default search action
Yongdong Wu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j56]Zhikai Lin, Kexing Wang, Yongdong Wu, Dingcheng Li:
Fast Payments Across Heterogeneous Blockchains for Internet of Things. IEEE Access 12: 33923-33937 (2024) - [j55]Yao Chen, Wensheng Gan, Gengsen Huang, Yongdong Wu, Philip S. Yu:
Privacy-preserving federated discovery of DNA motifs with differential privacy. Expert Syst. Appl. 249: 123799 (2024) - [j54]Yijie Gui, Wensheng Gan, Yongdong Wu, Philip S. Yu:
Privacy preserving rare itemset mining. Inf. Sci. 662: 120262 (2024) - [j53]Lin Wan, Zhiquan Liu, Yong Ma, Yudan Cheng, Yongdong Wu, Runchuan Li, Jianfeng Ma:
Lightweight and Privacy-Preserving Dual Incentives for Mobile Crowdsensing. IEEE Trans. Cloud Comput. 12(2): 504-521 (2024) - [c87]Jin Qian, Kaimin Wei, Yongdong Wu, Jilian Zhang, Jinpeng Chen, Huan Bao:
GI-SMN: Gradient Inversion Attack Against Federated Learning Without Prior Knowledge. ICIC (8) 2024: 439-448 - [i16]Huan Bao, Kaimin Wei, Yongdong Wu, Jin Qian, Robert H. Deng:
Distributional Black-Box Model Inversion Attack with Multi-Agent Reinforcement Learning. CoRR abs/2404.13860 (2024) - [i15]Jin Qian, Kaimin Wei, Yongdong Wu, Jilian Zhang, Jipeng Chen, Huan Bao:
GI-SMN: Gradient Inversion Attack against Federated Learning without Prior Knowledge. CoRR abs/2405.03516 (2024) - 2023
- [j52]Qihua Feng, Peiya Li, Zhixun Lu, Zhibo Zhou, Yongdong Wu, Jian Weng, Feiran Huang:
DHAN: Encrypted JPEG image retrieval via DCT histograms-based attention networks. Appl. Soft Comput. 133: 109935 (2023) - [j51]Kailun Yan, Jilian Zhang, Yongdong Wu:
Improving Bitcoin Transaction Propagation Efficiency through Local Clique Network. Comput. J. 66(2): 318-332 (2023) - [j50]Dongliang Cao, Kaimin Wei, Yongdong Wu, Jilian Zhang, Bingwen Feng, Jinpeng Chen:
FePN: A robust feature purification network to defend against adversarial examples. Comput. Secur. 134: 103427 (2023) - [j49]Peng Li, Junzuo Lai, Yongdong Wu:
Accountable attribute-based authentication with fine-grained access control and its application to crowdsourcing. Frontiers Comput. Sci. 17(1): 171802 (2023) - [j48]Yunhua He, Mingshun Luo, Bin Wu, Limin Sun, Yongdong Wu, Zhiquan Liu, Ke Xiao:
A Game Theory-Based Incentive Mechanism for Collaborative Security of Federated Learning in Energy Blockchain Environment. IEEE Internet Things J. 10(24): 21294-21308 (2023) - [j47]Yao Chen, Wensheng Gan, Yongdong Wu, Philip S. Yu:
Privacy-preserving federated mining of frequent itemsets. Inf. Sci. 625: 504-520 (2023) - [j46]Yuxian Li, Jian Weng, Wei Wu, Ming Li, Yingjiu Li, Haoxin Tu, Yongdong Wu, Robert H. Deng:
PRI: PCH-based privacy-preserving with reusability and interoperability for enhancing blockchain scalability. J. Parallel Distributed Comput. 180: 104721 (2023) - [j45]Jianbin Mai, Yongdong Wu, Zhiquan Liu, Jingjing Guo, Zuobin Ying, Xin Chen, Shunyan Cui:
Anomaly detection method for vehicular network based on collaborative deep support vector data description. Phys. Commun. 56: 101940 (2023) - [j44]Yongdong Wu, Jian Weng, Zhengxia Wang, Kaimin Wei, Jinming Wen, Junzuo Lai, Xin Li:
Attacks and Countermeasures on Privacy-Preserving Biometric Authentication Schemes. IEEE Trans. Dependable Secur. Comput. 20(2): 1744-1755 (2023) - [j43]Yudan Cheng, Jianfeng Ma, Zhiquan Liu, Yongdong Wu, Kaimin Wei, Caiqin Dong:
A Lightweight Privacy Preservation Scheme With Efficient Reputation Management for Mobile Crowdsensing in Vehicular Networks. IEEE Trans. Dependable Secur. Comput. 20(3): 1771-1788 (2023) - [j42]Yudan Cheng, Jianfeng Ma, Zhiquan Liu, Zhetao Li, Yongdong Wu, Caiqin Dong, Runchuan Li:
A Privacy-Preserving and Reputation-Based Truth Discovery Framework in Mobile Crowdsensing. IEEE Trans. Dependable Secur. Comput. 20(6): 5293-5311 (2023) - [j41]Hongshuang Hu, Yongdong Wu, Jian Weng, Kaimin Wei, Zhiquan Liu, Feiran Huang, Yinyan Zhang:
Attacks on Acceleration-Based Secure Device Pairing With Automatic Visual Tracking. IEEE Trans. Inf. Forensics Secur. 18: 3991-4005 (2023) - [j40]Zhiquan Liu, Jingjing Guo, Feiran Huang, Donghong Cai, Yongdong Wu, Xin Chen, Kostromitin Konstantin Igorevich:
Lightweight Trustworthy Message Exchange in Unmanned Aerial Vehicle Networks. IEEE Trans. Intell. Transp. Syst. 24(2): 2144-2157 (2023) - [j39]Jine Tang, Taishan Qin, Deliang Kong, Zhangbing Zhou, Xiaocui Li, Yongdong Wu, Junhua Gu:
Anomaly Detection in Social-Aware IoT Networks. IEEE Trans. Netw. Serv. Manag. 20(3): 3162-3176 (2023) - [c86]Hailong Song, Yang Xu, Mengdie Xiang, Yongdong Wu, Shanlin Wen, Mengxi He:
Study on the calibration method of ultrasonic endoscope. BIC 2023: 264-268 - [c85]Yijie Gui, Qizhi Chen, Wensheng Gan, Yongdong Wu:
ODTT: Optimized Dynamic Taxonomy Tree with Differential Privacy. IEEE Big Data 2023: 3264-3273 - [c84]Yao Chen, Shan Huang, Wensheng Gan, Gengsen Huang, Yongdong Wu:
Federated Learning for Metaverse: A Survey. WWW (Companion Volume) 2023: 1151-1160 - [i14]Yao Chen, Shan Huang, Wensheng Gan, Gengsen Huang, Yongdong Wu:
Federated Learning for Metaverse: A Survey. CoRR abs/2303.17987 (2023) - [i13]Yao Chen, Wensheng Gan, Gengsen Huang, Yongdong Wu, Philip S. Yu:
Privacy-Preserving Federated Discovery of DNA Motifs with Differential Privacy. CoRR abs/2304.01689 (2023) - 2022
- [j38]Kaimin Wei, Kai Huang, Yongdong Wu, Zhetao Li, Hongliang He, Jilian Zhang, Jinpeng Chen, Song Guo:
High-Performance UAV Crowdsensing: A Deep Reinforcement Learning Approach. IEEE Internet Things J. 9(19): 18487-18499 (2022) - [j37]Yang Yang, Robert H. Deng, Ximeng Liu, Yongdong Wu, Jian Weng, Xianghan Zheng, Chunming Rong:
Privacy-Preserving Medical Treatment System Through Nondeterministic Finite Automata. IEEE Trans. Cloud Comput. 10(3): 2020-2037 (2022) - [j36]Zhijian Shao, Jian Weng, Yue Zhang, Yongdong Wu, Ming Li, Jiasi Weng, Weiqi Luo, Shui Yu:
Peripheral-Free Device Pairing by Randomly Switching Power. IEEE Trans. Dependable Secur. Comput. 19(6): 4240-4254 (2022) - [j35]Bowen Zhao, Jiaming Yuan, Ximeng Liu, Yongdong Wu, HweeHwa Pang, Robert H. Deng:
SOCI: A Toolkit for Secure Outsourced Computation on Integers. IEEE Trans. Inf. Forensics Secur. 17: 3637-3648 (2022) - [j34]Qi Lin, Wensheng Gan, Yongdong Wu, Jiahui Chen, Chien-Ming Chen:
Smart System: Joint Utility and Frequency for Pattern Classification. ACM Trans. Manag. Inf. Syst. 13(4): 43:1-43:24 (2022) - [c83]Yao Chen, Yijie Gui, Hong Lin, Wensheng Gan, Yongdong Wu:
Federated Learning Attacks and Defenses: A Survey. IEEE Big Data 2022: 4256-4265 - [c82]Junhui Li, Wensheng Gan, Yijie Gui, Yongdong Wu, Philip S. Yu:
Frequent Itemset Mining with Local Differential Privacy. CIKM 2022: 1146-1155 - [c81]Zhaowen Yin, Wensheng Gan, Gengsen Huang, Yongdong Wu, Philippe Fournier-Viger:
Constraint-based Sequential Rule Mining. DSAA 2022: 1-10 - [c80]Dejia Lin, Yongdong Wu, Wensheng Gan:
Sybil-resistant Truth Discovery in Crowdsourcing by Exploiting the Long-tail Effect. TrustCom 2022: 1545-1550 - [c79]Yijie Gui, Wensheng Gan, Yao Chen, Yongdong Wu:
Mining with Rarity for Web Intelligence. WWW (Companion Volume) 2022: 973-981 - [i12]Qi Lin, Wensheng Gan, Yongdong Wu, Jiahui Chen, Chien-Ming Chen:
Smart System: Joint Utility and Frequency for Pattern Classification. CoRR abs/2206.04269 (2022) - [i11]Jinbao Miao, Wensheng Gan, Shicheng Wan, Yongdong Wu, Philippe Fournier-Viger:
Towards Target High-Utility Itemsets. CoRR abs/2206.06157 (2022) - [i10]Yao Chen, Wensheng Gan, Yongdong Wu, Philip S. Yu:
Contrast Pattern Mining: A Survey. CoRR abs/2209.13556 (2022) - [i9]Yao Chen, Yijie Gui, Hong Lin, Wensheng Gan, Yongdong Wu:
Federated Learning Attacks and Defenses: A Survey. CoRR abs/2211.14952 (2022) - 2021
- [j33]Zhiquan Liu, Jianfeng Ma, Jian Weng, Feiran Huang, Yongdong Wu, Linfeng Wei, Yuxian Li:
LPPTE: A lightweight privacy-preserving trust evaluation scheme for facilitating distributed data fusion in cooperative vehicular safety applications. Inf. Fusion 73: 144-156 (2021) - [j32]Zhiquan Liu, Feiran Huang, Jian Weng, Kun Cao, Yinbin Miao, Jingjing Guo, Yongdong Wu:
BTMPP: Balancing Trust Management and Privacy Preservation for Emergency Message Dissemination in Vehicular Networks. IEEE Internet Things J. 8(7): 5386-5407 (2021) - [j31]Peng Li, Junzuo Lai, Yongdong Wu:
Event-oriented linkable and traceable anonymous authentication and its application to voting. J. Inf. Secur. Appl. 60: 102865 (2021) - [j30]Peng Li, Junzuo Lai, Yongdong Wu:
Publicly Traceable Attribute-Based Anonymous Authentication and Its Application to Voting. Secur. Commun. Networks 2021: 6611518:1-6611518:17 (2021) - [j29]Ziwen Zhang, Xuelian Wang, Yongdong Wu, Zengpeng Zhao, Yang E:
Applied Research on InSAR and GPS Data Fusion in Deformation Monitoring. Sci. Program. 2021: 3888975:1-3888975:9 (2021) - [j28]Kang-Di Lu, Guo-Qiang Zeng, Xizhao Luo, Jian Weng, Weiqi Luo, Yongdong Wu:
Evolutionary Deep Belief Network for Cyber-Attack Detection in Industrial Automation and Control System. IEEE Trans. Ind. Informatics 17(11): 7618-7627 (2021) - [c78]Qi Lin, Wensheng Gan, Yongdong Wu, Jiahui Chen, Chien-Ming Chen:
Joint Utility and Frequency for Pattern Classification. IEEE BigData 2021: 5524-5533 - [e2]Yongdong Wu, Moti Yung:
Information Security and Cryptology - 16th International Conference, Inscrypt 2020, Guangzhou, China, December 11-14, 2020, Revised Selected Papers. Lecture Notes in Computer Science 12612, Springer 2021, ISBN 978-3-030-71851-0 [contents] - [i8]Ming Li, Jian Weng, Yi Li, Yongdong Wu, Jiasi Weng, Dingcheng Li, Robert H. Deng:
IvyCross: A Trustworthy and Privacy-preserving Framework for Blockchain Interoperability. IACR Cryptol. ePrint Arch. 2021: 1244 (2021) - 2020
- [c77]Chao Wang, Linzhu Fang, Yongdong Wu, Feng Lin, Kui Ren:
Poster Abstract: Secure Remote Key Initialization of Wireless IoT. IoTDI 2020: 252-253 - [i7]Zhijian Shao, Jian Weng, Yue Zhang, Yongdong Wu, Ming Li, Jiasi Weng, Weiqi Luo, Shui Yu:
Peripheral-free Device Pairing by Randomly Switching Power. CoRR abs/2002.11288 (2020) - [i6]Yang Yang, Robert H. Deng, Ximeng Liu, Yongdong Wu, Jian Weng, Xianghan Zheng, Chunming Rong:
Privacy-preserving Medical Treatment System through Nondeterministic Finite Automata. CoRR abs/2005.11688 (2020)
2010 – 2019
- 2019
- [j27]Yongdong Wu, Dengpan Ye, Zhuo Wei, Qian Wang, William Tan, Robert H. Deng:
Situation-Aware Authenticated Video Broadcasting Over Train-Trackside WiFi Networks. IEEE Internet Things J. 6(2): 1617-1627 (2019) - [j26]Yongdong Wu, Binbin Chen, Jian Weng, Zhuo Wei, Xin Li, Bo Qiu, Niekie Liu:
False Load Attack to Smart Meters by Synchronously Switching Power Circuits. IEEE Trans. Smart Grid 10(3): 2641-2649 (2019) - [c76]Yongdong Wu, Jian Weng, Bo Qiu, Zhuo Wei, Fan Qian, Robert H. Deng:
Random Delay Attack and Its Applications on Load Frequency Control of Power Systems. DSC 2019: 1-8 - [i5]Yao Cheng, Chang Xu, Daisuke Mashima, Vrizlynn L. L. Thing, Yongdong Wu:
PowerNet: Neural Power Demand Forecasting in Smart Grid. CoRR abs/1904.11979 (2019) - 2018
- [j25]Zhuo Wei, Yongdong Wu, Yanjiang Yang, Zheng Yan, Qingqi Pei, Yajuan Xie, Jian Weng:
AutoPrivacy: Automatic privacy protection and tagging suggestion for mobile social photo. Comput. Secur. 76: 341-353 (2018) - [j24]Yongdong Wu, Binbin Chen, Zhigang Zhao, Yao Cheng:
Attack and Countermeasure on Interlock-Based Device Pairing Schemes. IEEE Trans. Inf. Forensics Secur. 13(3): 745-757 (2018) - [j23]Yongdong Wu, Zhuo Wei, Jian Weng, Xin Li, Robert H. Deng:
Resonance Attacks on Load Frequency Control of Smart Grids. IEEE Trans. Smart Grid 9(5): 4490-4502 (2018) - [j22]Yongdong Wu, Zhuo Wei, Jian Weng, Robert H. Deng:
Position Manipulation Attacks to Balise-Based Train Automatic Stop Control. IEEE Trans. Veh. Technol. 67(6): 5287-5301 (2018) - [c75]Yao Cheng, Hendra Saputra, Leng Meng Goh, Yongdong Wu:
Secure smart metering based on LoRa technology. ISBA 2018: 1-8 - 2017
- [j21]Zhuo Wei, Yanjiang Yang, Yongdong Wu, Jian Weng, Robert H. Deng:
HIBS-KSharing: Hierarchical Identity-Based Signature Key Sharing for Automotive. IEEE Access 5: 16314-16323 (2017) - [j20]Yongdong Wu, Jian Weng, Zhe Tang, Xin Li, Robert H. Deng:
Vulnerabilities, Attacks, and Countermeasures in Balise-Based Train Control Systems. IEEE Trans. Intell. Transp. Syst. 18(4): 814-823 (2017) - [c74]Yao Cheng, Chang Xu, Daisuke Mashima, Vrizlynn L. L. Thing, Yongdong Wu:
PowerLSTM: Power Demand Forecasting Using Long Short-Term Memory Neural Network. ADMA 2017: 727-740 - [c73]Sumei Sun, Yongdong Wu, Boon Shyang Lim, Hieu Duy Nguyen:
A High Bit-Rate Shared Key Generator with Time-Frequency Features of Wireless Channels. GLOBECOM 2017: 1-6 - [c72]Zhuo Wei, Yanjiang Yang, Rehana Yasmin, Yongdong Wu, Jian Weng, Robert H. Deng:
IoVShield: An Efficient Vehicular Intrusion Detection System for Self-driving (Short Paper). ISPEC 2017: 638-647 - 2016
- [j19]Zhuo Wei, Zheng Yan, Yongdong Wu, Robert Huijie Deng:
Trustworthy Authentication on Scalable Surveillance Video with Background Model Support. ACM Trans. Multim. Comput. Commun. Appl. 12(4s): 64:1-64:20 (2016) - [c71]Yongdong Wu, Vivy Suhendra, Hendra Saputra, Zhigang Zhao:
Obfuscating Software Puzzle for Denial-of-Service Attack Mitigation. iThings/GreenCom/CPSCom/SmartData 2016: 115-122 - [c70]Vivy Suhendra, Yongdong Wu, Hendra Saputra, Zhigang Zhao, Feng Bao:
Lightweight Key Management Protocols for Smart Grids. iThings/GreenCom/CPSCom/SmartData 2016: 345-348 - [c69]Yongdong Wu, Bo Qiu, Zhuo Wei, Jian Weng:
Secure Subway Train-to-Train Communications via GSM-R Communication Systems. VTC Spring 2016: 1-5 - 2015
- [j18]Yongdong Wu, Zhigang Zhao, Feng Bao, Robert H. Deng:
Software Puzzle: A Countermeasure to Resource-Inflated Denial-of-Service Attacks. IEEE Trans. Inf. Forensics Secur. 10(1): 168-177 (2015) - [j17]Xin Kang, Yongdong Wu:
Incentive Mechanism Design for Heterogeneous Peer-to-Peer Networks: A StackelbergGame Approach. IEEE Trans. Mob. Comput. 14(5): 1018-1030 (2015) - [c68]Zhuo Wei, Robert H. Deng, Jialie Shen, Jixiang Zhu, Kun Ouyang, Yongdong Wu:
Multidimensional Context Awareness in Mobile Devices. MMM (2) 2015: 38-49 - [e1]Javier López, Yongdong Wu:
Information Security Practice and Experience - 11th International Conference, ISPEC 2015, Beijing, China, May 5-8, 2015. Proceedings. Lecture Notes in Computer Science 9065, Springer 2015, ISBN 978-3-319-17532-4 [contents] - 2014
- [j16]Xin Kang, Yongdong Wu:
A trust-based pollution attack prevention scheme in peer-to-peer streaming networks. Comput. Networks 72: 62-73 (2014) - [j15]Robert Huijie Deng, Xuhua Ding, Yongdong Wu, Zhuo Wei:
Efficient block-based transparent encryption for H.264/SVC bitstreams. Multim. Syst. 20(2): 165-178 (2014) - [j14]Zhuo Wei, Yongdong Wu, Robert H. Deng, Xuhua Ding:
A Hybrid Scheme for Authenticating Scalable Video Codestreams. IEEE Trans. Inf. Forensics Secur. 9(4): 543-553 (2014) - [i4]Xin Kang, Yongdong Wu:
A Trust-based Pollution Attack Prevention Scheme in Peer-to-Peer Streaming Networks. CoRR abs/1408.0726 (2014) - [i3]Xin Kang, Yongdong Wu:
Incentive Mechanism Design for Heterogeneous Peer-to-Peer Networks: A Stackelberg Game Approach. CoRR abs/1408.0727 (2014) - 2013
- [j13]Yongdong Wu, Zhuo Wei, Robert H. Deng:
Attribute-Based Access to Scalable Media in Cloud-Assisted Content Sharing Networks. IEEE Trans. Multim. 15(4): 778-788 (2013) - [c67]Xin Kang, Yongdong Wu:
Dynamic resource allocation for credit-based peer-to-peer multimedia streaming networks. GLOBECOM 2013: 1501-1506 - [c66]Xin Kang, Yongdong Wu:
A game-theoretic approach for cooperation stimulation in peer-to-peer streaming networks. ICC 2013: 2283-2287 - [c65]Zhuo Wei, Robert H. Deng, Jialie Shen, Yongdong Wu, Xuhua Ding, Swee-Won Lo:
Technique for authenticating H.264/SVC streams in surveillance applications. ICME Workshops 2013: 1-4 - [c64]Junzuo Lai, Xuhua Ding, Yongdong Wu:
Accountable Trapdoor Sanitizable Signatures. ISPEC 2013: 117-131 - [c63]Yongdong Wu, Zhigang Zhao, Xuejun Wen:
Transparently secure smartphone-based social networking. WCNC 2013: 4475-4480 - 2012
- [j12]Zhuo Wei, Yongdong Wu, Xuhua Ding, Robert H. Deng:
A scalable and format-compliant encryption scheme for H.264/SVC bitstreams. Signal Process. Image Commun. 27(9): 1011-1024 (2012) - [c62]Zhuo Wei, Xuhua Ding, Robert Huijie Deng, Yongdong Wu:
No Tradeoff between Confidentiality and Performance: An Analysis on H.264/SVC Partial Encryption. Communications and Multimedia Security 2012: 72-86 - [c61]Yongdong Wu, Robert H. Deng:
A Pollution Attack to Public-key Watermarking Schemes. ICME 2012: 230-235 - [c60]Alok Pathak, Wai-Choong Wong, Huaqun Guo, Yongdong Wu:
Remote tracking protocol with predictive localization algorithm. ICON 2012: 268-273 - [c59]Yongdong Wu, Zhigang Zhao:
Enhancing the Security of On-line Transactions with CAPTCHA Keyboard. SEC 2012: 531-536 - [c58]Xin Kang, Yongdong Wu:
Fighting Pollution Attack in Peer-to-Peer Streaming Networks: A Trust Management Approach. SEC 2012: 537-542 - 2011
- [j11]Huaqun Guo, Yongdong Wu, Feng Bao, Hongmei Chen, Maode Ma:
UBAPV2G: A Unique Batch Authentication Protocol for Vehicle-to-Grid Communications. IEEE Trans. Smart Grid 2(4): 707-714 (2011) - [c57]Huaqun Guo, Fan Yu, Zonghua Zhang, Wai-Choong Wong, Maode Ma, Yongdong Wu:
HASVC: An Efficient Hybrid Authentication Scheme for Vehicular Communication. ICC 2011: 1-5 - [c56]Yongdong Wu, Szeling Yeo:
Obscure Spread Spectrum watermarking. ICME 2011: 1-6 - [c55]Kun Zhang, Hong Zhang, Yongdong Wu, Feng Bao:
Evaluating the importance of nodes in complex networks based on principal component analysis and grey relational analysis. ICON 2011: 231-235 - [c54]Hui Fang, Yongdong Wu, Shuhong Wang, Yin Huang:
Multi-stage Binary Code Obfuscation Using Improved Virtual Machine. ISC 2011: 168-181 - [c53]Huaqun Guo, Yongdong Wu, Hongmei Chen, Maode Ma:
A Batch Authentication Protocol for V2G Communications. NTMS 2011: 1-5 - [c52]Yongdong Wu, Robert H. Deng:
Zero-error watermarking on jpeg images by shuffling huffman tree nodes. VCIP 2011: 1-4 - 2010
- [j10]Yongdong Wu, Robert H. Deng:
A Multi-Key Pirate Decoder Against Traitor Tracing Schemes. J. Comput. Sci. Technol. 25(2): 362-374 (2010) - [j9]Yongdong Wu, Zhou Wei, Haixia Yao, Zhigang Zhao, Lek Heng Ngoh, Robert H. Deng, Shengsheng Yu:
TeleOph: a secure real-time teleophthalmology system. IEEE Trans. Inf. Technol. Biomed. 14(5): 1259-1266 (2010) - [c51]Yongdong Wu, Zhigang Zhao, Ying Qiu, Feng Bao:
Blocking Foxy Phishing Emails with Historical Information. ICC 2010: 1-5 - [c50]Yongdong Wu, Bo Qiu:
Transforming a pattern identifier into biometric key generators. ICME 2010: 78-82 - [c49]Huaqun Guo, Fan Yu, Wai-Choong Wong, Vivy Suhendra, Yongdong Wu:
Secure wireless communication platform for EV-to-Grid research. IWCMC 2010: 21-25 - [c48]Qiming Li, Yongdong Wu, Feng Bao:
A Reversible Data Hiding Scheme for JPEG Images. PCM (1) 2010: 653-664 - [c47]Yongdong Wu, Bo Qiu:
Perceptually fractural pixel values in rendering high dynamic range images. VCIP 2010: 77442X
2000 – 2009
- 2009
- [c46]Huaqun Guo, Lek Heng Ngoh, Yongdong Wu, Joseph Chee Ming Teo:
Secure wireless vehicle monitoring and control. APSCC 2009: 81-86 - [c45]Ying Qiu, Feng Bao, Yongdong Wu, Yanjiang Yang:
A Lightweight Fast Handover Authentication Scheme in Mobile Networks. ICC 2009: 1-5 - [c44]Yongdong Wu, Feng Bao, Ying Qiu:
Tracing Stateful Pirate Decoders. ICC 2009: 1-5 - [c43]Huaqun Guo, H. S. Cheng, Yongdong Wu, J. J. Ang, F. Tao, A. K. Venkatasubramanian, C. H. Kwek, L. H. Liow:
An Automotive Security System for Anti-theft. ICN 2009: 421-426 - [c42]Yongdong Wu, Feng Bao:
Improving a Digital Rights Management Scheme for Video Broadcast. PCM 2009: 708-718 - [c41]Yongdong Wu, Haixia Yao, Zhigang Zhao:
Evaluating a Multimedia-Based Tele-Ophthalmology System. PCM 2009: 1125-1130 - 2008
- [j8]Yongdong Wu, HweeHwa Pang:
A Lightweight Buyer-Seller Watermarking Protocol. Adv. Multim. 2008: 905065:1-905065:7 (2008) - [c40]Yongdong Wu, Qiming Li, Feng Bao:
Optimizing the capacity of distortion-freewatermarking on palette images. ICME 2008: 205-208 - [c39]Yongdong Wu, Haixia Yao, Feng Bao:
Minimizing SSO Effort in Verifying SSL Anti-phishing Indicators. SEC 2008: 47-61 - [i2]Yongdong Wu, Robert H. Deng:
On the Security of Fully Collusion Resistant Traitor Tracing Schemes. IACR Cryptol. ePrint Arch. 2008: 450 (2008) - 2007
- [j7]Yongdong Wu, Di Ma, Robert H. Deng:
Flexible Access Control to JPEG 2000 Image Code-Streams. IEEE Trans. Multim. 9(6): 1314-1324 (2007) - [c38]Yongdong Wu, Feng Bao, Robert H. Deng:
Forgery Attack to an Asymptotically Optimal Traitor Tracing Scheme. ACISP 2007: 171-183 - [c37]Yongdong Wu, Feng Bao, Robert H. Deng, Marc Mouffron, Frederic Rousseau:
Enhanced Security by OS-Oriented Encapsulation in TPM-Enabled DRM. Inscrypt 2007: 472-481 - [c36]Yongdong Wu:
Security Flaws in Kuribayashi-Tanaka Fingerprinting Protocol. ICC 2007: 1317-1322 - [c35]Ratna Dutta, Yongdong Wu, Sourav Mukhopadhyay:
Constant Storage Self-Healing Key Distribution with Revocation in Wireless Sensor Network. ICC 2007: 1323-1328 - [c34]Tieyan Li, Yongdong Wu:
Resilient Aggregation Scheme for Confidential Sensor Reports. ICC 2007: 1472-1477 - [c33]Yongdong Wu, Bo Qiu, Feng Bao:
Evaluating Ouda's Tamper-Localization Watermarking Scheme. ICME 2007: 843-846 - [c32]Yongdong Wu, Zhigang Zhao:
Collusion attack to a scalable AND-ACC fingerprinting scheme. VCIP 2007: 65082X - [c31]Tieyan Li, Yongdong Wu:
Adaptive Stream Authentication for Wireless Multimedia Communications. WCNC 2007: 2613-2618 - [c30]Yongdong Wu, A. Lakshminarayanan, Zhigang Zhao:
A Trust Answer to Distance Query. WCNC 2007: 2703-2708 - 2006
- [j6]Yongdong Wu, Robert H. Deng:
Scalable authentication of MPEG-4 streams. IEEE Trans. Multim. 8(1): 152-161 (2006) - [j5]Yongdong Wu:
Nonlinear collusion attack on a watermarking scheme for buyer authentication. IEEE Trans. Multim. 8(3): 626-629 (2006) - [c29]Yongdong Wu, Feng Bao:
Batch Decryption of Encrypted Short Messages and Its Application on Concurrent SSL Handshakes. Inscrypt 2006: 264-278 - [c28]Yongdong Wu, Zhigang Zhao, Tian Wei Chui:
An Attack on SMC-Based Software Protection. ICICS 2006: 352-368 - [c27]Yongdong Wu:
Tamper-Localization Watermarking with Systematic Error Correcting Code. ICIP 2006: 1965-1968 - [c26]Yongdong Wu:
Protection of Video Logos with Randomization. ICME 2006: 1341-1344 - [c25]Fang Qi, Feng Bao, Tieyan Li, Weijia Jia, Yongdong Wu:
Preventing Web-Spoofing with Automatic Detecting Security Indicator. ISPEC 2006: 112-122 - [c24]Tieyan Li, Yongdong Wu, Huafei Zhu:
An Efficient Scheme for Encrypted Data Aggregation on Sensor Networks. VTC Spring 2006: 831-835 - [c23]Yongdong Wu, Tieyan Li:
Video stream authentication in lossy networks. WCNC 2006: 2150-2155 - 2005
- [j4]Robert H. Deng, Di Ma, Weizhong Shao, Yongdong Wu:
Scalable trusted online dissemination of JPEG2000 images. Multim. Syst. 11(1): 60-67 (2005) - [j3]Yongdong Wu, Robert H. Deng:
Security of an ill-posed operator for image authentication. IEEE Trans. Circuits Syst. Video Technol. 15(1): 161-163 (2005) - [j2]Yongdong Wu:
On the security of an SVD-based ownership watermarking. IEEE Trans. Multim. 7(4): 624-627 (2005) - [c22]Yongdong Wu:
Efficient Authentication of Electronic Document Workflow. CISC 2005: 101-112 - [c21]Yongdong Wu:
Linear Combination Collusion Attack and its Application on an Anti-Collusion Fingerprinting. ICASSP (2) 2005: 13-16 - [c20]HweeHwa Pang, Yongdong Wu:
Evaluation of MPEG-4 IPMP extension. ICASSP (2) 2005: 1161-1164 - [c19]Tieyan Li, Huafei Zhu, Yongdong Wu:
Multi-Source Stream Authentication Framework in Case of Composite MPEG-4 Stream. ICICS 2005: 389-401 - [c18]Fang Qi, Weijia Jia, Feng Bao, Yongdong Wu:
Batching SSL/TLS Handshake Improved. ICICS 2005: 402-413 - [c17]Yongdong Wu:
Aggregating signatures of MPEG-4 elementary streams. ICME 2005: 181-184 - [c16]Yongdong Wu, Feng Bao, Robert H. Deng:
Secure Person-To-Person Communications Based on Biometrics Signals. SEC 2005: 205-222 - [c15]Yongdong Wu, Tieyan Li, Robert H. Deng:
Protecting Group Dynamic Information in Large Scale Multicast Groups. SEC 2005: 459-476 - [c14]Huafei Zhu, Feng Bao, Tieyan Li, Yongdong Wu:
Sequential aggregate signatures for wireless routing protocols. WCNC 2005: 2436-2439 - 2004
- [c13]Tieyan Li, Yongdong Wu, Di Ma, Huafei Zhu, Robert H. Deng:
Flexible Verification of MPEG-4 Stream in Peer-to-Peer CDN. ICICS 2004: 79-91 - [c12]Di Ma, Robert H. Deng, Yongdong Wu, Tieyan Li:
Dynamic Access Control for Multi-privileged Group Communications. ICICS 2004: 508-519 - [c11]Yongdong Wu, Robert H. Deng:
Compliant encryption of jpeg2000 codestreanis. ICIP 2004: 3439-3442 - [c10]Yongdong Wu, Di Ma, Robert H. Deng:
Progressive protection of jpeg2000 codestreams. ICIP 2004: 3447-3450 - [c9]Yongdong Wu, Feng Bao:
Collusion attack on a multi-key secure video proxy scheme. ACM Multimedia 2004: 380-383 - 2003
- [j1]Yongdong Wu, Robert H. Deng:
Content-aware authentication of motion JPEG2000 stream in lossy networks. IEEE Trans. Consumer Electron. 49(4): 792-801 (2003) - [c8]Tieyan Li, Yongdong Wu:
Trust on Web Browser: Attack vs. Defense. ACNS 2003: 241-253 - [c7]Yongdong Wu, Robert H. Deng:
Adaptive Collusion Attack to a Block Oriented Watermarking Scheme. ICICS 2003: 238-248 - [c6]Yongdong Wu, Feng Bao, Changsheng Xu:
The security flaws in some authentication watermarking schemes. ICME 2003: 493-496 - [c5]Yongdong Wu:
Zero-Distortion Authentication Watermarking. ISC 2003: 325-337 - [c4]Cheng Peng, Robert H. Deng, Yongdong Wu, Weizhong Shao:
A flexible and scalable authentication scheme for JPEG2000 image codestreams. ACM Multimedia 2003: 433-441 - [c3]Yongdong Wu, Changsheng Xu:
Fault-induced attack on semi-fragile image authentication schemes. VCIP 2003: 1875-1883 - 2002
- [c2]Yongdong Wu, Di Ma, Changsheng Xu:
Efficient Object-Based Stream Authentication. INDOCRYPT 2002: 354-367 - [c1]Yongdong Wu, Changsheng Xu, Feng Bao:
Counterfeiting Attack on a Lossless Authentication Watermarking Scheme. VIP 2002: 109-112 - 2001
- [i1]Jeff Jianxin Yan, Yongdong Wu:
An Attack on A Traitor Tracing Scheme. IACR Cryptol. ePrint Arch. 2001: 67 (2001)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:22 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint