Bin Wang
Orcid: 0000-0002-3790-2708Affiliations:
- Zhejiang University, College of Electrical Engineering, Hangzhou, China
According to our database1,
Bin Wang
authored at least 106 papers
between 2008 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2025
Unveiling the veil: high-frequency components as the key to understanding medical DNNs' vulnerability to adversarial examples.
Cybersecur., December, 2025
Enhancing transferability of targeted adversarial examples through amplitude spectrum alignment.
Multim. Syst., October, 2025
F$^{2}$2AT: Feature-Focusing Adversarial Training via Disentanglement of Natural and Perturbed Patterns.
IEEE Trans. Knowl. Data Eng., September, 2025
CustomFair: A Customized Fairness Method for Federated Recommender Systems in Social Internet of Things.
IEEE Internet Things J., September, 2025
Efficient Batch Verification and Privacy-Preserving Data Aggregation Scheme in V2G Networks.
IEEE Trans. Veh. Technol., August, 2025
MalAE: A Feature-Optimized and Autoencoder Ensemble-Based Method for IoT Malware Classification.
IEEE Internet Things J., July, 2025
Evolutionary Game-Based Adaptive DT Association and Transfer for Wireless Computing Power Networks.
IEEE Trans. Green Commun. Netw., June, 2025
Two-in-One Solution: Simultaneously Enhancing Security and Privacy for Data-Driven Models in Mobile Edge Computing.
IEEE Trans. Consumer Electron., May, 2025
Enhancing Privacy in Distributed Intelligent Vehicles With Information Bottleneck Theory.
IEEE Internet Things J., March, 2025
IEEE Trans. Inf. Forensics Secur., 2025
IEEE Trans. Dependable Secur. Comput., 2025
Finding the PISTE: Towards Understanding Privacy Leaks in Vertical Federated Learning Systems.
IEEE Trans. Dependable Secur. Comput., 2025
IEEE Trans. Dependable Secur. Comput., 2025
FairReward: Towards Fair Reward Distribution Using Equity Theory in Blockchain-Based Federated Learning.
IEEE Trans. Dependable Secur. Comput., 2025
J. Comput. Secur., 2025
DMRP: Privacy-Preserving Deep Learning Model with Dynamic Masking and Random Permutation.
J. Inf. Secur. Appl., 2025
Neurocomputing, 2025
CIFFormer: A Contextual Information Flow Guided Transformer for colorectal polyp segmentation.
Neurocomputing, 2025
Comput. Secur., 2025
2024
Neighbor-Enhanced Representation Learning for Link Prediction in Dynamic Heterogeneous Attributed Networks.
ACM Trans. Knowl. Discov. Data, September, 2024
IEEE Trans. Neural Networks Learn. Syst., August, 2024
Contract Theory Based Incentive Mechanism for Clustered Vehicular Federated Learning.
IEEE Trans. Intell. Transp. Syst., July, 2024
Learning-Induced Channel Extrapolation for Fluid Antenna Systems Using Asymmetric Graph Masked Autoencoder.
IEEE Wirel. Commun. Lett., June, 2024
IEEE Trans. Comput. Soc. Syst., April, 2024
IEEE Internet Things J., March, 2024
FedComm: A Privacy-Enhanced and Efficient Authentication Protocol for Federated Learning in Vehicular Ad-Hoc Networks.
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Dependable Secur. Comput., 2024
Knowl. Based Syst., 2024
Neurocomputing, 2024
The Illusion of Anonymity: Uncovering the Impact of User Actions on Privacy in Web3 Social Ecosystems.
CoRR, 2024
Comput. Secur., 2024
Adversarial perturbation denoising utilizing common characteristics in deep feature space.
Appl. Intell., 2024
Int. J. Appl. Math. Comput. Sci., 2024
A Wolf in Sheep's Clothing: Practical Black-box Adversarial Attacks for Evading Learning-based Windows Malware Detection in the Wild.
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the IEEE International Conference on Communications Workshops, 2024
2023
Multim. Syst., December, 2023
Pattern Recognit. Lett., September, 2023
Comput. Secur., September, 2023
Improving adversarial robustness of medical imaging systems via adding global attention noise.
Comput. Biol. Medicine, September, 2023
IEEE Internet Things J., May, 2023
IEEE Trans. Knowl. Data Eng., April, 2023
DNS Rebinding Threat Modeling and Security Analysis for Local Area Network of Maritime Transportation Systems.
IEEE Trans. Intell. Transp. Syst., February, 2023
CGIR: Conditional Generative Instance Reconstruction Attacks Against Federated Learning.
IEEE Trans. Dependable Secur. Comput., 2023
F<sup>2</sup>AT: Feature-Focusing Adversarial Training via Disentanglement of Natural and Perturbed Patterns.
CoRR, 2023
LEA<sup>2</sup>: A Lightweight Ensemble Adversarial Attack via Non-overlapping Vulnerable Frequency Regions.
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023
Proceedings of the 23rd IEEE International Conference on Communication Technology, 2023
Poisoning with Cerberus: Stealthy and Colluded Backdoor Attack against Federated Learning.
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023
2022
CCUBI: A cross-chain based premium competition scheme with privacy preservation for usage-based insurance.
Int. J. Intell. Syst., December, 2022
J. King Saud Univ. Comput. Inf. Sci., November, 2022
ACM Trans. Priv. Secur., 2022
Character-Level Street View Text Spotting Based on Deep Multisegmentation Network for Smarter Autonomous Driving.
IEEE Trans. Artif. Intell., 2022
IEEE J. Sel. Top. Signal Process., 2022
IEEE J. Sel. Top. Signal Process., 2022
Transparent Aspect-Level Sentiment Analysis Based on Dependency Syntax Analysis and Its Application on COVID-19.
ACM J. Data Inf. Qual., 2022
GAAT: Group Adaptive Adversarial Training to Improve the Trade-Off Between Robustness and Accuracy.
Int. J. Pattern Recognit. Artif. Intell., 2022
Digit. Commun. Networks, 2022
AWFC: Preventing Label Flipping Attacks Towards Federated Learning for Intelligent IoT.
Comput. J., 2022
Hey! You Photographed My Screen without Approved: A Practical Screen Content Protection Scheme Based on Visual Cryptography.
Proceedings of the International Conference on Networking and Network Applications, 2022
Proceedings of the IEEE INFOCOM 2022, 2022
Proceedings of the 4th International Conference on Data Intelligence and Security, 2022
Proceedings of the Computer Vision - ECCV 2022, 2022
Proceedings of the Computer Vision - ECCV 2022, 2022
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2022
2021
Wirel. Commun. Mob. Comput., 2021
ACM Trans. Sens. Networks, 2021
Secur. Commun. Networks, 2021
PeerJ Comput. Sci., 2021
An explainable sentiment prediction model based on the portraits of users sharing representative opinions in social sensors.
Int. J. Distributed Sens. Networks, 2021
Proceedings of the WiSec '21: 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June, 2021
Optimization of Multipath Transmission Path Scheduling Based on Forward Delay in Vehicle Heterogeneous Networks.
Proceedings of the 7th IEEE International Conference on Network Softwarization, 2021
Task Distribution Offloading Algorithm Based on DQN for Sustainable Vehicle Edge Network.
Proceedings of the 7th IEEE International Conference on Network Softwarization, 2021
You Can See, But You Cannot Photograph: An Intelligent Content Protection Scheme for Videos on Screens.
Proceedings of the 2021 International Conference on Networking and Network Applications, 2021
2020
CoRR, 2020
Towards Robust DNNs: An Taylor Expansion-Based Method for Generating Powerful Adversarial Examples.
CoRR, 2020
Spot evasion attacks: Adversarial examples for license plate recognition systems with convolutional neural networks.
Comput. Secur., 2020
2019
Spot Evasion Attacks: Adversarial Examples for License Plate Recognition Systems with Convolution Neural Networks.
CoRR, 2019
2018
IEEE/ACM Trans. Netw., 2018
D<sup>2</sup>FL: Design and Implementation of Distributed Dynamic Fault Localization.
IEEE Trans. Dependable Secur. Comput., 2018
Sensors, 2018
机器学习算法在中医诊疗中的研究综述 (Review of Machine Learning Algorithms in Traditional Chinese Medicine).
计算机科学, 2018
2016
Future Gener. Comput. Syst., 2016
A multipath resource updating approach for distributed controllers in software-defined network.
Sci. China Inf. Sci., 2016
2015
IEEE Access, 2015
2014
Sci. China Inf. Sci., 2014
Sci. China Inf. Sci., 2014
AdaFlow: Adaptive Control to Improve Availability of OpenFlow Forwarding for Burst Quantity of Flows.
Proceedings of the Testbeds and Research Infrastructure: Development of Networks and Communities, 2014
Proceedings of the 22nd International Conference on Software, 2014
Lossless reconfiguration protocol for multi-domain data plane in software-defined networks.
Proceedings of the 2014 Proceedings IEEE INFOCOM Workshops, Toronto, ON, Canada, April 27, 2014
Proceedings of the 30th IEEE International Conference on Software Maintenance and Evolution, Victoria, BC, Canada, September 29, 2014
2013
J. Syst. Archit., 2013
Proceedings of the 22nd International Symposium on High-Performance Parallel and Distributed Computing, 2013
2012
J. Syst. Archit., 2012
Proceedings of the 2012 IEEE International Conference on Cluster Computing, 2012
2010
2009
Proceedings of the 2009 Pacific-Asia Conference on Circuits, Communications and Systems, 2009
2008
Proceedings of the 2008 International Conference on Computational Intelligence and Security, 2008