[1] Yiming Wu, Qianjun Liu, Xiaojing Liao, Shouling Ji, Peng Wang, Xiaofeng Wang, Chunming Wu, and Zhao Li. Price TAG: Towards Semi-Automatically Discovery Tactics, Techniques and Procedures for E-Commerce Cyber Threat Intelligence. IEEE Transactions on Dependable and Secure Computing (TDSC). (CCF A)
[2] Yiming Wu, Zhiyuan Xie, Shouling Ji, Zhenguang Liu, Xuhong Zhang, Changting Lin, Shuiguang Deng, Jun Zhou, Ting Wang, and Raheem Beyah. Fraud-agents Detection in Online Microfinance: A Large-scale Empirical Study. IEEE Transactions on Dependable and Secure Computing (TDSC). (CCF A)
[3] 李泽宇, 张旭鸿,蒲誉文,伍一鸣,纪守领. 多模态深度伪造及检测技术综述. 计算机研究与发展.(CCF A)
[4] Peng H, Wang Z, Zhao D, Yiming Wu, et al. Efficient text-based evolution algorithm to hard-label adversarial attacks on text[J]. Journal of King Saud University-Computer and Information Sciences, 2023, 35(5): 101539.(SCI 2区)
[5] Peng H, Guo S, Zhao D, Yiming Wu, et al. Query-efficient model extraction for text classification model in a hard label setting[J]. Journal of King Saud University-Computer and Information Sciences, 2023, 35(4): 10-20.(SCI 2区)
[6] Jing He, Yiming Wu, Guangli Xiang, Zhendong Wu, and Shouling Ji. Efficient Privacy-Preservation Multi-factor Ranking with Approximate Search over Encrypted Big Cloud Data. International Symposium on Cyberspace Safety and Security (CSS). Springer, Cham, 2017.
[7] Mingliang Xiong, Yiming Wu, Yipeng Ding, Xueyu Mao, Zhenyi Fang, Haiping Huang. A Smart Home Control System Based on Indoor Location and Attitude Estimation. International Conference on Computer, Information and Telecommunication Systems (CITS), 2016.
[8] Tao chen, Haiping Huang, Zhengyu Chen, Yiming Wu, Hao Jiang. A Secure Routing Mechanism against Wormhole Attack in IPv6-Based Wireless Sensor Networks, International Symposium on Parallel Architectures, Algorithms and Programming (PAAP), 2015.