default search action
Yuwei Xu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j22]Jie Cao, Yuwei Xu, Enze Yu, Qiao Xiang, Kehui Song, Liang He, Guang Cheng:
GateKeeper: An UltraLite malicious traffic identification method with dual-aspect optimization strategies on IoT gateways. Comput. Networks 250: 110556 (2024) - [j21]Kai Wang, Yuwei Xu, Siqiang Luo:
TIGER: Training Inductive Graph Neural Network for Large-scale Knowledge Graph Reasoning. Proc. VLDB Endow. 17(10): 2459-2472 (2024) - [j20]Kejun Zhang, Shaofei Xu, Yutuo Song, Yuwei Xu, Pengcheng Li, Xiang Yang, Bing Zou, Wenbin Wang:
An Efficient Cross-Modal Privacy-Preserving Image-Text Retrieval Scheme. Symmetry 16(8): 1084 (2024) - [c37]Kai Wang, Yuwei Xu, Zhiyong Wu, Siqiang Luo:
LLM as Prompter: Low-resource Inductive Reasoning on Arbitrary Knowledge Graphs. ACL (Findings) 2024: 3742-3759 - [c36]Yuwei Xu, Jiangfeng Li, Yujie Hou, Lei Wang, Kehui Song, Guang Cheng:
NuanceTracker: A Website Fingerprinting Attack against Tor Hidden Services through Burst patterns. ISCC 2024: 1-7 - [i2]Kai Wang, Yuwei Xu, Zhiyong Wu, Siqiang Luo:
LLM as Prompter: Low-resource Inductive Reasoning on Arbitrary Knowledge Graphs. CoRR abs/2402.11804 (2024) - 2023
- [j19]Yuwei Xu, Jie Cao, Kehui Song, Qiao Xiang, Guang Cheng:
FastTraffic: A lightweight method for encrypted traffic fast classification. Comput. Networks 235: 109965 (2023) - [j18]Yuwei Xu, Jie Cao, Kehui Song, Qiao Xiang, Guang Cheng:
Corrigendum to "FastTraffic: A lightweight method for encrypted traffic fast classification" [Computer Networks, Volume 235, November 2023, 109965]. Comput. Networks 237: 110098 (2023) - [j17]Yuwei Xu, Ran He, Shengjiang Dai, Yujian Zhang:
ChainKeeper: A cross-chain scheme for governing the chain by chain. IET Blockchain 3(4): 249-264 (2023) - [j16]Yuwei Xu, Enze Yu, Yuxing Song, Fei Tong, Qiao Xiang, Liang He:
$\mathcal {R}$-Tracing: Consortium Blockchain-Based Vehicle Reputation Management for Resistance to Malicious Attacks and Selfish Behaviors. IEEE Trans. Veh. Technol. 72(6): 7095-7110 (2023) - [c35]Jie Cao, Yuwei Xu, Qiao Xiang:
$\mathcal{L}{-}$ ETC: A Lightweight Model Based on Key Bytes Selection for Encrypted Traffic Classification. ICC 2023: 2370-2375 - [c34]Yuwei Xu, Lei Wang, Jiangfeng Li, Kehui Song, Yali Yuan:
Zoomer: A Website Fingerprinting Attack Against Tor Hidden Services. ICICS 2023: 370-382 - [c33]Yuwei Xu, Haoyu Wang, Junyu Zeng:
SCOPE: A Cross-Chain Supervision Scheme for Consortium Blockchains. ICICS 2023: 553-570 - [c32]Yuwei Xu, Yuxing Song, Junyu Zeng, Ran He, Jingdong Xu:
S-chain: A Shard-based Blockchain Scheme for Cross-chain Supervision. ICPADS 2023: 667-674 - [c31]Yuwei Xu, Zehui Wu, Jie Cao, Jingdong Xu, Guang Cheng:
DarkTrans: A Blockchain-based Covert Communication Scheme with High Channel Capacity and Strong Concealment. ICPADS 2023: 675-682 - [c30]Yuwei Xu, Ying Zhang, Haonan Shi, Jie Cao:
ChainPass: A Privacy-preserving Complete Cross-chain Authentication for Consortium Blockchains. TrustCom 2023: 334-341 - [c29]Yuwei Xu, Xiaotian Fang, Jie Cao, Rou Yu, Kehui Song, Guang Cheng:
Cerberus: Efficient OSPS Traffic Identification through Multi-Task Learning. TrustCom 2023: 504-511 - [c28]Yuwei Xu, Zizhi Zhu, Yunpeng Bai, Lilanyi Wu, Kehui Song, Guang Cheng:
SharpEye: Identify mKCP Camouflage Traffic through Feature Optimization. TrustCom 2023: 1157-1164 - [c27]Yuwei Xu, Tiantian Zhang, Junyu Zeng, Rongrong Wang, Kehui Song, Jingdong Xu:
SmartBuoy: A Machine Learning-Based Detection Method for Interest Flooding Attacks in VNDN. UbiSec 2023: 236-252 - 2022
- [j15]Changhai Wang, Hui Liang, Bo Wang, Xiaoxu Cui, Yuwei Xu:
MG-Conv: A spatiotemporal multi-graph convolutional neural network for stock market index trend prediction. Comput. Electr. Eng. 103: 108285 (2022) - [j14]Yujian Zhang, Yuhao Luo, Xing Chen, Fei Tong, Yuwei Xu, Jun Tao, Guang Cheng:
A Lightweight Authentication Scheme Based on Consortium Blockchain for Cross-Domain IoT. Secur. Commun. Networks 2022: 9686049:1-9686049:15 (2022) - 2021
- [j13]Yujian Zhang, Chuanyou Li, Fei Tong, Yuwei Xu:
A variable neighborhood search algorithm for energy conscious task scheduling in heterogeneous computing systems. Concurr. Comput. Pract. Exp. 33(24) (2021) - [j12]Jingyu Yang, Yuwei Xu, Huanjing Yue, Zhongyu Jiang, Kun Li:
Low-light image enhancement based on Retinex decomposition and adaptive gamma correction. IET Image Process. 15(5): 1189-1202 (2021) - [c26]Yuwei Xu, Lijuan Feng, Zeyang Xia, Jing Xiong:
Camera Pose Estimation Based on Feature Extraction and Description for Robotic Gastrointestinal Endoscopy. ICIRA (3) 2021: 113-122 - [c25]Xinjing Yuan, Lingjun Pu, Xiaohang Xu, Yuwei Xu, Jingdong Xu:
Streaming-Aware Cellular Resource Allocation for UHD Video Streaming over Ultra Dense Network. WCNC 2021: 1-7 - 2020
- [j11]Yuwei Xu, Shuai Tong, Tiantian Zhang, Wen Sun, Xiaoyan Hu, Qiao Xiang:
COMPASS: Directing Named Data Transmission in VANETs by Dynamic Directional Interfaces. IEEE Access 8: 8418-8435 (2020) - [j10]Zhizhong Fu, Yufei Zhao, Yuwei Xu, Lijuan Xu, Jin Xu:
Gradient structural similarity based gradient filtering for multi-modal image fusion. Inf. Fusion 53: 251-268 (2020) - [c24]Yujian Zhang, Fei Tong, Yuwei Xu, Jun Tao, Guang Cheng:
A Privacy-Preserving Authentication Scheme for VANETs based on Consortium Blockchain. VTC Fall 2020: 1-6
2010 – 2019
- 2018
- [j9]Changhai Wang, Yuwei Xu, Hui Liang, Wanwei Huang, Ling Zhang:
WOODY: A Post-Process Method for Smartphone-Based Activity Recognition. IEEE Access 6: 49611-49625 (2018) - [j8]Yuwei Xu, Claude Carlet, Sihem Mesnager, Chuankun Wu:
Classification of Bent Monomials, Constructions of Bent Multinomials and Upper Bounds on the Nonlinearity of Vectorial Functions. IEEE Trans. Inf. Theory 64(1): 367-383 (2018) - [c23]Wenping Yu, Jianzhong Zhang, Jingdong Xu, Yuwei Xu:
Motion Trajectory Sequence-Based Map Matching Assisted Indoor Autonomous Mobile Robot Positioning. ICA3PP (3) 2018: 327-341 - [c22]Ningjia Fu, Yuwei Xu, Jianzhong Zhang, Rongkang Wang, Jingdong Xu:
FlowCop: Detecting "Stranger" in Network Traffic Classification. ICCCN 2018: 1-9 - [c21]Siyan Yao, Yuwei Xu, Shuai Tong, Jianzhong Zhang, Jingdong Xu:
N-Guide: Achieving Efficient Named Data Transmission in Smart Buildings. WASA 2018: 580-592 - [c20]Miao Lu, Ying Wu, Yuwei Xu, Yijie Yang, Jingjing Wang:
SACP: A Signcryption-Based Authentication Scheme with Conditional Privacy Preservation for VANET. WASA 2018: 773-779 - 2017
- [j7]Yuwei Xu, Yongqiang Li, Chuankun Wu, Feng Liu:
On the construction of differentially 4-uniform involutions. Finite Fields Their Appl. 47: 309-329 (2017) - [j6]Yuwei Xu, Chuankun Wu:
Further Characterization of H Vectorial Functions. Int. J. Netw. Secur. 19(6): 899-903 (2017) - [c19]Yuwei Xu, Siyan Yao, Changhai Wang, Jingdong Xu:
CO-RTO: Achieving efficient data retransmission in VNDN by correlations implied in names. INFOCOM Workshops 2017: 366-371 - [c18]Wenping Yu, Yuwei Xu, Jianzhong Zhang, Chao Ma, Jingdong Xu:
A Smartphone-Based Online Pedestrian Positioning Approach for Both Structured and Open Indoor Spaces. ISPA/IUCC 2017: 1194-1198 - 2016
- [c17]Changhai Wang, Yuwei Xu, Jianzhong Zhang, Wenping Yu:
COPO: A Novel Position-Adaptive Method for Smartphone-Based Human Activity Recognition. APSCC 2016: 1-14 - [c16]Changhai Wang, Meng Li, Jianzhong Zhang, Yuwei Xu:
A Model with Hierarchical Classifiers for Activity Recognition on Mobile Devices. Trustcom/BigDataSE/ISPA 2016: 1295-1301 - [c15]Changhai Wang, Yuwei Xu, Jianzhong Zhang, Wenping Yu:
SW-HMM: A Method for Evaluating Confidence of Smartphone-Based Activity Recognition. Trustcom/BigDataSE/ISPA 2016: 2086-2091 - 2015
- [j5]Yuwei Xu, Jeremiah D. Deng, Mariusz Nowostawski, Martin K. Purvis:
Optimized routing for video streaming in multi-hop wireless networks using analytical capacity estimation. J. Comput. Syst. Sci. 81(1): 145-157 (2015) - [c14]Yuwei Xu, Jian Wang, Tingting Liu, Wenping Yu, Jingdong Xu:
Detecting Urban Road Condition and Disseminating Traffic Information by VANETs. UIC/ATC/ScalCom 2015: 93-98 - [i1]Yuwei Xu, Chuankun Wu:
On the Existence and Constructions of Vectorial Boolean Bent Functions. IACR Cryptol. ePrint Arch. 2015: 77 (2015) - 2014
- [j4]Jianhong Zhang, Yuwei Xu:
Privacy-preserving authentication protocols with efficient verification in VANETs. Int. J. Commun. Syst. 27(12): 3676-3692 (2014) - [c13]Changhai Wang, Jianzhong Zhang, Meng Li, Yuan Yuan, Yuwei Xu:
A Smartphone Location Independent Activity Recognition Method Based on the Angle Feature. ICA3PP (1) 2014: 179-191 - [c12]Shiwei Ran, Jinzhi Lin, Ying Wu, Jianzhong Zhang, Yuwei Xu:
Converting Ptolemy II Models to SpaceEx for Applied Verification. ICA3PP (1) 2014: 669-683 - [c11]Yuwei Xu, Ying Wu, Jingdong Xu, Tingting Liu, Jian Wang, Anhua Lin:
An efficient detection scheme for urban traffic condition using volunteer probes. ICPADS 2014: 768-773 - 2013
- [j3]Jianhong Zhang, Jian Mao, Yuwei Xu:
On the security of an ID-based anonymous proxy signature scheme and its improved scheme. Int. J. Embed. Syst. 5(3): 181-188 (2013) - [j2]Jianhong Zhang, Yuwei Xu, Jiancheng Zou:
Comment on Wang et al.'s anonymous multi-receiver ID-based encryption scheme and its improved schemes. Int. J. Intell. Inf. Database Syst. 7(5): 400-413 (2013) - [j1]Jianhong Zhang, Yuwei Xu, Zhipeng Chen:
Augmented Broadcaster Identity-based Broadcast Encryption. J. Digit. Inf. Manag. 11(3): 227-234 (2013) - [c10]Yuwei Xu, Jeremiah D. Deng, Mariusz Nowostawski:
Quality of service for video streaming over multi-hop wireless networks: Admission control approach based on analytical capacity estimation. ISSNIP 2013: 345-350 - 2012
- [c9]Jianhong Zhang, Yuwei Xu:
Breaking and Repairing of an Anonymous and Traceable Communication Protocol for Vehicular Ad Hoc Networks. CIT 2012: 88-93 - [c8]Yuwei Xu, Ying Wu, Jingdong Xu, Lin Sun:
Efficient Detection Scheme for Urban Traffic Congestion Using Buses. AINA Workshops 2012: 287-293 - [c7]Lin Sun, Ying Wu, Jingdong Xu, Yuwei Xu:
An RSU-assisted Cluster Head Selection and Backup Protocol. AINA Workshops 2012: 581-587 - [c6]Yuwei Xu, Jeremiah D. Deng, Mariusz Nowostawski:
Optimizing Routing in Multi-hop Wireless Networks Using Analytical Capacity Estimation: A Study on Video Streaming. HPCC-ICESS 2012: 748-755 - [c5]Jianhong Zhang, Yuwei Xu:
On the Security of an Enhanced ID-Based Anonymous Proxy Signature Scheme in ICCAE2010. INCoS 2012: 245-250 - [c4]Jianhong Zhang, Yuwei Xu:
Comment on Anonymous Multi-receiver Identity-Based Encryption Scheme. INCoS 2012: 473-476 - [c3]Yuwei Xu, Ying Wu, Jingdong Xu, Dongying Ni, Gongyi Wu, Lin Sun:
A Queue-Length-Based Detection Scheme for Urban Traffic Congestion by VANETs. NAS 2012: 252-259 - 2011
- [c2]Yuwei Xu, Ying Wu, Jingdong Xu, Lin Sun:
Multi-hop broadcast for data transmission of traffic congestion detection. MUM 2011: 100-108 - 2010
- [c1]Yuwei Xu, Ying Wu, Gongyi Wu, Jingdong Xu, Boxing Liu, Lin Sun:
Data Collection for the Detection of Urban Traffic Congestion by VANETs. APSCC 2010: 405-410
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 20:33 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint