Wu Yang

Orcid: 0000-0001-5985-7648

Affiliations:
  • Harbin Engineering University, Information Security Research Center, China
  • Harbin Institute of Technology, China (PhD)


According to our database1, Wu Yang authored at least 108 papers between 2005 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Beyond Traditional Threats: A Persistent Backdoor Attack on Federated Learning.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

2023
Privacy-Preserving Cross-Area Traffic Forecasting in ITS: A Transferable Spatial-Temporal Graph Neural Network Approach.
IEEE Trans. Intell. Transp. Syst., December, 2023

A novel cross-network node pair embedding methodology for anchor link prediction.
World Wide Web (WWW), September, 2023

Stochastic Digital-Twin Service Demand With Edge Response: An Incentive-Based Congestion Control Approach.
IEEE Trans. Mob. Comput., April, 2023

A Novel Cross-Network Embedding for Anchor Link Prediction with Social Adversarial Attacks.
ACM Trans. Priv. Secur., 2023

Multitentacle Federated Learning Over Software-Defined Industrial Internet of Things Against Adaptive Poisoning Attacks.
IEEE Trans. Ind. Informatics, 2023

Anchor Link Prediction for Privacy Leakage via De-Anonymization in Multiple Social Networks.
IEEE Trans. Dependable Secur. Comput., 2023

Cloud-Edge Orchestrated Power Dispatching for Smart Grid With Distributed Energy Resources.
IEEE Trans. Cloud Comput., 2023

Privacy-Preserving Federated Learning of Remote Sensing Image Classification With Dishonest Majority.
IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens., 2023

Blockchain and digital twin empowered trustworthy self-healing for edge-AI enabled industrial Internet of things.
Inf. Sci., 2023

Privacy-Preserving Outsourcing of K-Means Clustering for Cloud-Device Collaborative Computing in Space-Air-Ground Integrated IoT.
IEEE Internet Things J., 2023

DRL-Driven Digital Twin Function Virtualization for Adaptive Service Response in 6G Networks.
IEEE Netw. Lett., 2023

Bridging the Gaps of Both Modality and Language: Synchronous Bilingual CTC for Speech Translation and Speech Recognition.
CoRR, 2023

Sema-IIoVT: Emergent Semantic-Based Trustworthy Information-Centric Fog System and Testbed for Intelligent Internet of Vehicles.
IEEE Consumer Electron. Mag., 2023

AI-based Intrusion Detection for Intelligence Internet of Vehicles.
IEEE Consumer Electron. Mag., 2023

Anchor Link Prediction via Network Structural Role for Privacy Leakage in Edge Computing.
Proceedings of the IEEE Global Communications Conference, 2023

2022
Digital Twin Consensus for Blockchain-Enabled Intelligent Transportation Systems in Smart Cities.
IEEE Trans. Intell. Transp. Syst., 2022

Joint Protection of Energy Security and Information Privacy for Energy Harvesting: An Incentive Federated Learning Approach.
IEEE Trans. Ind. Informatics, 2022

FairHealth: Long-Term Proportional Fairness-Driven 5G Edge Healthcare in Internet of Medical Things.
IEEE Trans. Ind. Informatics, 2022

A Survey of GNSS Spoofing and Anti-Spoofing Technology.
Remote. Sens., 2022

Device-free near-field human sensing using WiFi signals.
Pers. Ubiquitous Comput., 2022

Differential Privacy and IRS Empowered Intelligent Energy Harvesting for 6G Internet of Things.
IEEE Internet Things J., 2022

Blockchain-Based Incentive Energy-Knowledge Trading in IoT: Joint Power Transfer and AI Design.
IEEE Internet Things J., 2022

Information-Centric Wireless Sensor Networking Scheme With Water-Depth-Awareness Content Caching for Underwater IoT.
IEEE Internet Things J., 2022

Propagable Backdoors over Blockchain-based Federated Learning via Sample-Specific Eclipse.
Proceedings of the IEEE Global Communications Conference, 2022

Contrastive GNN-based Traffic Anomaly Analysis Against Imbalanced Dataset in IoT-based ITS.
Proceedings of the IEEE Global Communications Conference, 2022

2021
An Approach of Linear Regression-Based UAV GPS Spoofing Detection.
Wirel. Commun. Mob. Comput., 2021

Leveraging Graph Convolutional-LSTM for Energy-Efficient Caching in Blockchain-Based Green IoT.
IEEE Trans. Green Commun. Netw., 2021

DAM-SE: A Blockchain-Based Optimized Solution for the Counterattacks in the Internet of Federated Learning Systems.
Secur. Commun. Networks, 2021

Early Rumor Detection Based on Deep Recurrent Q-Learning.
Secur. Commun. Networks, 2021

Intelligent Intrusion Detection Based on Federated Learning for Edge-Assisted Internet of Things.
Secur. Commun. Networks, 2021

Cache Pollution Detection Method Based on GBDT in Information-Centric Network.
Secur. Commun. Networks, 2021

Malware Detection Based on Multi-level and Dynamic Multi-feature Using Ensemble Learning at Hypervisor.
Mob. Networks Appl., 2021

Securing Collaborative Environment Monitoring in Smart Cities Using Blockchain Enabled Software-Defined Internet of Drones.
IEEE Internet Things Mag., 2021

ECBCM: A prestige-based edge computing blockchain security consensus model.
Trans. Emerg. Telecommun. Technol., 2021

On-path caching based on content relevance in Information-Centric Networking.
Comput. Commun., 2021

An Improved Artificial Bee Colony Algorithm for Community Detection in Bipartite Networks.
IEEE Access, 2021

2020
Sustainable Secure Management Against APT Attacks for Intelligent Embedded-Enabled Smart Manufacturing.
IEEE Trans. Sustain. Comput., 2020

Application-Aware Consensus Management for Software-Defined Intelligent Blockchain in IoT.
IEEE Netw., 2020

Blockchain and AI Empowered Trust-Information-Centric Network for Beyond 5G.
IEEE Netw., 2020

Improved streaming quotient filter: a duplicate detection approach for data streams.
Int. Arab J. Inf. Technol., 2020

An adaptive cache management approach in ICN with pre-filter queues.
Comput. Commun., 2020

An incentive mechanism for data sharing based on blockchain with smart contracts.
Comput. Electr. Eng., 2020

Network Traffic Sampling System Based on Storage Compression for Application Classification Detection.
IEEE Access, 2020

A Memetic Algorithm for Community Detection in Signed Networks.
IEEE Access, 2020

UAV Sensor Spoofing Detection Algorithm Based on GPS and Optical Flow Fusion.
Proceedings of the ICCSP 2020: 4th International Conference on Cryptography, 2020

A Big Data Management Architecture for Standardized IoT Based on Smart Scalable SNMP.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

Sensitive Labels Matching Privacy Protection in Multi-Social Networks.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

Application of Block Chain Technology in Constructing Network Threat Intelligence System.
Proceedings of the ICBCT'20: The 2nd International Conference on Blockchain Technology, 2020

An Optimization of Deep Sensor Fusion Based on Generalized Intersection over Union.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2020

Adversarial Learning-based Bias Mitigation for Fatigue Driving Detection in Fair-Intelligent IoV.
Proceedings of the IEEE Global Communications Conference, 2020

2019
Making Knowledge Tradable in Edge-AI Enabled IoT: A Consortium Blockchain-Based Efficient and Incentive Approach.
IEEE Trans. Ind. Informatics, 2019

Software Defined Wireless Mesh Network Flat Distribution Control Plane.
Future Internet, 2019

Fog-Computing-Enabled Cognitive Network Function Virtualization for an Information-Centric Future Internet.
IEEE Commun. Mag., 2019

Location-Based Seeds Selection for Influence Blocking Maximization in Social Networks.
IEEE Access, 2019

Fog-Enabled Vehicle as a Service for Computing Geographical Migration in Smart Cities.
IEEE Access, 2019

A Survey on Green 6G Network: Architecture and Technologies.
IEEE Access, 2019

A Memetic Algorithm for Community Detection in Bipartite Networks.
IEEE Access, 2019

Vehicle-to-Cloudlet: Game-Based Computation Demand Response for Mobile Edge Computing through Vehicles.
Proceedings of the 89th IEEE Vehicular Technology Conference, 2019

Location-Aware Targeted Influence Blocking Maximization in Social Networks.
Proceedings of the 28th International Conference on Computer Communication and Networks, 2019

Security Function Virtualization Based Moving Target Defense of SDN-Enabled Smart Grid.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

SCEH: Smart Customized E-Health Framework for Countryside Using Edge AI and Body Sensor Networks.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

User Credibility Assessment Based on Trust Propagation in Microblog.
Proceedings of the Computing, Communications and IoT Applications, ComComAp 2019, Shenzhen, 2019

User anchor link identification based on integrated similarity decision in multiple heterogeneous social networks.
Proceedings of the Computing, Communications and IoT Applications, ComComAp 2019, Shenzhen, 2019

Network Penetration Identification Method Based on Interactive Behavior Analysis.
Proceedings of the Seventh International Conference on Advanced Cloud and Big Data, 2019

2018
Mathematical Performance Evaluation Model for Mobile Network Firewall Based on Queuing.
Wirel. Commun. Mob. Comput., 2018

Novel architectures and security solutions of programmable software-defined networking: a comprehensive survey.
Frontiers Inf. Technol. Electron. Eng., 2018

Identification of unknown operating system type of Internet of Things terminal device based on RIPPER.
Int. J. Distributed Sens. Networks, 2018

Location-Aware Influence Blocking Maximization in Social Networks.
IEEE Access, 2018

Robust WLAN-Based Indoor Intrusion Detection Using PHY Layer Information.
IEEE Access, 2018

Privacy Preserving Social Network Against Dopv Attacks.
Proceedings of the Web Information Systems Engineering - WISE 2018, 2018

LAMP: Lightweight and Accurate Malicious Access Points Localization via Channel Phase Information.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2018

Multi-pattern Matching Algorithm based on Variable Step Size.
Proceedings of the 8th International Conference on Communication and Network Security, 2018

Research on Task Scheduling Model for Multi-core Processor.
Proceedings of the 8th International Conference on Communication and Network Security, 2018

PWiG: A Phase-based Wireless Gesture Recognition System.
Proceedings of the 2018 International Conference on Computing, 2018

Malware Detection Based on Dynamic Multi-Feature Using Ensemble Learning at Hypervisor.
Proceedings of the IEEE Global Communications Conference, 2018

QoS-aware Topology Discovery in Decentralized Software Defined Wireless Mesh Network (D-SDWMN) Architecture.
Proceedings of the 2018 2nd International Conference on Computer Science and Artificial Intelligence, 2018

Hybrid Classification of WEB Trojan Exploiting Small Volume of Labeled Data Vectors.
Proceedings of the 14th International Conference on Computational Intelligence and Security, 2018

2017
Device-Free Passive Identity Identification via WiFi Signals.
Sensors, 2017

Thwarting Nonintrusive Occupancy Detection Attacks from Smart Meters.
Secur. Commun. Networks, 2017

Discovering burst patterns of burst topic in twitter.
Comput. Electr. Eng., 2017

Preserving Privacy in Social Networks Against Label Pair Attacks.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2017

Two-Stage Mixed Queuing Model for Web Security Gateway Performance Evaluation.
Proceedings of the 26th International Conference on Computer Communication and Networks, 2017

Wii: Device-Free Passive Identity Identification via WiFi Signals.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

2016
iPil: improving passive indoor localisation via link-based CSI features.
Int. J. Ad Hoc Ubiquitous Comput., 2016

An adaptive wireless passive human detection via fine-grained physical layer information.
Ad Hoc Networks, 2016

WiSal: Ubiquitous WiFi-Based Device-Free Passive Subarea Localization without Intensive Site-Survey.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Robust WLAN-Based Indoor Fine-Grained Intrusion Detection.
Proceedings of the 2016 IEEE Global Communications Conference, 2016

Detecting Community Pacemakers of Burst Topic in Twitter.
Proceedings of the Web Technologies and Applications - 18th Asia-Pacific Web Conference, 2016

2015
WiFi-Based Real-Time Calibration-Free Passive Human Motion Detection.
Sensors, 2015

Anomaly Detection in Microblogging via Co-Clustering.
J. Comput. Sci. Technol., 2015

Enhancing the Performance of Indoor Device-Free Passive Localization.
Int. J. Distributed Sens. Networks, 2015

Heterogeneous Sparse Relational Data Co-clustering in Social Network.
Proceedings of the 2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom), 2015

FRID: Indoor Fine-Grained Real-Time Passive Human Motion Detection.
Proceedings of the 2015 IEEE 12th Intl Conf on Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom), 2015

SAMD: A System for Abnormal Messages Detection Oriented Microblog Message Stream.
Proceedings of the Bio-Inspired Computing - Theories and Applications, 2015

2014
Information Diffusion and Influence Measurement Based on Interaction in Microblogging.
Proceedings of the Social Media Processing - Third National Conference, 2014

Detecting Anomalies in Microblogging via Nonnegative Matrix Tri-Factorization.
Proceedings of the Social Media Processing - Third National Conference, 2014

Agglomerative Hierarchical Co-clustering Based on Bregman Divergence.
Proceedings of the Recent Advances on Soft Computing and Data Mining, 2014

Detecting Bots in Follower Markets.
Proceedings of the Bio-Inspired Computing - Theories and Applications, 2014

2009
A Dual-Center Event Description Model Used in Event Tracking.
Proceedings of the CSIE 2009, 2009 WRI World Congress on Computer Science and Information Engineering, March 31, 2009

2008
Study of Index Weight in Network Threat Evaluation Based on Improved Grey Theory.
Proceedings of the PACIIA 2008, 2008

A Method for Global Attack Graph Generation.
Proceedings of the IEEE International Conference on Networking, Sensing and Control, 2008

2007
A Method to Enhance Service Survivability Based on Autonomous Configuration.
Proceedings of the Proceeding of the Second International Multi-Symposium of Computer and Computational Sciences (IMSCCS 2007), 2007

An Efficient Survivability Hierarchy Analysis Model for Networked Information System.
Proceedings of the Computational Intelligence and Security, International Conference, 2007

A Quantitative Evaluation Model for Network Security.
Proceedings of the Computational Intelligence and Security, International Conference, 2007

2006
An Efficient SVM-Based Method to Detect Malicious Attacks for Web Servers.
Proceedings of the Advanced Web and Network Technologies, and Applications, 2006

2005
An Improved Network Intrusion Detection Method based on VQ-SVM.
Proceedings of the International Conference on Parallel and Distributed Computing Systems, 2005

Using Boosting Learning Method for Intrusion Detection.
Proceedings of the Advanced Data Mining and Applications, First International Conference, 2005


  Loading...