Rong Wang

Orcid: 0000-0001-9251-3775

Affiliations:
  • Sichuan Normal University, College of Computer Science, Visual Computing and Virtual Reality Key Laboratory of Sichuan, Chengdu, China
  • Southwest Jiaotong University, School of Information Science and Technology, Chengdu, Sichuan, China


According to our database1, Rong Wang authored at least 13 papers between 2017 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Video salient object detection via self-attention-guided multilayer cross-stack fusion.
Multim. Tools Appl., May, 2024

A divide-and-conquer approach to privacy-preserving high-dimensional big data release.
J. Inf. Secur. Appl., 2024

PrivRBFN: Building Privacy-Preserving Radial Basis Function Networks Based on Federated Learning.
Proceedings of the Web and Big Data - 8th International Joint Conference, 2024

2023
A Survey on Federated Learning Poisoning Attacks and Defenses.
CoRR, 2023

FedCIP: Federated Client Intellectual Property Protection with Traitor Tracking.
CoRR, 2023

Covert Communication Based on the Poisoning Attack in Federated Learning.
CoRR, 2023

Exploring a Self-Attentive Multilayer Cross-Stacking Fusion Model for Video Salient Object Detection.
Proceedings of the IEEE International Conference on Systems, Man, and Cybernetics, 2023

2021
Differentially private data publishing for arbitrarily partitioned data.
Inf. Sci., 2021

2020
Heterogeneous data release for cluster analysis with differential privacy.
Knowl. Based Syst., 2020

Privacy-preserving high-dimensional data publishing for classification.
Comput. Secur., 2020

2018
Privacy-Preserving Algorithms for Multiple Sensitive Attributes Satisfying t-Closeness.
J. Comput. Sci. Technol., 2018

An Authentication Method Based on the Turtle Shell Algorithm for Privacy-Preserving Data Mining.
Comput. J., 2018

2017
Detection of malicious web pages based on hybrid analysis.
J. Inf. Secur. Appl., 2017


  Loading...