Bin Wang

Orcid: 0000-0002-3790-2708

Affiliations:
  • Zhejiang University, College of Electrical Engineering, Hangzhou, China


According to our database1, Bin Wang authored at least 106 papers between 2008 and 2025.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Unveiling the veil: high-frequency components as the key to understanding medical DNNs' vulnerability to adversarial examples.
Cybersecur., December, 2025

Enhancing transferability of targeted adversarial examples through amplitude spectrum alignment.
Multim. Syst., October, 2025

F$^{2}$2AT: Feature-Focusing Adversarial Training via Disentanglement of Natural and Perturbed Patterns.
IEEE Trans. Knowl. Data Eng., September, 2025

CustomFair: A Customized Fairness Method for Federated Recommender Systems in Social Internet of Things.
IEEE Internet Things J., September, 2025

Efficient Batch Verification and Privacy-Preserving Data Aggregation Scheme in V2G Networks.
IEEE Trans. Veh. Technol., August, 2025

MalAE: A Feature-Optimized and Autoencoder Ensemble-Based Method for IoT Malware Classification.
IEEE Internet Things J., July, 2025

Evolutionary Game-Based Adaptive DT Association and Transfer for Wireless Computing Power Networks.
IEEE Trans. Green Commun. Netw., June, 2025

Two-in-One Solution: Simultaneously Enhancing Security and Privacy for Data-Driven Models in Mobile Edge Computing.
IEEE Trans. Consumer Electron., May, 2025

Enhancing Privacy in Distributed Intelligent Vehicles With Information Bottleneck Theory.
IEEE Internet Things J., March, 2025

VFLMonitor: Defending One-Party Hijacking Attacks in Vertical Federated Learning.
IEEE Trans. Inf. Forensics Secur., 2025

A Proactive Defense Against Model Poisoning Attacks in Federated Learning.
IEEE Trans. Dependable Secur. Comput., 2025

Finding the PISTE: Towards Understanding Privacy Leaks in Vertical Federated Learning Systems.
IEEE Trans. Dependable Secur. Comput., 2025

CoBA: Collusive Backdoor Attacks With Optimized Trigger to Federated Learning.
IEEE Trans. Dependable Secur. Comput., 2025

FairReward: Towards Fair Reward Distribution Using Equity Theory in Blockchain-Based Federated Learning.
IEEE Trans. Dependable Secur. Comput., 2025

Enhancing robustness of backdoor attacks on real-world object detection systems.
J. Comput. Secur., 2025

DMRP: Privacy-Preserving Deep Learning Model with Dynamic Masking and Random Permutation.
J. Inf. Secur. Appl., 2025

Adversarial training via multi-guidance and historical memory enhancement.
Neurocomputing, 2025

CIFFormer: A Contextual Information Flow Guided Transformer for colorectal polyp segmentation.
Neurocomputing, 2025

Evading backdoor defenses: Concealing genuine backdoors through scapegoat strategy.
Comput. Secur., 2025

Multi-stage feature fusion network for polyp segmentation.
Appl. Soft Comput., 2025

2024
Neighbor-Enhanced Representation Learning for Link Prediction in Dynamic Heterogeneous Attributed Networks.
ACM Trans. Knowl. Discov. Data, September, 2024

Hierarchical Threshold Pruning Based on Uniform Response Criterion.
IEEE Trans. Neural Networks Learn. Syst., August, 2024

Contract Theory Based Incentive Mechanism for Clustered Vehicular Federated Learning.
IEEE Trans. Intell. Transp. Syst., July, 2024

Learning-Induced Channel Extrapolation for Fluid Antenna Systems Using Asymmetric Graph Masked Autoencoder.
IEEE Wirel. Commun. Lett., June, 2024

DeFiScanner: Spotting DeFi Attacks Exploiting Logic Vulnerabilities on Blockchain.
IEEE Trans. Comput. Soc. Syst., April, 2024

Adaptive Digital Twin Placement and Transfer in Wireless Computing Power Network.
IEEE Internet Things J., March, 2024

FedComm: A Privacy-Enhanced and Efficient Authentication Protocol for Federated Learning in Vehicular Ad-Hoc Networks.
IEEE Trans. Inf. Forensics Secur., 2024

Enhancing Transferability of Adversarial Examples Through Mixed-Frequency Inputs.
IEEE Trans. Inf. Forensics Secur., 2024

Dr. Defender: Proactive Detection of Autopilot Drones Based on CSI.
IEEE Trans. Inf. Forensics Secur., 2024

CODER: Protecting Privacy in Image Retrieval With Differential Privacy.
IEEE Trans. Dependable Secur. Comput., 2024

Polyp-LVT: Polyp segmentation with lightweight vision transformers.
Knowl. Based Syst., 2024

Robust filter pruning guided by deep frequency-features for edge intelligence.
Neurocomputing, 2024

The Illusion of Anonymity: Uncovering the Impact of User Actions on Privacy in Web3 Social Ecosystems.
CoRR, 2024

BFS2Adv: Black-box adversarial attack towards hard-to-attack short texts.
Comput. Secur., 2024

Adversarial perturbation denoising utilizing common characteristics in deep feature space.
Appl. Intell., 2024

Developing Hessian-free second-order adversarial examples for adversarial training.
Int. J. Appl. Math. Comput. Sci., 2024

A Wolf in Sheep's Clothing: Practical Black-box Adversarial Attacks for Evading Learning-based Windows Malware Detection in the Wild.
Proceedings of the 33rd USENIX Security Symposium, 2024

Model-Driven Channel Extrapolation for Massive Fluid Antenna.
Proceedings of the IEEE International Conference on Communications Workshops, 2024

2023
Adversarial training in logit space against tiny perturbations.
Multim. Syst., December, 2023

Towards desirable decision boundary by Moderate-Margin Adversarial Training.
Pattern Recognit. Lett., September, 2023

Object-free backdoor attack and defense on semantic segmentation.
Comput. Secur., September, 2023

Improving adversarial robustness of medical imaging systems via adding global attention noise.
Comput. Biol. Medicine, September, 2023

Personalized Location Privacy Trading in Double Auction for Mobile Crowdsensing.
IEEE Internet Things J., May, 2023

HGATE: Heterogeneous Graph Attention Auto-Encoders.
IEEE Trans. Knowl. Data Eng., April, 2023

DNS Rebinding Threat Modeling and Security Analysis for Local Area Network of Maritime Transportation Systems.
IEEE Trans. Intell. Transp. Syst., February, 2023

CGIR: Conditional Generative Instance Reconstruction Attacks Against Federated Learning.
IEEE Trans. Dependable Secur. Comput., 2023

F<sup>2</sup>AT: Feature-Focusing Adversarial Training via Disentanglement of Natural and Perturbed Patterns.
CoRR, 2023

Robust Backdoor Attacks on Object Detection in Real World.
CoRR, 2023

LEA<sup>2</sup>: A Lightweight Ensemble Adversarial Attack via Non-overlapping Vulnerable Frequency Regions.
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023

Contract Theory Based Incentive Mechanism for Clustered Federated Learning.
Proceedings of the 23rd IEEE International Conference on Communication Technology, 2023

Poisoning with Cerberus: Stealthy and Colluded Backdoor Attack against Federated Learning.
Proceedings of the Thirty-Seventh AAAI Conference on Artificial Intelligence, 2023

2022
CCUBI: A cross-chain based premium competition scheme with privacy preservation for usage-based insurance.
Int. J. Intell. Syst., December, 2022

Automatic mapping of configuration options in software using static analysis.
J. King Saud Univ. Comput. Inf. Sci., November, 2022

EI-MTD: Moving Target Defense for Edge Intelligence against Adversarial Attacks.
ACM Trans. Priv. Secur., 2022

Character-Level Street View Text Spotting Based on Deep Multisegmentation Network for Smarter Autonomous Driving.
IEEE Trans. Artif. Intell., 2022

Surface Material Perception Through Multimodal Learning.
IEEE J. Sel. Top. Signal Process., 2022

Loss-Privacy Tradeoff in Federated Edge Learning.
IEEE J. Sel. Top. Signal Process., 2022

Transparent Aspect-Level Sentiment Analysis Based on Dependency Syntax Analysis and Its Application on COVID-19.
ACM J. Data Inf. Qual., 2022

GAAT: Group Adaptive Adversarial Training to Improve the Trade-Off Between Robustness and Accuracy.
Int. J. Pattern Recognit. Artif. Intell., 2022

A blockchain-based audit approach for encrypted data in federated learning.
Digit. Commun. Networks, 2022

Hessian-Free Second-Order Adversarial Examples for Adversarial Learning.
CoRR, 2022

Visually imperceptible adversarial patch attacks.
Comput. Secur., 2022

AWFC: Preventing Label Flipping Attacks Towards Federated Learning for Intelligent IoT.
Comput. J., 2022

Hey! You Photographed My Screen without Approved: A Practical Screen Content Protection Scheme Based on Visual Cryptography.
Proceedings of the International Conference on Networking and Network Applications, 2022

MalGraph: Hierarchical Graph Neural Networks for Robust Windows Malware Detection.
Proceedings of the IEEE INFOCOM 2022, 2022

Detecting Vulnerabilities in Ethereum Smart Contracts with Deep Learning.
Proceedings of the 4th International Conference on Data Intelligence and Security, 2022

Robust Network Architecture Search via Feature Distortion Restraining.
Proceedings of the Computer Vision - ECCV 2022, 2022

Filter Pruning via Feature Discrimination in Deep Neural Networks.
Proceedings of the Computer Vision - ECCV 2022, 2022

Prevention of GAN-Based Privacy Inferring Attacks Towards Federated Learning.
Proceedings of the Collaborative Computing: Networking, Applications and Worksharing, 2022

2021
A Novel Privacy-Preserving Mobile-Coverage Scheme Based on Trustworthiness in HWSNs.
Wirel. Commun. Mob. Comput., 2021

SenCS: Enabling Real-time Indoor Proximity Verification via Contextual Similarity.
ACM Trans. Sens. Networks, 2021

A Blockchain-Based IoT Cross-Domain Delegation Access Control Method.
Secur. Commun. Networks, 2021

Malware homology determination using visualized images and feature fusion.
PeerJ Comput. Sci., 2021

An explainable sentiment prediction model based on the portraits of users sharing representative opinions in social sensors.
Int. J. Distributed Sens. Networks, 2021

Towards Speeding up Adversarial Training in Latent Spaces.
CoRR, 2021

OutletSpy: cross-outlet application inference via power factor correction signal.
Proceedings of the WiSec '21: 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June, 2021

Optimization of Multipath Transmission Path Scheduling Based on Forward Delay in Vehicle Heterogeneous Networks.
Proceedings of the 7th IEEE International Conference on Network Softwarization, 2021

Task Distribution Offloading Algorithm Based on DQN for Sustainable Vehicle Edge Network.
Proceedings of the 7th IEEE International Conference on Network Softwarization, 2021

You Can See, But You Cannot Photograph: An Intelligent Content Protection Scheme for Videos on Screens.
Proceedings of the 2021 International Conference on Networking and Network Applications, 2021

2020
Towards Imperceptible Adversarial Image Patches Based on Network Explanations.
CoRR, 2020

TEAM: We Need More Powerful Adversarial Examples for DNNs.
CoRR, 2020

Towards Robust DNNs: An Taylor Expansion-Based Method for Generating Powerful Adversarial Examples.
CoRR, 2020

Spot evasion attacks: Adversarial examples for license plate recognition systems with convolutional neural networks.
Comput. Secur., 2020

2019
Spot Evasion Attacks: Adversarial Examples for License Plate Recognition Systems with Convolution Neural Networks.
CoRR, 2019

2018
Easy Path Programming: Elevate Abstraction Level for Network Functions.
IEEE/ACM Trans. Netw., 2018

D<sup>2</sup>FL: Design and Implementation of Distributed Dynamic Fault Localization.
IEEE Trans. Dependable Secur. Comput., 2018

Pido: Predictive Delay Optimization for Intertidal Wireless Sensor Networks.
Sensors, 2018

机器学习算法在中医诊疗中的研究综述 (Review of Machine Learning Algorithms in Traditional Chinese Medicine).
计算机科学, 2018

2016
A user mode CPU-GPU scheduling framework for hybrid workloads.
Future Gener. Comput. Syst., 2016

A multipath resource updating approach for distributed controllers in software-defined network.
Sci. China Inf. Sci., 2016

2015
A survey on data center networking for cloud computing.
Comput. Networks, 2015

WaSCO: A Hybrid Enterprise Desktop Wake-Up System Based on Cloud Infrastructure.
IEEE Access, 2015

2014
A secure routing model based on distance vector routing algorithm.
Sci. China Inf. Sci., 2014

Dynamic load distribution with hop-by-hop forwarding based on max-min one-way delay.
Sci. China Inf. Sci., 2014

AdaFlow: Adaptive Control to Improve Availability of OpenFlow Forwarding for Burst Quantity of Flows.
Proceedings of the Testbeds and Research Infrastructure: Development of Networks and Communities, 2014

Prototype for customized multicast services in software defined networks.
Proceedings of the 22nd International Conference on Software, 2014

Lossless reconfiguration protocol for multi-domain data plane in software-defined networks.
Proceedings of the 2014 Proceedings IEEE INFOCOM Workshops, Toronto, ON, Canada, April 27, 2014

Pinso: Precise Isolation of Concurrency Bugs via Delta Triaging.
Proceedings of the 30th IEEE International Conference on Software Maintenance and Evolution, Victoria, BC, Canada, September 29, 2014

2013
Quality of service aware power management for virtualized data centers.
J. Syst. Archit., 2013

kMemvisor: flexible system wide memory mirroring in virtual environments.
Proceedings of the 22nd International Symposium on High-Performance Parallel and Distributed Computing, 2013

2012
SINOF: A dynamic-static combined framework for dynamic binary translation.
J. Syst. Archit., 2012

Memvisor: Application Level Memory Mirroring via Binary Translation.
Proceedings of the 2012 IEEE International Conference on Cluster Computing, 2012

2010
Fast-Converging Distance Vector Routing Mechanism for IP Networks.
J. Networks, 2010

2009
Adjoint code generator.
Sci. China Ser. F Inf. Sci., 2009

A Fast Reroute Mechanism for RIP Protocol.
Proceedings of the 2009 Pacific-Asia Conference on Circuits, Communications and Systems, 2009

2008
APVP: An Aggregate-Based Path Verification Routing Protocol for the Ad Hoc Networks.
Proceedings of the 2008 International Conference on Computational Intelligence and Security, 2008


  Loading...