Bin Wu
Orcid: 0000-0003-0657-3427Affiliations:
- Beijing University of Posts and Telecommunications, School of Cyberspace Security, National Disaster Recovery Technology Engineering Laboratory, China
- Beijing University of Posts and Telecommunications, China (PhD 2008)
According to our database1,
Bin Wu
authored at least 21 papers
between 2007 and 2023.
Collaborative distances:
Collaborative distances:
Timeline
2008
2010
2012
2014
2016
2018
2020
2022
0
1
2
3
4
5
6
1
1
1
4
3
1
2
1
1
1
1
1
1
1
1
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2023
Comput. Syst. Sci. Eng., 2023
2022
Comput. Intell. Neurosci., 2022
2021
Phishing Website Detection Based on Deep Convolutional Neural Network and Random Forest Ensemble Learning.
Sensors, 2021
Proceedings of the AISS 2021: 3rd International Conference on Advanced Information Science and System, Sanya, China, November 26, 2021
2020
Graph Adaptation Network with Domain-Specific Word Alignment for Cross-Domain Relation Extraction.
Sensors, 2020
Feature subset selection combining maximal information entropy and maximal information coefficient.
Appl. Intell., 2020
Network Intrusion Detection Based on Supervised Adversarial Variational Auto-Encoder With Regularization.
IEEE Access, 2020
Using Improved Conditional Generative Adversarial Networks to Detect Social Bots on Twitter.
IEEE Access, 2020
A Flexible Phishing Detection Approach Based on Software-Defined Networking Using Ensemble Learning Method.
Proceedings of the HP3C 2020: 4th International Conference on High Performance Compilation, 2020
2019
KSII Trans. Internet Inf. Syst., 2019
IEEE Access, 2019
Proceedings of the Algorithms and Architectures for Parallel Processing, 2019
2018
Proceedings of the Bio-inspired Computing: Theories and Applications, 2018
2016
Flow-based Anomaly Detection Using Access Behavior Profiling and Time-sequenced Relation Mining.
KSII Trans. Internet Inf. Syst., 2016
Detection of command and control in advanced persistent threat based on independent access.
Proceedings of the 2016 IEEE International Conference on Communications, 2016
2015
KSII Trans. Internet Inf. Syst., 2015
Towards a multiobjective framework for evaluating network security under exploit attacks.
Proceedings of the 2015 IEEE International Conference on Communications, 2015
2012
A Danger Theory Based Mobile Virus Detection Model and Its Application in Inhibiting Virus.
J. Networks, 2012
2007
Proceedings of the 2007 IEEE/WIC/ACM International Conference on Web Intelligence and International Conference on Intelligent Agent Technology, 2007