Rongwei Yu

ORCID: 0000-0002-1376-2720
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Advanced Malware Detection Techniques
  • Security and Verification in Computing
  • Cloud Data Security Solutions
  • Network Security and Intrusion Detection
  • Cryptography and Data Security
  • Anomaly Detection Techniques and Applications
  • Advanced Neural Network Applications
  • Image Enhancement Techniques
  • Blockchain Technology Applications and Security
  • Advanced Data Storage Technologies
  • Access Control and Trust
  • Internet Traffic Analysis and Secure E-voting
  • Video Surveillance and Tracking Methods
  • Advanced Steganography and Watermarking Techniques
  • Advanced Vision and Imaging
  • Generative Adversarial Networks and Image Synthesis
  • Spam and Phishing Detection
  • Distributed and Parallel Computing Systems
  • Robotics and Sensor-Based Localization
  • Advanced Authentication Protocols Security
  • Cloud Computing and Resource Management
  • User Authentication and Security Systems
  • Digital and Cyber Forensics
  • Image and Signal Denoising Methods
  • Adversarial Robustness in Machine Learning

Wuhan University
2009-2024

Ministry of Education of the People's Republic of China
2012

Motivation The conformational B-cell epitopes are the specific sites on antigens that have immune functions. identification of is great importance to immunologists for facilitating design peptide-based vaccines. As an attempt narrow search experimental validation, various computational models been developed epitope prediction by using antigen structures. However, application these undermined limited number available In contrast most structure-based methods, we here accurately predict from...

10.1371/journal.pone.0043575 article EN cc-by PLoS ONE 2012-08-21

Intrusion detection systems are crucial in fighting against various network attacks. By monitoring the behavior real time, possible attack attempts can be detected and acted upon. However, with development of openness flexibility networks, artificial immunity-based anomaly methods lack continuous adaptability hence have poor performance. Thus, a novel framework for adaptive regulation is built this paper. First, heuristic dimensionality reduction algorithm based on unsupervised clustering...

10.1155/2023/8980876 article EN cc-by International Journal of Intelligent Systems 2023-02-24

LiDAR and camera, as two different sensors, supply geometric (point clouds) semantic (RGB images) information of 3D scenes. However, it is still challenging for existing methods to fuse data from the cross making them complementary quality object detection (3OD). We propose ImLiDAR, a new 3OD paradigm narrow cross-sensor discrepancies by progressively fusing multi-scale features camera Images point clouds. ImLiDAR enables provide head with yet robustly fused features. To achieve this, core...

10.1109/tgrs.2023.3321138 article EN IEEE Transactions on Geoscience and Remote Sensing 2023-01-01

The presence of haze negatively affects the visibility captured images, posing challenges for general object detection models. We observe that current techniques exhibit three limitations: 1) they typically view image restoration and as separate tasks; 2) disregard potential details in degraded images benefit detection; 3) lack sufficient recognition ability under interference. To this end, we propose a novel Diffusion Model (Diff-HOD) Object Detection Hazy weather conditions. Diff-HOD is...

10.1109/icassp48485.2024.10446872 article EN ICASSP 2022 - 2022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) 2024-03-18

Object detection remains challenging in hazy weather conditions due to the poor visibility of captured images. There are currently two types detectors capable adapting varying conditions: (i) low-level adaptation methods that combine one detector with an additional dehazing network and (ii) high-level explore various kinds domain knowledge. However, neither these approaches can achieve desirable performance their inherent limitations. We raise intriguing question—if combining both...

10.1155/2023/3691730 article EN cc-by International Journal of Intelligent Systems 2023-04-14

In this paper we present a file distribution model aiming at data leakage prevention. Taking into consideration the guilt probability which is of user having leaked files, can select allocation plan with least overlap between obtained sets users, as consequence find out sources high probability. So that measures be taken for information security further. The simulation experiments reveal distinguish malicious users and detect leak source effectively.

10.1109/mec.2013.6885474 article EN 2013-12-01

10.1007/s11859-010-0305-7 article EN Wuhan University Journal of Natural Sciences 2010-05-12

Jitter is one of the premier impairments which inflict a heavy damage on quality service in wireless VoIP. To solve this issue, paper proposes new quality-based jitter buffer algorithm. An adaptive windowing algorithm introduced to dynamically adjust window size indicates numbers packets used estimate future network delay and loss rete. When receiving voice packet, receiver firstly uses variable-size update size. Then, histogram established according remaining window. Finally, E-Model...

10.1109/iccsnt.2012.6525910 article EN 2012-12-01

The Rowhammer bug is a novel micro-architectural security threat, enabling powerful privilege-escalation attacks on various mainstream platforms. It works by actively flipping bits in Dynamic Random Access Memory (DRAM) cells with unprivileged instructions. In order to set up against binaries the Linux page cache, Waylaying algorithm has previously been proposed. method stealthily relocates onto exploitable physical addresses without exhausting system memory. However, proof-of-concept can be...

10.26599/tst.2018.9010134 article EN Tsinghua Science & Technology 2019-04-29

Fault localization is a critical step of software debugging. We present statistical fault approach via semi-dynamic slicing in this paper. In our technique, we first conduct the execution flow graph based on both coverage information and static control-flow-graph to model executions approximately. Second, use backward analyze dependence relationships between statements results, obtain sliced calculate statistics. At last, suspiciousness according Tarantula, classic localization. Controlled...

10.1109/trustcom.2011.89 article EN 2011-11-01

Cloud attack provenance is a well-established industrial practice for assuring transparency and accountability service provider to tenants. However, the multi-tenancy self-service nature coupled with sheer size of cloud implies many unique challenges forensics. Although Virtual Machine Introspection (VMI) powerful tool due privilege isolation, stealthiness state-of-the-art attacks lack precise information make existing solutions difficult fulfill real-time forensics when tracking enormous...

10.1109/tifs.2022.3183409 article EN IEEE Transactions on Information Forensics and Security 2022-01-01

Multivariate time series anomaly detection on key performance indicators helps mitigate the impact of large-scale IT system anomalies. Due to large volume and abstract nature multivariate series, previous works have tended make overly strict or optimistic hypotheses labeling costs resulted in unsatisfactory results. Thus, it remains a challenge an appropriate trade-off between model performance. This research proposes AMAD, active learning-based approach that address this problem. Its core...

10.1016/j.cose.2023.103603 article EN cc-by-nc-nd Computers & Security 2023-11-22

Trusted computing has been introduced into virtualization as an approach of providing trust in a platform. However, the primitive design privileged domain menaces virtual TPMs with oversize trusted base, leading to security vulnerabilities. This paper proposes new administrative (Domain A), architecture that prevents from tampers. We port VTPM components Domain A. begin reviewing Xen TPM and depicting attack Xen. Then, A-based scheme is described principle implementation porting manager...

10.1109/mines.2010.162 article EN International Conference on Multimedia Information Networking and Security 2010-01-01

This paper proposes an efficient architecture to produce a hierarchical access control scheme for the multicast application environment. The divides group members into several subgroups with different rights. In order enhance efficiency, theory of Weil pairing is introduced present three party key agreement protocol. advantages this are : (1) easy implementation, (2) support high dynamics controls, including join, leave, merge and partition. Meanwhile, communication broadcasting between...

10.1109/nswctc.2009.80 article EN 2009-04-01

Real-world rain is a mixture of streaks and rainy haze. It poses great challenge for current deraining techniques due to two reasons. First, existing methods consider removal haze as separate processes. Second, they are limited in insufficient modeling ability learn the mapping from clean images. To address these issues, we propose novel Depth-guided Dynamic Message Passing Diffusion Model removal, called DG-RainDiff. DG-RainDiff joint learning paradigm that integrates depth estimation image...

10.1109/icassp48485.2024.10445956 article EN ICASSP 2022 - 2022 IEEE International Conference on Acoustics, Speech and Signal Processing (ICASSP) 2024-03-18

We propose a novel model‐free unsupervised learning paradigm to tackle the unfavorable prevailing problem of real‐world image deraining, dubbed MUL‐Derain. Beyond existing deraining efforts, MUL‐Derain leverages Multiscale Attentive Filtering (MSAF) handle multiscale rain streaks. Therefore, formulation any imaging is not necessary, and it requires neither iterative optimization nor progressive refinement operations. Meanwhile, can efficiently compute spatial coherence global interactions by...

10.1155/2024/7454928 article EN cc-by International Journal of Intelligent Systems 2024-01-01

10.32604/cmc.2024.056165 article EN Computers, materials & continua/Computers, materials & continua (Print) 2024-01-01

In cloud storage, symmetric encryption is a common method to protect the confidentiality of volume data. One critical issue in management keys such as key generation, update and distribution. Many schemes have adopted hierarchical structures based on derivation generate organize keys. However, efficient these derived associated distribution multiple not been well studied. This paper mainly studies in-situ traffic cost First, we redesign node structure our binary key-derivation tree provide...

10.1007/s11227-024-06684-8 article EN cc-by-nc-nd The Journal of Supercomputing 2024-12-01

Session Initiation Protocol is widely used for establishing VoIP calls in wireless packet networks. According to shortages of SIP and relevant security mechanisms, a secure identity-based mechanism was proposed this paper. The scheme realizes point-to-point mutual authentication by employing signature, achieves end-to-end identity key agreement between cross-domain user agents message integrity checking Diffle-Hellman mechanism. Compared trans-domain communication, our method has the...

10.1109/icsess.2012.6269501 article EN IEEE International Conference on Computer Science and Automation Engineering 2012-06-01
Coming Soon ...