


default search action
Wei Yuan 0001
Person information
- affiliation (PhD 2004): Huazhong University of Science and Technology, Department of Electronics and Information Engineering, Wuhan, China
Other persons with the same name
- Wei Yuan — disambiguation page
- Wei Yuan 0002
— Shanghai Jiao Tong University, Global Institute of Future Technology, China - Wei Yuan 0003
— University of Queensland, Brisbane, QLD, Australia - Wei Yuan 0004
— Tohoku University, International Research Institute of Disaster Science, Sendai, Japan (and 1 more) - Wei Yuan 0005
— Chinese Academy of Sciences, Suzhou Institute of Nano-Tech and Nano-Bionics, China (and 1 more) - Wei Yuan 0006
![0000-0001-9357-5716 [0000-0001-9357-5716]](https://dblp.uni-trier.de/img/orcid-mark.12x12.png)
- Wei Yuan 0007
![0000-0002-6660-593X [0000-0002-6660-593X]](https://dblp.uni-trier.de/img/orcid-mark.12x12.png)
- Wei Yuan 0008
![0000-0002-3158-3486 [0000-0002-3158-3486]](https://dblp.uni-trier.de/img/orcid-mark.12x12.png)
- Wei Yuan 0009
![0009-0000-4770-4855 [0009-0000-4770-4855]](https://dblp.uni-trier.de/img/orcid-mark.12x12.png)
- Wei Yuan 0010
![0000-0001-7981-1241 [0000-0001-7981-1241]](https://dblp.uni-trier.de/img/orcid-mark.12x12.png)
- Wei Yuan 0011
![0000-0002-8709-8252 [0000-0002-8709-8252]](https://dblp.uni-trier.de/img/orcid-mark.12x12.png)
- Wei Yuan 0012
![0000-0001-5463-2183 [0000-0001-5463-2183]](https://dblp.uni-trier.de/img/orcid-mark.12x12.png)
- Wei Yuan 0013
![0000-0002-2709-6773 [0000-0002-2709-6773]](https://dblp.uni-trier.de/img/orcid-mark.12x12.png)
- Wei Yuan 0014
![0000-0002-1446-9702 [0000-0002-1446-9702]](https://dblp.uni-trier.de/img/orcid-mark.12x12.png)
- Wei Yuan 0015
![0009-0002-0165-6071 [0009-0002-0165-6071]](https://dblp.uni-trier.de/img/orcid-mark.12x12.png)
- Wei Yuan 0016
![0000-0002-8123-6570 [0000-0002-8123-6570]](https://dblp.uni-trier.de/img/orcid-mark.12x12.png)
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2026
[j28]Wei Zhou
, Zimin Mao, Shuijun Yin, Hanwen Zhang, Zhicheng Huang, Heng Li
, Tiejun Wu, Wei Yuan
:
Improving the transferability of targeted adversarial examples by style-agnostic attack. Comput. Secur. 160: 104744 (2026)- 2025
[j27]Heng Li
, Bang Wu, Wei Zhou, Wei Yuan
, Cuiying Gao
, Xinge You
, Xiapu Luo
:
An Efficient Adversarial Attack on FCG-Based Android Malware Detection Systems. IEEE Trans. Inf. Forensics Secur. 20: 9413-9426 (2025)
[c27]Heng Li, Zhiyuan Yao, Bang Wu, Cuiying Gao, Teng Xu, Wei Yuan, Xiapu Luo:
Automated Mass Malware Factory: The Convergence of Piggybacking and Adversarial Example in Android Malicious Software Generation. NDSS 2025
[c26]Yinyuan Zhang, Cuiying Gao, Yueming Wu, Shihan Dou, Cong Wu, Ying Zhang, Wei Yuan, Yang Liu:
Fighting Fire with Fire: Continuous Attack for Adversarial Android Malware Detection. USENIX Security Symposium 2025: 4897-4916- 2024
[j26]Zimin Mao, Shuiyan Chen, Zhuang Miao
, Heng Li, Beihao Xia, Junzhe Cai, Wei Yuan, Xinge You:
Enhancing robustness of person detection: A universal defense filter against adversarial patch attacks. Comput. Secur. 146: 104066 (2024)
[j25]Liheng Yuan
, Fanghua Ye, Wei Zhou, Wei Yuan
, Xinge You:
Concept drift adaptation with scarce labels: A novel approach based on diffusion and adversarial learning. Eng. Appl. Artif. Intell. 137: 109105 (2024)
[j24]Liheng Yuan
