Yongdong Wu
Yongdong Wu
Unknown affiliation
Verified email at - Homepage
Cited by
Cited by
Attribute-based access to scalable media in cloud-assisted content sharing networks
Y Wu, Z Wei, RH Deng
IEEE transactions on multimedia 15 (4), 778-788, 2013
On the security of an SVD-based ownership watermarking
Y Wu
IEEE transactions on Multimedia 7 (4), 624-627, 2005
UBAPV2G: A unique batch authentication protocol for vehicle-to-grid communications
H Guo, Y Wu, F Bao, H Chen, M Ma
IEEE Transactions on Smart Grid 2 (4), 707-714, 2011
Resonance attacks on load frequency control of smart grids
Y Wu, Z Wei, J Weng, X Li, RH Deng
IEEE Transactions on Smart Grid 9 (5), 4490-4502, 2017
Method for incremental authentication of documents
YD Wu, HR Deng
US Patent 7,315,866, 2008
Incentive mechanism design for heterogeneous peer-to-peer networks: A Stackelberg game approach
X Kang, Y Wu
IEEE Transactions on Mobile Computing 14 (5), 1018-1030, 2014
PowerLSTM: power demand forecasting using long short-term memory neural network
Y Cheng, C Xu, D Mashima, VLL Thing, Y Wu
International Conference on Advanced Data Mining and Applications, 727-740, 2017
Compliant encryption of JPEG2000 codestreams
Y Wu, RH Deng
2004 International Conference on Image Processing, 2004. ICIP'04. 5, 3439-3442, 2004
Progressive protection of JPEG2000 codestreams
Y Wu, D Ma, RH Deng
2004 International Conference on Image Processing, 2004. ICIP'04. 5, 3447-3450, 2004
Transforming a pattern identifier into biometric key generators
Y Wu, B Qiu
2010 IEEE International Conference on Multimedia and Expo, 78-82, 2010
Linear combination collusion attack and its application on an anti-collusion fingerprinting [image watermarking]
Y Wu
Proceedings.(ICASSP'05). IEEE International Conference on Acoustics, Speech …, 2005
MiR-26a and miR-144 inhibit proliferation and metastasis of esophageal squamous cell cancer by inhibiting cyclooxygenase-2
Y Shao, P Li, ST Zhu, JP Yue, XJ Ji, D Ma, L Wang, YJ Wang, Y Zong, ...
Oncotarget 7 (12), 15173, 2016
Software puzzle: A countermeasure to resource-inflated denial-of-service attacks
Y Wu, Z Zhao, F Bao, RH Deng
IEEE Transactions on Information Forensics and security 10 (1), 168-177, 2014
Multi-stage binary code obfuscation using improved virtual machine
H Fang, Y Wu, S Wang, Y Huang
International Conference on Information Security, 168-181, 2011
Vulnerabilities, attacks, and countermeasures in balise-based train control systems
Y Wu, J Weng, Z Tang, X Li, RH Deng
IEEE Transactions on intelligent transportation systems 18 (4), 814-823, 2016
Method of using biometric information for secret generation
US Patent App. 10/472,696, 2004
A flexible and scalable authentication scheme for JPEG2000 image codestreams
C Peng, RH Deng, Y Wu, W Shao
Proceedings of the eleventh ACM international conference on Multimedia, 433-441, 2003
Effects of cyclooxygenase-2 on human esophageal squamous cell carcinoma
L Zhang, YD Wu, P Li, J Tu, YL Niu, CM Xu, ST Zhang
World Journal of Gastroenterology: WJG 17 (41), 4572, 2011
Scalable authentication of MPEG-4 streams
Y Wu, RH Deng
IEEE Transactions on Multimedia 8 (1), 152-161, 2006
Trust on web browser: Attack vs. defense
TY Li, Y Wu
International Conference on Applied Cryptography and Network Security, 241-253, 2003
The system can't perform the operation now. Try again later.
Articles 1–20