Yanjun Wu

According to our database1, Yanjun Wu authored at least 57 papers between 2005 and 2019.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Other 

Links

On csauthors.net:

Bibliography

2019
Multi-Layer Feature Based Shoeprint Verification Algorithm for Camera Sensor Images.
Sensors, 2019

Crime Scene Shoeprint Retrieval Using Hybrid Features and Neighboring Images.
Information, 2019

Gradient-aware blind face inpainting for deep face verification.
Neurocomputing, 2019

Prefetch-aware fingerprint cache management for data deduplication systems.
Frontiers Comput. Sci., 2019

Attention Convolutional Binary Neural Tree for Fine-Grained Visual Categorization.
CoRR, 2019

Guided Attention Network for Object Detection and Counting on Drones.
CoRR, 2019

Scale Invariant Fully Convolutional Network: Detecting Hands Efficiently.
CoRR, 2019

Data Priming Network for Automatic Check-Out.
CoRR, 2019

LOSGSR: Learned Opinion Score Guided Shoeprint Retrieval.
IEEE Access, 2019

ID-Softmax: A Softmax-like Loss for ID Face Recognition.
Proceedings of the 14th International Joint Conference on Computer Vision, 2019

Data Priming Network for Automatic Check-Out.
Proceedings of the 27th ACM International Conference on Multimedia, 2019

VulSniper: Focus Your Attention to Shoot Fine-Grained Vulnerabilities.
Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence, 2019

Scale Invariant Fully Convolutional Network: Detecting Hands Efficiently.
Proceedings of the Thirty-Third AAAI Conference on Artificial Intelligence, 2019

2018
MixHeter: A global scheduler for mixed workloads in heterogeneous environments.
J. Parallel Distrib. Comput., 2018

Deep reinforcement learning for extractive document summarization.
Neurocomputing, 2018

A Recommendation Model Based on Deep Neural Network.
IEEE Access, 2018

Pre-Patch: Find Hidden Threats in Open Software Based on Machine Learning Method.
Proceedings of the Services - SERVICES 2018, 2018

Teaching Machines to Ask Questions.
Proceedings of the Twenty-Seventh International Joint Conference on Artificial Intelligence, 2018

MAD-API: Detection, Correction and Explanation of API Misuses in Distributed Android Applications.
Proceedings of the Artificial Intelligence and Mobile Services - AIMS 2018, 2018

2017
A manifold ranking based method using hybrid features for crime scene shoeprint retrieval.
Multimedia Tools Appl., 2017

MemSC: A Scan-Resistant and Compact Cache Replacement Framework for Memory-Based Key-Value Cache Systems.
J. Comput. Sci. Technol., 2017

Towards a scalable and energy-efficient resource manager for coupling cluster computing with distributed embedded computing.
Cluster Computing, 2017

An Obstacle Detection Method Based on Binocular Stereovision.
Proceedings of the Advances in Multimedia Information Processing - PCM 2017, 2017

Learning Path Generation Method Based on Migration Between Concepts.
Proceedings of the Knowledge Science, Engineering and Management, 2017

Exception beyond Exception: Crashing Android System by Trapping in "Uncaught Exception".
Proceedings of the 39th IEEE/ACM International Conference on Software Engineering: Software Engineering in Practice Track, 2017

Accelerating Core Decomposition in Large Temporal Networks Using GPUs.
Proceedings of the Neural Information Processing - 24th International Conference, 2017

PCSsampler: Sample-based, Private-state Cluster Scheduling.
Proceedings of the 17th IEEE/ACM International Symposium on Cluster, 2017

EpCom: A parallel community detection approach for epidemic diffusion over social networks.
Proceedings of the 2017 IEEE International Conference on Bioinformatics and Biomedicine, 2017

2016
MrHeter: improving MapReduce performance in heterogeneous environments.
Cluster Computing, 2016

Macaca: A Scalable and Energy-Efficient Platform for Coupling Cloud Computing with Distributed Embedded Computing.
Proceedings of the 2016 IEEE International Parallel and Distributed Processing Symposium Workshops, 2016

Searching Time Period-Based Longest Frequent Path in Big Trajectory Data.
Proceedings of the 18th IEEE International Conference on High Performance Computing and Communications; 14th IEEE International Conference on Smart City; 2nd IEEE International Conference on Data Science and Systems, 2016

Tiresias: Low-Overhead Sample Based Scheduling with Task Hopping.
Proceedings of the 2016 IEEE International Conference on Cluster Computing, 2016

2015
C2Hunter: Detection and Mitigation of Covert Channels in Data Centers.
Proceedings of the Handbook on Data Centers, 2015

Characterizing the spatio-temporal burstiness of storage workloads.
Proceedings of the 5th International Workshop on Cloud Data and Platforms, 2015

Sparkle: adaptive sample based scheduling for cluster computing.
Proceedings of the 5th International Workshop on Cloud Data and Platforms, 2015

POSTER: biTheft: Stealing Your Secrets by Bidirectional Covert Channel Communication with Zero-Permission Android Application.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

POSTER: PatchGen: Towards Automated Patch Detection and Generation for 1-Day Vulnerabilities.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2014
C2Detector: a covert channel detection framework in cloud computing.
Security and Communication Networks, 2014

LSG: A Unified Multi-dimensional Latent Semantic Graph for Personal Information Retrieval.
Proceedings of the Web-Age Information Management - 15th International Conference, 2014

2013
Systemic threats to hypervisor non-control data.
IET Information Security, 2013

Policykeeper: Recommending Proper Security Mechanisms Based on the Severity of Vulnerability Considering User Experience.
Proceedings of the Seventh International Conference on Software Security and Reliability, 2013

Vulcloud: Scalable and Hybrid Vulnerability Detection in Cloud Computing.
Proceedings of the Seventh International Conference on Software Security and Reliability, 2013

hGuard: A Framework to Measure Hypervisor Critical Files.
Proceedings of the Seventh International Conference on Software Security and Reliability, 2013

HyperVerify: A VM-assisted Architecture for Monitoring Hypervisor Non-control Data.
Proceedings of the Seventh International Conference on Software Security and Reliability, 2013

CIVSched: Communication-aware Inter-VM Scheduling in Virtual Machine Monitor Based on the Process.
Proceedings of the 13th IEEE/ACM International Symposium on Cluster, 2013

Vulnerability Detection of Android System in Fuzzing Cloud.
Proceedings of the 2013 IEEE Sixth International Conference on Cloud Computing, Santa Clara, CA, USA, June 28, 2013

2012
Virtual Machine Replay Update: Improved Implementation for Modern Hardware Architecture.
Proceedings of the Sixth International Conference on Software Security and Reliability, 2012

A Novel Security Scheme for Online Banking Based on Virtual Machine.
Proceedings of the Sixth International Conference on Software Security and Reliability, 2012

Improving Flask Implementation Using Hardware Assisted In-VM Isolation.
Proceedings of the Information Security and Privacy Research, 2012

Baggy Bounds with Accurate Checking.
Proceedings of the 23rd IEEE International Symposium on Software Reliability Engineering Workshops, 2012

Deterministic Replay of Multithread Applications Using Virtual Machine.
Proceedings of the 26th International Conference on Advanced Information Networking and Applications Workshops, 2012

Return-Oriented Programming Attack on the Xen Hypervisor.
Proceedings of the Seventh International Conference on Availability, 2012

2009
Efficient and Automatic Instrumentation for Packed Binaries.
Proceedings of the Advances in Information Security and Assurance, 2009

2007
A Multimodal Image Registration and Fusion Methodology Applied to Drug Discovery Research.
Proceedings of the IEEE 9th Workshop on Multimedia Signal Processing, 2007

2006
Portal monitoring based anti-malware framework: design and implementation.
Proceedings of the 25th IEEE International Performance Computing and Communications Conference, 2006

2005
Security On-demand Architecture with Multiple Modules Support.
Proceedings of the Information Security Practice and Experience, 2005

Enforcing the Principle of Least Privilege with a State-Based Privilege Control Model.
Proceedings of the Information Security Practice and Experience, 2005


  Loading...