Non-Ideal Power Grid.
IEEE Access, 2020

2019
Double-image encryption based on spatiotemporal chaos and DNA operations.
Multim. Tools Appl., 2019

Variable Frequency Constant Current Control Method for Switched-Capacitor Converter Based Automotive LED Driver.
IEEE Access, 2019

High Voltage Gain Ratio Isolated Resonant Switched-Capacitor Converter for Sustainable Energy.
IEEE Access, 2019

Citation2vec: A New Method for Citation Recommendation Based on Semantic Representation of Citation Context.
Proceedings of the 17th International Conference on Scientometrics and Informetrics, 2019

2018
Bit-level image cryptosystem combining 2D hyper-chaos with a modified non-adjacent spatiotemporal chaos.
Multim. Tools Appl., 2018

Protecting Your Own Private Key in Cloud: Security, Scalability and Performance.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

2016
A study of HSM based key protection in encryption file system.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016

2008
Abnormal Traffic Detection in VoIP by Using Machine Learning Approaches.
Proceedings of the 2008 International Conference on Artificial Intelligence, 2008


  Loading...