Yanjun Wu
According to our database1,
Yanjun Wu
authored at least 66 papers
between 2005 and 2021.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis OtherLinks
On csauthors.net:
Bibliography
2021
IEEE Trans. Inf. Forensics Secur., 2021
J. Intell. Fuzzy Syst., 2021
Proceedings of the PPoPP '21: 26th ACM SIGPLAN Symposium on Principles and Practice of Parallel Programming, 2021
2020
J. Supercomput., 2020
Pattern Recognit., 2020
Proceedings of the MM '20: The 28th ACM International Conference on Multimedia, 2020
Proceedings of the Computer Vision - ECCV 2020, 2020
Proceedings of the Computer Vision - ECCV 2020, 2020
Proceedings of the 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2020
2019
Sensors, 2019
Inf., 2019
Neurocomputing, 2019
Frontiers Comput. Sci., 2019
Proceedings of the 14th International Joint Conference on Computer Vision, 2019
Proceedings of the 27th ACM International Conference on Multimedia, 2019
Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence, 2019
RVTensor: A Light-Weight Neural Network Inference Framework Based on the RISC-V Architecture.
Proceedings of the Benchmarking, Measuring, and Optimizing, 2019
Proceedings of the Thirty-Third AAAI Conference on Artificial Intelligence, 2019
2018
J. Parallel Distributed Comput., 2018
Neurocomputing, 2018
Proceedings of the Services - SERVICES 2018, 2018
Proceedings of the Twenty-Seventh International Joint Conference on Artificial Intelligence, 2018
MAD-API: Detection, Correction and Explanation of API Misuses in Distributed Android Applications.
Proceedings of the Artificial Intelligence and Mobile Services - AIMS 2018, 2018
2017
A manifold ranking based method using hybrid features for crime scene shoeprint retrieval.
Multim. Tools Appl., 2017
MemSC: A Scan-Resistant and Compact Cache Replacement Framework for Memory-Based Key-Value Cache Systems.
J. Comput. Sci. Technol., 2017
Towards a scalable and energy-efficient resource manager for coupling cluster computing with distributed embedded computing.
Clust. Comput., 2017
Proceedings of the Advances in Multimedia Information Processing - PCM 2017, 2017
Proceedings of the Knowledge Science, Engineering and Management, 2017
Exception beyond Exception: Crashing Android System by Trapping in "Uncaught Exception".
Proceedings of the 39th IEEE/ACM International Conference on Software Engineering: Software Engineering in Practice Track, 2017
Proceedings of the Neural Information Processing - 24th International Conference, 2017
Proceedings of the 17th IEEE/ACM International Symposium on Cluster, 2017
EpCom: A parallel community detection approach for epidemic diffusion over social networks.
Proceedings of the 2017 IEEE International Conference on Bioinformatics and Biomedicine, 2017
2016
Clust. Comput., 2016
Macaca: A Scalable and Energy-Efficient Platform for Coupling Cloud Computing with Distributed Embedded Computing.
Proceedings of the 2016 IEEE International Parallel and Distributed Processing Symposium Workshops, 2016
Proceedings of the 18th IEEE International Conference on High Performance Computing and Communications; 14th IEEE International Conference on Smart City; 2nd IEEE International Conference on Data Science and Systems, 2016
Proceedings of the 2016 IEEE International Conference on Cluster Computing, 2016
2015
Proceedings of the Handbook on Data Centers, 2015
Proceedings of the 5th International Workshop on Cloud Data and Platforms, 2015
Proceedings of the 5th International Workshop on Cloud Data and Platforms, 2015
POSTER: biTheft: Stealing Your Secrets by Bidirectional Covert Channel Communication with Zero-Permission Android Application.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
POSTER: PatchGen: Towards Automated Patch Detection and Generation for 1-Day Vulnerabilities.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
2014
Secur. Commun. Networks, 2014
LSG: A Unified Multi-dimensional Latent Semantic Graph for Personal Information Retrieval.
Proceedings of the Web-Age Information Management - 15th International Conference, 2014
2013
Policykeeper: Recommending Proper Security Mechanisms Based on the Severity of Vulnerability Considering User Experience.
Proceedings of the Seventh International Conference on Software Security and Reliability, 2013
Proceedings of the Seventh International Conference on Software Security and Reliability, 2013
Proceedings of the Seventh International Conference on Software Security and Reliability, 2013
Proceedings of the Seventh International Conference on Software Security and Reliability, 2013
CIVSched: Communication-aware Inter-VM Scheduling in Virtual Machine Monitor Based on the Process.
Proceedings of the 13th IEEE/ACM International Symposium on Cluster, 2013
Proceedings of the 2013 IEEE Sixth International Conference on Cloud Computing, Santa Clara, CA, USA, June 28, 2013
2012
Virtual Machine Replay Update: Improved Implementation for Modern Hardware Architecture.
Proceedings of the Sixth International Conference on Software Security and Reliability, 2012
Proceedings of the Sixth International Conference on Software Security and Reliability, 2012
Proceedings of the Information Security and Privacy Research, 2012
Proceedings of the 23rd IEEE International Symposium on Software Reliability Engineering Workshops, 2012
Proceedings of the 26th International Conference on Advanced Information Networking and Applications Workshops, 2012
Proceedings of the Seventh International Conference on Availability, 2012
2009
Proceedings of the Advances in Information Security and Assurance, 2009
2007
A Multimodal Image Registration and Fusion Methodology Applied to Drug Discovery Research.
Proceedings of the IEEE 9th Workshop on Multimedia Signal Processing, 2007
2006
Proceedings of the 25th IEEE International Performance Computing and Communications Conference, 2006
2005
Proceedings of the Information Security Practice and Experience, 2005
Enforcing the Principle of Least Privilege with a State-Based Privilege Control Model.
Proceedings of the Information Security Practice and Experience, 2005