Yongdong Wu

Orcid: 0000-0002-0850-724X

According to our database1, Yongdong Wu authored at least 147 papers between 2001 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Fast Payments Across Heterogeneous Blockchains for Internet of Things.
IEEE Access, 2024

2023
FePN: A robust feature purification network to defend against adversarial examples.
Comput. Secur., November, 2023

Anomaly Detection in Social-Aware IoT Networks.
IEEE Trans. Netw. Serv. Manag., September, 2023

Privacy-preserving federated mining of frequent itemsets.
Inf. Sci., May, 2023

Lightweight Trustworthy Message Exchange in Unmanned Aerial Vehicle Networks.
IEEE Trans. Intell. Transp. Syst., February, 2023

Anomaly detection method for vehicular network based on collaborative deep support vector data description.
Phys. Commun., February, 2023

Improving Bitcoin Transaction Propagation Efficiency through Local Clique Network.
Comput. J., February, 2023

DHAN: Encrypted JPEG image retrieval via DCT histograms-based attention networks.
Appl. Soft Comput., January, 2023

Attacks on Acceleration-Based Secure Device Pairing With Automatic Visual Tracking.
IEEE Trans. Inf. Forensics Secur., 2023

Attacks and Countermeasures on Privacy-Preserving Biometric Authentication Schemes.
IEEE Trans. Dependable Secur. Comput., 2023

A Lightweight Privacy Preservation Scheme With Efficient Reputation Management for Mobile Crowdsensing in Vehicular Networks.
IEEE Trans. Dependable Secur. Comput., 2023

A Privacy-Preserving and Reputation-Based Truth Discovery Framework in Mobile Crowdsensing.
IEEE Trans. Dependable Secur. Comput., 2023

PRI: PCH-based privacy-preserving with reusability and interoperability for enhancing blockchain scalability.
J. Parallel Distributed Comput., 2023

A Game Theory-Based Incentive Mechanism for Collaborative Security of Federated Learning in Energy Blockchain Environment.
IEEE Internet Things J., 2023

Accountable attribute-based authentication with fine-grained access control and its application to crowdsourcing.
Frontiers Comput. Sci., 2023

Privacy-Preserving Federated Discovery of DNA Motifs with Differential Privacy.
CoRR, 2023

Federated Learning for Metaverse: A Survey.
Proceedings of the Companion Proceedings of the ACM Web Conference 2023, 2023

ODTT: Optimized Dynamic Taxonomy Tree with Differential Privacy.
Proceedings of the IEEE International Conference on Big Data, 2023

Study on the calibration method of ultrasonic endoscope.
Proceedings of the 3rd International Conference on Bioinformatics and Intelligent Computing, 2023

2022
Smart System: Joint Utility and Frequency for Pattern Classification.
ACM Trans. Manag. Inf. Syst., December, 2022

SOCI: A Toolkit for Secure Outsourced Computation on Integers.
IEEE Trans. Inf. Forensics Secur., 2022

Peripheral-Free Device Pairing by Randomly Switching Power.
IEEE Trans. Dependable Secur. Comput., 2022

Privacy-Preserving Medical Treatment System Through Nondeterministic Finite Automata.
IEEE Trans. Cloud Comput., 2022

High-Performance UAV Crowdsensing: A Deep Reinforcement Learning Approach.
IEEE Internet Things J., 2022

Contrast Pattern Mining: A Survey.
CoRR, 2022

Towards Target High-Utility Itemsets.
CoRR, 2022

Mining with Rarity for Web Intelligence.
Proceedings of the Companion of The Web Conference 2022, Virtual Event / Lyon, France, April 25, 2022

Sybil-resistant Truth Discovery in Crowdsourcing by Exploiting the Long-tail Effect.
Proceedings of the IEEE International Conference on Trust, 2022

Constraint-based Sequential Rule Mining.
Proceedings of the 9th IEEE International Conference on Data Science and Advanced Analytics, 2022

