cPSO-CNN: An efficient PSO-based algorithm for fine-tuning hyper-parameters of convolutional neural networks Y Wang, H Zhang, G Zhang Swarm and Evolutionary Computation 49, 114-123, 2019 | 221 | 2019 |
Adversarial attacks and defenses in machine learning-empowered communication systems and networks: A contemporary survey Y Wang, T Sun, S Li, X Yuan, W Ni, E Hossain, HV Poor IEEE Communications Surveys & Tutorials, 2023 | 77 | 2023 |
U-tri: Unlinkability through random identifier for sdn network Y Wang, Q Chen, J Yi, J Guo Proceedings of the 2017 Workshop on Moving Target Defense, 3-15, 2017 | 31 | 2017 |
Dispersed pixel perturbation-based imperceptible backdoor trigger for image classifier models Y Wang, M Zhao, S Li, X Yuan, W Ni IEEE Transactions on Information Forensics and Security 17, 3091-3106, 2022 | 16 | 2022 |
New adversarial image detection based on sentiment analysis Y Wang, T Li, S Li, X Yuan, W Ni IEEE Transactions on Neural Networks and Learning Systems, 2023 | 13 | 2023 |
Privacy-preserving top-k spatial keyword queries over outsourced database S Su, Y Teng, X Cheng, Y Wang, G Li International Conference on Database Systems for Advanced Applications, 589-608, 2015 | 12 | 2015 |
An IP-traceback-based packet filtering scheme for eliminating DDoS attacks Y Wang, R Sun Journal of Networks 9 (4), 874, 2014 | 12 | 2014 |
Deterministic packet marking based on the coordination of border gateways L Yonghui, W Yulong, Y Fangchun, S Sen, Y Dong 2010 2nd International Conference on Education Technology and Computer 2, V2 …, 2010 | 9 | 2010 |
A semistructured random identifier protocol for anonymous communication in SDN network Y Wang, J Yi, J Guo, Y Qiao, M Qi, Q Chen Security and Communication Networks 2018 (1), 2916356, 2018 | 7 | 2018 |
Cooperative localization and association of commercial-off-the-shelf sensors in three-dimensional aircraft cabin Y Wang, S Li, W Ni, D Abbott, M Johnson, G Pei, M Hedley IEEE Transactions on Automation Science and Engineering 19 (4), 3508-3519, 2021 | 6 | 2021 |
Filtering Location Optimization for Defending Against Large‐Scale BDoS Attacks N Lu, Y Wang, W Shi, G Li, D Diao Chinese Journal of Electronics 26 (2), 435-444, 2017 | 5 | 2017 |
A parsing mode based method for malformed SIP messages testing for IMS network Y Wang, D Wang, L Wang Journal of Networks 8 (4), 812, 2013 | 5 | 2013 |
Cooperative three-dimensional position mapping based on received signal strength measurements: Algorithm design and field test Y Wang, S Li, W Ni, M Zhao, A Jamalipour, B Wu IEEE Transactions on Vehicular Technology 70 (10), 10541-10552, 2021 | 3 | 2021 |
An efficient and tunable matrix‐disguising method toward privacy‐preserving computation Y Wang, Y Li Security and Communication Networks 8 (17), 3099-3110, 2015 | 3 | 2015 |
WHIT: A more efficient hybrid method for single-packet IP traceback using walsh matrix and router degree distribution Y Wang, J Ren IEICE transactions on communications 96 (7), 1896-1907, 2013 | 3 | 2013 |
A Practical Method for SIP-DoS Attack Effect Evaluation Y Wang, Y Yang Journal of Information & Computational Science 9, 333-345, 2012 | 3 | 2012 |
Minimizing adversarial training samples for robust image classifiers: analysis and adversarial example generator design Y Wang, T Sun, X Yuan, S Li, W Ni IEEE Transactions on Information Forensics and Security, 2024 | 2 | 2024 |
Automatic device-location association based on received signal strength measurements Y Wang, S Li, W Ni, D Abbott, M Johnson, G Pei, M Hedley 2020 IEEE 92nd Vehicular Technology Conference (VTC2020-Fall), 1-5, 2020 | 2 | 2020 |
IMS 络中畸形 SIP 信令的快速检测 王玉龙, 杨鸿飞, 杨逸 北京邮电大学学报 34 (6), 2011 | 2 | 2011 |
A Method for Disguising Malformed SIP Messages to Evade SIP IDS. Y Wang, L Wang J. Softw. 8 (11), 2830-2838, 2013 | 1 | 2013 |