default search action
Songyang Wu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j19]Yunze Tong, Xuebo Zhang, Runhua Wang, Zhixing Song, Songyang Wu, Shiyong Zhang, Youwei Wang, Jing Yuan:
TC$^{2}$LI-SLAM: A Tightly-Coupled Camera-LiDAR-Inertial SLAM System. IEEE Robotics Autom. Lett. 9(9): 7421-7428 (2024) - [j18]Ruyi Li, Xuebo Zhang, Shiyong Zhang, Jing Yuan, Hui Liu, Songyang Wu:
BA-LIOM: tightly coupled laser-inertial odometry and mapping with bundle adjustment. Robotica 42(3): 684-700 (2024) - [c10]Songyang Wu, Bochen Shen, Hao Zheng, Wenqi Sun, Qi Sun, Shuang Wang:
FedURL: A BERT-based Federated Malicious URL Detection Framework. ICIC (9) 2024: 122-131 - 2023
- [j17]Wei Guo, Zhe Wang, Ziqiu Chi, Xinlei Xu, Dongdong Li, Songyang Wu:
Scalable one-stage multi-view subspace clustering with dictionary learning. Knowl. Based Syst. 259: 110092 (2023) - [j16]Songyang Wu, Lipeng Song:
Effects of Competition and Reputation on Auditing Cloud Service Provider's Security Commitment. IEEE Syst. J. 17(1): 306-313 (2023) - [j15]Haiying Li, Jinchong He, Songyang Wu, Bin Xu, Lu Bai:
Incoherent Scattering of a Bessel Vortex Electromagnetic Beam From a Nonmagnetized Plasma. IEEE Trans. Geosci. Remote. Sens. 61: 1-8 (2023) - [c9]Yukun Li, Songyang Wu, Zhiguo Ding, Jiahong Jiang, Kezhu Song:
Personalized Privacy Protection and Security Aggregation Technology for Smart Grid. AISNS 2023: 431-437 - [c8]Zhengyan Ding, Yanfeng Shang, Songyang Wu, Zicheng Wang, Jie Chen:
Introducing Unsupervised Big Data and Multimodal Large Models for Small Tasks on Plate Recognition. CISP-BMEI 2023: 1-5 - [c7]Han Zhang, Libo Chen, Ming Liu, Yong Shi, Songyang Wu, Zhi Xue:
Both Sides Needed: A Two-Dimensional Measurement Study of Email Security Based on SPF and DMARC. MSN 2023: 855-861 - 2022
- [j14]Songyang Wu, Wenqi Sun, Zhiguo Ding, Shanjun Liu:
Cloud Evidence Tracing System: An integrated forensics investigation system for large-scale public cloud platform. Digit. Investig. 41: 301391 (2022) - [j13]Songyang Wu, Wenju Xu, Zhiyong Hong, Pu Duan, Benyu Zhang, Yupu Hu, Baocang Wang:
Updatable privacy-preserving itK-nearest neighbor query in location-based s-ervice. Peer-to-Peer Netw. Appl. 15(2): 1076-1089 (2022) - [c6]Ying Zhang, Linyu Guan, Jingyan Lu, Songyang Wu:
Face Forgery Detection of Deepfake Based on Multiple Convolutional Neural Networks. SPML 2022: 211-217 - [i1]Qinyu Hu, Songyang Wu, Wenqi Sun, Zhushou Tang, Chaofan Chen, Zhiguo Ding, Xiaomei Zhang:
Measurement of the Usage of Web Clips in Underground Economy. CoRR abs/2209.03319 (2022) - 2021
- [j12]Songyang Wu, Wenqi Sun, Qingle Wang, Ronghua Che, Meng Hu, Zhiguo Ding, Xue Xue:
A Secure Quantum Protocol for Anonymous One-Vote Veto Voting. IEEE Access 9: 146841-146849 (2021) - [j11]Xiaoyang Liu, Songyang Wu, Chao Liu, Yihao Zhang:
Social network node influence maximization method combined with degree discount and local node optimization. Soc. Netw. Anal. Min. 11(1): 31 (2021) - [c5]Hao Peng, Zhen Qian, Ming Zhong, Dandan Zhao, Guangquan Xu, Songyang Wu, Jianming Han:
System Security Analysis of Different Link Proportions Between Nodes in the Cyber-Physical System Against Target Attack. FCS 2021: 230-242
2010 – 2019
- 2018
- [c4]Hanzhou Wu, Wei Wang, Jing Dong, Yanli Chen, Hongxia Wang, Songyang Wu:
Reversible Embedding to Covers Full of Boundaries. ICCCS (4) 2018: 404-415 - 2017
- [j10]Songyang Wu, Yong Zhang, Wei Cao:
Network security assessment using a semantic reasoning and graph based approach. Comput. Electr. Eng. 64: 96-109 (2017) - [j9]Songyang Wu, Yong Zhang, Xupeng Wang, Xiong Xiong, Lin Du:
Forensic analysis of WeChat on Android smartphones. Digit. Investig. 21: 3-10 (2017) - [j8]Na Ruan, Mingli Wu, Shiheng Ma, Haojin Zhu, Weijia Jia, Songyang Wu:
Detect and Prevent SIP Flooding Attacks in VoLTE by Utilizing a Two-Tier PFilter Design. IEICE Trans. Inf. Syst. 100-D(10): 2287-2294 (2017) - [c3]Mingli Wu, Na Ruan, Shiheng Ma, Haojin Zhu, Weijia Jia, Qingshui Xue, Songyang Wu:
Detect SIP Flooding Attacks in VoLTE by Utilizing and Compressing Counting Bloom Filter. WASA 2017: 124-135 - 2016
- [j7]Songyang Wu, Pan Wang, Xun Li, Yong Zhang:
Effective detection of android malware based on the usage of data flow APIs and machine learning. Inf. Softw. Technol. 75: 17-25 (2016) - [j6]Hao Peng, Dandan Zhao, Yunjie Yu, Zhendong Wu, Songyang Wu:
一种面向分布式异构网络的基于可信计算的信任模型 (Trust Model Based on Trusted Computing for Distributed Heterogeneous Networks). 计算机科学 43(10): 66-69 (2016) - [j5]Songyang Wu, Yong Zhang:
Secure Provenance for Data Forensics with Efficient Revocation of Anonymous Credentials in Cloud Computing. Wirel. Pers. Commun. 90(3): 1497-1517 (2016) - [c2]Songyang Wu, Yong Zhang:
Efficient verification of data possession in cloud computing. CCIS 2016: 424-428 - 2015
- [j4]Yang Zhao, Feng Yue, Songyang Wu, Hu Xiong, Zhiguang Qin:
Analysis and Improvement of Patient Self-controllable Multi-level Privacy-preserving Cooperative Authentication Scheme. Int. J. Netw. Secur. 17(6): 779-786 (2015) - [j3]Hu Xiong, Shikun Wu, Ji Geng, Emmanuel Ahene, Songyang Wu, Zhiguang Qin:
A Pairing-free Key-insulated Certificate-based Signature Scheme with Provable Security. KSII Trans. Internet Inf. Syst. 9(3): 1246-1259 (2015) - [j2]Songyang Wu, Yong Zhang:
Secure cloud storage using anonymous and blackbox traceable data access control. Secur. Commun. Networks 8(18): 4308-4318 (2015) - [j1]Hu Xiong, Songyang Wu, Fagen Li, Zhiguang Qin:
Compact Leakage-Free ID-Based Signature Scheme with Applications to Secret Handshakes. Wirel. Pers. Commun. 80(4): 1671-1685 (2015)
2000 – 2009
- 2009
- [c1]Songyang Wu, Chengxiang Tan:
A High Security Framework for SMS. BMEI 2009: 1-6
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 22:08 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint