2013
23Attribute-Based Access to Scalable Media in Cloud-Assisted Content Sharing Networks. Yongdong Wu, Zhuo Wei, Robert H. Deng. IEEE Transactions on Multimedia (15): 778-788 (2013). Web SearchBibTeXDownload
2012
22A Pollution Attack to Public-key Watermarking Schemes. Yongdong Wu, Robert H. Deng. ICME 2012, 230-235. Web SearchBibTeXDownload
21A scalable and format-compliant encryption scheme for H.264/SVC bitstreams. Zhuo Wei, Yongdong Wu, Xuhua Ding, Robert H. Deng. Sig. Proc.: Image Comm. (27): 1011-1024 (2012). Web SearchBibTeXDownload
2011
20Evaluating the importance of nodes in complex networks based on principal component analysis and grey relational analysis. Kun Zhang, Hong Zhang, Yongdong Wu, Feng Bao. ICON 2011, 231-235. Web SearchBibTeXDownload
19Zero-error watermarking on jpeg images by shuffling huffman tree nodes. Yongdong Wu, Robert H. Deng. VCIP 2011, 1-4. Web SearchBibTeXDownload
2010
18TeleOph: a secure real-time teleophthalmology system. Yongdong Wu, Zhou Wei, Haixia Yao, Zhigang Zhao, Lek Heng Ngoh, Robert H. Deng, Shengsheng Yu. IEEE Transactions on Information Technology in Biomedicine (14): 1259-1266 (2010). Web SearchBibTeXDownload
17A Multi-Key Pirate Decoder Against Traitor Tracing Schemes. Yongdong Wu, Robert H. Deng. J. Comput. Sci. Technol. (25): 362-374 (2010). Web SearchBibTeXDownload
2009
16A Lightweight Fast Handover Authentication Scheme in Mobile Networks. Ying Qiu, Feng Bao, Yongdong Wu, Yanjiang Yang. ICC 2009, 1-5. Web SearchBibTeXDownload
2008
15On the Security of Fully Collusion Resistant Traitor Tracing Schemes. Yongdong Wu, Robert H. Deng. IACR Cryptology ePrint Archive (2008): 450 (2008). Web SearchBibTeXDownload
2007
14Forgery Attack to an Asymptotically Optimal Traitor Tracing Scheme. Yongdong Wu, Feng Bao, Robert H. Deng. ACISP 2007, 171-183. Web SearchBibTeXDownload
13Flexible Access Control to JPEG 2000 Image Code-Streams. Yongdong Wu, Di Ma, Robert H. Deng. IEEE Transactions on Multimedia (9): 1314-1324 (2007). Web SearchBibTeXDownload
12Enhanced Security by OS-Oriented Encapsulation in TPM-Enabled DRM. Yongdong Wu, Feng Bao, Robert H. Deng, Marc Mouffron, Frederic Rousseau. Inscrypt 2007, 472-481. Web SearchBibTeXDownload
2006
11Scalable authentication of MPEG-4 streams. Yongdong Wu, Robert H. Deng. IEEE Transactions on Multimedia (8): 152-161 (2006). Web SearchBibTeXDownload
2005
10Security of an ill-posed operator for image authentication. Yongdong Wu, Robert H. Deng. IEEE Trans. Circuits Syst. Video Techn. (15): 161-163 (2005). Web SearchBibTeXDownload
9Scalable trusted online dissemination of JPEG2000 images. Robert H. Deng, Di Ma, Weizhong Shao, Yongdong Wu. Multimedia Syst. (11): 60-67 (2005). Web SearchBibTeXDownload
8Secure Person-To-Person Communications Based on Biometrics Signals. Yongdong Wu, Feng Bao, Robert H. Deng. SEC 2005, 205-222. Web SearchBibTeX
7Protecting Group Dynamic Information in Large Scale Multicast Groups. Yongdong Wu, Tieyan Li, Robert H. Deng. SEC 2005, 459-476. Web SearchBibTeX
2004
6Flexible Verification of MPEG-4 Stream in Peer-to-Peer CDN. Tieyan Li, Yongdong Wu, Di Ma, Huafei Zhu, Robert H. Deng. ICICS 2004, 79-91. Web SearchBibTeXDownload
5Dynamic Access Control for Multi-privileged Group Communications. Di Ma, Robert H. Deng, Yongdong Wu, Tieyan Li. ICICS 2004, 508-519. Web SearchBibTeXDownload
4Compliant encryption of jpeg2000 codestreanis. Yongdong Wu, Robert H. Deng. ICIP 2004, 3439-3442. Web SearchBibTeXDownload
3Progressive protection of jpeg2000 codestreams. Yongdong Wu, Di Ma, Robert H. Deng. ICIP 2004, 3447-3450. Web SearchBibTeXDownload
2003
2A flexible and scalable authentication scheme for JPEG2000 image codestreams. Cheng Peng, Robert H. Deng, Yongdong Wu, Weizhong Shao. ACM Multimedia 2003, 433-441. Web SearchBibTeXDownload
1Adaptive Collusion Attack to a Block Oriented Watermarking Scheme. Yongdong Wu, Robert H. Deng. ICICS 2003, 238-248. Web SearchBibTeXDownload
from DBLP and Google Scholar
Developed by the Database Group at the University of Wisconsin and Yahoo! Research