Attribute-based access to scalable media in cloud-assisted content sharing networks Y Wu, Z Wei, RH Deng IEEE transactions on multimedia 15 (4), 778-788, 2013 | 135 | 2013 |
On the security of an SVD-based ownership watermarking Y Wu IEEE transactions on Multimedia 7 (4), 624-627, 2005 | 134 | 2005 |
Resonance attacks on load frequency control of smart grids Y Wu, Z Wei, J Weng, X Li, RH Deng IEEE Transactions on Smart Grid 9 (5), 4490-4502, 2017 | 125 | 2017 |
UBAPV2G: A unique batch authentication protocol for vehicle-to-grid communications H Guo, Y Wu, F Bao, H Chen, M Ma IEEE Transactions on Smart Grid 2 (4), 707-714, 2011 | 94 | 2011 |
PowerLSTM: power demand forecasting using long short-term memory neural network Y Cheng, C Xu, D Mashima, VLL Thing, Y Wu Advanced Data Mining and Applications: 13th International Conference, ADMA …, 2017 | 81 | 2017 |
Incentive mechanism design for heterogeneous peer-to-peer networks: A Stackelberg game approach X Kang, Y Wu IEEE Transactions on Mobile Computing 14 (5), 1018-1030, 2014 | 81 | 2014 |
Evolutionary deep belief network for cyber-attack detection in industrial automation and control system KD Lu, GQ Zeng, X Luo, J Weng, W Luo, Y Wu IEEE Transactions on Industrial Informatics 17 (11), 7618-7627, 2021 | 77 | 2021 |
Method for incremental authentication of documents YD Wu, HR Deng US Patent 7,315,866, 2008 | 75 | 2008 |
Compliant encryption of JPEG2000 codestreams Y Wu, RH Deng 2004 International Conference on Image Processing, 2004. ICIP'04. 5, 3439-3442, 2004 | 67 | 2004 |
Progressive protection of JPEG2000 codestreams Y Wu, D Ma, RH Deng 2004 International Conference on Image Processing, 2004. ICIP'04. 5, 3447-3450, 2004 | 64 | 2004 |
Vulnerabilities, attacks, and countermeasures in balise-based train control systems Y Wu, J Weng, Z Tang, X Li, RH Deng IEEE Transactions on intelligent transportation systems 18 (4), 814-823, 2016 | 61 | 2016 |
Transforming a pattern identifier into biometric key generators Y Wu, B Qiu 2010 IEEE International Conference on Multimedia and Expo, 78-82, 2010 | 57 | 2010 |
MiR-26a and miR-144 inhibit proliferation and metastasis of esophageal squamous cell cancer by inhibiting cyclooxygenase-2 Y Shao, P Li, ST Zhu, JP Yue, XJ Ji, D Ma, L Wang, YJ Wang, Y Zong, ... Oncotarget 7 (12), 15173, 2016 | 56 | 2016 |
LPPTE: A lightweight privacy-preserving trust evaluation scheme for facilitating distributed data fusion in cooperative vehicular safety applications Z Liu, J Ma, J Weng, F Huang, Y Wu, L Wei, Y Li Information Fusion 73, 144-156, 2021 | 55 | 2021 |
Software puzzle: A countermeasure to resource-inflated denial-of-service attacks Y Wu, Z Zhao, F Bao, RH Deng IEEE Transactions on Information Forensics and security 10 (1), 168-177, 2014 | 55 | 2014 |
Linear combination collusion attack and its application on an anti-collusion fingerprinting [image watermarking] Y Wu Proceedings.(ICASSP'05). IEEE International Conference on Acoustics, Speech …, 2005 | 53 | 2005 |
Multi-stage binary code obfuscation using improved virtual machine H Fang, Y Wu, S Wang, Y Huang International Conference on Information Security, 168-181, 2011 | 52 | 2011 |
BTMPP: Balancing trust management and privacy preservation for emergency message dissemination in vehicular networks Z Liu, F Huang, J Weng, K Cao, Y Miao, J Guo, Y Wu IEEE Internet of Things Journal 8 (7), 5386-5407, 2020 | 50 | 2020 |
Secure smart metering based on LoRa technology Y Cheng, H Saputra, LM Goh, Y Wu 2018 IEEE 4th International Conference on Identity, Security, and Behavior …, 2018 | 50 | 2018 |
A lightweight privacy preservation scheme with efficient reputation management for mobile crowdsensing in vehicular networks Y Cheng, J Ma, Z Liu, Y Wu, K Wei, C Dong IEEE Transactions on Dependable and Secure Computing 20 (3), 1771-1788, 2022 | 48 | 2022 |