[1] Yiming Wu, Chenghao Chen, Changkun Wu, Chong Fu, Biru Zhu, Zhenyu Wen, and Zhen Hong. Towards Human-Imperceptible Backdoor Attacks on Text-to-Image Diffusion Models. // Conference on Computer Vision and Pattern Recogniton 2026 (CVPR'26). (CCF A)
[2] Jie Su; Peng Sun; Yuting Jiang; Zhenyu Wen; Fangda Guo; Yiming Wu; Zhen Hong; Haoran Duan; Yawen Huang; Rajiv Ranjan; Yefeng Zheng; A Semantic-Consistent Few-Shot Modulation Recognition Framework for IoT Applications, IEEE Transactions on Neural Networks and Learning Systems, 2025.(中科院一区)
[3] 洪榛,冯王磊,温震宇,吴迪,李涛涛,伍一鸣*,王聪,纪守领. 基于梯度回溯的联邦学习搭便车攻击检测,计算机研究与发展,2024. (CCF A)
[4] Yiming Wu, Gaoyun Lin, Lisong Liu, Zhen Hong, Yangyang Wang, Xing Yang, Zoe L. Jiang, Shouling Ji, Zhenyu Wen. MASiNet: Network Intrusion Detection for IoT Security Based on Meta-Learning Framework, IEEE Internet of Things Journal, 2024. (中科院一区)
[5] Zhenyu Wen,Jianfeng Yu, Zening Huang, Yiming Wu*, Zhen Hong, Rajiv Ranjan. SGMFuzz: State Guided Mutation Protocol Fuzzing.IEEE Networking Letters, 2024.
[6] 李泽宇, 张旭鸿,蒲誉文,伍一鸣,纪守领. 多模态深度伪造及检测技术综述. 计算机研究与发展,2023.(CCF A)
[7] Peng H, Wang Z, Zhao D, Yiming Wu, et al. Efficient text-based evolution algorithm to hard-label adversarial attacks on text[J]. Journal of King Saud University-Computer and Information Sciences, 2023, 35(5): 101539.(SCI 2区)
[8] Peng H, Guo S, Zhao D, Yiming Wu, et al. Query-efficient model extraction for text classification model in a hard label setting[J]. Journal of King Saud University-Computer and Information Sciences, 2023, 35(4): 10-20.(SCI 2区)
[9]Yiming Wu, Qianjun Liu, Xiaojing Liao, Shouling Ji, Peng Wang, Xiaofeng Wang, Chunming Wu, and Zhao Li. Price TAG: Towards Semi-Automatically Discovery Tactics, Techniques and Procedures for E-Commerce Cyber Threat Intelligence. IEEE Transactions on Dependable and Secure Computing (TDSC), 2021. (CCF A)
[10] Yiming Wu, Zhiyuan Xie, Shouling Ji, Zhenguang Liu, Xuhong Zhang, Changting Lin, Shuiguang Deng, Jun Zhou, Ting Wang, and Raheem Beyah. Fraud-agents Detection in Online Microfinance: A Large-scale Empirical Study. IEEE Transactions on Dependable and Secure Computing (TDSC), 2022. (CCF A)
[11] Jing He, Yiming Wu, Guangli Xiang, Zhendong Wu, and Shouling Ji. Efficient Privacy-Preservation Multi-factor Ranking with Approximate Search over Encrypted Big Cloud Data. International Symposium on Cyberspace Safety and Security (CSS). Springer, Cham, 2017.
[12] Mingliang Xiong, Yiming Wu, Yipeng Ding, Xueyu Mao, Zhenyi Fang, Haiping Huang. A Smart Home Control System Based on Indoor Location and Attitude Estimation. International Conference on Computer, Information and Telecommunication Systems (CITS), 2016.
[13] Tao chen, Haiping Huang, Zhengyu Chen, Yiming Wu, Hao Jiang. A Secure Routing Mechanism against Wormhole Attack in IPv6-Based Wireless Sensor Networks, International Symposium on Parallel Architectures, Algorithms and Programming (PAAP), 2015.