Boyang Wang

Affiliations:
  • University of Cincinnati, Department of Electrical and Computer Engineering, OH, USA


According to our database1, Boyang Wang authored at least 14 papers between 2020 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2025
Micropower: Micro Neural Networks for Side-Channel Attacks.
Proceedings of the IEEE International Symposium on Hardware Oriented Security and Trust, 2025

SARP: Spatial Agnostic Radio Fingerprinting with Pseudo-Labeling.
Proceedings of the 22nd IEEE Consumer Communications & Networking Conference, 2025

2024
TinyPower: Side-Channel Attacks with Tiny Neural Networks.
Proceedings of the IEEE International Symposium on Hardware Oriented Security and Trust, 2024

2023
Prompting Creative Requirements via Traceable and Adversarial Examples in Deep Learning.
Proceedings of the 31st IEEE International Requirements Engineering Conference, 2023

TripletPower: Deep-Learning Side-Channel Attacks over Few Traces.
Proceedings of the IEEE International Symposium on Hardware Oriented Security and Trust, 2023

RADTEC: Re-authentication of IoT Devices with Machine Learning.
Proceedings of the 20th IEEE Consumer Communications & Networking Conference, 2023

2022
Cache Shaping: An Effective Defense Against Cache-Based Website Fingerprinting.
Proceedings of the CODASPY '22: Twelveth ACM Conference on Data and Application Security and Privacy, Baltimore, MD, USA, April 24, 2022

RadioNet: Robust Deep-Learning Based Radio Fingerprinting.
Proceedings of the 10th IEEE Conference on Communications and Network Security, 2022

FaultHunter: Automatically Detecting Vulnerabilities in C against Fault Injection Attacks.
Proceedings of the IEEE/ACM International Conference on Big Data Computing, 2022

2021
Robust deep-learning-based radio fingerprinting with fine-tuning.
Proceedings of the WiSec '21: 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June, 2021

Reliability of Convolutional Neural Networks: Failure Metrics with Metamorphic Test Cases.
Proceedings of the 22nd IEEE International Conference on Information Reuse and Integration for Data Science, 2021

HiddenText: Cross-Trace Website Fingerprinting over Encrypted Traffic.
Proceedings of the 22nd IEEE International Conference on Information Reuse and Integration for Data Science, 2021

Adaptive Fingerprinting: Website Fingerprinting over Few Encrypted Traffic.
Proceedings of the CODASPY '21: Eleventh ACM Conference on Data and Application Security and Privacy, 2021

2020
Mitigating File-Injection Attacks with Natural Language Processing.
Proceedings of the IWSPA@CODASPY '20: Proceedings ofthe Sixth International Workshop on Security and Privacy Analytics, 2020


  Loading...