Zhibo Wang
Orcid: 0000-0002-5804-3279Affiliations:
- Zhejiang University, Hangzhou, China
According to our database1,
Zhibo Wang
authored at least 171 papers
between 2008 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
IEEE Wirel. Commun., October, 2024
IEEE Trans. Neural Networks Learn. Syst., October, 2024
A Profit-Maximizing Data Marketplace with Differentially Private Federated Learning under Price Competition.
Proc. ACM Manag. Data, September, 2024
IEEE Trans. Mob. Comput., May, 2024
Shield Against Gradient Leakage Attacks: Adaptive Privacy-Preserving Federated Learning.
IEEE/ACM Trans. Netw., April, 2024
Call White Black: Enhanced Image-Scaling Attack in Industrial Artificial Intelligence Systems.
IEEE Trans. Ind. Informatics, April, 2024
Computation Offloading in Multi-Cell Networks With Collaborative Edge-Cloud Computing: A Game Theoretic Approach.
IEEE Trans. Mob. Comput., March, 2024
IEEE Trans. Mob. Comput., March, 2024
IEEE Trans. Dependable Secur. Comput., 2024
IEEE Trans. Dependable Secur. Comput., 2024
PointNCBW: Towards Dataset Ownership Verification for Point Clouds via Negative Clean-label Backdoor Watermark.
CoRR, 2024
RedAgent: Red Teaming Large Language Models with Context-aware Autonomous Language Agent.
CoRR, 2024
CoRR, 2024
CoRR, 2024
FaceObfuscator: Defending Deep Learning-based Privacy Attacks with Gradient Descent-resistant Features in Face Recognition.
Proceedings of the 33rd USENIX Security Symposium, 2024
DAAP: Privacy-Preserving Model Accuracy Estimation on Unlabeled Datasets Through Distribution-Aware Adversarial Perturbation.
Proceedings of the 33rd USENIX Security Symposium, 2024
Towards Efficient Asynchronous Federated Learning in Heterogeneous Edge Environments.
Proceedings of the IEEE INFOCOM 2024, 2024
Breaking Secure Aggregation: Label Leakage from Aggregated Gradients in Federated Learning.
Proceedings of the IEEE INFOCOM 2024, 2024
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024
2023
PrivAim: A Dual-Privacy Preserving and Quality-Aware Incentive Mechanism for Federated Learning.
IEEE Trans. Computers, July, 2023
IEEE Internet Things J., June, 2023
IEEE Trans. Mob. Comput., April, 2023
IEEE Trans. Knowl. Data Eng., March, 2023
Towards Privacy-Driven Truthful Incentives for Mobile Crowdsensing Under Untrusted Platform.
IEEE Trans. Mob. Comput., 2023
IEEE Trans. Dependable Secur. Comput., 2023
IEEE Trans. Dependable Secur. Comput., 2023
VoiceCloak: Adversarial Example Enabled Voice De-Identification with Balanced Privacy and Utility.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2023
Threats to Training: A Survey of Poisoning Attacks and Defenses on Machine Learning Systems.
ACM Comput. Surv., 2023
Towards Deep Learning Models Resistant to Transfer-based Adversarial Attacks via Data-centric Robust Learning.
CoRR, 2023
SurrogatePrompt: Bypassing the Safety Filter of Text-To-Image Models via Substitution.
CoRR, 2023
CAPP-130: A Corpus of Chinese Application Privacy Policy Summarization and Interpretation.
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023
Proceedings of the 31st ACM International Conference on Multimedia, 2023
Proceedings of the 31st ACM International Conference on Multimedia, 2023
Proceedings of the 31st ACM International Conference on Multimedia, 2023
Action Recognition with Multi-stream Motion Modeling and Mutual Information Maximization.
Proceedings of the Thirty-Second International Joint Conference on Artificial Intelligence, 2023
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023
Counterfactual-based Saliency Map: Towards Visual Contrastive Explanations for Neural Networks.
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2023
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2023
Towards Efficient Edge Learning for Large Models in Heterogeneous Resource-limited Environments.
Proceedings of the 9th International Conference on Big Data Computing and Communications, 2023
2022
Temporal Correlation Enhanced Sparse Activity Detection in MIMO Enabled Grant-Free NOMA.
IEEE Trans. Veh. Technol., 2022
Towards Personalized Privacy-Preserving Truth Discovery Over Crowdsourced Data Streams.
