![](https://dblp.uni-trier.de./img/logo.320x120.png)
![search dblp search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
![search dblp](https://dblp.uni-trier.de./img/search.dark.16x16.png)
default search action
Yulong Wang 0001
Person information
- affiliation: Beijing University of Posts and Telecommunications, School of Computer Science (National Pilot Software Engineering School), China
Other persons with the same name
- Yulong Wang — disambiguation page
- Yulong Wang 0002
— Huazhong Agricultural University, College of Informatics, Wuhan, China (and 2 more)
- Yulong Wang 0003 — Shenzhen University, First Affiliated Hospital, Department of Neurology, China
- Yulong Wang 0004
— Beijing Baichuan Intelligence Technology Co., Ltd., China (and 1 more)
Refine list
![note](https://dblp.uni-trier.de./img/note-mark.dark.12x12.png)
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j16]Yulong Wang
, Tianxiang Li, Shenghong Li
, Xin Yuan
, Wei Ni
:
New Adversarial Image Detection Based on Sentiment Analysis. IEEE Trans. Neural Networks Learn. Syst. 35(10): 14060-14074 (2024) - 2023
- [j15]Yulong Wang
, Tong Sun, Shenghong Li, Xin Yuan
, Wei Ni
, Ekram Hossain
, H. Vincent Poor
:
Adversarial Attacks and Defenses in Machine Learning-Empowered Communication Systems and Networks: A Contemporary Survey. IEEE Commun. Surv. Tutorials 25(4): 2245-2298 (2023) - [j14]Zhicheng Liu, Yulong Wang, Tongcun Liu
, Lei Zhang, Wei Li, Jianxin Liao, Ding He
:
Semantic-enhanced Contrastive Learning for Session-based Recommendation. Knowl. Based Syst. 280: 111001 (2023) - [i4]Yulong Wang, Tong Sun, Shenghong Li, Xin Yuan, Wei Ni, Ekram Hossain, H. Vincent Poor:
Adversarial Attacks and Defenses in Machine Learning-Powered Networks: A Contemporary Survey. CoRR abs/2303.06302 (2023) - [i3]Yulong Wang, Tianxiang Li, Shenghong Li, Xin Yuan, Wei Ni:
New Adversarial Image Detection Based on Sentiment Analysis. CoRR abs/2305.03173 (2023) - 2022
- [j13]Yulong Wang
, Shenghong Li, Wei Ni
, David Abbott, Mark Johnson, Guangyu Pei
, Mark Hedley:
Cooperative Localization and Association of Commercial-Off-the-Shelf Sensors in Three-Dimensional Aircraft Cabin. IEEE Trans Autom. Sci. Eng. 19(4): 3508-3519 (2022) - [j12]Yulong Wang
, Minghui Zhao, Shenghong Li, Xin Yuan
, Wei Ni
:
Dispersed Pixel Perturbation-Based Imperceptible Backdoor Trigger for Image Classifier Models. IEEE Trans. Inf. Forensics Secur. 17: 3091-3106 (2022) - [c27]Menghua Cao, Dongxia Wang, Yulong Wang:
AAT: An Efficient Adaptive Adversarial Training Algorithm. IPMV 2022: 110-114 - [i2]Yulong Wang, Minghui Zhao, Shenghong Li, Xin Yuan, Wei Ni:
Dispersed Pixel Perturbation-based Imperceptible Backdoor Trigger for Image Classifier Models. CoRR abs/2208.09336 (2022) - 2021
- [j11]Tongcun Liu
, Haoxin Liu, Yulong Wang:
Exploiting local spatio-temporal characteristics for effective video understanding. Multim. Tools Appl. 80(21): 31821-31836 (2021) - [j10]Yulong Wang
, Shenghong Li, Wei Ni
, Minghui Zhao, Abbas Jamalipour
, Bochun Wu
:
Cooperative Three-Dimensional Position Mapping Based on Received Signal Strength Measurements: Algorithm Design and Field Test. IEEE Trans. Veh. Technol. 70(10): 10541-10552 (2021) - [j9]Jianxin Liao, Tongcun Liu, Hongzhi Yin
, Tong Chen
, Jingyu Wang
, Yulong Wang:
An integrated model based on deep multimodal and rank learning for point-of-interest recommendation. World Wide Web 24(2): 631-655 (2021) - [c26]Lei Gao, Yulong Wang, Tongcun Liu, Jingyu Wang
, Lei Zhang, Jianxin Liao:
Question-Driven Span Labeling Model for Aspect-Opinion Pair Extraction. AAAI 2021: 12875-12883 - [c25]Siyuan Lou, Yulong Wang, Tongcun Liu, Jianxin Liao:
UMDSF: Unified Model With Dynamic-Static Features for Personalized Recommendation. IJCNN 2021: 1-8 - [i1]Yulong Wang, Shenghong Li, Wei Ni, David Abbott, Mark Johnson, Guangyu Pei, Mark Hedley:
Three-dimensional Cooperative Localization of Commercial-Off-The-Shelf Sensors. CoRR abs/2111.02040 (2021) - 2020
- [j8]Tongcun Liu
, Jianxin Liao, Zhigen Wu, Yulong Wang, Jingyu Wang
:
Exploiting geographical-temporal awareness attention for next point-of-interest recommendation. Neurocomputing 400: 227-237 (2020) - [c24]Shuang Cao, Yulong Wang, Xiaoxiang Wang, Qi Li:
A Rapid Assessment Method for Seismic Intensity Area and Affecting Field Direction Using Mobile Phone Base Stations. ICCCS 2020: 623-627 - [c23]Yulong Wang, Shenghong Li, Wei Ni, David Abbott, Mark Johnson, Guangyu Pei, Mark Hedley:
Automatic Device-Location Association based on Received Signal Strength Measurements. VTC Fall 2020: 1-5
2010 – 2019
- 2019
- [j7]Tongcun Liu
, Jianxin Liao, Yulong Wang, Jingyu Wang
, Qi Qi:
Collaborative tensor-topic factorization model for personalized activity recommendation. Multim. Tools Appl. 78(12): 16923-16943 (2019) - [c22]Tongcun Liu, Jianxin Liao, Zhigen Wu, Yulong Wang, Jingyu Wang
:
A Geographical-Temporal Awareness Hierarchical Attention Network for Next Point-of-Interest Recommendation. ICMR 2019: 7-15 - 2018
- [j6]Jianxin Liao, Tongcun Liu
, Meilian Liu, Jingyu Wang
, Yulong Wang, Haifeng Sun:
Multi-Context Integrated Deep Neural Network Model for Next Location Prediction. IEEE Access 6: 21980-21990 (2018) - [j5]Yulong Wang
, Junjie Yi
, Jun Guo
, Yanbo Qiao, Mingyue Qi
, Qingyu Chen
:
A Semistructured Random Identifier Protocol for Anonymous Communication in SDN Network. Secur. Commun. Networks 2018: 2916356:1-2916356:20 (2018) - 2017
- [c21]Yulong Wang, Qingyu Chen, Junjie Yi, Jun Guo:
U-TRI: Unlinkability Through Random Identifier for SDN Network. MTD@CCS 2017: 3-15 - [c20]Yaolin Zheng, Yulong Wang, Lei Zhang, Jingyu Wang, Qi Qi:
A Tag-Based Integrated Diffusion Model for Personalized Location Recommendation. ICONIP (5) 2017: 327-337 - [c19]Yiming Guo, Yulong Wang, Lei Zhang, Jingyu Wang
, Qi Qi:
GA-based Load Balancing Algorithm for Distributed Timing Task. NaNA 2017: 258-262 - 2016
- [c18]Xiaoxiang Wang, Xiaopeng Ma, Yulong Wang, Dongyu Wang:
A Data Scheduling Algorithm for medical streaming in mobile P2P network. ICUFN 2016: 816-820 - [c17]Yingping Feng, Xiaoxiang Wang, Yulong Wang, Dongyu Wang:
Flow Distribution Strategy in heterogeneous networks based on satisfaction. ICUFN 2016: 966-971 - 2015
- [c16]Sen Su, Yiping Teng, Xiang Cheng, Yulong Wang, Guoliang Li:
Privacy-Preserving Top-k Spatial Keyword Queries over Outsourced Database. DASFAA (1) 2015: 589-608 - 2014
- [j4]Ning Lu, Yulong Wang, Sen Su, Fangchun Yang:
