关注
Yongdong Wu
Yongdong Wu
未知所在单位机构
在 i2r.a-star.edu.sg 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Attribute-based access to scalable media in cloud-assisted content sharing networks
Y Wu, Z Wei, RH Deng
IEEE transactions on multimedia 15 (4), 778-788, 2013
1352013
On the security of an SVD-based ownership watermarking
Y Wu
IEEE transactions on Multimedia 7 (4), 624-627, 2005
1342005
Resonance attacks on load frequency control of smart grids
Y Wu, Z Wei, J Weng, X Li, RH Deng
IEEE Transactions on Smart Grid 9 (5), 4490-4502, 2017
1252017
UBAPV2G: A unique batch authentication protocol for vehicle-to-grid communications
H Guo, Y Wu, F Bao, H Chen, M Ma
IEEE Transactions on Smart Grid 2 (4), 707-714, 2011
942011
PowerLSTM: power demand forecasting using long short-term memory neural network
Y Cheng, C Xu, D Mashima, VLL Thing, Y Wu
Advanced Data Mining and Applications: 13th International Conference, ADMA …, 2017
812017
Incentive mechanism design for heterogeneous peer-to-peer networks: A Stackelberg game approach
X Kang, Y Wu
IEEE Transactions on Mobile Computing 14 (5), 1018-1030, 2014
812014
Evolutionary deep belief network for cyber-attack detection in industrial automation and control system
KD Lu, GQ Zeng, X Luo, J Weng, W Luo, Y Wu
IEEE Transactions on Industrial Informatics 17 (11), 7618-7627, 2021
772021
Method for incremental authentication of documents
YD Wu, HR Deng
US Patent 7,315,866, 2008
752008
Compliant encryption of JPEG2000 codestreams
Y Wu, RH Deng
2004 International Conference on Image Processing, 2004. ICIP'04. 5, 3439-3442, 2004
672004
Progressive protection of JPEG2000 codestreams
Y Wu, D Ma, RH Deng
2004 International Conference on Image Processing, 2004. ICIP'04. 5, 3447-3450, 2004
642004
Vulnerabilities, attacks, and countermeasures in balise-based train control systems
Y Wu, J Weng, Z Tang, X Li, RH Deng
IEEE Transactions on intelligent transportation systems 18 (4), 814-823, 2016
612016
Transforming a pattern identifier into biometric key generators
Y Wu, B Qiu
2010 IEEE International Conference on Multimedia and Expo, 78-82, 2010
572010
MiR-26a and miR-144 inhibit proliferation and metastasis of esophageal squamous cell cancer by inhibiting cyclooxygenase-2
Y Shao, P Li, ST Zhu, JP Yue, XJ Ji, D Ma, L Wang, YJ Wang, Y Zong, ...
Oncotarget 7 (12), 15173, 2016
562016
LPPTE: A lightweight privacy-preserving trust evaluation scheme for facilitating distributed data fusion in cooperative vehicular safety applications
Z Liu, J Ma, J Weng, F Huang, Y Wu, L Wei, Y Li
Information Fusion 73, 144-156, 2021
552021
Software puzzle: A countermeasure to resource-inflated denial-of-service attacks
Y Wu, Z Zhao, F Bao, RH Deng
IEEE Transactions on Information Forensics and security 10 (1), 168-177, 2014
552014
Linear combination collusion attack and its application on an anti-collusion fingerprinting [image watermarking]
Y Wu
Proceedings.(ICASSP'05). IEEE International Conference on Acoustics, Speech …, 2005
532005
Multi-stage binary code obfuscation using improved virtual machine
H Fang, Y Wu, S Wang, Y Huang
International Conference on Information Security, 168-181, 2011
522011
BTMPP: Balancing trust management and privacy preservation for emergency message dissemination in vehicular networks
Z Liu, F Huang, J Weng, K Cao, Y Miao, J Guo, Y Wu
IEEE Internet of Things Journal 8 (7), 5386-5407, 2020
502020
Secure smart metering based on LoRa technology
Y Cheng, H Saputra, LM Goh, Y Wu
2018 IEEE 4th International Conference on Identity, Security, and Behavior …, 2018
502018
A lightweight privacy preservation scheme with efficient reputation management for mobile crowdsensing in vehicular networks
Y Cheng, J Ma, Z Liu, Y Wu, K Wei, C Dong
IEEE Transactions on Dependable and Secure Computing 20 (3), 1771-1788, 2022
482022
系统目前无法执行此操作,请稍后再试。
文章 1–20