IEEE/ACM Trans. Netw., 2022
IEEE Trans. Mob. Comput., 2022
Privacy-Preserving Streaming Truth Discovery in Crowdsourcing With Differential Privacy.
IEEE Trans. Mob. Comput., 2022
Towards Personalized Privacy-Preserving Incentive for Truth Discovery in Mobile Crowdsensing Systems.
IEEE Trans. Mob. Comput., 2022
Eclipse: Preserving Differential Location Privacy Against Long-Term Observation Attacks.
IEEE Trans. Mob. Comput., 2022
IEEE Trans. Ind. Informatics, 2022
DAP: Efficient Detection Against Probabilistic Cloning Attacks in Anonymous RFID Systems.
IEEE Trans. Ind. Informatics, 2022
PrivStream: A privacy-preserving inference framework on IoT streaming data at the edge.
Inf. Fusion, 2022
Vanilla Feature Distillation for Improving the Accuracy-Robustness Trade-Off in Adversarial Training.
CoRR, 2022
IEEE Commun. Surv. Tutorials, 2022
Comput. Electr. Eng., 2022
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022
Push the Limit of Adversarial Example Attack on Speaker Recognition in Physical Domain.
Proceedings of the 20th ACM Conference on Embedded Networked Sensor Systems, 2022
Proceedings of the ACM MobiCom '22: The 28th Annual International Conference on Mobile Computing and Networking, Sydney, NSW, Australia, October 17, 2022
An Efficient Two-Layer Task Offloading Scheme for MEC System with Multiple Services Providers.
Proceedings of the IEEE INFOCOM 2022, 2022
Proceedings of the IEEE INFOCOM 2022, 2022
Fairness-aware Adversarial Perturbation Towards Bias Mitigation for Deployed Deep Models.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022
2021
Trustworthy and Cost-Effective Cell Selection for Sparse Mobile Crowdsensing Systems.
IEEE Trans. Veh. Technol., 2021
IEEE Trans. Mob. Comput., 2021
SocialRecruiter: Dynamic Incentive Mechanism for Mobile Crowdsourcing Worker Recruitment With Social Networks.
IEEE Trans. Mob. Comput., 2021
Nowhere to Hide: Efficiently Identifying Probabilistic Cloning Attacks in Large-Scale RFID Systems.
IEEE Trans. Inf. Forensics Secur., 2021
Invisible Adversarial Attack against Deep Neural Networks: An Adaptive Penalization Approach.
IEEE Trans. Dependable Secur. Comput., 2021
Augmenting Encrypted Search: A Decentralized Service Realization with Enforced Execution.
IEEE Trans. Dependable Secur. Comput., 2021
Online policies for throughput maximization of backscatter assisted wireless powered communication via reinforcement learning approaches.
Pervasive Mob. Comput., 2021
IEEE J. Sel. Areas Commun., 2021
Joint User Activity Identification and Channel Estimation for Grant-Free NOMA: A Spatial-Temporal Structure-Enhanced Approach.
IEEE Internet Things J., 2021
Fine-Grained and Context-Aware Behavioral Biometrics for Pattern Lock on Smartphones.
Proc. ACM Interact. Mob. Wearable Ubiquitous Technol., 2021
IEEE Access Special Section Editorial: Toward Smart Cities With IoT Based on Crowdsensing.
IEEE Access, 2021
Proceedings of the 40th IEEE Conference on Computer Communications, 2021
A Truthful Procurement Auction for Incentivizing Heterogeneous Clients in Federated Learning.
Proceedings of the 41st IEEE International Conference on Distributed Computing Systems, 2021
Proceedings of the 2021 IEEE/CVF International Conference on Computer Vision, 2021
2020
IEEE Trans. Wirel. Commun., 2020
Cluster-Enabled Cooperative Scheduling Based on Reinforcement Learning for High-Mobility Vehicular Networks.
IEEE Trans. Veh. Technol., 2020
New Emoji Requests from Twitter Users: When, Where, Why, and What We Can Do About Them.
ACM Trans. Soc. Comput., 2020
IEEE Trans. Mob. Comput., 2020
Ranking Station Importance With Human Mobility Patterns Using Subway Network Datasets.
IEEE Trans. Intell. Transp. Syst., 2020
IEEE J. Sel. Areas Commun., 2020
Toward Efficient Compressed-Sensing-Based RFID Identification: A Sparsity-Controlled Approach.
