Bin Wu

Orcid: 0000-0002-8103-0468

Affiliations:
  • Chinese Academy of Sciences, State Key Laboratory of Information Security, Beijing, China


According to our database1, Bin Wu authored at least 28 papers between 2010 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
CD-Net: Robust mobile traffic classification against apps updating.
Comput. Secur., 2025

2024
A Robust joint coverless image steganography scheme based on two independent modules.
Cybersecur., December, 2024

A Poisson Game-Based Incentive Mechanism for Federated Learning in Web 3.0.
IEEE Trans. Netw. Sci. Eng., 2024

Game-Theoretic Incentive Mechanism for Collaborative Quality Control in Blockchain-Enhanced Carbon Emissions Verification.
IEEE Trans. Netw. Sci. Eng., 2024

A Practical Data Trading Protocol for Sudoku Solutions.
IEEE Trans. Inf. Forensics Secur., 2024

A Blockchain-based carbon emission security accounting scheme.
Comput. Networks, 2024

2023
NBA: defensive distillation for backdoor removal via neural behavior alignment.
Cybersecur., December, 2023

DLP: towards active defense against backdoor attacks with decoupled learning process.
Cybersecur., December, 2023

Cross-Chain Trusted Service Quality Computing Scheme for Multichain-Model-Based 5G Network Slicing SLA.
IEEE Internet Things J., July, 2023

BEPHAP: A Blockchain-based Efficient Privacy-Preserving Handover Authentication Protocol with key agreement for Internet of Vehicles.
J. Syst. Archit., 2023

A Game Theory-Based Incentive Mechanism for Collaborative Security of Federated Learning in Energy Blockchain Environment.
IEEE Internet Things J., 2023

2022
Privacy Preservation for Trajectory Publication Based on Differential Privacy.
ACM Trans. Intell. Syst. Technol., 2022

A Cross-Chain Trusted Reputation Scheme for a Shared Charging Platform Based on Blockchain.
IEEE Internet Things J., 2022

2021
RDIC: A blockchain-based remote data integrity checking scheme for IoT in 5G networks.
J. Parallel Distributed Comput., 2021

Achieving low-entropy secure cloud data auditing with file and authenticator deduplication.
Inf. Sci., 2021

Sensitive attribute privacy preservation of trajectory data publishing based on l-diversity.
Distributed Parallel Databases, 2021

Malicious Conspiracy on Permissioned Blockchain to Mount Denial-of-endorsement Attacks.
Proceedings of the 2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom), New York City, NY, USA, September 30, 2021

Keys as Secret Messages: Provably Secure and Efficiency-balanced Steganography on Blockchain.
Proceedings of the 2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom), New York City, NY, USA, September 30, 2021

DeeSCVHunter: A Deep Learning-Based Framework for Smart Contract Vulnerability Detection.
Proceedings of the International Joint Conference on Neural Networks, 2021

New Dynamic Switch Migration Technique Based on Deep Q-learning.
Proceedings of the 19th IEEE International Conference on Embedded and Ubiquitous Computing, 2021

2020
Restructured Cloning Vulnerability Detection Based on Function Semantic Reserving and Reiteration Screening.
Proceedings of the Computer Security - ESORICS 2020, 2020

Linear Attack on Round-Reduced DES Using Deep Learning.
Proceedings of the Computer Security - ESORICS 2020, 2020

2019
Cloning Vulnerability Detection in Driver Layer of IoT Devices.
Proceedings of the Information and Communications Security - 21st International Conference, 2019

Comment Spam Detection via Effective Features Combination.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

2018
Text Image Deblurring via Intensity Extremums Prior.
Proceedings of the MultiMedia Modeling - 24th International Conference, 2018

Anomaly User Detection via Comprehensive Keystroke Features Optimization.
Proceedings of the 2018 International Joint Conference on Neural Networks, 2018

2017
Robust Steganography via Patch-Based Texture Synthesis.
Proceedings of the Internet Multimedia Computing and Service, 2017

2010
Privacy Preserving of Trust Management Credentials Based on Trusted Computing.
Proceedings of the Information Security, 2010


  Loading...