Follow
Yongdong Wu
Yongdong Wu
Unknown affiliation
Verified email at i2r.a-star.edu.sg - Homepage
Title
Cited by
Cited by
Year
Attribute-based access to scalable media in cloud-assisted content sharing networks
Y Wu, Z Wei, RH Deng
IEEE transactions on multimedia 15 (4), 778-788, 2013
1322013
On the security of an SVD-based ownership watermarking
Y Wu
IEEE transactions on Multimedia 7 (4), 624-627, 2005
1302005
Resonance attacks on load frequency control of smart grids
Y Wu, Z Wei, J Weng, X Li, RH Deng
IEEE Transactions on Smart Grid 9 (5), 4490-4502, 2017
1052017
UBAPV2G: A unique batch authentication protocol for vehicle-to-grid communications
H Guo, Y Wu, F Bao, H Chen, M Ma
IEEE Transactions on Smart Grid 2 (4), 707-714, 2011
942011
Incentive mechanism design for heterogeneous peer-to-peer networks: A Stackelberg game approach
X Kang, Y Wu
IEEE Transactions on Mobile Computing 14 (5), 1018-1030, 2014
822014
PowerLSTM: power demand forecasting using long short-term memory neural network
Y Cheng, C Xu, D Mashima, VLL Thing, Y Wu
Advanced Data Mining and Applications: 13th International Conference, ADMA …, 2017
762017
Method for incremental authentication of documents
YD Wu, HR Deng
US Patent 7,315,866, 2008
752008
Compliant encryption of JPEG2000 codestreams
Y Wu, RH Deng
2004 International Conference on Image Processing, 2004. ICIP'04. 5, 3439-3442, 2004
672004
Progressive protection of JPEG2000 codestreams
Y Wu, D Ma, RH Deng
2004 International Conference on Image Processing, 2004. ICIP'04. 5, 3447-3450, 2004
642004
Transforming a pattern identifier into biometric key generators
Y Wu, B Qiu
2010 IEEE International Conference on Multimedia and Expo, 78-82, 2010
562010
Evolutionary deep belief network for cyber-attack detection in industrial automation and control system
KD Lu, GQ Zeng, X Luo, J Weng, W Luo, Y Wu
IEEE Transactions on Industrial Informatics 17 (11), 7618-7627, 2021
552021
Vulnerabilities, attacks, and countermeasures in balise-based train control systems
Y Wu, J Weng, Z Tang, X Li, RH Deng
IEEE Transactions on intelligent transportation systems 18 (4), 814-823, 2016
552016
MiR-26a and miR-144 inhibit proliferation and metastasis of esophageal squamous cell cancer by inhibiting cyclooxygenase-2
Y Shao, P Li, ST Zhu, JP Yue, XJ Ji, D Ma, L Wang, YJ Wang, Y Zong, ...
Oncotarget 7 (12), 15173, 2016
552016
Linear combination collusion attack and its application on an anti-collusion fingerprinting [image watermarking]
Y Wu
Proceedings.(ICASSP'05). IEEE International Conference on Acoustics, Speech …, 2005
532005
Software puzzle: A countermeasure to resource-inflated denial-of-service attacks
Y Wu, Z Zhao, F Bao, RH Deng
IEEE Transactions on Information Forensics and security 10 (1), 168-177, 2014
522014
Multi-stage binary code obfuscation using improved virtual machine
H Fang, Y Wu, S Wang, Y Huang
International Conference on Information Security, 168-181, 2011
492011
Secure smart metering based on LoRa technology
Y Cheng, H Saputra, LM Goh, Y Wu
2018 IEEE 4th International Conference on Identity, Security, and Behavior …, 2018
452018
Method of using biometric information for secret generation
YD Wu
US Patent App. 10/472,696, 2004
452004
A flexible and scalable authentication scheme for JPEG2000 image codestreams
C Peng, RH Deng, Y Wu, W Shao
Proceedings of the eleventh ACM international conference on Multimedia, 433-441, 2003
422003
LPPTE: A lightweight privacy-preserving trust evaluation scheme for facilitating distributed data fusion in cooperative vehicular safety applications
Z Liu, J Ma, J Weng, F Huang, Y Wu, L Wei, Y Li
Information Fusion 73, 144-156, 2021
412021
The system can't perform the operation now. Try again later.
Articles 1–20