IEEE Internet Things J., 2020
SCRA: Structured Compressive Random Access for Efficient Information Collection in IoT.
IEEE Internet Things J., 2020
CoRR, 2020
Sci. China Inf. Sci., 2020
CCF Trans. Netw., 2020
PWEND: Proactive wakeup based energy-efficient neighbor discovery for mobile sensor networks.
Ad Hoc Networks, 2020
Proceedings of the 19th IEEE International Conference on Trust, 2020
Proceedings of the Mobihoc '20: The Twenty-first ACM International Symposium on Theory, 2020
Proceedings of the 39th IEEE Conference on Computer Communications, 2020
Towards Personalized Privacy-Preserving Incentive for Truth Discovery in Crowdsourced Binary-Choice Question Answering.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020
Proceedings of the 22nd IEEE International Conference on High Performance Computing and Communications; 18th IEEE International Conference on Smart City; 6th IEEE International Conference on Data Science and Systems, 2020
Proceedings of the Thirty-Fourth AAAI Conference on Artificial Intelligence, 2020
2019
Privacy-Preserving Crowd-Sourced Statistical Data Publishing with An Untrusted Server.
IEEE Trans. Mob. Comput., 2019
IEEE Trans. Mob. Comput., 2019
An Energy Efficient Synchronization Protocol for Target Tracking in Wireless Sensor Array Networks.
Sensors, 2019
J. Netw. Comput. Appl., 2019
IEEE Internet Things J., 2019
PRSS: A Prejudiced Random Sensing Strategy for Energy-Efficient Information Collection in the Internet of Things.
IEEE Internet Things J., 2019
Simultaneous Sensor Placement and Scheduling for Fusion-Based Detection in RF-Powered Sensor Networks.
IEEE Internet Things J., 2019
EveDroid: Event-Aware Android Malware Detection Against Model Degrading for IoT Devices.
IEEE Internet Things J., 2019
Augmenting Encrypted Search: A Decentralized Service Realization with Enforced Execution.
CoRR, 2019
IEEE Commun. Mag., 2019
The World Wants Mangoes and Kangaroos: A Study of New Emoji Requests Based on Thirty Million Tweets.
Proceedings of the World Wide Web Conference, 2019
Beyond Inferring Class Representatives: User-Level Privacy Leakage From Federated Learning.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019
Towards Privacy-preserving Incentive for Mobile Crowdsensing Under An Untrusted Platform.
Proceedings of the 2019 IEEE Conference on Computer Communications, 2019
advPattern: Physical-World Attacks on Deep Person Re-Identification via Adversarially Transformable Patterns.
Proceedings of the 2019 IEEE/CVF International Conference on Computer Vision, 2019
Proceedings of the 21st IEEE International Conference on High Performance Computing and Communications; 17th IEEE International Conference on Smart City; 5th IEEE International Conference on Data Science and Systems, 2019
Proceedings of the 22th International Conference on Information Fusion, 2019
2018
Niffler: A Context-Aware and User-Independent Side-Channel Attack System for Password Inference.
Wirel. Commun. Mob. Comput., 2018
Enabling Online Robust Barcode-Based Visible Light Communication With Realtime Feedback.
IEEE Trans. Wirel. Commun., 2018
IEEE Trans. Veh. Technol., 2018
IEEE Trans. Veh. Technol., 2018
IEEE Trans. Veh. Technol., 2018
On Achieving Asynchronous Energy-Efficient Neighbor Discovery for Mobile Sensor Networks.
IEEE Trans. Emerg. Top. Comput., 2018
Real-Time and Spatio-Temporal Crowd-Sourced Social Network Data Publishing with Differential Privacy.
IEEE Trans. Dependable Secur. Comput., 2018
IEEE Internet Things J., 2018
IEEE Internet Things J., 2018
Heterogeneous incentive mechanism for time-sensitive and location-dependent crowdsensing networks with random arrivals.
Comput. Networks, 2018
IEEE Commun. Mag., 2018
A Social Utility-Based Dissemination Scheme for Emergency Warning Messages in Vehicular Social Networks.
Comput. J., 2018
Sparsest Random Sampling for Cluster-Based Compressive Data Gathering in Wireless Sensor Networks.
IEEE Access, 2018
Deep User Modeling for Content-based Event Recommendation in Event-based Social Networks.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018
Pay On-Demand: Dynamic Incentive and Task Selection for Location-Dependent Mobile Crowdsensing Systems.
Proceedings of the 38th IEEE International Conference on Distributed Computing Systems, 2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
Proceedings of the 2nd Asia-Pacific Workshop on Networking, 2018
2017
IEEE Trans. Veh. Technol., 2017
Pervasive Mob. Comput., 2017
Efficient and Reliable Missing Tag Identification for Large-Scale RFID Systems With Unknown Tags.
IEEE Internet Things J., 2017
Comput. Networks, 2017
Ad Hoc Networks, 2017
Approximate Cardinality Estimation (ACE) in large-scale Internet of Things deployments.
Ad Hoc Networks, 2017
Exploiting social influence for context-aware event recommendation in event-based social networks.
Proceedings of the 2017 IEEE Conference on Computer Communications, 2017
2016
A Secure Credit-Based Incentive Mechanism for Message Forwarding in Noncooperative DTNs.
IEEE Trans. Veh. Technol., 2016
IEEE Trans. Mob. Comput., 2016
SecWeb: Privacy-Preserving Web Browsing Monitoring with w-Event Differential Privacy.
Proceedings of the Security and Privacy in Communication Networks, 2016
RescueDP: Real-time spatio-temporal crowd-sourced data publishing with differential privacy.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016
Catch me in the dark: Effective privacy-preserving outsourcing of feature extractions over image data.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016
Proceedings of the 22nd IEEE International Conference on Parallel and Distributed Systems, 2016
2015
IEEE Trans. Mob. Comput., 2015
Pervasive Mob. Comput., 2015
Frontiers Inf. Technol. Electron. Eng., 2015
pQueue-MAC: An Energy Efficient Hybrid MAC Protocol for Event-Driven Sensor Networks.
Int. J. Distributed Sens. Networks, 2015
Fault Tolerant Line-Based Barrier Coverage Formation in Mobile Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2015
Proceedings of the 35th IEEE International Conference on Distributed Computing Systems, 2015
CloudBI: Practical Privacy-Preserving Outsourcing of Biometric Identification in the Cloud.
Proceedings of the Computer Security - ESORICS 2015, 2015
Walls Have Ears! Opportunistically Communicating Secret Messages Over the Wiretap Channel: from Theory to Practice.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
2014
Optimal Load Balancing and Energy Cost Management for Internet Data Centers in Deregulated Electricity Markets.
IEEE Trans. Parallel Distributed Syst., 2014
IEEE Trans. Mob. Comput., 2014
Applying biometrics to design three-factor remote user authentication scheme with key agreement.
Secur. Commun. Networks, 2014
Mobile Beacon Based Wormhole Attackers Detection and Positioning in Wireless Sensor Networks.
Int. J. Distributed Sens. Networks, 2014
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014
Proceedings of the 22nd ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems, 2014
2013
HierTrack: an energy-efficient cluster-based target tracking system forwireless sensor networks.
J. Zhejiang Univ. Sci. C, 2013
Int. J. Distributed Sens. Networks, 2013
iQueue-MAC: A traffic adaptive duty-cycled MAC protocol with dynamic slot allocation.
Proceedings of the 10th Annual IEEE International Conference on Sensing, 2013
Proceedings of the IEEE 10th International Conference on Mobile Ad-Hoc and Sensor Systems, 2013
2012
Queue-MAC: A queue-length aware hybrid CSMA/TDMA MAC protocol for providing dynamic adaptation to traffic and duty-cycle variation in wireless sensor networks.
Proceedings of the 9th IEEE International Workshop on Factory Communication Systems, 2012
Proceedings of the Advances in Wireless Sensor Networks, 2012
2011
Proceedings of the 9th International Conference on Embedded Networked Sensor Systems, 2011
Proceedings of the 9th International Conference on Embedded Networked Sensor Systems, 2011
2010
Label-Based DV-Hop Localization Against Wormhole Attacks in Wireless Sensor Networks.
Proceedings of the Fifth International Conference on Networking, Architecture, and Storage, 2010
A Novel Mobility Management Scheme for Target Tracking in Cluster-Based Sensor Networks.
Proceedings of the Distributed Computing in Sensor Systems, 2010
2008
Proceedings of the IEEE International Conference on Networking, Sensing and Control, 2008