Yulin Wu
Orcid: 0000-0001-7952-7136Affiliations:
- Harbin Institute of Technology, Department of Computer Science and Technology, Shenzhen, China
According to our database1,
Yulin Wu
authored at least 40 papers
between 2017 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2025
Improved belief propagation decoding algorithm based on decoupling representation of Pauli operators for quantum stabilizer codes.
Quantum Inf. Process., March, 2025
MKDTI: Predicting Drug-Target Interactions via Multiple Kernel Fusion on Graph Attention Network.
Proceedings of the Advanced Intelligent Computing Technology and Applications, 2025
2024
IEEE Trans. Artif. Intell., February, 2024
MKDTI: Predicting drug-target interactions via multiple kernel fusion on graph attention network.
CoRR, 2024
KnobTree: Intelligent Database Parameter Configuration via Explainable Reinforcement Learning.
CoRR, 2024
Proceedings of the 32nd IEEE/ACM International Symposium on Quality of Service, 2024
2023
Breaking the traditional: a survey of algorithmic mechanism design applied to economic and complex environments.
Neural Comput. Appl., August, 2023
IEEE J. Sel. Top. Appl. Earth Obs. Remote. Sens., 2023
FssNN: Communication-Efficient Secure Neural Network Training via Function Secret Sharing.
IACR Cryptol. ePrint Arch., 2023
A Generic Multi-Player Transformation Algorithm for Solving Large-Scale Zero-Sum Extensive-Form Adversarial Team Games.
CoRR, 2023
Proceedings of the 2023 Secure and Trustworthy Deep Learning Systems Workshop, 2023
NIEE: Modeling Edge Embeddings for Drug-Disease Association Prediction via Neighborhood Interactions.
Proceedings of the Advanced Intelligent Computing Technology and Applications, 2023
2022
IEEE ACM Trans. Comput. Biol. Bioinform., 2022
Sensors, 2022
Expert Syst. Appl., 2022
Comput. Stand. Interfaces, 2022
Efficient maliciously secure two-party mixed-protocol framework for data-driven computation tasks.
Comput. Stand. Interfaces, 2022
Mixed-protocol multi-party computation framework towards complex computation tasks with malicious security.
Comput. Stand. Interfaces, 2022
Prediction of the disease causal genes based on heterogeneous network and multi-feature combination method.
Comput. Biol. Chem., 2022
Achieving Efficient and Privacy-Preserving Arbitrary Geographic Range Query for Cloud.
Proceedings of the 4th International Conference on Data Intelligence and Security, 2022
Proceedings of the 4th International Conference on Data Intelligence and Security, 2022
Proceedings of the 4th International Conference on Data Intelligence and Security, 2022
Local Energy Trading Platform Based on Privacy-Preserving Blockchain with Linkable Ring Signature.
Proceedings of the 4th International Conference on Data Intelligence and Security, 2022
PyHENet: A Generic Framework for Privacy-Preserving DL Inference Based on Fully Homomorphic Encryption.
Proceedings of the 4th International Conference on Data Intelligence and Security, 2022
2021
Efficient Server-Aided Secure Two-Party Computation in Heterogeneous Mobile Cloud Computing.
IEEE Trans. Dependable Secur. Comput., 2021
Inf. Sci., 2021
Proceedings of the Intelligent Computing Theories and Application, 2021
Student Can Also be a Good Teacher: Extracting Knowledge from Vision-and-Language Model for Cross-Modal Retrieval.
Proceedings of the CIKM '21: The 30th ACM International Conference on Information and Knowledge Management, Virtual Event, Queensland, Australia, November 1, 2021
2020
Efficient two-party privacy-preserving collaborative <i>k</i>-means clustering protocol supporting both storage and computation outsourcing.
Inf. Sci., 2020
2019
Proceedings of the Provable Security, 2019
2018
Proceedings of the 17th IEEE International Conference On Trust, 2018
A Temporal and Spatial Constrained Attribute-Based Access Control Scheme for Cloud Storage.
Proceedings of the 17th IEEE International Conference On Trust, 2018
Multi-Authority Ciphertext Policy Attribute-Based Encryption Scheme on Ideal Lattices.
Proceedings of the IEEE International Conference on Parallel & Distributed Processing with Applications, 2018
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018
Towards Secure Cloud Data Similarity Retrieval: Privacy Preserving Near-Duplicate Image Data Detection.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018
Efficient Two-Party Privacy Preserving Collaborative k-means Clustering Protocol Supporting both Storage and Computation Outsourcing.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2018
2017
Dynamic Data Operations with Deduplication in Privacy-Preserving Public Auditing for Secure Cloud Storage.
Proceedings of the 2017 IEEE International Conference on Computational Science and Engineering, 2017