Binxing Fang
Orcid: 0000-0003-0305-2132
According to our database1,
Binxing Fang
authored at least 282 papers
between 2004 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Adaptive scheduling-based fine-grained greybox fuzzing for cloud-native applications.
J. Cloud Comput., December, 2024
Mach. Learn., September, 2024
UCTT: universal and low-cost adversarial example generation for tendency classification.
Neural Comput. Appl., August, 2024
A Practical Adversarial Attack Against Sequence-Based Deep Learning Malware Classifiers.
IEEE Trans. Computers, March, 2024
Comput. Secur., February, 2024
FedComp: A Federated Learning Compression Framework for Resource-Constrained Edge Computing Devices.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., January, 2024
IEEE Internet Things J., 2024
Proceedings of the 40th IEEE International Conference on Data Engineering, 2024
Proceedings of the 40th IEEE International Conference on Data Engineering, 2024
Proceedings of the 40th IEEE International Conference on Data Engineering, 2024
Proceedings of the IEEE International Conference on Communications, 2024
2023
IEEE Trans. Cybern., December, 2023
Smart-DNN+: A Memory-efficient Neural Networks Compression Framework for the Model Inference.
ACM Trans. Archit. Code Optim., December, 2023
Sci. China Inf. Sci., April, 2023
Proceedings of the 22nd IEEE International Conference on Trust, 2023
Proceedings of the IEEE Global Communications Conference, 2023
Aspect-to-Scope Oriented Multi-view Contrastive Learning for Aspect-based Sentiment Analysis.
Proceedings of the Findings of the Association for Computational Linguistics: EMNLP 2023, 2023
Proceedings of the 61st Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers), 2023
2022
HinCTI: A Cyber Threat Intelligence Modeling and Identification System Based on Heterogeneous Information Network.
IEEE Trans. Knowl. Data Eng., 2022
Mob. Networks Appl., 2022
From Passive to Active: Near-optimal DNS-based Data Exfiltration Defense Method Based on Sticky Mechanism.
Proceedings of the IEEE International Conference on Trust, 2022
Proceedings of the 22nd IEEE International Conference on Software Quality, 2022
Proceedings of the IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2022
Proceedings of the IEEE International Conference on Communications, 2022
Improving Anomaly Detection with a Self-Supervised Task Based on Generative Adversarial Network.
Proceedings of the IEEE International Conference on Acoustics, 2022
Affective Knowledge Enhanced Multiple-Graph Fusion Networks for Aspect-based Sentiment Analysis.
Proceedings of the 2022 Conference on Empirical Methods in Natural Language Processing, 2022
Proceedings of the 2022 Conference on Empirical Methods in Natural Language Processing, 2022
Proceedings of the 7th IEEE International Conference on Data Science in Cyberspace, 2022
Proceedings of the 7th IEEE International Conference on Data Science in Cyberspace, 2022
Proceedings of the 7th IEEE International Conference on Data Science in Cyberspace, 2022
ABNN<sup>2</sup>: secure two-party arbitrary-bitwidth quantized neural network predictions.
Proceedings of the DAC '22: 59th ACM/IEEE Design Automation Conference, San Francisco, California, USA, July 10, 2022
SmartIdx: Reducing Communication Cost in Federated Learning by Exploiting the CNNs Structures.
Proceedings of the Thirty-Sixth AAAI Conference on Artificial Intelligence, 2022
2021
Wirel. Commun. Mob. Comput., 2021
Proceedings of the 20th IEEE International Conference on Trust, 2021
Proceedings of the 20th IEEE International Conference on Trust, 2021
Adapting Named Data Networking (NDN) for Better Consumer Mobility Support in LEO Satellite Networks.
Proceedings of the MSWiM '21: 24th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems, Alicante, Spain, November 22, 2021
Proceedings of the 2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom), New York City, NY, USA, September 30, 2021
Proceedings of the Cyber Security - 18th China Annual Conference, 2021
2020
World Wide Web, 2020
IEEE Internet Things J., 2020
Int. J. Distributed Sens. Networks, 2020
Predicting the security threats on the spreading of rumor, false information of Facebook content based on the principle of sociology.
Comput. Commun., 2020
CloudDLP: Transparent and Scalable Data Sanitization for Browser-Based Cloud Storage.
IEEE Access, 2020
Proceedings of the 19th IEEE International Conference on Trust, 2020
Proceedings of the IEEE Symposium on Computers and Communications, 2020
How Many Users Behind A Local Recursive DNS Server? Estimated by Delta-Time Cluster Model.
Proceedings of the 22nd IEEE International Conference on High Performance Computing and Communications; 18th IEEE International Conference on Smart City; 6th IEEE International Conference on Data Science and Systems, 2020
Proceedings of the Computer Security - ESORICS 2020, 2020
QSAN: A Quantum-probability based Signed Attention Network for Explainable False Information Detection.
Proceedings of the CIKM '20: The 29th ACM International Conference on Information and Knowledge Management, 2020
2019
IEEE Trans. Knowl. Data Eng., 2019
Correction to: Application of combined kernel function artificial intelligence algorithm in mobile communication network security authentication mechanism.
J. Supercomput., 2019
Sensors, 2019
Enhancing stock market prediction with extended coupled hidden Markov model over multi-sourced data.
Knowl. Inf. Syst., 2019
IEEE Internet Things J., 2019
IEEE Internet Things J., 2019
Int. J. Distributed Sens. Networks, 2019
Concurr. Comput. Pract. Exp., 2019
Clust. Comput., 2019
IEEE Access, 2019
IEEE Access, 2019
IDNS: A High-Performance Model for Identification of DNS Infrastructures on Large-scale Traffic.
Proceedings of the 2019 IEEE Symposium on Computers and Communications, 2019
Proceedings of the 2019 IEEE Symposium on Computers and Communications, 2019
Proceedings of the 31st IEEE International Conference on Tools with Artificial Intelligence, 2019
Proceedings of the ICITEE-2019: 2nd International Conference on Information Technologies and Electrical Engineering, 2019
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019
CloudDLP: Transparent and Automatic Data Sanitization for Browser-Based Cloud Storage.
Proceedings of the 28th International Conference on Computer Communication and Networks, 2019
Proceedings of the 2019 IEEE International Conference on Communications, 2019
Proceedings of the 2019 IEEE International Conference on Communications, 2019
A More Efficient Private Set Intersection Protocol Based on Random OT and Balance Hash.
Proceedings of the 2019 IEEE International Conference on Communications, 2019
Proceedings of the 2019 IEEE International Conference on Communications, 2019
Proceedings of the 2019 IEEE International Conference on Communications, 2019
Analyzing and Predicting the Popularity of Online Content Using the Weak Ties Theory.
Proceedings of the 21st IEEE International Conference on High Performance Computing and Communications; 17th IEEE International Conference on Smart City; 5th IEEE International Conference on Data Science and Systems, 2019
Proceedings of the Fourth IEEE International Conference on Data Science in Cyberspace, 2019
Proceedings of the Fourth IEEE International Conference on Data Science in Cyberspace, 2019
Proceedings of the Fourth IEEE International Conference on Data Science in Cyberspace, 2019
Proceedings of the Fourth IEEE International Conference on Data Science in Cyberspace, 2019
Understanding Information Diffusion via Heterogeneous Information Network Embeddings.
Proceedings of the Database Systems for Advanced Applications, 2019
PSMSP: A Parallelized Sampling-Based Approach for Mining Top-k Sequential Patterns in Database Graphs.
Proceedings of the Database Systems for Advanced Applications, 2019
FileCrypt: Transparent and Scalable Protection of Sensitive Data in Browser-based Cloud Storage.
Proceedings of the 7th IEEE Conference on Communications and Network Security, 2019
Proceedings of the 2019 IEEE International Conference on Big Data (IEEE BigData), 2019
Proceedings of the IEEE International Conference on Big Data and Smart Computing, 2019
2018
Checking virtual machine kernel control-flow integrity using a page-level dynamic tracing approach.
Soft Comput., 2018
Secur. Commun. Networks, 2018
Knowl. Based Syst., 2018
J. Comput. Sci., 2018
A high-performance virtual machine filesystem monitor in cloud-assisted cognitive IoT.
Future Gener. Comput. Syst., 2018
IEEE Access, 2018
IEEE Access, 2018
Leakage Models and Inference Attacks on Searchable Encryption for Cyber-Physical Social Systems.
IEEE Access, 2018
Dynamic Trustworthiness Overlapping Community Discovery in Mobile Internet of Things.
IEEE Access, 2018
Proceedings of the 2018 IEEE SmartWorld, 2018
Proceedings of the 33rd Annual ACM Symposium on Applied Computing, 2018
Proceedings of the Advances in Digital Forensics XIV, 2018
Proceedings of the Computational Science - ICCS 2018, 2018
Proceedings of the Computational Science - ICCS 2018, 2018
Proceedings of the Computational Science - ICCS 2018, 2018
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018
Automatically Crawling Dynamic Web Applications via Proxy-Based JavaScript Injection and Runtime Analysis.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018
Proceedings of the IEEE International Conference on Big Data (IEEE BigData 2018), 2018
Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, 2018
2017
IEICE Trans. Inf. Syst., 2017
RICS-DFA: a space and time-efficient signature matching algorithm with Reduced Input Character Set.
Concurr. Comput. Pract. Exp., 2017
Proceedings of the International Conference on Security, Pattern Analysis, and Cybernetics, 2017
Proceedings of the Security and Privacy in Communication Networks, 2017
Proceedings of the 2017 International Conference on Computing, 2017
Proceedings of the IEEE International Conference on Communications, 2017
Proceedings of the IEEE International Conference on Communications, 2017
Proceedings of the Algorithms and Architectures for Parallel Processing, 2017
Proceedings of the 2017 IEEE Global Communications Conference, 2017
Proceedings of the Second IEEE International Conference on Data Science in Cyberspace, 2017
Proceedings of the Second IEEE International Conference on Data Science in Cyberspace, 2017
Proceedings of the Advanced Data Mining and Applications - 13th International Conference, 2017
2016
Revisiting the Practicality of Search on Encrypted Data: From the Security Broker's Perspective.
Sci. Program., 2016
Keep all mobile users′ whereabouts secure: a radio frequency identification protocol anti-tracking in 5G.
Int. J. Commun. Syst., 2016
Understanding information interactions in diffusion: an evolutionary game-theoretic perspective.
Frontiers Comput. Sci., 2016
Proceedings of the 12th International Conference on Semantics, Knowledge and Grids, 2016
Proceedings of the 9th International Conference on Service Science, 2016
Proceedings of the 2016 IEEE Military Communications Conference, 2016
Proceedings of the Twenty-Fifth International Joint Conference on Artificial Intelligence, 2016
CFWatcher: A novel target-based real-time approach to monitor critical files using VMI.
Proceedings of the 2016 IEEE International Conference on Communications, 2016
2015
Evolving Chinese Restaurant Processes for Modeling Evolutionary Traces in Temporal Data.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2015
Proceedings of the Intelligent Computation in Big Data Era, 2015
Proceedings of the 2015 IEEE International Conference on Communications, 2015
Proceedings of the 2015 IEEE Global Communications Conference, 2015
2014
Designing robust routing protocols to protect base stations in wireless sensor networks.
Wirel. Commun. Mob. Comput., 2014
Neurocomputing, 2014
A Multiobjective Particle Swarm Optimization-Based Partial Classification for Accident Severity Analysis.
Appl. Artif. Intell., 2014
Proceedings of the 13th IEEE International Conference on Trust, 2014
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2014
Proceedings of the 9th IEEE International Conference on Networking, 2014
Proceedings of the IEEE Symposium on Computers and Communications, 2014
Proceedings of the 2014 IEEE Conference on Computer Communications, 2014
Proceedings of the IEEE International Conference on Communications, 2014
Proceedings of the 2014 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2014
POSTER: TraceVirt: A Framework for Detecting the Non-tampering Attacks in the Virtual Machine.
Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, 2014
Detecting the run time attacks in the cloud with an evidence collection based approach.
Proceedings of the IEEE 3rd International Conference on Cloud Computing and Intelligence Systems, 2014
A General Framework of Nonleakage-Based Authentication Using CSP for the Internet of Things.
Proceedings of the Web Technologies and Applications, 2014
Proceedings of the Twenty-Eighth AAAI Conference on Artificial Intelligence, 2014
2013
IEEE J. Sel. Areas Commun., 2013
IEICE Trans. Inf. Syst., 2013
Botnet Triple-Channel Model: Towards Resilient and Efficient Bidirectional Communication Botnets.
Proceedings of the Security and Privacy in Communication Networks, 2013
Proceedings of IEEE International Conference on Communications, 2013
2012
Wirel. Commun. Mob. Comput., 2012
Sensors, 2012
Sci. China Inf. Sci., 2012
Proceedings of the Implementation and Application of Automata, 2012
Network Security Analysis Method Taking into Account the Usage Information (Poster Abstract).
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2012
Proceedings of the NETWORKING 2012, 2012
Proceedings of the Trustworthy Computing and Services - International Conference, ISCTCS 2012, Beijing, China, May 28, 2012
Proceedings of the 18th IEEE International Conference on Parallel and Distributed Systems, 2012
Proceedings of IEEE International Conference on Communications, 2012
Proceedings of IEEE International Conference on Communications, 2012
Proceedings of the 2012 IEEE Global Communications Conference, 2012
An efficient and sustainable self-healing protocol for Unattended Wireless Sensor Networks.
