Yuwei Xu

Orcid: 0000-0002-1611-9167

Affiliations:
  • Southeast University, School of Cyber Science and Engineering, Nanjing, China
  • Purple Mountain Laboratories for Network and Communication Security, Nanjing, China
  • Nankai University, College of Cyberspace Security, Tianjin, China (PhD 2012)


According to our database1, Yuwei Xu authored at least 32 papers between 2018 and 2025.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
$\mathcal {R}$-Manager: Consortium Blockchain-Based Vehicle Reputation Management for High-Quality Reports in Traffic-Oriented Crowdsourcing.
IEEE Trans. Veh. Technol., January, 2025

2024
GateKeeper: An UltraLite malicious traffic identification method with dual-aspect optimization strategies on IoT gateways.
Comput. Networks, 2024

WCDGA: BERT-Based and Character-Transforming Adversarial DGA with High Anti-Detection Ability.
Proceedings of the 23rd IEEE International Conference on Trust, 2024

Perturbing Vulnerable Bytes in Packets to Generate Adversarial Samples Resisting DNN-Based Traffic Monitoring.
Proceedings of the 23rd IEEE International Conference on Trust, 2024

A High-Accuracy Unknown Traffic Identification Method Based on Multi-View Contrastive Learning.
Proceedings of the 23rd IEEE International Conference on Trust, 2024

TriViewNet: Achieve Accurate Tor Hidden Service Classification by Multi-View Feature Extraction and Fusion.
Proceedings of the 23rd IEEE International Conference on Trust, 2024

M-ETC: Improving Multi-Task Encrypted Traffic Classification by Reducing Inter-Task Interference.
Proceedings of the 23rd IEEE International Conference on Trust, 2024

Dual-view Traffic Identification for Open Source Proxy Software through Early Flows.
Proceedings of the IEEE International Symposium on Parallel and Distributed Processing with Applications, 2024

NuanceTracker: A Website Fingerprinting Attack against Tor Hidden Services through Burst patterns.
Proceedings of the IEEE Symposium on Computers and Communications, 2024

TorHunter: A Lightweight Method for Efficient Identification of Obfuscated Tor Traffic Through Unsupervised Pre-training.
Proceedings of the Information and Communications Security - 26th International Conference, 2024

DataJudge: Cross-Chain Data Consistency Verification Based on Extended Merkle Hash Tree.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2024

ChainSafari: A General and Efficient Blockchain Verifiable Query Scheme with Real-Time Synchronization.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2024

ZKCross: An Efficient and Reliable Cross-Chain Authentication Scheme Based on Lightweight Attribute-Based Zero-Knowledge Proof.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2024

BlockWhisper: A Blockchain-Based Hybrid Covert Communication Scheme with Strong Ability to Evade Detection.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2024

2023
ChainKeeper: A cross-chain scheme for governing the chain by chain.
IET Blockchain, December, 2023

Corrigendum to "FastTraffic: A lightweight method for encrypted traffic fast classification" [Computer Networks, Volume 235, November 2023, 109965].
Comput. Networks, December, 2023

FastTraffic: A lightweight method for encrypted traffic fast classification.
Comput. Networks, November, 2023

$\mathcal {R}$-Tracing: Consortium Blockchain-Based Vehicle Reputation Management for Resistance to Malicious Attacks and Selfish Behaviors.
IEEE Trans. Veh. Technol., June, 2023

SmartBuoy: A Machine Learning-Based Detection Method for Interest Flooding Attacks in VNDN.
Proceedings of the Ubiquitous Security, 2023

ChainPass: A Privacy-preserving Complete Cross-chain Authentication for Consortium Blockchains.
Proceedings of the 22nd IEEE International Conference on Trust, 2023

SharpEye: Identify mKCP Camouflage Traffic through Feature Optimization.
Proceedings of the 22nd IEEE International Conference on Trust, 2023

Cerberus: Efficient OSPS Traffic Identification through Multi-Task Learning.
Proceedings of the 22nd IEEE International Conference on Trust, 2023

DarkTrans: A Blockchain-based Covert Communication Scheme with High Channel Capacity and Strong Concealment.
Proceedings of the 29th IEEE International Conference on Parallel and Distributed Systems, 2023

S-chain: A Shard-based Blockchain Scheme for Cross-chain Supervision.
Proceedings of the 29th IEEE International Conference on Parallel and Distributed Systems, 2023

SCOPE: A Cross-Chain Supervision Scheme for Consortium Blockchains.
Proceedings of the Information and Communications Security - 25th International Conference, 2023

Zoomer: A Website Fingerprinting Attack Against Tor Hidden Services.
Proceedings of the Information and Communications Security - 25th International Conference, 2023

$\mathcal{L}{-}$ ETC: A Lightweight Model Based on Key Bytes Selection for Encrypted Traffic Classification.
Proceedings of the IEEE International Conference on Communications, 2023

2022
A Lightweight Authentication Scheme Based on Consortium Blockchain for Cross-Domain IoT.
Secur. Commun. Networks, 2022

MG-Conv: A spatiotemporal multi-graph convolutional neural network for stock market index trend prediction.
Comput. Electr. Eng., 2022

2020
COMPASS: Directing Named Data Transmission in VANETs by Dynamic Directional Interfaces.
IEEE Access, 2020

A Privacy-Preserving Authentication Scheme for VANETs based on Consortium Blockchain.
Proceedings of the 92nd IEEE Vehicular Technology Conference, 2020

2018
WOODY: A Post-Process Method for Smartphone-Based Activity Recognition.
IEEE Access, 2018


  Loading...