Frequent Itemset Mining with Local Differential Privacy.
Proceedings of the 31st ACM International Conference on Information & Knowledge Management, 2022

Federated Learning Attacks and Defenses: A Survey.
Proceedings of the IEEE International Conference on Big Data, 2022

2021
Evolutionary Deep Belief Network for Cyber-Attack Detection in Industrial Automation and Control System.
IEEE Trans. Ind. Informatics, 2021

Applied Research on InSAR and GPS Data Fusion in Deformation Monitoring.
Sci. Program., 2021

Publicly Traceable Attribute-Based Anonymous Authentication and Its Application to Voting.
Secur. Commun. Networks, 2021

Event-oriented linkable and traceable anonymous authentication and its application to voting.
J. Inf. Secur. Appl., 2021

BTMPP: Balancing Trust Management and Privacy Preservation for Emergency Message Dissemination in Vehicular Networks.
IEEE Internet Things J., 2021

LPPTE: A lightweight privacy-preserving trust evaluation scheme for facilitating distributed data fusion in cooperative vehicular safety applications.
Inf. Fusion, 2021

IvyCross: A Trustworthy and Privacy-preserving Framework for Blockchain Interoperability.
IACR Cryptol. ePrint Arch., 2021

Joint Utility and Frequency for Pattern Classification.
Proceedings of the 2021 IEEE International Conference on Big Data (Big Data), 2021

2020
Poster Abstract: Secure Remote Key Initialization of Wireless IoT.
Proceedings of the Fifth IEEE/ACM International Conference on Internet-of-Things Design and Implementation, 2020

2019
False Load Attack to Smart Meters by Synchronously Switching Power Circuits.
IEEE Trans. Smart Grid, 2019

Situation-Aware Authenticated Video Broadcasting Over Train-Trackside WiFi Networks.
IEEE Internet Things J., 2019

PowerNet: Neural Power Demand Forecasting in Smart Grid.
CoRR, 2019

Random Delay Attack and Its Applications on Load Frequency Control of Power Systems.
Proceedings of the 2019 IEEE Conference on Dependable and Secure Computing, 2019

2018
Position Manipulation Attacks to Balise-Based Train Automatic Stop Control.
IEEE Trans. Veh. Technol., 2018

Resonance Attacks on Load Frequency Control of Smart Grids.
IEEE Trans. Smart Grid, 2018

Attack and Countermeasure on Interlock-Based Device Pairing Schemes.
IEEE Trans. Inf. Forensics Secur., 2018

AutoPrivacy: Automatic privacy protection and tagging suggestion for mobile social photo.
Comput. Secur., 2018

Secure smart metering based on LoRa technology.
Proceedings of the IEEE 4th International Conference on Identity, 2018

2017
Vulnerabilities, Attacks, and Countermeasures in Balise-Based Train Control Systems.
IEEE Trans. Intell. Transp. Syst., 2017

HIBS-KSharing: Hierarchical Identity-Based Signature Key Sharing for Automotive.
IEEE Access, 2017

IoVShield: An Efficient Vehicular Intrusion Detection System for Self-driving (Short Paper).
Proceedings of the Information Security Practice and Experience, 2017

A High Bit-Rate Shared Key Generator with Time-Frequency Features of Wireless Channels.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

PowerLSTM: Power Demand Forecasting Using Long Short-Term Memory Neural Network.
Proceedings of the Advanced Data Mining and Applications - 13th International Conference, 2017

2016
Trustworthy Authentication on Scalable Surveillance Video with Background Model Support.
ACM Trans. Multim. Comput. Commun. Appl., 2016

Secure Subway Train-to-Train Communications via GSM-R Communication Systems.
Proceedings of the IEEE 83rd Vehicular Technology Conference, 2016

Obfuscating Software Puzzle for Denial-of-Service Attack Mitigation.
Proceedings of the 2016 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2016

Lightweight Key Management Protocols for Smart Grids.
Proceedings of the 2016 IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2016

2015
Incentive Mechanism Design for Heterogeneous Peer-to-Peer Networks: A StackelbergGame Approach.
IEEE Trans. Mob. Comput., 2015

Software Puzzle: A Countermeasure to Resource-Inflated Denial-of-Service Attacks.
IEEE Trans. Inf. Forensics Secur., 2015

Multidimensional Context Awareness in Mobile Devices.
Proceedings of the MultiMedia Modeling - 21st International Conference, 2015

2014
A Hybrid Scheme for Authenticating Scalable Video Codestreams.
IEEE Trans. Inf. Forensics Secur., 2014

Efficient block-based transparent encryption for H.264/SVC bitstreams.
Multim. Syst., 2014

Incentive Mechanism Design for Heterogeneous Peer-to-Peer Networks: A Stackelberg Game Approach.
CoRR, 2014

A trust-based pollution attack prevention scheme in peer-to-peer streaming networks.
Comput. Networks, 2014

2013
Attribute-Based Access to Scalable Media in Cloud-Assisted Content Sharing Networks.
IEEE Trans. Multim., 2013

Transparently secure smartphone-based social networking.
Proceedings of the 2013 IEEE Wireless Communications and Networking Conference (WCNC), 2013

Accountable Trapdoor Sanitizable Signatures.
Proceedings of the Information Security Practice and Experience, 2013

Technique for authenticating H.264/SVC streams in surveillance applications.
Proceedings of the 2013 IEEE International Conference on Multimedia and Expo Workshops, 2013

A game-theoretic approach for cooperation stimulation in peer-to-peer streaming networks.
Proceedings of IEEE International Conference on Communications, 2013

Dynamic resource allocation for credit-based peer-to-peer multimedia streaming networks.
Proceedings of the 2013 IEEE Global Communications Conference, 2013

2012
A scalable and format-compliant encryption scheme for H.264/SVC bitstreams.
Signal Process. Image Commun., 2012

Enhancing the Security of On-line Transactions with CAPTCHA Keyboard.
Proceedings of the Information Security and Privacy Research, 2012

Fighting Pollution Attack in Peer-to-Peer Streaming Networks: A Trust Management Approach.
Proceedings of the Information Security and Privacy Research, 2012

Remote tracking protocol with predictive localization algorithm.
Proceedings of the 18th IEEE International Conference on Networks, 2012

A Pollution Attack to Public-key Watermarking Schemes.
Proceedings of the 2012 IEEE International Conference on Multimedia and Expo, 2012

No Tradeoff between Confidentiality and Performance: An Analysis on H.264/SVC Partial Encryption.
Proceedings of the Communications and Multimedia Security, 2012

2011
UBAPV2G: A Unique Batch Authentication Protocol for Vehicle-to-Grid Communications.
IEEE Trans. Smart Grid, 2011

Zero-error watermarking on jpeg images by shuffling huffman tree nodes.
Proceedings of the 2011 IEEE Visual Communications and Image Processing, 2011

A Batch Authentication Protocol for V2G Communications.
Proceedings of the 4th IFIP International Conference on New Technologies, 2011

Multi-stage Binary Code Obfuscation Using Improved Virtual Machine.
Proceedings of the Information Security, 14th International Conference, 2011

Evaluating the importance of nodes in complex networks based on principal component analysis and grey relational analysis.
Proceedings of the 17th IEEE International Conference on Networks, 2011

Obscure Spread Spectrum watermarking.
Proceedings of the 2011 IEEE International Conference on Multimedia and Expo, 2011

HASVC: An Efficient Hybrid Authentication Scheme for Vehicular Communication.
Proceedings of IEEE International Conference on Communications, 2011

2010
TeleOph: a secure real-time teleophthalmology system.
IEEE Trans. Inf. Technol. Biomed., 2010

A Multi-Key Pirate Decoder Against Traitor Tracing Schemes.
J. Comput. Sci. Technol., 2010

Perceptually fractural pixel values in rendering high dynamic range images.
Proceedings of the Visual Communications and Image Processing 2010, 2010

A Reversible Data Hiding Scheme for JPEG Images.
Proceedings of the Advances in Multimedia Information Processing - PCM 2010, 2010

Secure wireless communication platform for EV-to-Grid research.
Proceedings of the 6th International Wireless Communications and Mobile Computing Conference, 2010

Transforming a pattern identifier into biometric key generators.
Proceedings of the 2010 IEEE International Conference on Multimedia and Expo, 2010

Blocking Foxy Phishing Emails with Historical Information.
Proceedings of IEEE International Conference on Communications, 2010

2009
Evaluating a Multimedia-Based Tele-Ophthalmology System.
Proceedings of the Advances in Multimedia Information Processing, 2009

Improving a Digital Rights Management Scheme for Video Broadcast.
Proceedings of the Advances in Multimedia Information Processing, 2009

An Automotive Security System for Anti-theft.
Proceedings of the Eighth International Conference on Networks, 2009

Tracing Stateful Pirate Decoders.
Proceedings of IEEE International Conference on Communications, 2009

A Lightweight Fast Handover Authentication Scheme in Mobile Networks.
Proceedings of IEEE International Conference on Communications, 2009

Secure wireless vehicle monitoring and control.
Proceedings of the 4th IEEE Asia-Pacific Services Computing Conference, 2009

2008
On the Security of Fully Collusion Resistant Traitor Tracing Schemes.
IACR Cryptol. ePrint Arch., 2008

A Lightweight Buyer-Seller Watermarking Protocol.
Adv. Multim., 2008

Minimizing SSO Effort in Verifying SSL Anti-phishing Indicators.
Proceedings of The IFIP TC-11 23rd International Information Security Conference, 2008

Optimizing the capacity of distortion-freewatermarking on palette images.
Proceedings of the 2008 IEEE International Conference on Multimedia and Expo, 2008

2007
Flexible Access Control to JPEG 2000 Image Code-Streams.
IEEE Trans. Multim., 2007

A Trust Answer to Distance Query.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2007

Adaptive Stream Authentication for Wireless Multimedia Communications.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2007

Collusion attack to a scalable AND-ACC fingerprinting scheme.
Proceedings of the Visual Communications and Image Processing 2007, 2007

Evaluating Ouda's Tamper-Localization Watermarking Scheme.
Proceedings of the 2007 IEEE International Conference on Multimedia and Expo, 2007

Security Flaws in Kuribayashi-Tanaka Fingerprinting Protocol.
Proceedings of IEEE International Conference on Communications, 2007

Resilient Aggregation Scheme for Confidential Sensor Reports.
Proceedings of IEEE International Conference on Communications, 2007

Constant Storage Self-Healing Key Distribution with Revocation in Wireless Sensor Network.
Proceedings of IEEE International Conference on Communications, 2007

Enhanced Security by OS-Oriented Encapsulation in TPM-Enabled DRM.
Proceedings of the Information Security and Cryptology, Third SKLOIS Conference, 2007

Forgery Attack to an Asymptotically Optimal Traitor Tracing Scheme.
Proceedings of the Information Security and Privacy, 12th Australasian Conference, 2007

2006
Scalable authentication of MPEG-4 streams.
IEEE Trans. Multim., 2006

Nonlinear collusion attack on a watermarking scheme for buyer authentication.
IEEE Trans. Multim., 2006

Video stream authentication in lossy networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2006

An Efficient Scheme for Encrypted Data Aggregation on Sensor Networks.
Proceedings of the 63rd IEEE Vehicular Technology Conference, 2006

Preventing Web-Spoofing with Automatic Detecting Security Indicator.
Proceedings of the Information Security Practice and Experience, 2006

Protection of Video Logos with Randomization.
Proceedings of the 2006 IEEE International Conference on Multimedia and Expo, 2006

Tamper-Localization Watermarking with Systematic Error Correcting Code.
Proceedings of the International Conference on Image Processing, 2006

