default search action
Mi Wen
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j50]Xiwen Wang, Kai Zhang, Jinguo Li, Mi Wen, Shengmin Xu, Jianting Ning:
Non-interactive Boolean Searchable Asymmetric Encryption With Bilateral Access Control. Comput. J. 67(1): 179-194 (2024) - [j49]Dingyu Shou, Chao Li, Zhen Wang, Song Cheng, Xiaobo Hu, Kai Zhang, Mi Wen, Yong Wang:
An Intrusion Detection Method Based on Attention Mechanism to Improve CNN-BiLSTM Model. Comput. J. 67(5): 1851-1865 (2024) - [j48]Jiahao Huang, Mi Wen, Minjie Wei, Yanbing Bi:
Enhancing the transferability of adversarial samples with random noise techniques. Comput. Secur. 136: 103541 (2024) - [j47]Xiumin Li, Mi Wen, Siying He, Rongxing Lu, Liangliang Wang:
A Privacy-Preserving Federated Learning Scheme Against Poisoning Attacks in Smart Grid. IEEE Internet Things J. 11(9): 16805-16816 (2024) - [j46]Yanxiang Xu, Mi Wen, Wei He, Hongwei Wang, Yunsheng Xue:
An improved multi-scale and knowledge distillation method for efficient pedestrian detection in dense scenes. J. Real Time Image Process. 21(4): 126 (2024) - [j45]Yunsheng Xue, Mi Wen, Wei He, Weiwei Li:
DPG: a model to build feature subspace against adversarial patch attack. Mach. Learn. 113(8): 5601-5622 (2024) - [j44]Zhiwei Chen, Zhibo Pang, Wenjing Hou, Hong Wen, Mi Wen, Runhui Zhao, Tao Tang:
Cross-Device Radio Frequency Fingerprinting Identification Based on Domain Adaptation. IEEE Trans. Consumer Electron. 70(1): 2391-2400 (2024) - [c38]Yanbo Zhang, Mi Wen, Weiwei Li, Ben Niu, Weidong Qiu, Fenghua Li:
ADP-VFL: An Adaptive Differential Privacy Scheme for VPP Based on Federated Learning. ICC 2024: 5184-5189 - [c37]Lei Zhang, Binbin Wang, Chang Liu, Mi Wen, Yan Zhang, Liangliang Wang:
AMNeuzz: A Strongly Directed Fuzz Testing Method Based on Attention Mechanism. ICCDE 2024: 105-110 - [c36]Mi Wen, Hongwei Wang, Yunsheng Xue, Yi Wu, Hong Wen:
Improving Structural and Semantic Global Knowledge in Graph Contrastive Learning with Distillation. PAKDD (2) 2024: 364-375 - [c35]Zian Jia, Yun Xiong, Yuhong Nan, Yao Zhang, Jinjing Zhao, Mi Wen:
MAGIC: Detecting Advanced Persistent Threats via Masked Graph Representation Learning. USENIX Security Symposium 2024 - 2023
- [j43]Yanfei Wang, Kai Zhang, Kejie Lu, Yun Xiong, Mi Wen:
Practical black-box adversarial attack on open-set recognition: Towards robust autonomous driving. Peer Peer Netw. Appl. 16(1): 295-311 (2023) - [j42]Minjun Deng, Kai Zhang, Pengfei Wu, Mi Wen, Jianting Ning:
DCDPI: Dynamic and Continuous Deep Packet Inspection in Secure Outsourced Middleboxes. IEEE Trans. Cloud Comput. 11(4): 3510-3524 (2023) - [j41]Weiwei Li, Mi Wen, Zhou Su, Kuan Zhang:
Collusion Detection and Trust Management for Indoor Navigation System With Crowdsourcing. IEEE Trans. Dependable Secur. Comput. 20(4): 2913-2924 (2023) - [j40]Kai Zhang, Xiwen Wang, Jianting Ning, Mi Wen, Rongxing Lu:
Multi-Client Boolean File Retrieval With Adaptable Authorization Switching for Secure Cloud Search Services. IEEE Trans. Dependable Secur. Comput. 20(6): 4621-4636 (2023) - [j39]Jiangwei Xu, Liangliang Wang, Mi Wen, Yu Long, Kefei Chen:
DPB-MA: Low-Latency Message Authentication Scheme Based on Distributed Verification and Priority in Vehicular Ad Hoc Network. IEEE Trans. Veh. Technol. 72(4): 5152-5166 (2023) - [c34]Siying He, Mi Wen, Xiumin Li, Zhou Su:
An Approach for Attack Scenario Construction Based on Dynamic Attack Path Graph. ICCC 2023: 1-6 - [c33]Xiumin Li, Mi Wen, Siying He, Rongxing Lu, Liangliang Wang:
A Scheme for Robust Federated Learning with Privacy-preserving Based on Krum AGR. ICCC 2023: 1-6 - [c32]Bailin Li, Mi Wen:
An Improved Traffic Forecasting Model based on Efficient Spatiotemporal Graph Convolutional Network. IEEA 2023: 48-51 - [c31]Jinkai Zheng, Guanjie Li, Wencong Wang, Tom H. Luan, Zhou Su, Mi Wen:
Long-term Incentive Mechanism for Federated Learning: A Dynamic Repeated Game Approach. PIMRC 2023: 1-6 - [i1]Zian Jia, Yun Xiong, Yuhong Nan, Yao Zhang, Jinjing Zhao, Mi Wen:
MAGIC: Detecting Advanced Persistent Threats via Masked Graph Representation Learning. CoRR abs/2310.09831 (2023) - 2022
- [j38]Mi Wen, Rong Xie, Kejie Lu, Liangliang Wang, Kai Zhang:
FedDetect: A Novel Privacy-Preserving Federated Learning Framework for Energy Theft Detection in Smart Grid. IEEE Internet Things J. 9(8): 6069-6080 (2022) - [j37]Jiasheng Chen, Liangliang Wang, Mi Wen, Kai Zhang, Kefei Chen:
Efficient Certificateless Online/Offline Signcryption Scheme for Edge IoT Devices. IEEE Internet Things J. 9(11): 8967-8979 (2022) - [j36]Huiwen Wang, Liangliang Wang, Mi Wen, Kefei Chen, Yiyuan Luo:
A Lightweight Certificateless Aggregate Ring Signature Scheme for Privacy Protection in Smart Grids. Wirel. Pers. Commun. 126(2): 1577-1599 (2022) - [c30]Jiangyan Ge, Mi Wen, Liangliang Wang, Rong Xie:
Attribute-Based Collaborative Access Control Scheme with Constant Ciphertext Length for Smart Grid. ICC 2022: 540-546 - [c29]Binbin Wang, Mi Wen, Yan Song, Liangliang Wang, Zihan Wang, Qifan Mao:
MLPNeuzz: A Novel Neural Program Smoothing Method Based on Multi-Layer Perceptron. ICCDE 2022: 92-97 - 2021
- [j35]Chao Sun, Mi Wen, Kai Zhang, Ping Meng, Rongcheng Cui:
Traffic sign detection algorithm based on feature expression enhancement. Multim. Tools Appl. 80(25): 33593-33614 (2021) - [j34]Kai Zhang, Mi Wen, Rongxing Lu, Kefei Chen:
Multi-Client Sub-Linear Boolean Keyword Searching for Encrypted Cloud Storage with Owner-Enforced Authorization. IEEE Trans. Dependable Secur. Comput. 18(6): 2875-2887 (2021) - [j33]Huanhuan Lv, Mi Wen, Rongxing Lu, Jinguo Li:
An Adversarial Attack Based on Incremental Learning Techniques for Unmanned in 6G Scenes. IEEE Trans. Veh. Technol. 70(6): 5254-5264 (2021) - [c28]Mi Wen, Mu-qing Zhu:
Text Content Tag Recommendation Algorithm Based on Knowledge Map Fusion Reasoning. ICCIR 2021: 740-745 - 2020
- [j32]Shaojing Zhou, Jinguo Li, Kai Zhang, Mi Wen, Qijie Guan:
An Accurate Ensemble Forecasting Approach for Highly Dynamic Cloud Workload With VMD and R-Transformer. IEEE Access 8: 115992-116003 (2020) - [j31]Pengpeng Ding, Jinguo Li, Mi Wen, Liangliang Wang, Hongjiao Li:
Efficient BiSRU Combined With Feature Dimensionality Reduction for Abnormal Traffic Detection. IEEE Access 8: 164414-164427 (2020) - [j30]Jinguo Li, Mi Wen, Kai Zhang:
Cloud-assisted secure and conjunctive publish/subscribe service in smart grids. IET Inf. Secur. 14(4): 470-481 (2020) - [j29]Jiale Wu, Mi Wen, Rongxing Lu, Beibei Li, Jinguo Li:
Toward efficient and effective bullying detection in online social network. Peer-to-Peer Netw. Appl. 13(5): 1567-1576 (2020) - [j28]Pengpeng Ding, Jinguo Li, Liangliang Wang, Mi Wen, Yuyao Guan:
HYBRID-CNN: An Efficient Scheme for Abnormal Flow Detection in the SDN-Based Smart Grid. Secur. Commun. Networks 2020: 8850550:1-8850550:20 (2020) - [c27]Huanhuan Lv, Mi Wen, Rongxing Lu, Xuankai Wang, Jinguo Li:
An Adversarial Attack with Fusion of Polarization for Unmanned Scenes. VTC Fall 2020: 1-6
2010 – 2019
- 2019
- [j27]Mi Wen, Shan Chen, Rongxing Lu, Beibei Li, Sijia Chen:
Security and Efficiency Enhanced Revocable Access Control for Fog-Based Smart Grid System. IEEE Access 7: 137968-137981 (2019) - [j26]Liangliang Wang, Mi Wen, Kefei Chen, Zhongqin Bi, Yu Long:
A new VRSA-based pairing-free certificateless signature scheme for fog computing. Concurr. Comput. Pract. Exp. 31(22) (2019) - [j25]Wenbo Jiang, Hongwei Li, Guowen Xu, Mi Wen, Guishan Dong, Xiaodong Lin:
PTAS: Privacy-preserving Thin-client Authentication Scheme in blockchain-based PKI. Future Gener. Comput. Syst. 96: 185-195 (2019) - [j24]Donghuan Yao, Mi Wen, Xiaohui Liang, Zipeng Fu, Kai Zhang, Baojia Yang:
Energy Theft Detection With Energy Privacy Preservation in the Smart Grid. IEEE Internet Things J. 6(5): 7659-7669 (2019) - [j23]Jinguo Li, Mi Wen, Kui Wu, Kejie Lu, Fengyong Li, Hongjiao Li:
Secure, flexible and high-efficient similarity search over encrypted data in multiple clouds. Peer-to-Peer Netw. Appl. 12(4): 893-911 (2019) - [j22]Guowen Xu, Hongwei Li, Sen Liu, Mi Wen, Rongxing Lu:
Efficient and Privacy-Preserving Truth Discovery in Mobile Crowd Sensing Systems. IEEE Trans. Veh. Technol. 68(4): 3854-3865 (2019) - [c26]Xuankai Wang, Mi Wen, Jinguo Li, Zipeng Fu, Rongxing Lu, Kefei Chen:
Adversarial attack against scene recognition system for unmanned vehicles. ACM TUR-C 2019: 65:1-65:6 - [c25]Li Gong, Hongwei Li, Guowen Xu, Xizhao Luo, Mi Wen:
Multi-Keyword Search Guaranteeing Forward and Backward Privacy over Large-Scale Cloud Data. GLOBECOM 2019: 1-6 - [c24]Shan Chen, Mi Wen, Rongxing Lu, Jinguo Li, Sijia Chen:
Achieve Revocable Access Control for Fog-Based Smart Grid System. VTC Fall 2019: 1-7 - 2018
- [j21]Fengyong Li, Kui Wu, Xinpeng Zhang, Jiang Yu, Jingsheng Lei, Mi Wen:
Robust Batch Steganography in Social Networks With Non-Uniform Payload and Data Decomposition. IEEE Access 6: 29912-29925 (2018) - [j20]Fengyong Li, Kui Wu, Jingsheng Lei, Mi Wen, Yanli Ren:
Unsupervised steganalysis over social networks based on multi-reference sub-image sets. Multim. Tools Appl. 77(14): 17953-17971 (2018) - [j19]Fengyong Li, Mi Wen, Jingsheng Lei, Yanli Ren:
Efficient steganographer detection over social networks with sampling reconstruction. Peer-to-Peer Netw. Appl. 11(5): 924-939 (2018) - [j18]Fengyong Li, Kui Wu, Xinpeng Zhang, Jingsheng Lei, Mi Wen:
Multi-Source Stego Detection with Low-Dimensional Textural Feature and Clustering Ensembles. Symmetry 10(5): 128 (2018) - [c23]Wenbo Jiang, Hongwei Li, Guowen Xu, Mi Wen, Guishan Dong, Xiaodong Lin:
A Privacy-Preserving Thin-Client Scheme in Blockchain-Based PKI. GLOBECOM 2018: 1-6 - [c22]Mi Wen, Donghuan Yao, Beibei Li, Rongxing Lu:
State Estimation Based Energy Theft Detection Scheme with Privacy Preservation in Smart Grid. ICC 2018: 1-6 - 2017
- [j17]Xu Zhang, Mi Wen, Kejie Lu, Jingsheng Lei:
A privacy-aware data dissemination scheme for smart grid with abnormal data traceability. Comput. Networks 117: 32-41 (2017) - [j16]Zhou Su, Qichao Xu, Yilong Hui, Mi Wen, Song Guo:
A Game Theoretic Approach to Parked Vehicle Assisted Content Delivery in Vehicular Ad Hoc Networks. IEEE Trans. Veh. Technol. 66(7): 6461-6474 (2017) - [c21]Liangliang Wang, Mi Wen, Kefei Chen, Zhongqin Bi, Yu Long:
An Efficient and Provably Secure Pairing-Free Certificateless Signature Scheme Based on Variant of RSA. CSS 2017: 248-266 - [c20]Mi Wen, Xu Zhang, Hongwei Li, Jinguo Li:
A Data Aggregation Scheme with Fine-Grained Access Control for the Smart Grid. VTC Fall 2017: 1-5 - 2016
- [j15]Jinguo Li, Mi Wen, Tao Zhang:
Group-Based Authentication and Key Agreement With Dynamic Policy Updating for MTC in LTE-A Networks. IEEE Internet Things J. 3(3): 408-417 (2016) - [j14]Mi Wen, Kuan Zhang, Jingsheng Lei, Xiaohui Liang, Ruilong Deng, Xuemin (Sherman) Shen:
CIT: A credit-based incentive tariff scheme with fraud-traceability for smart grid. Secur. Commun. Networks 9(9): 823-832 (2016) - [j13]Jinguo Li, Mi Wen, Kejie Lu, Chunhua Gu:
PIMRS: achieving privacy and integrity-preserving multi-owner ranked-keyword search over encrypted cloud data. Secur. Commun. Networks 9(16): 3765-3776 (2016) - [j12]Fengyong Li, Kui Wu, Jingsheng Lei, Mi Wen, Zhongqin Bi, Chunhua Gu:
