Yue Wu

Orcid: 0000-0002-6107-7859

Affiliations:
  • Shanghai Jiaotong University, National Engineering Laboratory of Information Content Analysis, Shanghai, China


According to our database1, Yue Wu authored at least 45 papers between 2008 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
DoF Analysis for (M, N)-Channels through a Number-Filling Puzzle.
CoRR, 2024

2023
SlicedLocator: Code vulnerability locator based on sliced dependence graph.
Comput. Secur., November, 2023

Link Prediction-Based Multi-Identity Recognition of Darknet Vendors.
Proceedings of the Information and Communications Security - 25th International Conference, 2023

A New Interference-Alignment Scheme for Wireless MapReduce.
Proceedings of the IEEE Global Communications Conference, 2023

2022
Smart Grid: Cyber Attacks, Critical Defense Approaches, and Digital Twin.
CoRR, 2022

FS-IDS: A framework for intrusion detection based on few-shot learning.
Comput. Secur., 2022

Towards High Transferability on Neural Network for Black-Box Adversarial Attacks.
Proceedings of the Security and Privacy in Communication Networks, 2022

DoF of a Cooperative X-Channel with an Application to Distributed Computing.
Proceedings of the IEEE International Symposium on Information Theory, 2022

Breaking Tor's Anonymity by Modifying Cell's Command.
Proceedings of the IEEE Symposium on Computers and Communications, 2022

Tracing Tor Hidden Service Through Protocol Characteristics.
Proceedings of the 31st International Conference on Computer Communications and Networks, 2022

QUIC-CNN: Website Fingerprinting for QUIC Traffic in Tor Network.
Proceedings of the 24th IEEE Int Conf on High Performance Computing & Communications; 8th Int Conf on Data Science & Systems; 20th Int Conf on Smart City; 8th Int Conf on Dependability in Sensor, 2022

Work-in-Progress: Reliability Evaluation of Power SCADA System with Three-Layer IDS.
Proceedings of the International Conference on Compilers, 2022

Automated Generation of Bug Samples Based on Source Code Analysis.
Proceedings of the 29th Asia-Pacific Software Engineering Conference, 2022

2020
Control Channel Anti-Jamming in Vehicular Networks via Cooperative Relay Beamforming.
IEEE Internet Things J., 2020

2019
Generating Adversarial Samples With Constrained Wasserstein Distance.
IEEE Access, 2019

A Novel Image-Based Malware Classification Model Using Deep Learning.
Proceedings of the Neural Information Processing - 26th International Conference, 2019

Deep Reinforcement Learning Based Multi-User Anti-Jamming Strategy.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

Evolutionary Anti-Jamming Game in Non-Orthogonal Multiple Access System.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

2018
Cooperative Antijamming Relaying for Control Channel Jamming in Vehicular Networks.
IEEE Trans. Veh. Technol., 2018

Detecting Domain-Flux Malware Using DNS Failure Traffic.
Int. J. Softw. Eng. Knowl. Eng., 2018

Cooperative relay beamforming for control channel jamming in vehicular networks.
Proceedings of the 16th International Symposium on Modeling and Optimization in Mobile, 2018

Caching Strategy for Scalable Video Coding in Information-Centric Networking.
Proceedings of the Third International Conference on Security of Smart Cities, 2018

Multi-SDN Based Cooperation Scheme for DDoS Attack Defense.
Proceedings of the Third International Conference on Security of Smart Cities, 2018

2017
Cooperative Anti-Jamming Relaying for Control Channel Jamming in Vehicular Networks.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

2016
Puppet attack: A denial of service attack in advanced metering infrastructure network.
J. Netw. Comput. Appl., 2016

Channel aware resource allocation for device-to-device communication underlaying cellular networks.
Proceedings of the International Conference on Security of Smart Cities, 2016

2015
Security and trust management in opportunistic networks: a survey.
Secur. Commun. Networks, 2015

A Dempster-Shafer theory based traffic information trust model in vehicular ad hoc networks.
Proceedings of the International Conference on Cyber Security of Smart Cities, 2015

2014
A New Intrusion Detection System Based on KNN Classification Algorithm in Wireless Sensor Network.
J. Electr. Comput. Eng., 2014

A 3-hop message relay algorithm for connected dominating sets in wireless ad-hoc sensor networks.
Proceedings of the 2014 IEEE/CIC International Conference on Communications in China, 2014

A denial of service attack in advanced metering infrastructure network.
Proceedings of the IEEE International Conference on Communications, 2014

An Asynchronous Distributed Algorithm for Constructing a Connected Dominating Set Optimized by Minimum-Weight Spanning Tree.
Proceedings of the 17th IEEE International Conference on Computational Science and Engineering, 2014

Constructing Minimum Connected Dominating Sets with Constant Update Time in Wireless Ad-Hoc Sensor Networks.
Proceedings of the 17th IEEE International Conference on Computational Science and Engineering, 2014

Distributed Construction of Connected Dominating Sets Optimized by Minimum-Weight Spanning Tree in Wireless Ad-Hoc Sensor Networks.
Proceedings of the 17th IEEE International Conference on Computational Science and Engineering, 2014

2013
An Intrusion Prevention Mechanism in Mobile Ad Hoc Networks.
Ad Hoc Sens. Wirel. Networks, 2013

CogTag: Cognitive tags framework for new generation Internet beyond IP & MPLS.
Proceedings of the Fourth International Conference on the Network of the Future, 2013

2012
Cost based routing in delay tolerant networks.
Proceedings of the 23rd IEEE International Symposium on Personal, 2012

Green firewall: An energy-efficient intrusion prevention mechanism in wireless sensor network.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

2009
Efficient implementation of FIR type time domain equalizers for MIMO wireless channels via M-LESQ.
Proceedings of the IEEE 20th International Symposium on Personal, 2009

Security in Wireless Mesh Networks: Challenges and Solutions.
Proceedings of the Sixth International Conference on Information Technology: New Generations, 2009

Outage Behavior of Multi-Antenna Multi-Relay Non-Regenerative Cooperative Networks.
Proceedings of the Sixth International Conference on Information Technology: New Generations, 2009

Alert correlation by a retrospective method.
Proceedings of the 2009 International Conference on Information Networking, 2009

2008
A Group Key Management Scheme with Revocation and Loss-tolerance Capability for Wireless Sensor Networks.
Proceedings of the Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom 2008), 2008

The Effect of Opportunistic Scheduling on TCP Performance over Shared Wireless Downlink.
Proceedings of the Global Communications Conference, 2008. GLOBECOM 2008, New Orleans, LA, USA, 30 November, 2008

Group-Based Trust Model in P2P System Based on Trusted Computing.
Proceedings of the International Conference on Computer Science and Software Engineering, 2008


  Loading...