An Attack on SMC-Based Software Protection.
Proceedings of the Information and Communications Security, 8th International Conference, 2006

Batch Decryption of Encrypted Short Messages and Its Application on Concurrent SSL Handshakes.
Proceedings of the Information Security and Cryptology, Second SKLOIS Conference, 2006

2005
On the security of an SVD-based ownership watermarking.
IEEE Trans. Multim., 2005

Security of an ill-posed operator for image authentication.
IEEE Trans. Circuits Syst. Video Technol., 2005

Scalable trusted online dissemination of JPEG2000 images.
Multim. Syst., 2005

Sequential aggregate signatures for wireless routing protocols.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2005

Protecting Group Dynamic Information in Large Scale Multicast Groups.
Proceedings of the Security and Privacy in the Age of Ubiquitous Computing, IFIP TC11 20th International Conference on Information Security (SEC 2005), May 30, 2005

Secure Person-To-Person Communications Based on Biometrics Signals.
Proceedings of the Security and Privacy in the Age of Ubiquitous Computing, IFIP TC11 20th International Conference on Information Security (SEC 2005), May 30, 2005

Aggregating signatures of MPEG-4 elementary streams.
Proceedings of the 2005 IEEE International Conference on Multimedia and Expo, 2005

Batching SSL/TLS Handshake Improved.
Proceedings of the Information and Communications Security, 7th International Conference, 2005

Multi-Source Stream Authentication Framework in Case of Composite MPEG-4 Stream.
Proceedings of the Information and Communications Security, 7th International Conference, 2005

Linear Combination Collusion Attack and its Application on an Anti-Collusion Fingerprinting.
Proceedings of the 2005 IEEE International Conference on Acoustics, 2005

Evaluation of MPEG-4 IPMP extension.
Proceedings of the 2005 IEEE International Conference on Acoustics, 2005

Efficient Authentication of Electronic Document Workflow.
Proceedings of the Information Security and Cryptology, First SKLOIS Conference, 2005

2004
Collusion attack on a multi-key secure video proxy scheme.
Proceedings of the 12th ACM International Conference on Multimedia, 2004

Progressive protection of jpeg2000 codestreams.
Proceedings of the 2004 International Conference on Image Processing, 2004

Compliant encryption of jpeg2000 codestreanis.
Proceedings of the 2004 International Conference on Image Processing, 2004

Dynamic Access Control for Multi-privileged Group Communications.
Proceedings of the Information and Communications Security, 6th International Conference, 2004

Flexible Verification of MPEG-4 Stream in Peer-to-Peer CDN.
Proceedings of the Information and Communications Security, 6th International Conference, 2004

2003
Content-aware authentication of motion JPEG2000 stream in lossy networks.
IEEE Trans. Consumer Electron., 2003

Fault-induced attack on semi-fragile image authentication schemes.
Proceedings of the Visual Communications and Image Processing 2003, 2003

A flexible and scalable authentication scheme for JPEG2000 image codestreams.
Proceedings of the Eleventh ACM International Conference on Multimedia, 2003

Zero-Distortion Authentication Watermarking.
Proceedings of the Information Security, 6th International Conference, 2003

The security flaws in some authentication watermarking schemes.
Proceedings of the 2003 IEEE International Conference on Multimedia and Expo, 2003

Adaptive Collusion Attack to a Block Oriented Watermarking Scheme.
Proceedings of the Information and Communications Security, 5th International Conference, 2003

Trust on Web Browser: Attack vs. Defense.
Proceedings of the Applied Cryptography and Network Security, 2003

2002
Counterfeiting Attack on a Lossless Authentication Watermarking Scheme.
Proceedings of the Visualisation 2002, 2002

Efficient Object-Based Stream Authentication.
Proceedings of the Progress in Cryptology, 2002

2001
An Attack on A Traitor Tracing Scheme.
IACR Cryptol. ePrint Arch., 2001


  Loading...