Lou, Wenjing
54  results:
Search for persons X
?
1

Bijack: Breaking Bitcoin Network with TCP Vulnerabilities:

, In: Computer Security – ESORICS 2023; Lecture Notes in Computer Science,
Li, Shaoyu ; Shi, Shanghao ; Xiao, Yang... - p. 306-326 , 2024
 
?
2

TriSAS: Toward Dependable Inter-SAS Coordination with Audit..:

, In: Proceedings of the 19th ACM Asia Conference on Computer and Communications Security,
Shi, Shanghao ; Xiao, Yang ; Du, Changlai... - p. 399-411 , 2024
 
?
3

Real-time Interference Mitigation for Automotive Radar:

, In: 2023 IEEE Radar Conference (RadarConf23),
Wu, Yubo ; Hou, Y. Thomas ; Li, Alexander. - p. 1-6 , 2023
 
?
4

Mitra: An O-RAN based Real-Time Solution for Coexistence be..:

, In: 2023 IEEE 20th International Conference on Mobile Ad Hoc and Smart Systems (MASS),
Acharya, Shiva ; Li, Shaoran ; Jiang, Nan... - p. 295-303 , 2023
 
?
5

A Decentralized Truth Discovery Approach to the Blockchain ..:

, In: IEEE INFOCOM 2023 - IEEE Conference on Computer Communications,
Xiao, Yang ; Zhang, Ning ; Lou, Wenjing. - p. 1-10 , 2023
 
?
6

MINDFL: Mitigating the Impact of Imbalanced and Noisy-label..:

, In: MILCOM 2023 - 2023 IEEE Military Communications Conference (MILCOM),
Zhang, Chaoyu ; Wang, Ning ; Shi, Shanghao... - p. 331-338 , 2023
 
?
7

MS-PTP: Protecting Network Timing from Byzantine Attacks:

, In: Proceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks,
Shi, Shanghao ; Xiao, Yang ; Du, Changlai... - p. 61-71 , 2023
 
?
8

Eywa: A General Approach for Scheduler Design in AoI Optimi..:

, In: IEEE INFOCOM 2023 - IEEE Conference on Computer Communications,
Li, Chengzhang ; Li, Shaoran ; Liu, Qingyu... - p. 1-9 , 2023
 
?
9

Age of Critical Information: Optimizing Data Freshness Base..:

, In: MILCOM 2023 - 2023 IEEE Military Communications Conference (MILCOM),
Liu, Qingyu ; Li, Chengzhang ; Hou, Y. Thomas.. - p. 747-754 , 2023
 
?
10

Fortifying Your Defenses: Techniques to Thwart Adversarial ..:

, In: Proceedings of the 2023 ACM Workshop on Wireless Security and Machine Learning,
Lou, Wenjing - p. 1 ff. , 2023
 
?
11

Day-Ahead Voltage Stability-Constrained Network Topology Op..:

, In: 2023 International Conference on Power System Technology (PowerCon),
Guo, Dingli ; Wang, Lei ; Jiao, Ticao... - p. 1-6 , 2023
 
?
12

Ao2I: Minimizing Age of Outdated Information to Improve Fre..:

, In: IEEE INFOCOM 2022 - IEEE Conference on Computer Communications,
Liu, Qingyu ; Li, Chengzhang ; Hou, Y. Thomas... - p. 1359-1368 , 2022
 
?
13

FLARE : Defending Federated Learning against Model Poiso..:

, In: Proceedings of the 2022 ACM on Asia Conference on Computer and Communications Security,
Wang, Ning ; Xiao, Yang ; Chen, Yimin... - p. 946-958 , 2022
 
?
14

Hector: A Reinforcement Learning-based Scheduler for Minimi..:

, In: MILCOM 2022 - 2022 IEEE Military Communications Conference (MILCOM),
Jin, Heng ; Liu, Qingyu ; Li, Chengzhang... - p. 887-894 , 2022
 
?
15

Transferability of Adversarial Examples in Machine Learning..:

, In: 2022 IEEE Conference on Communications and Network Security (CNS),
Hu, Yang ; Wang, Ning ; Chen, Yimin.. - p. 28-36 , 2022
 
1-15