Segui
Yulong Wang
Yulong Wang
Altri nomiWang Yulong, Y. Wang
Email verificata su bupt.edu.cn
Titolo
Citata da
Citata da
Anno
cPSO-CNN: An efficient PSO-based algorithm for fine-tuning hyper-parameters of convolutional neural networks
Y Wang, H Zhang, G Zhang
Swarm and Evolutionary Computation 49, 114-123, 2019
2212019
Adversarial attacks and defenses in machine learning-empowered communication systems and networks: A contemporary survey
Y Wang, T Sun, S Li, X Yuan, W Ni, E Hossain, HV Poor
IEEE Communications Surveys & Tutorials, 2023
772023
U-tri: Unlinkability through random identifier for sdn network
Y Wang, Q Chen, J Yi, J Guo
Proceedings of the 2017 Workshop on Moving Target Defense, 3-15, 2017
312017
Dispersed pixel perturbation-based imperceptible backdoor trigger for image classifier models
Y Wang, M Zhao, S Li, X Yuan, W Ni
IEEE Transactions on Information Forensics and Security 17, 3091-3106, 2022
162022
New adversarial image detection based on sentiment analysis
Y Wang, T Li, S Li, X Yuan, W Ni
IEEE Transactions on Neural Networks and Learning Systems, 2023
132023
Privacy-preserving top-k spatial keyword queries over outsourced database
S Su, Y Teng, X Cheng, Y Wang, G Li
International Conference on Database Systems for Advanced Applications, 589-608, 2015
122015
An IP-traceback-based packet filtering scheme for eliminating DDoS attacks
Y Wang, R Sun
Journal of Networks 9 (4), 874, 2014
122014
Deterministic packet marking based on the coordination of border gateways
L Yonghui, W Yulong, Y Fangchun, S Sen, Y Dong
2010 2nd International Conference on Education Technology and Computer 2, V2 …, 2010
92010
A semistructured random identifier protocol for anonymous communication in SDN network
Y Wang, J Yi, J Guo, Y Qiao, M Qi, Q Chen
Security and Communication Networks 2018 (1), 2916356, 2018
72018
Cooperative localization and association of commercial-off-the-shelf sensors in three-dimensional aircraft cabin
Y Wang, S Li, W Ni, D Abbott, M Johnson, G Pei, M Hedley
IEEE Transactions on Automation Science and Engineering 19 (4), 3508-3519, 2021
62021
Filtering Location Optimization for Defending Against Large‐Scale BDoS Attacks
N Lu, Y Wang, W Shi, G Li, D Diao
Chinese Journal of Electronics 26 (2), 435-444, 2017
52017
A parsing mode based method for malformed SIP messages testing for IMS network
Y Wang, D Wang, L Wang
Journal of Networks 8 (4), 812, 2013
52013
Cooperative three-dimensional position mapping based on received signal strength measurements: Algorithm design and field test
Y Wang, S Li, W Ni, M Zhao, A Jamalipour, B Wu
IEEE Transactions on Vehicular Technology 70 (10), 10541-10552, 2021
32021
An efficient and tunable matrix‐disguising method toward privacy‐preserving computation
Y Wang, Y Li
Security and Communication Networks 8 (17), 3099-3110, 2015
32015
WHIT: A more efficient hybrid method for single-packet IP traceback using walsh matrix and router degree distribution
Y Wang, J Ren
IEICE transactions on communications 96 (7), 1896-1907, 2013
32013
A Practical Method for SIP-DoS Attack Effect Evaluation
Y Wang, Y Yang
Journal of Information & Computational Science 9, 333-345, 2012
32012
Minimizing adversarial training samples for robust image classifiers: analysis and adversarial example generator design
Y Wang, T Sun, X Yuan, S Li, W Ni
IEEE Transactions on Information Forensics and Security, 2024
22024
Automatic device-location association based on received signal strength measurements
Y Wang, S Li, W Ni, D Abbott, M Johnson, G Pei, M Hedley
2020 IEEE 92nd Vehicular Technology Conference (VTC2020-Fall), 1-5, 2020
22020
IMS 络中畸形 SIP 信令的快速检测
王玉龙, 杨鸿飞, 杨逸
北京邮电大学学报 34 (6), 2011
22011
A Method for Disguising Malformed SIP Messages to Evade SIP IDS.
Y Wang, L Wang
J. Softw. 8 (11), 2830-2838, 2013
12013
Il sistema al momento non può eseguire l'operazione. Riprova più tardi.
Articoli 1–20