Bin Wu

Orcid: 0000-0002-8103-0468

Affiliations:
  • Chinese Academy of Sciences, State Key Laboratory of Information Security, Beijing, China


According to our database1, Bin Wu authored at least 20 papers between 2010 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
NBA: defensive distillation for backdoor removal via neural behavior alignment.
Cybersecur., December, 2023

DLP: towards active defense against backdoor attacks with decoupled learning process.
Cybersecur., December, 2023

Cross-Chain Trusted Service Quality Computing Scheme for Multichain-Model-Based 5G Network Slicing SLA.
IEEE Internet Things J., July, 2023

BEPHAP: A Blockchain-based Efficient Privacy-Preserving Handover Authentication Protocol with key agreement for Internet of Vehicles.
J. Syst. Archit., 2023

A Game Theory-Based Incentive Mechanism for Collaborative Security of Federated Learning in Energy Blockchain Environment.
IEEE Internet Things J., 2023

2022
Privacy Preservation for Trajectory Publication Based on Differential Privacy.
ACM Trans. Intell. Syst. Technol., 2022

A Cross-Chain Trusted Reputation Scheme for a Shared Charging Platform Based on Blockchain.
IEEE Internet Things J., 2022

2021
RDIC: A blockchain-based remote data integrity checking scheme for IoT in 5G networks.
J. Parallel Distributed Comput., 2021

Sensitive attribute privacy preservation of trajectory data publishing based on l-diversity.
Distributed Parallel Databases, 2021

Malicious Conspiracy on Permissioned Blockchain to Mount Denial-of-endorsement Attacks.
Proceedings of the 2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom), New York City, NY, USA, September 30, 2021

Keys as Secret Messages: Provably Secure and Efficiency-balanced Steganography on Blockchain.
Proceedings of the 2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom), New York City, NY, USA, September 30, 2021

DeeSCVHunter: A Deep Learning-Based Framework for Smart Contract Vulnerability Detection.
Proceedings of the International Joint Conference on Neural Networks, 2021

2020
Restructured Cloning Vulnerability Detection Based on Function Semantic Reserving and Reiteration Screening.
Proceedings of the Computer Security - ESORICS 2020, 2020

Linear Attack on Round-Reduced DES Using Deep Learning.
Proceedings of the Computer Security - ESORICS 2020, 2020

2019
Cloning Vulnerability Detection in Driver Layer of IoT Devices.
Proceedings of the Information and Communications Security - 21st International Conference, 2019

Comment Spam Detection via Effective Features Combination.
Proceedings of the 2019 IEEE International Conference on Communications, 2019

2018
Text Image Deblurring via Intensity Extremums Prior.
Proceedings of the MultiMedia Modeling - 24th International Conference, 2018

Anomaly User Detection via Comprehensive Keystroke Features Optimization.
Proceedings of the 2018 International Joint Conference on Neural Networks, 2018

2017
Robust Steganography via Patch-Based Texture Synthesis.
Proceedings of the Internet Multimedia Computing and Service, 2017

2010
Privacy Preserving of Trust Management Credentials Based on Trusted Computing.
Proceedings of the Information Security, 2010


  Loading...