, Fanghua Ye, Heng Li, Chenhao Zhang, Cuiying Gao, Chengqing Yu
, Wei Yuan
, Xinge You:
Semi-supervised anomaly detection with contamination-resilience and incremental training. Eng. Appl. Artif. Intell. 138: 109311 (2024)
[c25]Cuiying Gao
, Gaozhun Huang
, Heng Li
, Bang Wu
, Yueming Wu
, Wei Yuan
:
A Comprehensive Study of Learning-based Android Malware Detectors under Challenging Environments. ICSE 2024: 12:1-12:13
[c24]Litao Qiao, Bang Wu, Heng Li, Cuiying Gao
, Wei Yuan
, Xiapu Luo:
Trace-agnostic and Adversarial Training-resilient Website Fingerprinting Defense. INFOCOM 2024: 211-220
[c23]Cuiying Gao
, Yueming Wu
, Heng Li
, Wei Yuan
, Haoyu Jiang
, Qidan He
, Yang Liu
:
Uncovering and Mitigating the Impact of Code Obfuscation on Dataset Annotation with Antivirus Engines. ISSTA 2024: 553-565- 2023
[j23]Chenhao Zhang
, Shuijun Yin
, Heng Li
, Minghui Cai
, Wei Yuan
:
Detecting Android Malware With Pre-Existing Image Classification Neural Networks. IEEE Signal Process. Lett. 30: 858-862 (2023)
[j22]Cuiying Gao
, Minghui Cai
, Shuijun Yin
, Gaozhun Huang, Heng Li
, Wei Yuan
, Xiapu Luo
:
Obfuscation-Resilient Android Malware Analysis Based on Complementary Features. IEEE Trans. Inf. Forensics Secur. 18: 5056-5068 (2023)
[j21]Litao Qiao, Bang Wu
, Shuijun Yin
, Heng Li
, Wei Yuan
, Xiapu Luo
:
Resisting DNN-Based Website Fingerprinting Attacks Enhanced by Adversarial Training. IEEE Trans. Inf. Forensics Secur. 18: 5375-5386 (2023)
[j20]Conghao Wong
, Beihao Xia
, Qinmu Peng
, Wei Yuan
, Xinge You
:
MSN: Multi-Style Network for Trajectory Prediction. IEEE Trans. Intell. Transp. Syst. 24(9): 9751-9766 (2023)
[j19]Shiming Chen
, Peng Zhang
, Guo-Sen Xie
, Qinmu Peng
, Zehong Cao
, Wei Yuan
, Xinge You
:
Kernelized Similarity Learning and Embedding for Dynamic Texture Synthesis. IEEE Trans. Syst. Man Cybern. Syst. 53(2): 824-837 (2023)
[c22]Junzhe Cai
, Shuiyan Chen
, Heng Li
, Beihao Xia
, Zimin Mao
, Wei Yuan
:
HARP: Let Object Detector Undergo Hyperplasia to Counter Adversarial Patches. ACM Multimedia 2023: 2673-2683
[c21]Heng Li, Zhang Cheng, Bang Wu, Liheng Yuan, Cuiying Gao, Wei Yuan, Xiapu Luo:
Black-box Adversarial Example Attack towards FCG Based Android Malware Detection under Incomplete Feature Information. USENIX Security Symposium 2023: 1181-1198
[i4]Heng Li, Zhang Cheng, Bang Wu, Liheng Yuan, Cuiying Gao, Wei Yuan, Xiapu Luo:
Black-box Adversarial Example Attack towards FCG Based Android Malware Detection under Incomplete Feature Information. CoRR abs/2303.08509 (2023)- 2022
[j18]Beihao Xia
, Conghao Wong
, Qinmu Peng, Wei Yuan
, Xinge You:
CSCNet: Contextual semantic consistency network for trajectory prediction in crowded spaces. Pattern Recognit. 126: 108552 (2022)
[j17]Zichao Hu, Heng Li, Liheng Yuan, Zhang Cheng, Wei Yuan
, Ming Zhu:
Model scheduling and sample selection for ensemble adversarial example attacks. Pattern Recognit. 130: 108824 (2022)
[c20]Conghao Wong
, Beihao Xia, Ziming Hong, Qinmu Peng, Wei Yuan
, Qiong Cao, Yibo Yang, Xinge You:
View Vertically: A Hierarchical Network for Trajectory Prediction via Fourier Spectrums. ECCV (22) 2022: 682-700
[c19]Liheng Yuan, Heng Li, Beihao Xia, Cuiying Gao, Mingyue Liu, Wei Yuan
, Xinge You:
Recent Advances in Concept Drift Adaptation Methods for Deep Learning. IJCAI 2022: 5654-5661
[i3]Beihao Xia, Conghao Wong, Qinmu Peng, Wei Yuan, Xinge You:
CSCNet: Contextual Semantic Consistency Network for Trajectory Prediction in Crowded Spaces. CoRR abs/2202.08506 (2022)- 2021
[j16]Minghui Cai
, Yuan Jiang, Cuiying Gao
, Heng Li, Wei Yuan
:
Learning features from enhanced function call graphs for Android malware detection. Neurocomputing 423: 301-307 (2021)
[j15]Haoyang Li, Heng Li, Hansong Zhang
, Wei Yuan
:
Black-box attack against handwritten signature verification with region-restricted adversarial perturbations. Pattern Recognit. 111: 107689 (2021)
[j14]Wei Yuan
, Yuan Jiang, Heng Li
, Minghui Cai
:
A Lightweight On-Device Detection Method for Android Malware. IEEE Trans. Syst. Man Cybern. Syst. 51(9): 5600-5611 (2021)
[c18]Kaifa Zhao, Hao Zhou, Yulin Zhu
, Xian Zhan, Kai Zhou, Jianfeng Li, Le Yu, Wei Yuan
, Xiapu Luo:
Structural Attack against Graph Based Android Malware Detection. CCS 2021: 3218-3235
[c17]Heng Li, Shiyao Zhou, Wei Yuan
, Xiapu Luo, Cuiying Gao, Shuiyan Chen:
Robust Android Malware Detection against Adversarial Example Attacks. WWW 2021: 3603-3612- 2020
[j13]Heng Li, Shiyao Zhou, Wei Yuan
, Jiahuan Li, Henry Leung
:
Adversarial-Example Attacks Toward Android Malware Detection System. IEEE Syst. J. 14(1): 653-656 (2020)
2010 – 2019
- 2019
[j12]Xinge You
, Jiamiao Xu, Wei Yuan
, Xiao-Yuan Jing
, Dacheng Tao
, Taiping Zhang:
Multi-view common component discriminant analysis for cross-view classification. Pattern Recognit. 92: 37-51 (2019)- 2018
[j11]Yue Zhao, Xinge You, Shujian Yu, Chang Xu
, Wei Yuan
, Xiao-Yuan Jing, Taiping Zhang, Dacheng Tao
:
Multi-view manifold learning with locality alignment. Pattern Recognit. 78: 154-166 (2018)
[i2]Qi Zheng, Shujian Yu, Xinge You, Qinmu Peng, Wei Yuan:
Coarse-to-Fine Salient Object Detection with Low-Rank Matrix Recovery. CoRR abs/1805.07936 (2018)- 2017
[j10]Zhensheng Jiang, Wei Yuan
, Henry Leung, Xinge You, Qi Zheng
:
Coalition Formation and Spectrum Sharing of Cooperative Spectrum Sensing Participants. IEEE Trans. Cybern. 47(5): 1133-1146 (2017)
[j9]Wei Yuan
, Jianwei Huang, Ying Jun (Angela) Zhang
:
Competitive Charging Station Pricing for Plug-In Electric Vehicles. IEEE Trans. Smart Grid 8(2): 627-639 (2017)
[c16]Jiamiao Xu, Xinge You, Shi Yin, Peng Zhang, Wei Yuan:
Robust Multi-view Common Component Learning. CCCV (3) 2017: 268-279- 2016
[j8]Wei Yuan
, Xinge You, Jing Xu, Henry Leung, Tianhang Zhang, Chun-Lung Philip Chen
:
Multiobjective Optimization of Linear Cooperative Spectrum Sensing: Pareto Solutions and Refinement. IEEE Trans. Cybern. 46(1): 96-108 (2016)- 2015
[i1]Wei Yuan, Jianwei Huang, Ying Jun Zhang:
Competitive Charging Station Pricing for Plug-in Electric Vehicles. CoRR abs/1511.07907 (2015)- 2014
[c15]Wei Yuan
, Jianwei Huang, Ying Jun (Angela) Zhang
:
Competitive charging station pricing for plug-in electric vehicles. SmartGridComm 2014: 668-673- 2013
[j7]Xiaohui Chen, Jing Xu, Wei Yuan
, Wei Liu, Wenqing Cheng:
Channel assignment in heterogeneous multi-radio multi-channel wireless networks: A game theoretic approach. Comput. Networks 57(17): 3291-3299 (2013)
[j6]Wei Yuan
, Ping Wang, Wei Liu
, Wenqing Cheng:
Variable-Width Channel Allocation for Access Points: A Game-Theoretic Perspective. IEEE Trans. Mob. Comput. 12(7): 1428-1442 (2013)
[j5]Xiaohui Chen, Wei Yuan
, Wenqing Cheng, Wei Liu