A novel path-based approach for single-packet IP traceback. Secur. Commun. Networks 7(2): 309-321 (2014) - [j3]Ning Lu, Yulong Wang, Sen Su, Fangchun Yang, Rui Han:
Filtering location optimization for the reactive packet filtering. Secur. Commun. Networks 7(7): 1150-1164 (2014) - [j2]Yingguang Zhang, Sen Su, Yulong Wang, Weifeng Chen, Fangchun Yang:
Privacy-assured substructure similarity query over encrypted graph-structured data in cloud. Secur. Commun. Networks 7(11): 1933-1944 (2014) - 2013
- [c15]Hanzeng Wang, Xiaoxiang Wang, Dongyu Wang, Yulong Wang:
A Wireless Resources Allocation Method for D2MD Communication under IMT-A System. DASC 2013: 540-544 - [c14]Yulong Wang, Xiaoxiang Wang, Mingming Li, Zhiguo Liu:
A Resource Allocation Scheme for MBMS with QoS Guarantees. DASC 2013: 560-564 - [c13]Yulong Wang, Xiaoxiang Wang, Mingming Li, Jing Qu:
A Parity-Based Opportunistic Multicast Scheduling Scheme over Cellular Networks. DASC 2013: 565-568 - [c12]Mingjun Du, Xiaoxiang Wang, Dongyu Wang, Yulong Wang:
Device-to-Device Dynamic Clustering Algorithm in Multicast Communication. DASC 2013: 578-582 - [c11]Yingguang Zhang, Sen Su, Weifeng Chen, Yulong Wang, Peng Xu, Fangchun Yang:
Privacy-Assured Similarity Query over Graph-Structured Data in Mobile Cloud. ICDCS Workshops 2013: 398-403 - [c10]Xianan Wang, Xiaoxiang Wang, Dongyu Wang, Yulong Wang:
Optimization of Relay Transmission Schemes with Interference Cancellation in Wireless Systems. VTC Fall 2013: 1-5 - [c9]Jia Zhou, Xiaoxiang Wang, Mingming Li, Yulong Wang:
Outage Analysis of Opportunistic Cooperative Multi-Antenna Multicast Based on Space-Time Coding. VTC Fall 2013: 1-5 - 2012
- [j1]Dong Yan, Yulong Wang, Sen Su, Fangchun Yang:
A Precise and Practical IP Traceback Technique Based on Packet Marking and Logging. J. Inf. Sci. Eng. 28(3): 453-470 (2012) - [c8]Ning Lu, Yulong Wang, Fangchun Yang, Maotong Xu:
A Novel Approach for Single-Packet IP Traceback Based on Routing Path. PDP 2012: 253-260 - [c7]Yulong Wang, Sen Su, Yi Yang, Ji Ren:
A More Efficient Hybrid Approach for Single-Packet IP Traceback. PDP 2012: 275-282 - 2010
- [c6]Dong Yan, Yulong Wang, Sen Su, Fangchun Yang:
An Efficient Collaborative Traceback Scheme Based on Packet Digests Logging. CIT 2010: 2811-2815 - [c5]Jing Hu, Xiaoxiang Wang, Hongtao Zhang, Yulong Wang:
Location-Aware Relay Selection Scheme in Opportunistic Relay Communications. VTC Spring 2010: 1-5 - [c4]Lin Qu, Xiaoxiang Wang, Yulong Wang, Jianxin Liao:
Performance Evaluation of Frequency Planning in a Novel Cellular Architecture Based on Sector Relay. VTC Spring 2010: 1-5 - [c3]Mingwei Tang, Xiaoxiang Wang, Yulong Wang, Jianxin Liao:
Dynamic Resource Allocation with Threshold in OFDMA-based Relay Networks. VTC Spring 2010: 1-5 - [c2]Shuai Xu, Xiaoxiang Wang, Yulong Wang, Jing Wang:
Iterative Cooperation DV-Hop Localization Algorithm in Wireless Sensor Networks. VTC Spring 2010: 1-5
2000 – 2009
- 2008
- [c1]Yulong Wang, Fangchun Yang, Qibo Sun:
Measuring Network Vulnerability Based on Pathology. WAIM 2008: 640-646
Coauthor Index
![](https://dblp.uni-trier.de./img/cog.dark.24x24.png)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-20 23:58 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint