2008 |
37 | EE | Yongdong Wu,
Qiming Li,
Feng Bao:
Optimizing the capacity of distortion-freewatermarking on palette images.
ICME 2008: 205-208 |
36 | EE | Yongdong Wu,
Haixia Yao,
Feng Bao:
Minimizing SSO Effort in Verifying SSL Anti-phishing Indicators.
SEC 2008: 47-61 |
2007 |
35 | EE | Yongdong Wu,
Feng Bao,
Robert H. Deng:
Forgery Attack to an Asymptotically Optimal Traitor Tracing Scheme.
ACISP 2007: 171-183 |
34 | EE | Yongdong Wu:
Security Flaws in Kuribayashi-Tanaka Fingerprinting Protocol.
ICC 2007: 1317-1322 |
33 | EE | Tieyan Li,
Yongdong Wu:
Resilient Aggregation Scheme for Confidential Sensor Reports.
ICC 2007: 1472-1477 |
32 | EE | Yongdong Wu,
Bo Qiu,
Feng Bao:
Evaluating Ouda's Tamper-Localization Watermarking Scheme.
ICME 2007: 843-846 |
31 | EE | Yongdong Wu,
Feng Bao,
Robert H. Deng,
Marc Mouffron,
Frederic Rousseau:
Enhanced Security by OS-Oriented Encapsulation in TPM-Enabled DRM.
Inscrypt 2007: 472-481 |
30 | EE | Yongdong Wu,
Di Ma,
Robert H. Deng:
Flexible Access Control to JPEG 2000 Image Code-Streams.
IEEE Transactions on Multimedia 9(6): 1314-1324 (2007) |
2006 |
29 | EE | Yongdong Wu,
Zhigang Zhao,
Tian Wei Chui:
An Attack on SMC-Based Software Protection.
ICICS 2006: 352-368 |
28 | EE | Yongdong Wu:
Tamper-Localization Watermarking with Systematic Error Correcting Code.
ICIP 2006: 1965-1968 |
27 | EE | Yongdong Wu:
Protection of Video Logos with Randomization.
ICME 2006: 1341-1344 |
26 | EE | Fang Qi,
Feng Bao,
Tieyan Li,
Weijia Jia,
Yongdong Wu:
Preventing Web-Spoofing with Automatic Detecting Security Indicator.
ISPEC 2006: 112-122 |
25 | EE | Yongdong Wu,
Feng Bao:
Batch Decryption of Encrypted Short Messages and Its Application on Concurrent SSL Handshakes.
Inscrypt 2006: 264-278 |
24 | EE | Tieyan Li,
Yongdong Wu,
Huafei Zhu:
An Efficient Scheme for Encrypted Data Aggregation on Sensor Networks.
VTC Spring 2006: 831-835 |
23 | EE | Yongdong Wu,
Robert H. Deng:
Scalable authentication of MPEG-4 streams.
IEEE Transactions on Multimedia 8(1): 152-161 (2006) |
22 | EE | Yongdong Wu:
Nonlinear collusion attack on a watermarking scheme for buyer authentication.
IEEE Transactions on Multimedia 8(3): 626-629 (2006) |
2005 |
21 | EE | Yongdong Wu:
Efficient Authentication of Electronic Document Workflow.
CISC 2005: 101-112 |
20 | EE | Tieyan Li,
Huafei Zhu,
Yongdong Wu:
Multi-Source Stream Authentication Framework in Case of Composite MPEG-4 Stream.
ICICS 2005: 389-401 |
19 | EE | Fang Qi,
Weijia Jia,
Feng Bao,
Yongdong Wu:
Batching SSL/TLS Handshake Improved.
ICICS 2005: 402-413 |
18 | EE | Yongdong Wu:
Aggregating signatures of MPEG-4 elementary streams.
ICME 2005: 181-184 |
17 | | Yongdong Wu,
Feng Bao,
Robert H. Deng:
Secure Person-To-Person Communications Based on Biometrics Signals.
SEC 2005: 205-222 |
16 | | Yongdong Wu,
Tieyan Li,
Robert H. Deng:
Protecting Group Dynamic Information in Large Scale Multicast Groups.
SEC 2005: 459-476 |
15 | EE | Yongdong Wu,
Robert H. Deng:
Security of an ill-posed operator for image authentication.
IEEE Trans. Circuits Syst. Video Techn. 15(1): 161-163 (2005) |
14 | EE | Yongdong Wu:
On the security of an SVD-based ownership watermarking.
IEEE Transactions on Multimedia 7(4): 624-627 (2005) |
13 | EE | Robert H. Deng,
Di Ma,
Weizhong Shao,
Yongdong Wu:
Scalable trusted online dissemination of JPEG2000 images.
Multimedia Syst. 11(1): 60-67 (2005) |
2004 |
12 | EE | Yongdong Wu,
Feng Bao:
Collusion attack on a multi-key secure video proxy scheme.
ACM Multimedia 2004: 380-383 |
11 | EE | Di Ma,
Robert H. Deng,
Yongdong Wu,
Tieyan Li:
Dynamic Access Control for Multi-privileged Group Communications.
ICICS 2004: 508-519 |
10 | EE | Tieyan Li,
Yongdong Wu,
Di Ma,
Huafei Zhu,
Robert H. Deng:
Flexible Verification of MPEG-4 Stream in Peer-to-Peer CDN.
ICICS 2004: 79-91 |
9 | | Yongdong Wu,
Robert H. Deng:
Compliant encryption of jpeg2000 codestreanis.
ICIP 2004: 3439-3442 |
8 | | Yongdong Wu,
Di Ma,
Robert H. Deng:
Progressive protection of jpeg2000 codestreams.
ICIP 2004: 3447-3450 |
2003 |
7 | EE | Cheng Peng,
Robert H. Deng,
Yongdong Wu,
Weizhong Shao:
A flexible and scalable authentication scheme for JPEG2000 image codestreams.
ACM Multimedia 2003: 433-441 |
6 | EE | Tieyan Li,
Yongdong Wu:
Trust on Web Browser: Attack vs. Defense.
ACNS 2003: 241-253 |
5 | EE | Yongdong Wu,
Robert H. Deng:
Adaptive Collusion Attack to a Block Oriented Watermarking Scheme.
ICICS 2003: 238-248 |
4 | EE | Yongdong Wu:
Zero-Distortion Authentication Watermarking.
ISC 2003: 325-337 |
3 | | Yongdong Wu,
Changsheng Xu:
Fault-induced attack on semi-fragile image authentication schemes.
VCIP 2003: 1875-1883 |
2002 |
2 | EE | Yongdong Wu,
Di Ma,
Changsheng Xu:
Efficient Object-Based Stream Authentication.
INDOCRYPT 2002: 354-367 |
1 | EE | Yongdong Wu,
Changsheng Xu,
Feng Bao:
Counterfeiting Attack on a Lossless Authentication Watermarking Scheme.
VIP 2002: 109-112 |