, Henry Leung:
Access Point Selection under QoS Requirements in Variable Channel-Width WLANs. IEEE Wirel. Commun. Lett. 2(1): 114-117 (2013)
[c14]Xiaohui Chen, Wenqing Cheng, Wei Yuan, Wei Liu, Jing Xu:
Joint optimization of channel allocation and AP association in variable channel-width WLANs. WCNC 2013: 345-350- 2012
[j4]Wei Yuan
, Henry Leung, Wenqing Cheng, Siyue Chen, Bokan Chen:
Participation in Repeated Cooperative Spectrum Sensing: A Game-Theoretic Perspective. IEEE Trans. Wirel. Commun. 11(3): 1000-1011 (2012)- 2011
[j3]Wei Yuan
, Henry Leung, Siyue Chen, Wenqing Cheng:
A Distributed Sensor Selection Mechanism for Cooperative Spectrum Sensing. IEEE Trans. Signal Process. 59(12): 6033-6044 (2011)
[j2]Wei Yuan
, Henry Leung, Wenqing Cheng, Siyue Chen:
Optimizing Voting Rule for Cooperative Spectrum Sensing Through Learning Automata. IEEE Trans. Veh. Technol. 60(7): 3253-3264 (2011)- 2010
[c13]Shimin Gong, Ping Wang, Wei Liu, Wei Yuan:
Maximize Secondary User Throughput via Optimal Sensing in Multi-Channel Cognitive Radio Networks. GLOBECOM 2010: 1-5
[c12]Wenfang Xia, Wei Yuan, Wenqing Cheng, Wei Liu, Shu Wang, Jing Xu:
Optimization of Cooperative Spectrum Sensing in Ad-Hoc Cognitive Radio Networks. GLOBECOM 2010: 1-5
[c11]Wei Yuan, Wei Liu, Wenqing Cheng:
Capacity Maximization for Variable-Width WLANs: A Game-Theoretic Approach. ICC 2010: 1-5
2000 – 2009
- 2009
[c10]Wei Yuan, Wei Liu, Wenqing Cheng, Shu Wang:
Joint User-Centric and System-Centric Channel Allocation in Cognitive Radio Networks: A Game-Theoretic Perspective. CNSR 2009: 402-407
[c9]Wei Yuan, Wei Liu, Wenqing Cheng, Shu Wang:
Variable-Width Channel Allocation in Wireless LAN: A Game-Theoretic Perspective. ICC 2009: 1-6
[c8]Shimin Gong, Wei Liu, Wei Yuan, Wenqing Cheng, Shu Wang:
Threshold-Learning in Local Spectrum Sensing of Cognitive Radio. VTC Spring 2009
[c7]Feng Gao, Wei Yuan, Wei Liu, Wenqing Cheng, Shu Wang:
Pipelined cooperative spectrum sensing in cognitive radio networks. WCNC 2009: 588-592
[c6]Pan Zhou, Wei Liu, Wei Yuan, Wenqing Cheng, Shu Wang:
An energy-efficient cooperative MISO-based routing protocol for wireless sensor networks. WCNC 2009: 2314-2319- 2008
[j1]Zongkai Yang, Geng Cheng, Wei Liu, Wei Yuan, Wenqing Cheng:
Local Coordination Based Routing and Spectrum Assignment in Multi-hop Cognitive Radio Networks. Mob. Networks Appl. 13(1-2): 67-81 (2008)
[c5]Xiaowen Gong, Wei Yuan, Wei Liu, Wenqing Cheng, Shu Wang:
A Cooperative Relay Scheme for Secondary Communication in Cognitive Radio Networks. GLOBECOM 2008: 3106-3111
[c4]Pan Zhou, Wei Yuan, Wei Liu, Wenqing Cheng:
Joint Power and Rate Control in Cognitive Radio Networks: A Game-Theoretical Approach. ICC 2008: 3296-3301
[c3]Shengbin Liao, Wenqing Cheng, Zongkai Yang, Wei Liu, Wei Yuan:
A Utility-Optimal Backoff Algorithm for Clustered Sensor Networks. VTC Spring 2008: 158-162
[c2]Kanru Xu, Wei Yuan, Wenqing Cheng, Yi Ding
, Zongkai Yang:
An Energy-Efficient V-BLAST Based Cooperative MIMO Transmission Scheme for Wireless Sensor Networks. WCNC 2008: 688-693
[c1]Pan Zhou, Wei Liu, Wei Yuan, Wenqing Cheng:
Energy-Efficient Joint Power and Rate Control via Pricing in Wireless Data Networks. WCNC 2008: 1091-1096
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2026-02-10 23:47 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID







