Personal information

No personal information available

Activities

Works (11)

HSS: A Memory-Efficient, Accurate, and Fast Network Measurement Framework in Sliding Windows

IEEE Transactions on Network and Service Management
2024 | Journal article
Contributors: Zijun Hang; Yongjie Wang; Yuliang Lu
Source: check_circle
Crossref

A General Steganalysis Method of QR Codes

2023 | Book chapter
Contributors: Jia Chen; Kunlin Chen; Yongjie Wang; Xuehu Yan; Longlong Li
Source: check_circle
Crossref

Flow-MAE: Leveraging Masked AutoEncoder for Accurate, Efficient and Robust Malicious Traffic Classification

2023-10-16 | Conference paper
Contributors: Zijun Hang; Yuliang Lu; Yongjie Wang; Yi Xie
Source: check_circle
Crossref

Data Hiding Based on Redundant Space of WeChat Mini Program Codes

2022 | Book chapter
Contributors: Jia Chen; Jiayu Wang; Yongjie Wang; Xuehu Yan
Source: check_circle
Crossref

Intelligent Penetration Testing in Dynamic Defense Environment

2022-12-16 | Conference paper
Contributors: Qian Yao; Yongjie Wang; Xinli Xiong; Yang Li
Source: check_circle
Crossref

Visual secret sharing scheme with (n,n) threshold based on WeChat Mini Program codes

Journal of Visual Communication and Image Representation
2022-01 | Journal article
Contributors: Jia Chen; Yongjie Wang; Xuehu Yan; Jiayu Wang; Longlong Li
Source: check_circle
Crossref

IKN-CF: An Approach to Identify Key Nodes in Inter-Domain Routing Systems Based on Cascading Failures

Entropy
2021-11-02 | Journal article
Contributors: Wendian Zhao; Yongjie Wang; Xinli Xiong; Jiazhen Zhao
Source: check_circle
Crossref
grade
Preferred source (of 2)‎

CFM-RFM: A Cascading Failure Model for Inter-Domain Routing Systems with the Recovery Feedback Mechanism

Information
2021-06-14 | Journal article
Contributors: Wendian Zhao; Yongjie Wang; Xinli Xiong; Yang Li
Source: check_circle
Crossref
grade
Preferred source (of 2)‎

Weighted Polynomial-Based Secret Image Sharing Scheme with Lossless Recovery

Security and Communication Networks
2021-05-25 | Journal article
Contributors: Yongjie Wang; Jia Chen; Qinghong Gong; Xuehu Yan; Yuyuan Sun; Jialiang Peng
Source: check_circle
Crossref

Data Hiding Based on Mini Program Code

Security and Communication Networks
2021-05-24 | Journal article
Contributors: Jia Chen; Quankai Qi; Yongjie Wang; Xuehu Yan; Longlong Li; Zhili Zhou
Source: check_circle
Crossref

Prufer Coding: A Vectorization Method for Undirected Labeled Graph

IEEE Access
2020 | Journal article
Part of ISSN: 2169-3536
Source: Self-asserted source
yongjie wang
grade
Preferred source (of 2)‎