Bin Wang

Orcid: 0000-0002-3790-2708

Affiliations:
  • Zhejiang University, College of Electrical Engineering, Hangzhou, China


According to our database1, Bin Wang authored at least 62 papers between 2008 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Neighbor-Enhanced Representation Learning for Link Prediction in Dynamic Heterogeneous Attributed Networks.
ACM Trans. Knowl. Discov. Data, September, 2024

Hierarchical Threshold Pruning Based on Uniform Response Criterion.
IEEE Trans. Neural Networks Learn. Syst., August, 2024

Contract Theory Based Incentive Mechanism for Clustered Vehicular Federated Learning.
IEEE Trans. Intell. Transp. Syst., July, 2024

Learning-Induced Channel Extrapolation for Fluid Antenna Systems Using Asymmetric Graph Masked Autoencoder.
IEEE Wirel. Commun. Lett., June, 2024

Adaptive Digital Twin Placement and Transfer in Wireless Computing Power Network.
IEEE Internet Things J., March, 2024

FedComm: A Privacy-Enhanced and Efficient Authentication Protocol for Federated Learning in Vehicular Ad-Hoc Networks.
IEEE Trans. Inf. Forensics Secur., 2024

FedComm: A Privacy-Enhanced and Efficient Authentication Protocol for Federated Learning in Vehicular Ad-Hoc Networks.
IEEE Trans. Inf. Forensics Secur., 2024

Enhancing Transferability of Adversarial Examples Through Mixed-Frequency Inputs.
IEEE Trans. Inf. Forensics Secur., 2024

Dr. Defender: Proactive Detection of Autopilot Drones Based on CSI.
IEEE Trans. Inf. Forensics Secur., 2024

Robust filter pruning guided by deep frequency-features for edge intelligence.
Neurocomputing, 2024

Adversarial perturbation denoising utilizing common characteristics in deep feature space.
Appl. Intell., 2024

A Wolf in Sheep's Clothing: Practical Black-box Adversarial Attacks for Evading Learning-based Windows Malware Detection in the Wild.
Proceedings of the 33rd USENIX Security Symposium, 2024

Model-Driven Channel Extrapolation for Massive Fluid Antenna.
Proceedings of the IEEE International Conference on Communications Workshops, 2024

2023
Adversarial training in logit space against tiny perturbations.
Multim. Syst., December, 2023

Towards desirable decision boundary by Moderate-Margin Adversarial Training.
Pattern Recognit. Lett., September, 2023

Object-free backdoor attack and defense on semantic segmentation.
Comput. Secur., September, 2023

Improving adversarial robustness of medical imaging systems via adding global attention noise.
Comput. Biol. Medicine, September, 2023

Personalized Location Privacy Trading in Double Auction for Mobile Crowdsensing.
IEEE Internet Things J., May, 2023

HGATE: Heterogeneous Graph Attention Auto-Encoders.
IEEE Trans. Knowl. Data Eng., April, 2023

DNS Rebinding Threat Modeling and Security Analysis for Local Area Network of Maritime Transportation Systems.
IEEE Trans. Intell. Transp. Syst., February, 2023

CGIR: Conditional Generative Instance Reconstruction Attacks Against Federated Learning.
IEEE Trans. Dependable Secur. Comput., 2023

F<sup>2</sup>AT: Feature-Focusing Adversarial Training via Disentanglement of Natural and Perturbed Patterns.
CoRR, 2023

Contract Theory Based Incentive Mechanism for Clustered Federated Learning.
Proceedings of the 23rd IEEE International Conference on Communication Technology, 2023

2022
EI-MTD: Moving Target Defense for Edge Intelligence against Adversarial Attacks.
ACM Trans. Priv. Secur., 2022

Character-Level Street View Text Spotting Based on Deep Multisegmentation Network for Smarter Autonomous Driving.
IEEE Trans. Artif. Intell., 2022

Surface Material Perception Through Multimodal Learning.
IEEE J. Sel. Top. Signal Process., 2022

Loss-Privacy Tradeoff in Federated Edge Learning.
IEEE J. Sel. Top. Signal Process., 2022

Transparent Aspect-Level Sentiment Analysis Based on Dependency Syntax Analysis and Its Application on COVID-19.
ACM J. Data Inf. Qual., 2022

GAAT: Group Adaptive Adversarial Training to Improve the Trade-Off Between Robustness and Accuracy.
Int. J. Pattern Recognit. Artif. Intell., 2022

A blockchain-based audit approach for encrypted data in federated learning.
Digit. Commun. Networks, 2022

Hessian-Free Second-Order Adversarial Examples for Adversarial Learning.
CoRR, 2022

Visually imperceptible adversarial patch attacks.
Comput. Secur., 2022

Hey! You Photographed My Screen without Approved: A Practical Screen Content Protection Scheme Based on Visual Cryptography.
Proceedings of the International Conference on Networking and Network Applications, 2022

MalGraph: Hierarchical Graph Neural Networks for Robust Windows Malware Detection.
Proceedings of the IEEE INFOCOM 2022, 2022

Robust Network Architecture Search via Feature Distortion Restraining.
Proceedings of the Computer Vision - ECCV 2022, 2022

Filter Pruning via Feature Discrimination in Deep Neural Networks.
Proceedings of the Computer Vision - ECCV 2022, 2022

2021
A Novel Privacy-Preserving Mobile-Coverage Scheme Based on Trustworthiness in HWSNs.
Wirel. Commun. Mob. Comput., 2021

SenCS: Enabling Real-time Indoor Proximity Verification via Contextual Similarity.
ACM Trans. Sens. Networks, 2021

A Blockchain-Based IoT Cross-Domain Delegation Access Control Method.
Secur. Commun. Networks, 2021

Malware homology determination using visualized images and feature fusion.
PeerJ Comput. Sci., 2021

Towards Speeding up Adversarial Training in Latent Spaces.
CoRR, 2021

OutletSpy: cross-outlet application inference via power factor correction signal.
Proceedings of the WiSec '21: 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June, 2021

Optimization of Multipath Transmission Path Scheduling Based on Forward Delay in Vehicle Heterogeneous Networks.
Proceedings of the 7th IEEE International Conference on Network Softwarization, 2021

Task Distribution Offloading Algorithm Based on DQN for Sustainable Vehicle Edge Network.
Proceedings of the 7th IEEE International Conference on Network Softwarization, 2021

You Can See, But You Cannot Photograph: An Intelligent Content Protection Scheme for Videos on Screens.
Proceedings of the 2021 International Conference on Networking and Network Applications, 2021

2020
Towards Imperceptible Adversarial Image Patches Based on Network Explanations.
CoRR, 2020

TEAM: We Need More Powerful Adversarial Examples for DNNs.
CoRR, 2020

Towards Robust DNNs: An Taylor Expansion-Based Method for Generating Powerful Adversarial Examples.
CoRR, 2020

Spot evasion attacks: Adversarial examples for license plate recognition systems with convolutional neural networks.
Comput. Secur., 2020

2018
Easy Path Programming: Elevate Abstraction Level for Network Functions.
IEEE/ACM Trans. Netw., 2018

Pido: Predictive Delay Optimization for Intertidal Wireless Sensor Networks.
Sensors, 2018

机器学习算法在中医诊疗中的研究综述 (Review of Machine Learning Algorithms in Traditional Chinese Medicine).
计算机科学, 2018

2016
A multipath resource updating approach for distributed controllers in software-defined network.
Sci. China Inf. Sci., 2016

2014
A secure routing model based on distance vector routing algorithm.
Sci. China Inf. Sci., 2014

Dynamic load distribution with hop-by-hop forwarding based on max-min one-way delay.
Sci. China Inf. Sci., 2014

AdaFlow: Adaptive Control to Improve Availability of OpenFlow Forwarding for Burst Quantity of Flows.
Proceedings of the Testbeds and Research Infrastructure: Development of Networks and Communities, 2014

Prototype for customized multicast services in software defined networks.
Proceedings of the 22nd International Conference on Software, 2014

Lossless reconfiguration protocol for multi-domain data plane in software-defined networks.
Proceedings of the 2014 Proceedings IEEE INFOCOM Workshops, Toronto, ON, Canada, April 27, 2014

2010
Fast-Converging Distance Vector Routing Mechanism for IP Networks.
J. Networks, 2010

2009
Adjoint code generator.
Sci. China Ser. F Inf. Sci., 2009

A Fast Reroute Mechanism for RIP Protocol.
Proceedings of the 2009 Pacific-Asia Conference on Circuits, Communications and Systems, 2009

2008
APVP: An Aggregate-Based Path Verification Routing Protocol for the Ad Hoc Networks.
Proceedings of the 2008 International Conference on Computational Intelligence and Security, 2008


  Loading...