Proceedings of the 2012 IEEE Global Communications Conference, 2012
Proceedings of the 2012 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery, 2012
Proceedings of the ACM Conference on Computer and Communications Security, 2012
Proceedings of the 2nd IEEE International Conference on Cloud Computing and Intelligence Systems, 2012
Proceedings of the 2nd IEEE International Conference on Cloud Computing and Intelligence Systems, 2012
Proceedings of the Applied Cryptography and Network Security, 2012
2011
J. Networks, 2011
Exploring Social Relations for Personalized Tag Recommendation in Social Tagging Systems.
IEICE Trans. Inf. Syst., 2011
Comput. Commun., 2011
A Bayesian regularized neural network approach to short-term traffic speed prediction.
Proceedings of the IEEE International Conference on Systems, 2011
Proceedings of the 2011 ACM Symposium on Applied Computing (SAC), TaiChung, Taiwan, March 21, 2011
Proceedings of the 12th International Conference on Parallel and Distributed Computing, 2011
Proceedings of the 4th USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2011
Proceedings of the 16th IEEE Symposium on Computers and Communications, 2011
Proceedings of the Global Communications Conference, 2011
Proceedings of the 2011 IEEE Consumer Communications and Networking Conference, 2011
2010
J. Comput., 2010
J. Convergence Inf. Technol., 2010
Formalization and Quantitative Analysis of Controllability on Internet Information Security.
Int. J. Web Appl., 2010
IEICE Trans. Inf. Syst., 2010
IEICE Trans. Inf. Syst., 2010
IEICE Trans. Inf. Syst., 2010
Sci. China Inf. Sci., 2010
Sci. China Inf. Sci., 2010
Proceedings of the Network and Parallel Computing, IFIP International Conference, 2010
Speak the same language with your friends: augmenting tag recommenders with social relations.
Proceedings of the HT'10, 2010
Proceedings of the 2010 Data Compression Conference (DCC 2010), 2010
Proceedings of the 19th ACM Conference on Information and Knowledge Management, 2010
Proceedings of the 10th IEEE International Conference on Computer and Information Technology, 2010
2009
IEICE Trans. Inf. Syst., 2009
Sci. China Ser. F Inf. Sci., 2009
An Experimental Study on Instance Selection Schemes for Efficient Network Anomaly Detection.
Proceedings of the Recent Advances in Intrusion Detection, 12th International Symposium, 2009
Proceedings of the 2009 International Conference on Parallel and Distributed Computing, 2009
Proceedings of the Sixth International Conference on Information Technology: New Generations, 2009
Proceedings of the Sixth International Conference on Information Technology: New Generations, 2009
Proceedings of the 15th IEEE International Conference on Parallel and Distributed Systems, 2009
Proceedings of the 2009 IEEE/WIC/ACM International Conference on Web Intelligence and International Conference on Intelligent Agent Technology, 2009
Proceedings of the 2009 Data Compression Conference (DCC 2009), 2009
2008
Proceedings of the 17th International Conference on World Wide Web, 2008
Proceedings of the Ninth International Conference on Web-Age Information Management, 2008
Proceedings of the Ninth International Conference on Web-Age Information Management, 2008
A Quasi Word-Based Compression Method of English Text Using Byte-Oriented Coding Scheme.
Proceedings of the Ninth International Conference on Web-Age Information Management, 2008
Proceedings of the 13th IEEE Symposium on Computers and Communications (ISCC 2008), 2008
Proceedings of the 9th International Conference for Young Computer Scientists, 2008
Proceedings of the Seventh International Conference on Networking (ICN 2008), 2008
2007
IEICE Trans. Inf. Syst., 2007
Proceedings of the Intelligence and Security Informatics, Pacific Asia Workshop, 2007
A Novel Data Mining Method for Network Anomaly Detection Based on Transductive Scheme.
Proceedings of the Advances in Neural Networks, 2007
Proceedings of the 12th IEEE Symposium on Computers and Communications (ISCC 2007), 2007
Parallelizing Protocol Processing on SMT Processor Efficiently: A FSM Decomposition Approach.
Proceedings of the 26th IEEE International Performance Computing and Communications Conference, 2007
Proceedings of the IEEE International Conference on Network Protocols, 2007
Proceedings of the Computational Intelligence and Security, International Conference, 2007
Proceedings of the 2007 ACM Symposium on Information, Computer and Communications Security, 2007
2006
Clust. Comput., 2006
Multisite co-allocation scheduling algorithms for parallel jobs in computing grid environments.
Sci. China Ser. F Inf. Sci., 2006
Proceedings of the Seventh International Conference on Parallel and Distributed Computing, 2006
Proceedings of the Third International Conference on Information Technology: New Generations (ITNG 2006), 2006
Proceedings of the Information Security Practice and Experience, 2006
Proceedings of the Information Security Practice and Experience, 2006
Proceedings of the Intelligence and Security Informatics, 2006
Proceedings of the 25th IEEE International Performance Computing and Communications Conference, 2006
Research of a Novel Anti-Spam Technique Based on Users' Feedback and Improved Naive Bayesian Approach.
Proceedings of the 2006 International Conference on Networking and Services (ICNS 2006), 2006
Proceedings of IEEE International Conference on Communications, 2006
Proceedings of IEEE International Conference on Communications, 2006
Experimental Performance Study of a User Intensive and Large-scale Digital Library Framework.
Proceedings of the Second International Workshop on Document Image Analysis for Libraries (DIAL 2006), 2006
Proceedings of the Advanced Web and Network Technologies, and Applications, 2006
Proceedings of the Advanced Web and Network Technologies, and Applications, 2006
Proceedings of the Frontiers of WWW Research and Development, 2006
Proceedings of the Advanced International Conference on Telecommunications and International Conference on Internet and Web Applications and Services (AICT/ICIW 2006), 2006
2005
Techniques for Determining the Geographic Location of IP Addresses in ISP Topology Measurement.
J. Comput. Sci. Technol., 2005
IEEE Distributed Syst. Online, 2005
Techniques of IP Data Management in Network Address Resource platform.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2005
A Model for Estimating the Performance of Synchronous Parallel Network Simulation.
Proceedings of the International Conference on Parallel and Distributed Computing Systems, 2005
Proceedings of the Sixth International Conference on Parallel and Distributed Computing, 2005
A Distributed Architecture for Network Performance Measurement and Evaluation System.
Proceedings of the Sixth International Conference on Parallel and Distributed Computing, 2005
Proceedings of the Sixth International Conference on Parallel and Distributed Computing, 2005
Proceedings of the Third International Conference on Information Technology and Applications (ICITA 2005), 2005
Proceedings of the Networking and Mobile Computing, Third International Conference, 2005
Proceedings of the Pattern Recognition and Data Mining, 2005
Proceedings of the Grid and Cooperative Computing - GCC 2005, 4th International Conference, Beijing, China, November 30, 2005
Proceedings of the Computational Intelligence and Security, International Conference, 2005
Proceedings of the Computational Intelligence and Security, International Conference, 2005
Proceedings of the Advanced Parallel Processing Technologies, 6th International Workshop, 2005
Proceedings of the Fifth International Conference on Computer and Information Technology (CIT 2005), 2005
2004
Defending Against Flash Crowds and Malicious Traffic Attacks with An Auction-Based Method.
Proceedings of the 2004 IEEE/WIC/ACM International Conference on Web Intelligence (WI 2004), 2004
Proceedings of the String Processing and Information Retrieval, 2004
Proceedings of the International Workshop on Storage Network Architecture and Parallel I/Os, 2004
Grid-Enabled Parallel Debugging Environment: A Portal Solution.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2004
WonGoo: A Peer-to-Peer Protocol for Anonymous Communication.
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, 2004
Proceedings of the Parallel and Distributed Computing: Applications and Technologies, 2004
Proceedings of the Parallel and Distributed Computing: Applications and Technologies, 2004
Proceedings of the Parallel and Distributed Computing: Applications and Technologies, 2004
Proceedings of the Parallel and Distributed Computing: Applications and Technologies, 2004
Proceedings of the 18th International Parallel and Distributed Processing Symposium (IPDPS 2004), 2004
Proceedings of the Grid and Cooperative Computing, 2004
Proceedings of the Grid and Cooperative Computing, 2004
Proceedings of the Grid and Cooperative Computing, 2004
Proceedings of the Grid and Cooperative Computing, 2004
Proceedings of the Grid and Cooperative Computing, 2004
Proceedings of the Grid and Cooperative Computing, 2004
Proceedings of the 4th IEEE/ACM International Symposium on Cluster Computing and the Grid (CCGrid 2004), 2004