Bolun Wang

Orcid: 0000-0002-2027-870X

According to our database1, Bolun Wang authored at least 39 papers between 2014 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
Rectifying Strip Patterns.
ACM Trans. Graph., December, 2023

A novel feed rate scheduling method with acc-jerk-continuity and round-off error elimination for non-uniform rational B-spline interpolation.
J. Comput. Des. Eng., January, 2023

RWKV: Reinventing RNNs for the Transformer Era.
CoRR, 2023

2022
Fast and Exact Root Parity for Continuous Collision Detection.
Comput. Graph. Forum, 2022

Scattered Points Interpolation with Globally Smooth B-Spline Surface using Iterative Knot Insertion.
Comput. Aided Des., 2022

2021
A Large-scale Benchmark and an Inclusion-based Algorithm for Continuous Collision Detection.
ACM Trans. Graph., 2021

Scalable and Conservative Continuous Collision Detection.
CoRR, 2021

A novel feed rate scheduling method based on Sigmoid function with chord error and kinematics constraints.
CoRR, 2021

A novel S-shape based NURBS interpolation with acc-jerk- Continuity and round-off error elimination.
CoRR, 2021

KPI Method for Dynamic Surface Reconstruction With B-splines based on Sparse Data.
CoRR, 2021

DUDA-Net: a double U-shaped dilated attention network for automatic infection area segmentation in COVID-19 lung CT images.
Int. J. Comput. Assist. Radiol. Surg., 2021

MD-Net: A multi-scale dense network for retinal vessel segmentation.
Biomed. Signal Process. Control., 2021

Deepfake Videos in the Wild: Analysis and Detection.
Proceedings of the WWW '21: The Web Conference 2021, 2021

A method for Rapid Deployment of Brushless DC Motor Servo System Model Based on FPGA.
Proceedings of the 6th International Conference on Automation, 2021

2020
Exact and efficient polyhedral envelope containment check.
ACM Trans. Graph., 2020

Fast tetrahedral meshing in the wild.
ACM Trans. Graph., 2020

A fast T-spline fitting method based on efficient region segmentation.
Comput. Appl. Math., 2020

A Physical Process Driven Digital Terrain Model Generating Method Based on D-NURBS.
IEEE Access, 2020

Gotta Catch'Em All: Using Honeypots to Catch Adversarial Attacks on Neural Networks.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

NoiseScope: Detecting Deepfake Images in a Blind Setting.
Proceedings of the ACSAC '20: Annual Computer Security Applications Conference, 2020

2019
Gotta Catch 'Em All: Using Concealed Trapdoors to Detect Adversarial Attacks on Neural Networks.
CoRR, 2019

Neural Cleanse: Identifying and Mitigating Backdoor Attacks in Neural Networks.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019

Scaling Deep Learning Models for Spectrum Anomaly Detection.
Proceedings of the Twentieth ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2019

Inception-v3 Based Method of LifeCLEF 2019 Bird Recognition.
Proceedings of the Working Notes of CLEF 2019, 2019

Augmented Strategy For Polyphonic Sound Event Detection.
Proceedings of the 2019 Asia-Pacific Signal and Information Processing Association Annual Summit and Conference, 2019

2018
Improving and Securing Machine Learning Systems.
PhD thesis, 2018

Ghost Riders: Sybil Attacks on Crowdsourced Mobile Mapping Services.
IEEE/ACM Trans. Netw., 2018

Wireless Side-Lobe Eavesdropping Attacks.
CoRR, 2018

With Great Training Comes Great Vulnerability: Practical Attacks against Transfer Learning.
Proceedings of the 27th USENIX Security Symposium, 2018

2017
Value and Misinformation in Collaborative Investing Platforms.
ACM Trans. Web, 2017

Complexity vs. performance: empirical analysis of machine learning as a service.
Proceedings of the 2017 Internet Measurement Conference, 2017

2016
The power of comments: fostering social interactions in microblog networks.
Frontiers Comput. Sci., 2016

Poster: Defending against Sybil Devices in Crowdsourced Mapping Services.
Proceedings of the 14th Annual International Conference on Mobile Systems, 2016

Defending against Sybil Devices in Crowdsourced Mapping Services.
Proceedings of the 14th Annual International Conference on Mobile Systems, 2016

Anatomy of a Personalized Livestreaming System.
Proceedings of the 2016 ACM on Internet Measurement Conference, 2016

2015
Attacks and Defenses in Crowdsourced Mapping Services.
CoRR, 2015

Crowds on Wall Street: Extracting Value from Collaborative Investing Platforms.
Proceedings of the 18th ACM Conference on Computer Supported Cooperative Work & Social Computing, 2015

2014
Crowds on Wall Street: Extracting Value from Social Investing Platforms.
CoRR, 2014

Whispers in the dark: analysis of an anonymous social network.
Proceedings of the 2014 Internet Measurement Conference, 2014


  Loading...