Steganalysis Over Large-Scale Social Networks With High-Order Joint Features and Clustering Ensembles. IEEE Trans. Inf. Forensics Secur. 11(2): 344-357 (2016) - [c19]Jinguo Li, Mi Wen, Chunhua Gu, Hongwei Li:
PSS: Achieving high-efficiency and privacy-preserving similarity search in multiple clouds. ICC 2016: 1-6 - 2015
- [j11]Hongwei Li, Yi Yang, Haomiao Yang, Mi Wen:
Achieving efficient and privacy-preserving multi-feature search for mobile sensing. Comput. Commun. 65: 35-42 (2015) - [j10]Mi Wen, Jingsheng Lei, Zhongqin Bi, Jing Li:
EAPA: An efficient authentication protocol against pollution attack for smart grid. Peer-to-Peer Netw. Appl. 8(6): 1082-1089 (2015) - [j9]Mi Wen, Kaoru Ota, He Li, Jingsheng Lei, Chunhua Gu, Zhou Su:
Secure Data Deduplication With Reliable Key Management for Dynamic Updates in CPSS. IEEE Trans. Comput. Soc. Syst. 2(4): 137-147 (2015) - [c18]Lin Xu, Mi Wen, Jinguo Li:
A Bidirectional Broadcasting Authentication Scheme for Wireless Sensor Networks. CIC 2015: 200-204 - [c17]Hermine Hovhannisyan, Kejie Lu, Rongwei Yang, Wen Qi, Jianping Wang, Mi Wen:
A Novel Deduplication-Based Covert Channel in Cloud Storage Service. GLOBECOM 2015: 1-6 - [c16]Mi Wen, Kejie Lu, Jingsheng Lei, Fengyong Li, Jing Li:
BDO-SD: An efficient scheme for big data outsourcing with secure deduplication. INFOCOM Workshops 2015: 214-219 - [c15]Jinguo Li, Yaping Lin, Mi Wen, Chunhua Gu, Bo Yin:
Secure and Verifiable Multi-owner Ranked-Keyword Search in Cloud Computing. WASA 2015: 325-334 - 2014
- [b1]Mi Wen, Rongxing Lu, Xiaohui Liang, Jingsheng Lei, Xuemin (Sherman) Shen:
Querying over Encrypted Data in Smart Grids. Springer Briefs in Computer Science, Springer 2014, ISBN 978-3-319-06354-6, pp. 1-78 - [j8]Hongwei Li, Yi Yang, Mi Wen, Hongwei Luo, Rongxing Lu:
EMRQ: An Efficient Multi-keyword Range Query Scheme in Smart Grid Auction Market. KSII Trans. Internet Inf. Syst. 8(11): 3937-3954 (2014) - [j7]Mi Wen, Rongxing Lu, Jingsheng Lei, Hongwei Li, Xiaohui Liang, Xuemin (Sherman) Shen:
SESA: an efficient searchable encryption scheme for auction in emerging smart grid marketing. Secur. Commun. Networks 7(1): 234-244 (2014) - [c14]Yi Yang, Hongwei Li, Wenchao Liu, Haomiao Yao, Mi Wen:
Secure dynamic searchable symmetric encryption with constant document update cost. GLOBECOM 2014: 775-780 - [c13]Yi Yang, Hongwei Li, Mi Wen, Hongwei Luo, Rongxing Lu:
Achieving ranked range query in smart grid auction market. ICC 2014: 951-956 - 2013
- [j6]Mi Wen, Jingsheng Lei, Zhongqin Bi:
SSE: A Secure Searchable Encryption Scheme for Urban Sensing and Querying. Int. J. Distributed Sens. Networks 9 (2013) - [j5]Mi Wen, Rongxing Lu, Kuan Zhang, Jingsheng Lei, Xiaohui Liang, Xuemin Shen:
PaRQ: A Privacy-Preserving Range Query Scheme Over Encrypted Metering Data for Smart Grid. IEEE Trans. Emerg. Top. Comput. 1(1): 178-191 (2013) - [c12]Mi Wen, Rongxing Lu, Jingsheng Lei, Xiaohui Liang, Hongwei Li, Xuemin Shen:
ECQ: An Efficient Conjunctive Query scheme over encrypted multidimensional data in smart grid. GLOBECOM 2013: 796-801 - 2010
- [j4]Mi Wen, Zhi Yin, Yu Long, Yong Wang:
An Adaptive Key Management Framework for the Wireless Mesh and Sensor Networks. Wirel. Sens. Netw. 2(9): 689-697 (2010) - [c11]Yong Wang, Dawu Gu, Jianping Xu, Mi Wen, Liwen Deng:
RICB: Integer Overflow Vulnerability Dynamic Analysis via Buffer Overflow. e-Forensics 2010: 99-109 - [c10]Yong Wang, Dawu Gu, Mi Wen, Haming Li, Jianping Xu:
Classification of Malicious Software Behaviour Detection with Hybrid Set Based Feed Forward Neural Network. ISNN (2) 2010: 556-565 - [c9]Yong Wang, Dawu Gu, Mi Wen, Jianping Xu, Haming Li:
Denial of Service Detection with Hybrid Fuzzy Set Based Feed Forward Neural Network. ISNN (2) 2010: 576-585 - [c8]Yong Wang, Da Ruan, Jianping Xu, Mi Wen, Liwen Deng:
Computational Intelligence Algorithms Analysis for Smart Grid Cyber Security. ICSI (2) 2010: 77-84
2000 – 2009
- 2009
- [j3]Mi Wen, Yanfei Zheng, Wen-jun Ye, Kefei Chen, Weidong Qiu:
A key management protocol with robust continuity for sensor networks. Comput. Stand. Interfaces 31(4): 642-647 (2009) - [j2]Mi Wen, Ling Dong, Yanfei Zheng, Kefei Chen:
Towards Provable Security for Data Transmission Protocols in Sensor Network. J. Inf. Sci. Eng. 25(1): 319-333 (2009) - [j1]Ling Dong, Kefei Chen, Xuejia Lai, Mi Wen:
When is a key establishment protocol correct? Secur. Commun. Networks 2(6): 567-579 (2009) - [c7]Weidong Qiu, Yaowei Zhou, Bo Zhu, Yanfei Zheng, Mi Wen, Zheng Gong:
Key-Insulated Encryption Based Key Pre-distribution Scheme for WSN. ISA 2009: 200-209 - [c6]Mi Wen, Jingsheng Lei, Zhong Tang, Xiuxia Tian, Kefei Chen, Weidong Qiu:
A Verified Group Key Agreement Protocol for Resource-Constrained Sensor Networks. WISM 2009: 413-425 - 2007
- [c5]Mi Wen, Ling Dong, Yanfei Zheng, Kefei Chen:
A Framework for Proving the Security of Data Transmission Protocols in Sensor Network. PAISI 2007: 288-294 - [c4]Hui Li, Yanfei Zheng, Mi Wen, Kefei Chen:
A Secure Time Synchronization Protocol for Sensor Network. PAKDD Workshops 2007: 515-526 - [c3]Mi Wen, Yanfei Zheng, Hui Li, Kefei Chen:
A Hierarchical Composition of LU Matrix-Based Key Distribution Scheme for Sensor Networks. PAKDD Workshops 2007: 608-620 - [c2]Ling Dong, Kefei Chen, Mi Wen, Yanfei Zheng:
Protocol Engineering Principles for Cryptographic Protocols Design. SNPD (3) 2007: 641-646 - 2006
- [c1]Hui Li, Kefei Chen, Yanfei Zheng, Mi Wen:
A Locally Group Key Management with Revocation and Self-healing Capability for Sensor Networks. ICSNC 2006: 29
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-07 21:20 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint