Yulin Wu

Orcid: 0000-0001-7952-7136

Affiliations:
  • Harbin Institute of Technology, Department of Computer Science and Technology, Shenzhen, China


According to our database1, Yulin Wu authored at least 40 papers between 2017 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Improved belief propagation decoding algorithm based on decoupling representation of Pauli operators for quantum stabilizer codes.
Quantum Inf. Process., March, 2025

MKDTI: Predicting Drug-Target Interactions via Multiple Kernel Fusion on Graph Attention Network.
Proceedings of the Advanced Intelligent Computing Technology and Applications, 2025

2024
Capacity Abuse Attack of Deep Learning Models Without Need of Label Encodings.
IEEE Trans. Artif. Intell., February, 2024

MKDTI: Predicting drug-target interactions via multiple kernel fusion on graph attention network.
CoRR, 2024

KnobTree: Intelligent Database Parameter Configuration via Explainable Reinforcement Learning.
CoRR, 2024

Improving Real-Time Service Quality Through Parallel Monte Carlo Tree Search.
Proceedings of the 32nd IEEE/ACM International Symposium on Quality of Service, 2024

2023
Breaking the traditional: a survey of algorithmic mechanism design applied to economic and complex environments.
Neural Comput. Appl., August, 2023

A Generic Cryptographic Deep-Learning Inference Platform for Remote Sensing Scenes.
IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens., 2023

FssNN: Communication-Efficient Secure Neural Network Training via Function Secret Sharing.
IACR Cryptol. ePrint Arch., 2023

A Generic Multi-Player Transformation Algorithm for Solving Large-Scale Zero-Sum Extensive-Form Adversarial Team Games.
CoRR, 2023

Privacy-Preserving Distributed Machine Learning Made Faster.
Proceedings of the 2023 Secure and Trustworthy Deep Learning Systems Workshop, 2023

NIEE: Modeling Edge Embeddings for Drug-Disease Association Prediction via Neighborhood Interactions.
Proceedings of the Advanced Intelligent Computing Technology and Applications, 2023

2022
Deepgmd: A Graph-Neural-Network-Based Method to Detect Gene Regulator Module.
IEEE ACM Trans. Comput. Biol. Bioinform., 2022

SecMDGM: Federated Learning Security Mechanism Based on Multi-Dimensional Auctions.
Sensors, 2022

RLCFR: Minimize counterfactual regret by deep reinforcement learning.
Expert Syst. Appl., 2022

Generic server-aided secure multi-party computation in cloud computing.
Comput. Stand. Interfaces, 2022

Efficient maliciously secure two-party mixed-protocol framework for data-driven computation tasks.
Comput. Stand. Interfaces, 2022

Mixed-protocol multi-party computation framework towards complex computation tasks with malicious security.
Comput. Stand. Interfaces, 2022

Prediction of the disease causal genes based on heterogeneous network and multi-feature combination method.
Comput. Biol. Chem., 2022

Achieving Efficient and Privacy-Preserving Arbitrary Geographic Range Query for Cloud.
Proceedings of the 4th International Conference on Data Intelligence and Security, 2022

Intrusion Detection Method Based on Improved Sparrow Algorithm and Optimized SVM.
Proceedings of the 4th International Conference on Data Intelligence and Security, 2022

Efficient Mixed-Protocol Secure Four-Party Computation with Private Robustness.
Proceedings of the 4th International Conference on Data Intelligence and Security, 2022

Local Energy Trading Platform Based on Privacy-Preserving Blockchain with Linkable Ring Signature.
Proceedings of the 4th International Conference on Data Intelligence and Security, 2022

PyHENet: A Generic Framework for Privacy-Preserving DL Inference Based on Fully Homomorphic Encryption.
Proceedings of the 4th International Conference on Data Intelligence and Security, 2022

2021
Efficient Server-Aided Secure Two-Party Computation in Heterogeneous Mobile Cloud Computing.
IEEE Trans. Dependable Secur. Comput., 2021

Scalable sub-game solving for imperfect-information games.
Knowl. Based Syst., 2021

Privacy-preserving voluntary-tallying leader election for internet of things.
Inf. Sci., 2021

ScSSC: Semi-supervised Single Cell Clustering Based on 2D Embedding.
Proceedings of the Intelligent Computing Theories and Application, 2021

Student Can Also be a Good Teacher: Extracting Knowledge from Vision-and-Language Model for Cross-Modal Retrieval.
Proceedings of the CIKM '21: The 30th ACM International Conference on Information and Knowledge Management, Virtual Event, Queensland, Australia, November 1, 2021

2020
Efficient two-party privacy-preserving collaborative <i>k</i>-means clustering protocol supporting both storage and computation outsourcing.
Inf. Sci., 2020

RLCFR: Minimize Counterfactual Regret by Deep Reinforcement Learning.
CoRR, 2020

2019
A Lattice-Based Anonymous Distributed E-Cash from Bitcoin.
Proceedings of the Provable Security, 2019

2018
Fast Time Series Discords Detection with Privacy Preserving.
Proceedings of the 17th IEEE International Conference On Trust, 2018

A Temporal and Spatial Constrained Attribute-Based Access Control Scheme for Cloud Storage.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Multi-Authority Ciphertext Policy Attribute-Based Encryption Scheme on Ideal Lattices.
Proceedings of the IEEE International Conference on Parallel & Distributed Processing with Applications, 2018

PPLDEM: A Fast Anomaly Detection Algorithm with Privacy Preserving.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018

Towards Secure Cloud Data Similarity Retrieval: Privacy Preserving Near-Duplicate Image Data Detection.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018

Outsourced Privacy Preserving SVM with Multiple Keys.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018

Efficient Two-Party Privacy Preserving Collaborative k-means Clustering Protocol Supporting both Storage and Computation Outsourcing.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018

2017
Dynamic Data Operations with Deduplication in Privacy-Preserving Public Auditing for Secure Cloud Storage.
Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering, 2017


  Loading...