Bin Wu

Orcid: 0000-0003-0657-3427

Affiliations:
  • Beijing University of Posts and Telecommunications, School of Cyberspace Security, National Disaster Recovery Technology Engineering Laboratory, China
  • Beijing University of Posts and Telecommunications, China (PhD 2008)


According to our database1, Bin Wu authored at least 21 papers between 2007 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
Social Engineering Attack-Defense Strategies Based on Reinforcement Learning.
Comput. Syst. Sci. Eng., 2023

2022
Predicting User Susceptibility to Phishing Based on Multidimensional Features.
Comput. Intell. Neurosci., 2022

2021
Phishing Website Detection Based on Deep Convolutional Neural Network and Random Forest Ensemble Learning.
Sensors, 2021

Evaluation Model Based on Hesitation Fuzzy Theory.
Proceedings of the AISS 2021: 3rd International Conference on Advanced Information Science and System, Sanya, China, November 26, 2021

2020
Graph Adaptation Network with Domain-Specific Word Alignment for Cross-Domain Relation Extraction.
Sensors, 2020

Feature subset selection combining maximal information entropy and maximal information coefficient.
Appl. Intell., 2020

Network Intrusion Detection Based on Supervised Adversarial Variational Auto-Encoder With Regularization.
IEEE Access, 2020

Using Improved Conditional Generative Adversarial Networks to Detect Social Bots on Twitter.
IEEE Access, 2020

A Flexible Phishing Detection Approach Based on Software-Defined Networking Using Ensemble Learning Method.
Proceedings of the HP3C 2020: 4th International Conference on High Performance Compilation, 2020

2019
Detecting Malicious Social Robots with Generative Adversarial Networks.
KSII Trans. Internet Inf. Syst., 2019

A Session and Dialogue-Based Social Engineering Framework.
IEEE Access, 2019

Efficient Strategy Selection for Moving Target Defense Under Multiple Attacks.
IEEE Access, 2019

Moving Target Defense Against Injection Attacks.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2019

2018
A Hybrid Replacement Strategy for MOEA/D.
Proceedings of the Bio-inspired Computing: Theories and Applications, 2018

2016
Flow-based Anomaly Detection Using Access Behavior Profiling and Time-sequenced Relation Mining.
KSII Trans. Internet Inf. Syst., 2016

Detection of command and control in advanced persistent threat based on independent access.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

2015
Using Genetic Algorithm for Optimal Security Hardening in Risk Flow Attack Graph.
KSII Trans. Internet Inf. Syst., 2015

Exploring risk flow attack graph for security risk assessment.
IET Inf. Secur., 2015

Towards a multiobjective framework for evaluating network security under exploit attacks.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

2012
A Danger Theory Based Mobile Virus Detection Model and Its Application in Inhibiting Virus.
J. Networks, 2012

2007
A Data Safety Transmission Solution in Web Application.
Proceedings of the 2007 IEEE/WIC/ACM International Conference on Web Intelligence and International Conference on Intelligent Agent Technology, 2007


  Loading...