Bin Wang

Orcid: 0000-0002-3790-2708

Affiliations:
  • Zhejiang University, College of Electrical Engineering, Hangzhou, China


According to our database1, Bin Wang authored at least 39 papers between 2014 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Adaptive Digital Twin Placement and Transfer in Wireless Computing Power Network.
IEEE Internet Things J., March, 2024

FedComm: A Privacy-Enhanced and Efficient Authentication Protocol for Federated Learning in Vehicular Ad-Hoc Networks.
IEEE Trans. Inf. Forensics Secur., 2024

Dr. Defender: Proactive Detection of Autopilot Drones Based on CSI.
IEEE Trans. Inf. Forensics Secur., 2024

2023
Adversarial training in logit space against tiny perturbations.
Multim. Syst., December, 2023

Towards desirable decision boundary by Moderate-Margin Adversarial Training.
Pattern Recognit. Lett., September, 2023

Object-free backdoor attack and defense on semantic segmentation.
Comput. Secur., September, 2023

Personalized Location Privacy Trading in Double Auction for Mobile Crowdsensing.
IEEE Internet Things J., May, 2023

HGATE: Heterogeneous Graph Attention Auto-Encoders.
IEEE Trans. Knowl. Data Eng., April, 2023

DNS Rebinding Threat Modeling and Security Analysis for Local Area Network of Maritime Transportation Systems.
IEEE Trans. Intell. Transp. Syst., February, 2023

CGIR: Conditional Generative Instance Reconstruction Attacks Against Federated Learning.
IEEE Trans. Dependable Secur. Comput., 2023

F$^2$AT: Feature-Focusing Adversarial Training via Disentanglement of Natural and Perturbed Patterns.
CoRR, 2023

Achieving Last-Mile Functional Coverage in Testing Chip Design Software Implementations.
Proceedings of the 45th IEEE/ACM International Conference on Software Engineering: Software Engineering in Practice, 2023

MetaDiffuser: Diffusion Model as Conditional Planner for Offline Meta-RL.
Proceedings of the International Conference on Machine Learning, 2023

ChiPFormer: Transferable Chip Placement via Offline Decision Transformer.
Proceedings of the International Conference on Machine Learning, 2023

Contract Theory Based Incentive Mechanism for Clustered Federated Learning.
Proceedings of the 23rd IEEE International Conference on Communication Technology, 2023

2022
EI-MTD: Moving Target Defense for Edge Intelligence against Adversarial Attacks.
ACM Trans. Priv. Secur., 2022

Character-Level Street View Text Spotting Based on Deep Multisegmentation Network for Smarter Autonomous Driving.
IEEE Trans. Artif. Intell., 2022

Surface Material Perception Through Multimodal Learning.
IEEE J. Sel. Top. Signal Process., 2022

Loss-Privacy Tradeoff in Federated Edge Learning.
IEEE J. Sel. Top. Signal Process., 2022

Transparent Aspect-Level Sentiment Analysis Based on Dependency Syntax Analysis and Its Application on COVID-19.
ACM J. Data Inf. Qual., 2022

GAAT: Group Adaptive Adversarial Training to Improve the Trade-Off Between Robustness and Accuracy.
Int. J. Pattern Recognit. Artif. Intell., 2022

A blockchain-based audit approach for encrypted data in federated learning.
Digit. Commun. Networks, 2022

Hey! You Photographed My Screen without Approved: A Practical Screen Content Protection Scheme Based on Visual Cryptography.
Proceedings of the International Conference on Networking and Network Applications, 2022

MalGraph: Hierarchical Graph Neural Networks for Robust Windows Malware Detection.
Proceedings of the IEEE INFOCOM 2022, 2022

Robust Network Architecture Search via Feature Distortion Restraining.
Proceedings of the Computer Vision - ECCV 2022, 2022

Filter Pruning via Feature Discrimination in Deep Neural Networks.
Proceedings of the Computer Vision - ECCV 2022, 2022

2021
A Novel Privacy-Preserving Mobile-Coverage Scheme Based on Trustworthiness in HWSNs.
Wirel. Commun. Mob. Comput., 2021

SenCS: Enabling Real-time Indoor Proximity Verification via Contextual Similarity.
ACM Trans. Sens. Networks, 2021

A Blockchain-Based IoT Cross-Domain Delegation Access Control Method.
Secur. Commun. Networks, 2021

OutletSpy: cross-outlet application inference via power factor correction signal.
Proceedings of the WiSec '21: 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June, 2021

Optimization of Multipath Transmission Path Scheduling Based on Forward Delay in Vehicle Heterogeneous Networks.
Proceedings of the 7th IEEE International Conference on Network Softwarization, 2021

Task Distribution Offloading Algorithm Based on DQN for Sustainable Vehicle Edge Network.
Proceedings of the 7th IEEE International Conference on Network Softwarization, 2021

You Can See, But You Cannot Photograph: An Intelligent Content Protection Scheme for Videos on Screens.
Proceedings of the 2021 International Conference on Networking and Network Applications, 2021

2020
Towards Imperceptible Adversarial Image Patches Based on Network Explanations.
CoRR, 2020

2018
Easy Path Programming: Elevate Abstraction Level for Network Functions.
IEEE/ACM Trans. Netw., 2018

Pido: Predictive Delay Optimization for Intertidal Wireless Sensor Networks.
Sensors, 2018

2016
A multipath resource updating approach for distributed controllers in software-defined network.
Sci. China Inf. Sci., 2016

2014
A secure routing model based on distance vector routing algorithm.
Sci. China Inf. Sci., 2014

Dynamic load distribution with hop-by-hop forwarding based on max-min one-way delay.
Sci. China Inf. Sci., 2014


  Loading...