default search action
Yu Wu 0001
Person information
- unicode name: 吴渝
- affiliation: Chongqing University of Posts and Telecommunications, Institute of Computer Science and Technology, China
Other persons with the same name
- Yu Wu — disambiguation page
- Yu Wu 0002 — Chinese Academy of Sciences, Institute of Remote Sensing and Digital Earth, Beijing, China
- Yu Wu 0003 — University of California at Davis, Department of Electrical and Computer Engineering, CA, USA
- Yu Wu 0004 — University of Liverpool, Department of Electrical Engineering and Electronics, UK
- Yu Wu 0005 — The Ohio State University, Department of Electrical and Computer Engineering, Columbus, OH, USA
- Yu Wu 0007 — University College London, Department of Electronic and Electrical Engineering, UK
- Yu Wu 0008 — University of Bourgogne Franche-Comté, FEMTO-ST Institute, CNRS, Belfort, France (and 1 more)
- Yu Wu 0009 — Chongqing University, College of Aerospace Engineering, Chongqing, China
- Yu Wu 0010 — Dongguan Univeristy of Technology, China (and 2 more)
- Yu Wu 0011 — Princeton University, NJ, USA (and 1 more)
- Yu Wu 0012 — Microsoft Research Asia, Beijing, China (and 1 more)
- Yu Wu 0013 — Guangzhou University, School of Computer Science and Cyber Engineering, School of Computer Science and Educational Software, China
- Yu Wu 0014 — ShanghaiTech University, China
- Yu Wu 0015 — Beijing University of Technology, Faculty of Information Technology, State Key Laboratory of Advanced Power Transmission Technology, Beijing, China
- Yu Wu 0016 — Georgia Institute of Technology, Department of Electrical and Computer Engineering, Atlanta, GA, USA (and 1 more)
- Yu Wu 0017 — Pennsylvania State University, College of Information Sciences and Technology, University Park, PA, USA
- Yu Wu 0018 — Shanghai Jiao Tong University, Department of Automation, Shanghai, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j21]Xiao Pu, Zhiwen Wang, Lin Yuan, Yu Wu, Liping Jing, Xinbo Gao:
GADNet: Improving image-text matching via graph-based aggregation and disentanglement. Pattern Recognit. 157: 110900 (2025) - 2024
- [j20]Qingyi Zhu, Xuhang Luo, Yuhang Liu, Chenquan Gan, Yu Wu, Lu-Xing Yang:
Impact of cybersecurity awareness on mobile malware propagation: A dynamical model. Comput. Commun. 220: 1-11 (2024) - [j19]Jie Yang, Yu Wu:
Link prediction based on depth structure in social networks. Int. J. Mach. Learn. Cybern. 15(10): 4639-4657 (2024) - 2023
- [j18]Jie Yang, Yu Wu:
A link prediction method based on compressed sensing for social networks. Appl. Intell. 53(23): 29300-29318 (2023) - [j17]Zhigang Yang, Xuhua Zhang, Dapeng Wu, Ruyan Wang, Puning Zhang, Yu Wu:
Efficient Asynchronous Federated Learning Research in the Internet of Vehicles. IEEE Internet Things J. 10(9, May 1): 7737-7748 (2023) - [j16]Yinxue Yi, Xianping Wu, Mengyuan Zou, Kefei Cheng, Yu Wu, Zufan Zhang:
Collaborative Diffusion Based on Value Measurement in Social-Physical Networks. IEEE Internet Things J. 10(22): 20080-20093 (2023) - 2022
- [j15]Jie Yang, Yu Wu:
An approach of Bursty event detection in social networks based on topological features. Appl. Intell. 52(6): 6503-6521 (2022) - [j14]Saima Rafi, Muhammad Azeem Akbar, Yu Wu, Ahmed Alsanad, Abdu Gumaei, Muhammad Umer Sarwar:
Exploration of DevOps testing process capabilities: An ISM and fuzzy TOPSIS analysis. Appl. Soft Comput. 116: 108377 (2022) - [j13]Yinxue Yi, Yangfanyu Yang, Kefei Cheng, Yu Wu, Xiaokang Wang:
Information Dissemination With Service-Oriented Incentive Mechanism in Industrial Internet of Things. IEEE Internet Things J. 9(18): 16897-16907 (2022) - [j12]Xiaotong Cui, Xing Zhang, Hao Yan, Liang Zhang, Kefei Cheng, Yu Wu, Kaijie Wu:
Toward Building and Optimizing Trustworthy Systems Using Untrusted Components: A Graph-Theoretic Perspective. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 41(5): 1386-1399 (2022) - 2021
- [j11]Saima Rafi, Yu Wu, Muhammad Azeem Akbar, Sajjad Mahmood, Ahmed Alsanad, Abdu Gumaei:
Readiness model for DevOps implementation in software organizations. J. Softw. Evol. Process. 33(4) (2021) - [j10]Lei Yu, Yu Wu, Jie Yang, Yunkai Zhang:
Bullet Subtitle Sentiment Classification Based on Affective Computing and Ensemble Learning. Wirel. Commun. Mob. Comput. 2021: 5563104:1-5563104:9 (2021) - 2020
- [j9]Saima Rafi, Yu Wu, Muhammad Azeem Akbar, Ahmed Alsanad, Abdu Gumaei:
Multicriteria Based Decision Making of DevOps Data Quality Assessment Challenges Using Fuzzy TOPSIS. IEEE Access 8: 46958-46980 (2020) - [j8]Saima Rafi, Yu Wu, Muhammad Azeem Akbar, Ahmed Alsanad, Abdu Gumaei:
Prioritization Based Taxonomy of DevOps Security Challenges Using PROMETHEE. IEEE Access 8: 105426-105446 (2020) - [c27]Yu Wu, Zhenni Zhao, Jie Yang, Yijun Lin:
Weibo Sentiment Classification Based on Two Channels Text Convolution Neural Network with Multi-Feature. CyberC 2020: 152-160 - [c26]Saima Rafi, Yu Wu, Muhammad Azeem Akbar:
RMDevOps: A Road Map for Improvement in DevOps Activities in Context of Software Organizations. EASE 2020: 413-418 - [c25]Saima Rafi, Yu Wu, Muhammad Azeem Akbar:
Towards a Hypothetical Framework to Secure DevOps Adoption: Grounded Theory Approach. EASE 2020: 457-462
2010 – 2019
- 2018
- [j7]Isma Hamid, Yu Wu, Qamar Nawaz, Runqian Zhao:
A fast heuristic detection algorithm for visualizing structure of large community. J. Comput. Sci. 25: 280-288 (2018) - 2017
- [c24]Isma Hamid, Yu Wu, Qamar Nawaz, Muhammad Rauf:
Finding Expert Role in Social-Support Online Community. CSPS 2017: 2762-2769 - 2012
- [j6]Chao Wang, Yu Wu, Tingting Zhu, Hongbo Li, Mingliang Xu:
Tunneling Blasting Simulation for Digital Mine. Trans. Edutainment 7: 121-128 (2012) - [c23]Yu Wu, Hao Wang, Xian Wang, Jianbo Li:
An Evolution Model of Emotional Internet Public Opinion with Informed Marks. ICICA (1) 2012: 66-73 - 2011
- [j5]Nan Xiang, Haiying Zhao, Xiaojian Zhou, Mingliang Xu, Abdennour El Rhalibi, Yu Wu:
UEGM: uncertain emotion generator under multi-stimulus. Comput. Animat. Virtual Worlds 22(2-3): 141-149 (2011) - 2010
- [j4]Qun Liu, Xiaofeng Liao, Yu Wu:
A novel clustering algorithm using hypergraph-based granular computing. Int. J. Intell. Syst. 25(2): 155-164 (2010)
2000 – 2009
- 2009
- [c22]Yu Wu, Yanrong Yang, Huanzheng Wu, Gongxiao Wang:
Modeling and Simulation on Information Propagation on Instant Messaging Network Based on Two-layer Scale-free Networks with Tunable Clustering. SMC 2009: 5184-5188 - 2008
- [c21]Qun Liu, Lanfen Wang, Yu Wu:
Bifurcating Periodic Solutions for a Single Delayed Neuron Model under Periodic Excitation. GrC 2008: 452-457 - [c20]Yu Wu, Gongxiao Wang, Weisheng Li, Zhijun Li:
Automatic Chatbot Knowledge Acquisition from Online Forum via Rough Set and Ensemble Learning. NPC Workshops 2008: 242-246 - 2007
- [c19]Ting Wang, Yu Wu, Long Chen:
An Approach to Video Key-frame Extraction Based on Rough Set. MUE 2007: 590-596 - 2006
- [j3]Li Luo, Yu Wu, Guoyin Wang, Jie Bai:
A Video Pre-Classification Method with Multi-Layer Self-Organizing Maps and Principal Component Analysis. Int. Trans. Syst. Sci. Appl. 2(2): 177-184 (2006) - [j2]Zhe Yuan, Yu Wu, Guoyin Wang, Jianbo Li:
Motion-Information-Based Video Retrieval System Using Rough Pre-classification. Trans. Rough Sets 5: 306-333 (2006) - [c18]Wenbin Qiu, Yu Wu, Guoyin Wang, Simon X. Yang, Jie Bai, Jieying Li:
A novel unsupervised anomaly detection based on robust principal component classifier. Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2006: 62410T - [c17]Qun Liu, Xiaofeng Liao, Guoyin Wang, Yu Wu:
Research for Hopf bifurcation of an inertial two-neuron system with time delay. GrC 2006: 420-423 - [c16]Jie Bai, Yu Wu, Guoyin Wang, Simon X. Yang, Wenbin Qiu:
A Novel Intrusion Detection Model Based on Multi-layer Self-Organizing Maps and Principal Component Analysis. ISNN (2) 2006: 255-260 - 2005
- [j1]Guoyin Wang, Jun Zhao, Jiu-Jiang An, Yu Wu:
A Comparative Study of Algebra Viewpoint and Information Viewpoint in Attribute Reduction. Fundam. Informaticae 68(3): 289-301 (2005) - [c15]Desheng Yin, Guoyin Wang, Yu Wu:
Data-driven decision tree learning algorithm based on rough set theory. AMT 2005: 579-584 - [c14]Yongjun Hai, Yu Wu, Guoyin Wang:
An improved unsupervised clustering-based intrusion detection method. Data Mining, Intrusion Detection, Information Assurance, and Data Networks Security 2005: 52-60 - [c13]Jiu-Jiang An, Guoyin Wang, Yu Wu, Quan Gan:
A rule generation algorithm based on granular computing. GrC 2005: 102-107 - [c12]Feng Hu, Guoyin Wang, Hai Huang, Yu Wu:
Incremental Attribute Reduction Based on Elementary Sets. RSFDGrC (1) 2005: 185-193 - [c11]Zhe Yuan, Yu Wu, Guoyin Wang, Jianbo Li:
A Global-Motion Analysis Method via Rough-Set-Based Video Pre-classification. RSFDGrC (2) 2005: 323-332 - 2004
- [c10]Guoyin Wang, Jun Zhao, Jiu-Jiang An, Yu Wu:
Theoretical Study on Attribute Reduction of Rough Set Theory: Comparison of Algebra and Information Views. IEEE ICCI 2004: 148-155 - [c9]Hai Huang, Guoyin Wang, Yu Wu:
A direct approach for incomplete information systems. Data Mining and Knowledge Discovery: Theory, Tools, and Technology 2004: 114-121 - [c8]Zhijun Li, Yu Wu, Guoyin Wang, Yongjun Hai, Yunpeng He:
A new framework for intrusion detection based on rough set theory. Data Mining and Knowledge Discovery: Theory, Tools, and Technology 2004: 122-130 - [c7]Guoyin Wang, Long Chen, Yu Wu:
Rough Set Based Solutions for Network Security. MSRAS 2004: 455-465 - [c6]Zhengren Qin, Guoyin Wang, Yu Wu, Xiaorong Xue:
A Scalable Rough Set Knowledge Reduction Algorithm. Rough Sets and Current Trends in Computing 2004: 445-454 - [c5]Jiu-Jiang An, Guoyin Wang, Yu Wu:
A Learning Algorithm for Multiple Rule Trees. Workshop on Web-based Support Systems 2004: 13-19 - 2003
- [c4]Yu Wu, Zhijun Li, Ping Luo, Guoyin Wang:
New anti-spam filter based on data mining and analysis of email security. Data Mining and Knowledge Discovery: Theory, Tools, and Technology 2003: 147-154 - [c3]Zheng Zheng, Guoyin Wang, Yu Wu:
A Rough Set and Rule Tree Based Incremental Knowledge Acquisition Algorithm. RSFDGrC 2003: 122-129 - 2002
- [c2]Zheng Zheng, Guoyin Wang, Yu Wu:
Objects' combination based simple computation of attribute core. ISIC 2002: 514-519 - 2000
- [c1]Guoyin Wang, Yu Wu, Paul S. Fisher:
Rule generation based on rough set theory. Data Mining and Knowledge Discovery: Theory, Tools, and Technology 2000: 181-191
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-08 20:30 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint