Wenyuan Xu

This page is a disambiguation page, it actually contains mutiple papers from persons of the same or a similar name.

Known people with the same name:


Joint Architecture Design and Workload Partitioning for DNN Inference on Industrial IoT Clusters.
ACM Trans. Internet Techn., 2023

Inaudible Adversarial Perturbation: Manipulating the Recognition of User Speech in Real Time.
CoRR, 2023

Learning Normality is Enough: A Software-based Mitigation against Inaudible Voice Attacks.
Proceedings of the 32nd USENIX Security Symposium, 2023

Oblivion: Poisoning Federated Learning by Inducing Catastrophic Forgetting.
Proceedings of the IEEE INFOCOM 2023, 2023

Private Eye: On the Limits of Textual Screen Peeking via Eyeglass Reflections in Video Conferencing.
CoRR, 2022

Deformation Characteristics of Raising, Widening of Old Roadway on Soft Soil Foundation.
Symmetry, 2021

Channel pruning guided by spatial and channel attention for DNNs in intelligent edge computing.
Appl. Soft Comput., 2021

Accelerating Federated Learning for IoT in Big Data Analytics With Pruning, Quantization and Selective Updating.
IEEE Access, 2021

Tips and Tricks for Webly-Supervised Fine-Grained Recognition: Learning from the WebFG 2020 Challenge.
CoRR, 2020

Research on the Knowledge Map of Combat Simulation Domain Based on Relational Database.
Proceedings of the Human Centered Computing - 6th International Conference, 2020

EdgeLD: Locally Distributed Deep Learning Inference on Edge Device Clusters.
Proceedings of the 22nd IEEE International Conference on High Performance Computing and Communications; 18th IEEE International Conference on Smart City; 6th IEEE International Conference on Data Science and Systems, 2020

Personalized project recommendation on GitHub.
Sci. China Inf. Sci., 2018

ADMM for Hybrid Precoding of Relay in Millimeter-Wave Massive MIMO System.
Proceedings of the 88th IEEE Vehicular Technology Conference, 2018

Blue Note: How Intentional Acoustic Interference Damages Availability and Integrity in Hard Disk Drives and Operating Systems.
Proceedings of the 2018 IEEE Symposium on Security and Privacy, 2018

Research on the Design Method of the Command Simulation Training System.
Proceedings of the Human Centered Computing - 4th International Conference, 2018

Research on Simulation Scenario Editing Method Based on Instruction Rules.
Proceedings of the Human Centered Computing - 4th International Conference, 2018

Research on Embedded and Monitoring Test Technology of C4ISR System.
Proceedings of the Human Centered Computing - 4th International Conference, 2018

Cubic Spline Smoothing Algorithm for General Aviation Track.
Proceedings of the Human Centered Computing - 4th International Conference, 2018

Research and Implementation of Interactive Analysis and Mining Technology for Big Data.
Proceedings of the Human Centered Computing - 4th International Conference, 2018

Scalable Relevant Project Recommendation on GitHub.
Proceedings of the 9th Asia-Pacific Symposium on Internetware, 2017

REPERSP: Recommending Personalized Software Projects on GitHub.
Proceedings of the 2017 IEEE International Conference on Software Maintenance and Evolution, 2017

PSK/QAM modulation recognition by convolutional neural network.
Proceedings of the 2017 IEEE/CIC International Conference on Communications in China, 2017

Researches on the Analysis Framework of Application Layer Communication Protocol Based on SQLite.
Proceedings of the Human Centered Computing - Third International Conference, 2017

A Feature-Based Food Recommendation on Apache Spark.
Proceedings of the Fifth International Conference on Advanced Cloud and Big Data, 2017

Panel Security and Privacy in the Age of Internet of Things: Opportunities and Challenges.
Proceedings of the 21st ACM on Symposium on Access Control Models and Technologies, 2016

Jamming mobility in 802.11p networks: Modeling, evaluation, and detection.
Proceedings of the 35th IEEE International Performance Computing and Communications Conference, 2016

MC<sup>2</sup>: Multimode User-Centric Design of Wireless Sensor Networks for Long-Term Monitoring.
ACM Trans. Sens. Networks, 2014

A Large-Scale Empirical Analysis of Chinese Web Passwords.
Proceedings of the 23rd USENIX Security Symposium, San Diego, CA, USA, August 20-22, 2014., 2014

Three-dimensional formation merging control of second-order agents under directed and switching topologies.
Proceedings of the 11th IEEE International Conference on Control & Automation, 2014

Detection of On-Road Vehicles Emanating GPS Interference.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014

ACM HotMobile 2013 poster: leveraging imperfections of sensors for fingerprinting smartphones.
ACM SIGMOBILE Mob. Comput. Commun. Rev., 2013

TACO: Temperature-Aware Compensation for Time Synchronization in Wireless Sensor Networks.
Proceedings of the IEEE 10th International Conference on Mobile Ad-Hoc and Sensor Systems, 2013

Lightweight secure communication protocols for in-vehicle sensor networks.
Proceedings of the CyCAR'13, 2013

Energy-efficient information routing in sensor networks for robotic target tracking.
Wirel. Networks, 2012

Determining sink location through Zeroing-In attackers in wireless sensor networks.
Wirel. Networks, 2012

Long-term microclimate monitoring in wildland cultural heritage sites with wireless sensor networks.
Int. J. High Perform. Comput. Netw., 2012

Extracting jamming signals to locate radio interferers and jammers.
Proceedings of the Thirteenth ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2012

Error minimizing jammer localization through smart estimation of ambient noise.
Proceedings of the 9th IEEE International Conference on Mobile Ad-Hoc and Sensor Systems, 2012

Distributed transmit beamforming via feedback-based inter-cluster synchronization.
Proceedings of the 51th IEEE Conference on Decision and Control, 2012

Jamming Attack Defense.
Proceedings of the Encyclopedia of Cryptography and Security, 2nd Ed., 2011

Short paper: Jamming-resilient multipath routing leveraging availability-based correlation.
Proceedings of the Fourth ACM Conference on Wireless Network Security, 2011

Content-Aware Data Dissemination for Enhancing Privacy and Availability in Wireless Sensor Networks.
Proceedings of the IEEE 8th International Conference on Mobile Adhoc and Sensor Systems, 2011

Accurate Accident Reconstruction in VANET.
Proceedings of the Data and Applications Security and Privacy XXV, 2011

Poster: collaborative policy administration.
Proceedings of the 18th ACM Conference on Computer and Communications Security, 2011

Multi-mode user-centric design of wireless sensor networks for long-term monitoring.
ACM SIGMOBILE Mob. Comput. Commun. Rev., 2010

Zeroing-in on network metric minima for sink location determination.
Proceedings of the Third ACM Conference on Wireless Network Security, 2010

Network-assisted target tracking via smart local routing.
Proceedings of the 2010 IEEE/RSJ International Conference on Intelligent Robots and Systems, 2010

Distributed Transmit Beamforming with Autonomous and Self-Organizing Mobile Antennas.
Proceedings of the Global Communications Conference, 2010

Energy-efficient target tracking with a sensorless robot and a network of unreliable one-bit proximity sensors.
Proceedings of the 2009 IEEE International Conference on Robotics and Automation, 2009

Securing Emerging Wireless Systems - Lower-layer Approaches.
Springer, ISBN: 978-0-387-88490-5, 2009

On Adjusting Power to Defend Wireless Networks from Jamming.
Proceedings of the 4th Annual International Conference on Mobile and Ubiquitous Systems (MobiQuitous 2007), 2007

Channel surfing: defending wireless sensor networks from jamming and interference.
Proceedings of the 4th International Conference on Embedded Networked Sensor Systems, 2006

Key management for 3G MBMS security.
Proceedings of the Global Telecommunications Conference, 2004. GLOBECOM '04, Dallas, Texas, USA, 29 November, 2004

Design of two MUSIC-like estimators based on bias minimization.
IEEE Trans. Signal Process., 1996

Behavioral analysis of anisotropic diffusion in image processing .
IEEE Trans. Image Process., 1996

Comparative study of the biases of MUSIC-like estimators.
Signal Process., 1996

L∞ blind deconvolution for the generalized AR model.
Proceedings of the 8th European Signal Processing Conference, 1996

Analysis of the performance and sensitivity of eigendecomposition-based detectors.
IEEE Trans. Signal Process., 1995

On ill-posed anisotropic diffusion models.
Proceedings of the Proceedings 1995 International Conference on Image Processing, 1995

Theoretical comparison for biases of MUSIC-like DOA estimators.
Proceedings of the 1995 International Conference on Acoustics, 1995

Analysis and Design of Anisotropic Diffusion for Image Processing.
Proceedings of the Proceedings 1994 International Conference on Image Processing, 1994

Alternatives for the definition and evaluation of resolution thresholds of signal-subspace parameter estimators.
Proceedings of ICASSP '94: IEEE International Conference on Acoustics, 1994