Bin Wu
Orcid: 0000-0002-8103-0468Affiliations:
- Chinese Academy of Sciences, State Key Laboratory of Information Security, Beijing, China
According to our database1,
Bin Wu
authored at least 28 papers
between 2010 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2025
Comput. Secur., 2025
2024
A Robust joint coverless image steganography scheme based on two independent modules.
Cybersecur., December, 2024
IEEE Trans. Netw. Sci. Eng., 2024
Game-Theoretic Incentive Mechanism for Collaborative Quality Control in Blockchain-Enhanced Carbon Emissions Verification.
IEEE Trans. Netw. Sci. Eng., 2024
IEEE Trans. Inf. Forensics Secur., 2024
Comput. Networks, 2024
2023
Cybersecur., December, 2023
DLP: towards active defense against backdoor attacks with decoupled learning process.
Cybersecur., December, 2023
Cross-Chain Trusted Service Quality Computing Scheme for Multichain-Model-Based 5G Network Slicing SLA.
IEEE Internet Things J., July, 2023
BEPHAP: A Blockchain-based Efficient Privacy-Preserving Handover Authentication Protocol with key agreement for Internet of Vehicles.
J. Syst. Archit., 2023
A Game Theory-Based Incentive Mechanism for Collaborative Security of Federated Learning in Energy Blockchain Environment.
IEEE Internet Things J., 2023
2022
ACM Trans. Intell. Syst. Technol., 2022
A Cross-Chain Trusted Reputation Scheme for a Shared Charging Platform Based on Blockchain.
IEEE Internet Things J., 2022
2021
RDIC: A blockchain-based remote data integrity checking scheme for IoT in 5G networks.
J. Parallel Distributed Comput., 2021
Achieving low-entropy secure cloud data auditing with file and authenticator deduplication.
Inf. Sci., 2021
Sensitive attribute privacy preservation of trajectory data publishing based on l-diversity.
Distributed Parallel Databases, 2021
Malicious Conspiracy on Permissioned Blockchain to Mount Denial-of-endorsement Attacks.
Proceedings of the 2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom), New York City, NY, USA, September 30, 2021
Keys as Secret Messages: Provably Secure and Efficiency-balanced Steganography on Blockchain.
Proceedings of the 2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom), New York City, NY, USA, September 30, 2021
DeeSCVHunter: A Deep Learning-Based Framework for Smart Contract Vulnerability Detection.
Proceedings of the International Joint Conference on Neural Networks, 2021
Proceedings of the 19th IEEE International Conference on Embedded and Ubiquitous Computing, 2021
2020
Restructured Cloning Vulnerability Detection Based on Function Semantic Reserving and Reiteration Screening.
Proceedings of the Computer Security - ESORICS 2020, 2020
Proceedings of the Computer Security - ESORICS 2020, 2020
2019
Proceedings of the Information and Communications Security - 21st International Conference, 2019
Proceedings of the 2019 IEEE International Conference on Communications, 2019
2018
Proceedings of the MultiMedia Modeling - 24th International Conference, 2018
Proceedings of the 2018 International Joint Conference on Neural Networks, 2018
2017
Proceedings of the Internet Multimedia Computing and Service, 2017
2010
Proceedings of the Information Security, 2010