default search action
Yuefei Zhu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j36]Qingjun Yuan, Yuefei Zhu, Gang Xiong, Yongjuan Wang, Wentao Yu, Bin Luo, Gaopeng Gou:
ULDC: Unsupervised Learning-Based Data Cleaning for Malicious Traffic With High Noise. Comput. J. 67(3): 976-987 (2024) - [j35]Qingjun Yuan, Gaopeng Gou, Yuefei Zhu, Yongjuan Wang:
MMCo: using multimodal deep learning to detect malicious traffic with noisy labels. Frontiers Comput. Sci. 18(1): 181809 (2024) - [j34]Zongnan Chen, Jingtao Zhao, Xueliang Li, Yuefei Zhu, Tongjie Sheng:
Seismic Migration Imaging of Mountain Tunnel Using Surface Observation System. IEEE Geosci. Remote. Sens. Lett. 21: 1-5 (2024) - [j33]Yongjun Li, Yuefei Zhu, Jinlong Fei, Wei Wu:
Diverse Metrics for Robust LBS Privacy: Distance, Semantics, and Temporal Factors. Sensors 24(4): 1314 (2024) - [j32]Qingjun Yuan, Gaopeng Gou, Yanbei Zhu, Yuefei Zhu, Gang Xiong, Yongjuan Wang:
MCRe: A Unified Framework for Handling Malicious Traffic With Noise Labels Based on Multidimensional Constraint Representation. IEEE Trans. Inf. Forensics Secur. 19: 133-147 (2024) - 2023
- [j31]Qingjun Yuan, Chang Liu, Wentao Yu, Yuefei Zhu, Gang Xiong, Yongjuan Wang, Gaopeng Gou:
BoAu: Malicious traffic detection with noise labels based on boundary augmentation. Comput. Secur. 131: 103300 (2023) - [c38]Yuhan Song, Yuefei Zhu, Fushan Wei:
Towards Efficient and Privacy-Preserving Anomaly Detection of Blockchain-Based Cryptocurrency Transactions. ICICS 2023: 590-607 - [c37]RuoYang Gu, Jinlong Fei, Hao Yu, Yuefei Zhu, Kai Yang, Fang Guo:
Meta-TFEN: A Multi-Modal Deep Learning Approach for Encrypted Malicious Traffic Detection. ITNAC 2023: 98-104 - 2022
- [j30]Ding Li, Chunxiang Gu, Yuefei Zhu:
Gene Fingerprinting: Cracking Encrypted Tunnel with Zero-Shot Learning. IEICE Trans. Inf. Syst. 105-D(6): 1172-1184 (2022) - [j29]Ding Li, Yuefei Zhu, Minghao Chen, Jue Wang:
Minipatch: Undermining DNN-Based Website Fingerprinting With Adversarial Patches. IEEE Trans. Inf. Forensics Secur. 17: 2437-2451 (2022) - [j28]Yuhan Song, Fushan Wei, Kaijie Zhu, Yuefei Zhu:
Anomaly Detection as a Service: An Outsourced Anomaly Detection Scheme for Blockchain in a Privacy-Preserving Manner. IEEE Trans. Netw. Serv. Manag. 19(4): 3794-3809 (2022) - 2021
- [j27]Ding Li, Wei Lin, Bin Lu, Yuefei Zhu:
Exploiting side-channel leaks in web traffic of incremental search. Comput. Secur. 111: 102481 (2021) - [c36]Ruiqing Xiao, Yuefei Zhu, Anxiang Hu, Xiaoya Zhu, Shengli Liu:
A Patch Analysis Method Based on Multi-firmware Comparison. ISEEIE 2021: 96-100 - 2020
- [j26]Ruiqing Xiao, Yuefei Zhu, Bin Lu, Xiaoya Zhu, Shengli Liu:
Recognizing the Data Type of Firmware Data Segments With Deep Learning. IEEE Access 8: 69167-69185 (2020) - [j25]Chuanlong Yin, Yuefei Zhu, Shengli Liu, Jinlong Fei, Hetong Zhang:
Enhancing network intrusion detection classifiers using supervised adversarial training. J. Supercomput. 76(9): 6690-6719 (2020)
2010 – 2019
- 2018
- [c35]Yitong Meng, Jinlong Fei, Yan Chen, Yuefei Zhu:
A Domain Name Model of Anonymous Network Hidden Service. ICCCS (4) 2018: 111-122 - 2017
- [j24]Chuanlong Yin, Yuefei Zhu, Jinlong Fei, Xin-Zheng He:
A Deep Learning Approach for Intrusion Detection Using Recurrent Neural Networks. IEEE Access 5: 21954-21961 (2017) - [c34]Ding Li, Yuefei Zhu, Wei Lin:
Traffic Identification of Mobile Apps Based on Variational Autoencoder Network. CIS 2017: 287-291 - 2016
- [j23]Xu Cao, Yuefei Zhu, Jinlong Fei:
基于协同地址碰撞的隐蔽认证方法 (Cooperative Address Knocking Based Covert Authentication). 计算机科学 43(9): 175-179 (2016) - 2015
- [j22]Zongpeng Li, Baochun Li, Yuefei Zhu:
Designing Truthful Spectrum Auctions for Multi-hop Secondary Networks. IEEE Trans. Mob. Comput. 14(2): 316-327 (2015) - 2014
- [j21]Tao Han, Weiming Zhang, Chao Wang, Nenghai Yu, Yue-Fei Zhu:
Adaptive ±1 Steganography in Extended Noisy Region. Comput. J. 57(4): 557-566 (2014) - [j20]Changyong Peng, Yong Shen, Yuefei Zhu, Chunlei Liu:
A note on Weil's multiplicative character sum. Finite Fields Their Appl. 25: 132-133 (2014) - [j19]Yuefei Zhu, Baochun Li, Haoming Fu, Zongpeng Li:
Core-Selecting Secondary Spectrum Auctions. IEEE J. Sel. Areas Commun. 32(11): 2268-2279 (2014) - [c33]Wei Lin, Jinlong Fei, Yuefei Zhu, Xiaolong Shi:
A Method of Multiple Encryption and Sectional Encryption Protocol Reverse Engineering. CIS 2014: 420-424 - [c32]Tao Han, Jinlong Fei, Shengli Liu, Xi Chen, Yuefei Zhu:
High-Payload Image-Hiding Scheme Based on Best-Block Matching and Multi-layered Syndrome-Trellis Codes. WISE (2) 2014: 336-350 - 2013
- [j18]Shuhua Wu, Kefei Chen, Yuefei Zhu:
Enhancements of a three-party password-based authenticated key exchange protocol. Int. Arab J. Inf. Technol. 10(3): 215-221 (2013) - [j17]Shuhua Wu, Kefei Chen, Qiong Pu, Yuefei Zhu:
Cryptanalysis and enhancements of efficient three-party password-based key exchange scheme. Int. J. Commun. Syst. 26(5): 674-686 (2013) - [j16]Yan Guang, Yue-Fei Zhu, Chun-Xiang Gu, Yonghui Zheng, Jinlong Fei:
An Efficient Proof of Retrievability Scheme for Fully Homomorphic Encrypted Data. J. Networks 8(2): 339-344 (2013) - [j15]Yan Guang, Yue-Fei Zhu, Chun-Xiang Gu, Jinlong Fei, Xin-Zheng He:
A Framework for Automated Security Proof and its Application to OAEP. J. Networks 8(3): 552-558 (2013) - [j14]Yuefei Zhu, Baochun Li, Zongpeng Li:
Designing Two-Dimensional Spectrum Auctions for Mobile Secondary Users. IEEE J. Sel. Areas Commun. 31(3): 604-613 (2013) - [j13]Xiang Gao, Yue-Fei Zhu, Jinlong Fei, Tao Han:
Method Based on GSCPN for Network Vulnerability Analysis. J. Softw. 8(8): 2032-2038 (2013) - [c31]Yuefei Zhu, Baochun Li, Zongpeng Li:
Core-selecting combinatorial auction design for secondary spectrum markets. INFOCOM 2013: 1986-1994 - 2012
- [j12]Shuhua Wu, Kefei Chen, Yuefei Zhu:
A Secure Lightweight RFID Binding Proof Protocol for Medication Errors and Patient Safety. J. Medical Syst. 36(5): 2743-2749 (2012) - [j11]Shuhua Wu, Yuefei Zhu, Qiong Pu:
Robust smart-cards-based user authentication scheme with user anonymity. Secur. Commun. Networks 5(2): 236-248 (2012) - [c30]Yuefei Zhu, Baochun Li, Zongpeng Li:
Truthful spectrum auction design for secondary networks. INFOCOM 2012: 873-881 - [i9]Changyong Peng, Chuangying Zhu, Yuefei Zhu, Fei Kang:
Improved side channel attack on the block cipher NOEKEON. IACR Cryptol. ePrint Arch. 2012: 571 (2012) - [i8]Changyong Peng, Chuangying Zhu, Yuefei Zhu, Fei Kang:
Symbolic computation in block cipher with application to PRESENT. IACR Cryptol. ePrint Arch. 2012: 587 (2012) - 2011
- [j10]Shuhua Wu, Yuefei Zhu:
Improved two-factor authenticated key exchange protocol. Int. Arab J. Inf. Technol. 8(4): 430-439 (2011) - [j9]Shuhua Wu, Yuefei Zhu, Qiong Pu:
A novel lightweight authentication scheme with anonymity for roaming service in global mobility networks. Int. J. Netw. Manag. 21(5): 384-401 (2011) - [j8]Shuhua Wu, Yuefei Zhu, Qiong Pu:
Cryptanalysis and Enhancements of Three-Party Authenticated Key Exchange Protocol using ECC. J. Inf. Sci. Eng. 27(4): 1329-1343 (2011) - 2010
- [j7]Shuhua Wu, Yuefei Zhu, Qiong Pu:
Security analysis of a cocktail protocol with the authentication and key agreement on the UMTS. IEEE Commun. Lett. 14(4): 366-368 (2010) - [j6]Shuhua Wu, Yuefei Zhu, Qiong Pu:
Comments on an Efficient Secret Broadcast in the Broadcasting Networks. IEEE Commun. Lett. 14(7): 685-687 (2010) - [j5]Chunxiang Gu, Yuefei Zhu:
New Efficient Searchable Encryption Schemes from Bilinear Pairings. Int. J. Netw. Secur. 10(1): 25-31 (2010) - [c29]Yuefei Zhu, Xinbing Wang:
Multi-Session Data Gathering with Compressive Sensing for Large-Scale Wireless Sensor Networks. GLOBECOM 2010: 1-5
2000 – 2009
- 2009
- [j4]Shuhua Wu, Yuefei Zhu:
Efficient Solution to Password-based Key Exchange for Large Groups. J. Networks 4(2): 140-147 (2009) - [j3]Shuhua Wu, Yuefei Zhu:
Client-to-client Password-Based Authenticated Key Establishment in a Cross-Realm Setting. J. Networks 4(7): 649-656 (2009) - [c28]Shuhua Wu, Yuefei Zhu:
A Framework for Authenticated Key Exchange in the Standard Model. ISPEC 2009: 207-218 - [c27]Shuhua Wu, Yuefei Zhu:
Efficient Hybrid Password-Based Authenticated Group Key Exchange. APWeb/WAIM 2009: 562-567 - [i7]Chun-Xiang Gu, Yan Guang, Yue-Fei Zhu:
Automatic Approach of Provable Security and its Application for OAEP+. IACR Cryptol. ePrint Arch. 2009: 73 (2009) - 2008
- [j2]Shuhua Wu, Yuefei Zhu:
Proof of Forward Security for Password-based Authenticated Key Exchange. Int. J. Netw. Secur. 7(3): 335-341 (2008) - [c26]Shuhua Wu, Yuefei Zhu:
Constant-Round Password-Based Authenticated Key Exchange Protocol for Dynamic Groups. Financial Cryptography 2008: 69-82 - [c25]Xiaoyan Sun, Yang Wang, Jie Ren, Yuefei Zhu, Shengli Liu:
Collecting Internet Malware Based on Client-side Honeypot. ICYCS 2008: 1493-1498 - [c24]Shuhua Wu, Yuefei Zhu:
Password-Authenticated Key Exchange between Clients in a Cross-Realm Setting. NPC 2008: 94-104 - [c23]Shuhua Wu, Yuefei Zhu:
Forward Secure Password-Based Authenticated Key Distribution in the Three-Party Setting. NPC 2008: 105-115 - [c22]Shengli Liu, Wenbing Wang, Yuefei Zhu:
A New-Style Domain Integrating Management of Windows and UNIX. WAIM 2008: 619-624 - 2007
- [c21]TingMao Chang, Yuefei Zhu, Jin Zhou, YaJuan Zhang:
Universally Composable Three-Party Key Distribution. ARES 2007: 408-416 - [c20]Chunxiang Gu, Yuefei Zhu, Yonghui Zheng:
Certified E-Mail Protocol in the ID-Based Setting. ACNS 2007: 340-353 - [c19]Tingjun Liu, Shuhua Wu, Yuefei Zhu:
Forward Security for an Efficient Password-Based Authenticated Key Exchange. CIS 2007: 647-651 - [c18]Chunxiang Gu, Yuefei Zhu:
An Efficient ID-Based Proxy Signature Scheme from Pairings. Inscrypt 2007: 40-50 - [c17]Chunxiang Gu, Yuefei Zhu, Heng Pan:
Efficient Public Key Encryption with Keyword Search Schemes from Pairings. Inscrypt 2007: 372-383 - [c16]Jin Zhou, Yuefei Zhu, TingMao Chang, YaJuan Zhang:
Universally Composable Key-Evolving Signature. CISIM 2007: 97-102 - [i6]Jin Zhou, TingMao Chang, YaJuan Zhang, Yuefei Zhu:
Universally Composable Key-evolving Signature. IACR Cryptol. ePrint Arch. 2007: 11 (2007) - [i5]Jin Zhou, YaJuan Zhang, Yuefei Zhu:
Security Arguments for a Class of ID-based Signatures. IACR Cryptol. ePrint Arch. 2007: 49 (2007) - 2006
- [c15]Lei Xie, Yongjun Xu, Xiaowei Li, Yuefei Zhu:
A Lightweight Scheme for Trust Relationship Establishment in Ubiquitous Sensor Networks. CIT 2006: 229 - [c14]Shuhua Wu, Yuefei Zhu:
Practical Password-Based Authenticated Key Exchange Protocol. CIS 2006: 523-533 - [c13]Lei Xie, Hongsong Zhu, Yongjun Xu, Yuefei Zhu:
A Tamper-resistance Key Pre-distribution Scheme for Wireless Sensor Networks. GCC Workshops 2006: 437-443 - [c12]Shuhua Wu, Yuefei Zhu, Qiong Pu:
Resource Efficient Hardware Design for RSA. IMSCCS (2) 2006: 64-68 - [c11]Shuhua Wu, Yuefei Zhu:
Efficient Augmented Password-Based Encrypted Key Exchange Protocol. MSN 2006: 533-542 - [c10]Haojun Zhang, Yuefei Zhu:
Self-Updating Hash Chains and Their Implementations. WISE 2006: 387-397 - [i4]Chunxiang Gu, Yuefei Zhu, YaJuan Zhang:
Efficient Public Key Encryption with Keyword Search Schemes from Pairings. IACR Cryptol. ePrint Arch. 2006: 108 (2006) - [i3]Chunxiang Gu, Yuefei Zhu:
An Efficient ID-based Proxy Signature Scheme from Pairings. IACR Cryptol. ePrint Arch. 2006: 158 (2006) - [i2]Jin Zhou, TingMao Chang, YaJuan Zhang, Yuefei Zhu:
Universally Composable Three-Party Key Distribution. IACR Cryptol. ePrint Arch. 2006: 421 (2006) - [i1]TingMao Chang, Jin Zhou, YaJuan Zhang, Yuefei Zhu:
Hybrid Protocol For Password-based Key Exchange in Three-party Setting. IACR Cryptol. ePrint Arch. 2006: 452 (2006) - 2005
- [j1]Yuefei Zhu, Xueli Wang:
A criterion for primitive polynomials over Galois rings. Discret. Math. 303(1-3): 243-255 (2005) - [c9]Chunxiang Gu, Yuefei Zhu, YaJuan Zhang:
An ID-Based Optimistic Fair Signature Exchange Protocol from Pairings. CIS (2) 2005: 9-16 - [c8]Chunxiang Gu, Yuefei Zhu:
An ID-Based Verifiable Encrypted Signature Scheme Based on Hess's Scheme . CISC 2005: 42-52 - [c7]Chunxiang Gu, Yuefei Zhu:
Provable Security of ID-Based Proxy Signature Schemes. ICCNMC 2005: 1277-1286 - [c6]Heng Pan, JingFeng Li, Yuefei Zhu, DaWei Wei:
A Practical Scheme of Merging Multiple Public Key Infrastructures in E-commerce. ICCNMC 2005: 1287-1294 - [c5]Yuefei Zhu, BaiJie Kuang, YaJuan Zhang:
An Improved Algorithm for uP + vQ on a Family of Elliptic Curves. IPDPS 2005 - [c4]JingFeng Li, Yuefei Zhu, Heng Pan, DaWei Wei:
A New Public Key Certificate Revocation Scheme Based on One-Way Hash Chain. WAIM 2005: 670-675 - [c3]Heng Pan, Yuefei Zhu, ZhengYun Pan, XianLing Lu:
An Efficient Scheme of Merging Multiple Public Key Infrastructures in ERP. WAIM 2005: 919-924 - 2004
- [c2]BaiJie Kuang, Yuefei Zhu, YaJuan Zhang:
An Improved Algorithm for uP + vQ Using JSF13. ACNS 2004: 467-478 - [c1]Yuefei Zhu, Dan Xu:
An Efficient Key-Evolving Signature Scheme Based on Pairing. FTDCS 2004: 68-73
Coauthor Index
aka: Chun-Xiang Gu
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-10 21:13 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint