Bing Chen

Orcid: 0000-0002-2863-5441

Affiliations:
  • Nanjing University of Aeronautics and Astronautics, College of Computer Science and Technology, China (PhD 2008)


According to our database1, Bing Chen authored at least 118 papers between 2008 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Toward Online Reliability-Enhanced Microservice Deployment With Layer Sharing in Edge Computing.
IEEE Internet Things J., July, 2024

A Three-Party Hierarchical Game for Physical Layer Security Aware Wireless Communications With Dynamic Trilateral Coalitions.
IEEE Trans. Wirel. Commun., May, 2024

Service Migration or Task Rerouting: A Two-Timescale Online Resource Optimization for MEC.
IEEE Trans. Wirel. Commun., February, 2024

FLPurifier: Backdoor Defense in Federated Learning via Decoupled Contrastive Training.
IEEE Trans. Inf. Forensics Secur., 2024

BadCleaner: Defending Backdoor Attacks in Federated Learning via Attention-Based Multi-Teacher Distillation.
IEEE Trans. Dependable Secur. Comput., 2024

UAV-Assisted Active Sparse Crowdsensing for Ground Signal Map Construction Based on 3-D Spatial-Temporal Correlation.
IEEE Internet Things J., 2024

"No Matter What You Do!": Mitigating Backdoor Attacks in Graph Neural Networks.
CoRR, 2024

Fairness-Aware Federated Learning Framework on Heterogeneous Data Distributions.
Proceedings of the IEEE International Conference on Communications, 2024

2023
ADFL: Defending backdoor attacks in federated learning via adversarial distillation.
Comput. Secur., September, 2023

Multi-level membership inference attacks in federated Learning based on active GAN.
Neural Comput. Appl., August, 2023

VPFL: A verifiable privacy-preserving federated learning scheme for edge computing systems.
Digit. Commun. Networks, August, 2023

Workload Re-Allocation for Edge Computing With Server Collaboration: A Cooperative Queueing Game Approach.
IEEE Trans. Mob. Comput., May, 2023

Combine sliced joint graph with graph neural networks for smart contract vulnerability detection.
J. Syst. Softw., 2023

Extended Abstract of Combine Sliced Joint Graph with Graph Neural Networks for Smart Contract Vulnerability Detection.
Proceedings of the IEEE International Conference on Software Analysis, 2023

Tackling Non-IID for Federated Learning with Components Alignment.
Proceedings of the Machine Learning for Cyber Security - 5th International Conference, 2023

SAPPX: Securing COTS Binaries with Automatic Program Partitioning for Intel SGX.
Proceedings of the 34th IEEE International Symposium on Software Reliability Engineering, 2023

A DRL-Based Hierarchical Game for Physical Layer Security with Dynamic Trilateral Coalitions.
Proceedings of the IEEE International Conference on Communications, 2023

Label-Only Membership Inference Attack Against Federated Distillation.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2023

A Two-Timescale Online Optimization for Balancing Service Migration and Task Rerouting in MEC.
Proceedings of the IEEE Global Communications Conference, 2023

Detect Advanced Persistent Threat In Graph-Level Using Competitive AutoEncoder.
Proceedings of the 2nd International Conference on Networks, 2023

2022
Measurement-Based Optimization of Cell Selection in NB-IoT Networks.
ACM Trans. Sens. Networks, November, 2022

A Computation Offloading Game for Jointly Managing Local Pre-Processing Time-Length and Priority Selection in Edge Computing.
IEEE Trans. Veh. Technol., 2022

Distributed Clustering-Based Cooperative Vehicular Edge Computing for Real-Time Offloading Requests.
IEEE Trans. Veh. Technol., 2022

RobustFL: Robust Federated Learning Against Poisoning Attacks in Industrial IoT Systems.
IEEE Trans. Ind. Informatics, 2022

CrowdLoc: Robust image indoor localization with edge-assisted crowdsensing.
J. Syst. Archit., 2022

Joint Online Optimization of Data Sampling Rate and Preprocessing Mode for Edge-Cloud Collaboration-Enabled Industrial IoT.
IEEE Internet Things J., 2022

Optimizing NB-IoT Power Consumption via Adaptive Radio Access.
IEEE Internet Things J., 2022

Blockchain-based access control with k $k$ -times tamper resistance in cloud environment.
Int. J. Intell. Syst., 2022

An adaptive access control scheme based on trust degrees for edge computing.
Comput. Stand. Interfaces, 2022

Cyber situation perception for Internet of Things systems based on zero-day attack activities recognition within advanced persistent threat.
Concurr. Comput. Pract. Exp., 2022

Applications of Multi-Agent Reinforcement Learning in Future Internet: A Comprehensive Survey.
IEEE Commun. Surv. Tutorials, 2022

Closed-Loop Control of Edge-Cloud Collaboration Enabled IIoT: An Online Optimization Approach.
Proceedings of the IEEE International Conference on Communications, 2022

APTKG: Constructing Threat Intelligence Knowledge Graph from Open-Source APT Reports Based on Deep Learning.
Proceedings of the 5th International Conference on Data Science and Information Technology, 2022

Edge-based Protection Against Malicious Poisoning for Distributed Federated Learning.
Proceedings of the 25th IEEE International Conference on Computer Supported Cooperative Work in Design, 2022

Integrated Bigdata Analysis Model for Industrial Anomaly Detection via Temporal Convolutional Network and Attention Mechanism.
Proceedings of the Web and Big Data - 6th International Joint Conference, 2022

2021
Proof of Engagement: A Flexible Blockchain Consensus Mechanism.
Wirel. Commun. Mob. Comput., 2021

Fast Admission Control and Power Optimization With Adaptive Rates for Communication Fairness in Wireless Networks.
IEEE Trans. Mob. Comput., 2021

TrafficGAN: Network-Scale Deep Traffic Prediction With Generative Adversarial Nets.
IEEE Trans. Intell. Transp. Syst., 2021

Secure Storage Auditing With Efficient Key Updates for Cognitive Industrial IoT Environment.
IEEE Trans. Ind. Informatics, 2021

A Hierarchical Approach for Advanced Persistent Threat Detection with Attention-Based Graph Neural Networks.
Secur. Commun. Networks, 2021

Predicting the APT for Cyber Situation Comprehension in 5G-Enabled IoT Scenarios Based on Differentially Private Federated Learning.
Secur. Commun. Networks, 2021

Top-Down Pyramid Fusion Network for High-Resolution Remote Sensing Semantic Segmentation.
Remote. Sens., 2021

Device-Free Secure Interaction With Hand Gestures in WiFi-Enabled IoT Environment.
IEEE Internet Things J., 2021

PoisonGAN: Generative Poisoning Attacks Against Federated Learning in Edge Computing Systems.
IEEE Internet Things J., 2021

Is low-rate distributed denial of service a great threat to the Internet?
IET Inf. Secur., 2021

OAC-HAS: outsourced access control with hidden access structures in fog-enhanced IoT systems.
Connect. Sci., 2021

Defending against Membership Inference Attacks in Federated learning via Adversarial Example.
Proceedings of the 17th International Conference on Mobility, Sensing and Networking, 2021

2020
Secure Transmission of Compressed Sampling Data Using Edge Clouds.
IEEE Trans. Ind. Informatics, 2020

Channel Coding Scheme for Relay Edge Computing Wireless Networks via Homomorphic Encryption and NOMA.
IEEE Trans. Cogn. Commun. Netw., 2020

FedMEC: Improving Efficiency of Differentially Private Federated Learning via Mobile Edge Computing.
Mob. Networks Appl., 2020

Root Cause Analysis for Self-organizing Cellular Network: an Active Learning Approach.
Mob. Networks Appl., 2020

Automatic deployment and control of network services in NFV environments.
J. Netw. Comput. Appl., 2020

Minimum Time Extrema Estimation for Large-Scale Radio-Frequency Identification Systems.
J. Comput. Sci. Technol., 2020

LVPDA: A Lightweight and Verifiable Privacy-Preserving Data Aggregation Scheme for Edge-Enabled IoT.
IEEE Internet Things J., 2020

Relational intelligence recognition in online social networks - A survey.
Comput. Sci. Rev., 2020

Obstacle Recognition and Avoidance for UAVs Under Resource-Constrained Environments.
IEEE Access, 2020

Secure Routing Protocol in Wireless Ad Hoc Networks via Deep Learning.
Proceedings of the 2020 IEEE Wireless Communications and Networking Conference, 2020

Detecting Advanced Persistent Threat in Edge Computing via Federated Learning.
Proceedings of the Security and Privacy in Digital Economy, 2020

Predicting Advanced Persistent Threats for IoT Systems Based on Federated Learning.
Proceedings of the Security, Privacy, and Anonymity in Computation, Communication, and Storage, 2020

URFS: A User-space Raw File System based on NVMe SSD.
Proceedings of the 26th IEEE International Conference on Parallel and Distributed Systems, 2020

Beyond Model-Level Membership Privacy Leakage: an Adversarial Approach in Federated Learning.
Proceedings of the 29th International Conference on Computer Communications and Networks, 2020

UAV-Assisted Ground Signal Map Construction based on 3-D Spatial Correlation.
Proceedings of the IEEE Global Communications Conference, 2020

Defending Poisoning Attacks in Federated Learning via Adversarial Training Method.
Proceedings of the Frontiers in Cyber Security - Third International Conference, 2020

Graph Representation Learning Using Attention Network.
Proceedings of the Big Data - 8th CCF Conference, 2020

2019
Strategic Social Team Crowdsourcing: Forming a Team of Truthful Workers for Crowdsourcing in Social Networks.
IEEE Trans. Mob. Comput., 2019

Inapproximability results and suboptimal algorithms for minimum delay cache placement in campus networks with content-centric network routers.
J. Supercomput., 2019

Contextual Multi-Armed Bandit for Cache-Aware Decoupled Multiple Association in UDNs: A Deep Learning Approach.
IEEE Trans. Cogn. Commun. Netw., 2019

Cyber Situation Comprehension for IoT Systems based on APT Alerts and Logs Correlation.
Sensors, 2019

DeepCount: Crowd Counting with Wi-Fi using Deep Learning.
J. Commun. Inf. Networks, 2019

DeepCount: Crowd Counting with WiFi via Deep Learning.
CoRR, 2019

Matrix Differential Decomposition-Based Anomaly Detection and Localization in NFV Networks.
IEEE Access, 2019

Poisoning Attack in Federated Learning using Generative Adversarial Nets.
Proceedings of the 18th IEEE International Conference On Trust, 2019

Correlate the Advanced Persistent Threat Alerts and Logs for Cyber Situation Comprehension.
Proceedings of the Security and Privacy in Social Networks and Big Data, 2019

An Efficient Federated Learning Scheme with Differential Privacy in Mobile Edge Computing.
Proceedings of the Machine Learning and Intelligent Communications, 2019

Multiple Tasks Assignment for Cooperating Homogeneous Unmanned Aerial Vehicles.
Proceedings of the Machine Learning and Intelligent Communications, 2019

A Drone Formation Transformation Approach.
Proceedings of the Machine Learning and Intelligent Communications, 2019

Minimum Reconfiguration Cost for Drone Swarm Formation via Two-Stage Stochastic Programming.
Proceedings of the 2019 IEEE Symposium on Computers and Communications, 2019

GCGAN: Generative Adversarial Nets with Graph CNN for Network-Scale Traffic Prediction.
Proceedings of the International Joint Conference on Neural Networks, 2019

PEFL: A Privacy-Enhanced Federated Learning Scheme for Big Data Analytics.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

MastDP: Matching Based Double Auction Mechanism for Spectrum Trading with Differential Privacy.
Proceedings of the 2019 IEEE Global Communications Conference, 2019

2018
A novel method for measurement points selection in access points localization.
Wirel. Networks, 2018

A Novel Simulation Model for Nonstationary Rice Fading Channels.
Wirel. Commun. Mob. Comput., 2018

Energy Efficient Caching in Backhaul-Aware Cellular Networks with Dynamic Content Popularity.
Wirel. Commun. Mob. Comput., 2018

Compressed Sensing Based Joint Rate Allocation and Routing Design in Wireless Sensor Networks.
Wirel. Commun. Mob. Comput., 2018

Data Security and Privacy-Preserving in Edge Computing Paradigm: Survey and Open Issues.
IEEE Access, 2018

Truthful Double Auction for Joint Internet of Energy and Profit Optimization in Cognitive Radio Networks.
IEEE Access, 2018

Energy Efficiency of Access Control With Rate Constraints in Cognitive Radio Networks.
IEEE Access, 2018

Hybrid Network Coding Scheme in Cognitive Radio Networks With Multiple Secondary Users.
IEEE Access, 2018

Full Spectrum Sharing in Cognitive Radio Networks Toward 5G: A Survey.
IEEE Access, 2018

A Geometry-based 3D Non-stationary UAV-MIMO Channel Model Allowing 3D Arbitrary Trajectories.
Proceedings of the 10th International Conference on Wireless Communications and Signal Processing, 2018

LPDA-EC: A Lightweight Privacy-Preserving Data Aggregation Scheme for Edge Computing.
Proceedings of the 15th IEEE International Conference on Mobile Ad Hoc and Sensor Systems, 2018

Energy Efficient Caching in Backhaul-Aware Ultra-Dense Cellular Networks.
Proceedings of the IEEE International Conference on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2018

Estimating the Extrema of Large-Scale RFID Systems.
Proceedings of the 24th IEEE International Conference on Parallel and Distributed Systems, 2018

Adaptive Optimization with Max-Min Achievable Rate Fairness in Mobile Cloud Networking.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

On the Profit Maximization of Spectrum Investment under Uncertainties in Cognitive Radio Networks.
Proceedings of the 2018 IEEE International Conference on Communications, 2018

2017
Compressed RSS Measurement for Communication and Sensing in the Internet of Things.
Wirel. Commun. Mob. Comput., 2017

Toward Efficient Team Formation for Crowdsourcing in Noncooperative Social Networks.
IEEE Trans. Cybern., 2017

LCMSC: A lightweight collaborative mechanism for SDN controllers.
Comput. Networks, 2017

Wireless Virtualization as a Hierarchical Combinatorial Auction: An Illustrative Example.
Proceedings of the 2017 IEEE Wireless Communications and Networking Conference, 2017

Exact Algorithms for Maximizing Lifetime of WSNs Using Integer Linear Programming.
Proceedings of the 2017 IEEE Wireless Communications and Networking Conference, 2017

Application of Cooperative Communications with Dual-Stations in Wireless Mobile Environments.
Proceedings of the Machine Learning and Intelligent Communications, 2017

Device-Free and Robust User Identification in Smart Environment Using WiFi Signal.
Proceedings of the 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), 2017

Performance Analysis of Full-Duplex D2D Communications in Multi-Tier Heterogeneous Wireless Networks.
Proceedings of the 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), 2017

WiCount: A Deep Learning Approach for Crowd Counting Using WiFi Signals.
Proceedings of the 2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubiquitous Computing and Communications (ISPA/IUCC), 2017

WiSmart : Robust Human Access and Identification for Smart Homes Using WiFi Signals.
Proceedings of the Cloud Computing and Security - Third International Conference, 2017

2016
Channel Selection Policy in Multi-SU and Multi-PU Cognitive Radio Networks with Energy Harvesting for Internet of Everything.
Mob. Inf. Syst., 2016

Cooperative Caching Placement in Cognitive Device-to-Device Networks.
J. Commun., 2016

Fast Approximation Algorithm for Maximum Lifetime Aggregation Trees in Wireless Sensor Networks.
INFORMS J. Comput., 2016

TPAHS: A Truthful and Profit Maximizing Double Auction for Heterogeneous Spectrums.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

SDN-Based Efficient Bandwidth Allocation for Caching Enabled Cognitive Radio Networks.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Wi-Wri: Fine-Grained Writing Recognition Using Wi-Fi Signals.
Proceedings of the 2016 IEEE Trustcom/BigDataSE/ISPA, 2016

Towards optimal cache decision for campus networks with content-centric network routers.
Proceedings of the IEEE Symposium on Computers and Communication, 2016

PTOM: Profit Concerning and Truthful Online Spectrum Double Auction Mechanism.
Proceedings of the Cloud Computing and Security - Second International Conference, 2016

Wi-Play: Robust Human Activity Recognition for Somatosensory Game Using Wi-Fi Signals.
Proceedings of the Cloud Computing and Security - Second International Conference, 2016

2015
OpenFlow-Based Load Balancing for Wireless Mesh Network.
Proceedings of the Cloud Computing and Security - First International Conference, 2015

A Dynamic Resource Allocation Model for Guaranteeing Quality of Service in Software Defined Networking Based Cloud Computing Environment.
Proceedings of the Cloud Computing and Security - First International Conference, 2015

2010
A Novel Mobility Management Protocol Supporting Network Seamless Roaming.
J. Networks, 2010

2008
Weighted Margin Multi-Class Core Vector Machines.
Proceedings of the 2008 International Conference on Computational Intelligence and Security, 2008


  Loading...