Boyang Wang

Orcid: 0000-0001-8973-2328

According to our database1, Boyang Wang authored at least 121 papers between 2012 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of two.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Federated Learning With Dynamic Epoch Adjustment and Collaborative Training in Mobile Edge Computing.
IEEE Trans. Mob. Comput., May, 2024

MSC-AD: A Multiscene Unsupervised Anomaly Detection Dataset for Small Defect Detection of Casting Surface.
IEEE Trans. Ind. Informatics, April, 2024

A Hierarchical Multi-Vehicle Coordinated Motion Planning Method Based on Interactive Spatio-Temporal Corridors.
IEEE Trans. Intell. Veh., January, 2024

TP-FRL: An Efficient and Adaptive Trajectory Prediction Method Based on the Rule and Learning-Based Frameworks Fusion.
IEEE Trans. Intell. Veh., January, 2024

Design and Implementation of a Miniaturized Photoacoustic Spectroscopy CO₂ Sensor.
IEEE Trans. Instrum. Meas., 2024

Adaptive Multi-modal Fusion of Spatially Variant Kernel Refinement with Diffusion Model for Blind Image Super-Resolution.
CoRR, 2024

APISR: Anime Production Inspired Real-World Anime Super-Resolution.
CoRR, 2024

Search and Retrieval in Semantic-Structural Representations of Novel Malware.
Adv. Artif. Intell. Mach. Learn., 2024

Empirical Network Structure of Malicious Programs.
Adv. Artif. Intell. Mach. Learn., 2024

VCISR: Blind Single Image Super-Resolution with Video Compression Synthetic Data.
Proceedings of the IEEE/CVF Winter Conference on Applications of Computer Vision, 2024

LogFormer: A Pre-train and Tuning Pipeline for Log Anomaly Detection.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

2023
FastReach: A system for privacy-preserving reachability queries over location data.
Comput. Secur., December, 2023

Coordinated Motion Planning for Heterogeneous Autonomous Vehicles Based on Driving Behavior Primitives.
IEEE Trans. Intell. Transp. Syst., November, 2023

Fusion of Gaze and Scene Information for Driving Behaviour Recognition: A Graph-Neural-Network- Based Framework.
IEEE Trans. Intell. Transp. Syst., August, 2023

Assessment of Land Desertification and Its Drivers in Semi-Arid Alpine Mountains: A Case Study of the Qilian Mountains Region, Northwest China.
Remote. Sens., August, 2023

Massive Ultrasonic Data Compression Using Wavelet Packet Transformation Optimized by Convolutional Autoencoders.
IEEE Trans. Neural Networks Learn. Syst., March, 2023

Isolating Trajectory Tracking From Motion Control: A Model Predictive Control and Robust Control Framework for Unmanned Ground Vehicles.
IEEE Robotics Autom. Lett., March, 2023

Spectral Measurements of Muzzle Flash with a Temporally and Spatially Modulated LWIR-Imaging Fourier Transform Spectrometer.
Sensors, 2023

Identification of morphological fingerprint in perinatal brains using quasi-conformal mapping and contrastive learning.
CoRR, 2023

A Novel Fuzzy Time Series Method Based on Dynamic Ridge Polynomial Neural Network With Penalty Term and Fuzzy Clustering Analysis.
IEEE Access, 2023

Portability of Deep-Learning Side-Channel Attacks against Software Discrepancies.
Proceedings of the 16th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2023

Prompting Creative Requirements via Traceable and Adversarial Examples in Deep Learning.
Proceedings of the 31st IEEE International Requirements Engineering Conference, 2023

A Capture to Registration Framework for Realistic Image Super-Resolution in the Industry Environment.
Proceedings of the 31st ACM International Conference on Multimedia, 2023

Freq-HD: An Interpretable Frequency-based High-Dynamics Affective Clip Selection Method for in-the-Wild Facial Expression Recognition in Videos.
Proceedings of the 31st ACM International Conference on Multimedia, 2023

EvilELF: Evasion Attacks on Deep-Learning Malware Detection over ELF Files.
Proceedings of the International Conference on Machine Learning and Applications, 2023

TripletPower: Deep-Learning Side-Channel Attacks over Few Traces.
Proceedings of the IEEE International Symposium on Hardware Oriented Security and Trust, 2023

M2C: Towards Automatic Multimodal Manga Complement.
Proceedings of the Findings of the Association for Computational Linguistics: EMNLP 2023, 2023

RADTEC: Re-authentication of IoT Devices with Machine Learning.
Proceedings of the 20th IEEE Consumer Communications & Networking Conference, 2023

2022
Eclipse: Preserving Differential Location Privacy Against Long-Term Observation Attacks.
IEEE Trans. Mob. Comput., 2022

DR-GAN: Conditional Generative Adversarial Network for Fine-Grained Lesion Synthesis on Diabetic Retinopathy Images.
IEEE J. Biomed. Health Informatics, 2022

QuickN: Practical and Secure Nearest Neighbor Search on Encrypted Large-Scale Data.
IEEE Trans. Cloud Comput., 2022

Performance Assessment of BDS-3 PPP-B2b/INS Loosely Coupled Integration.
Remote. Sens., 2022

Improving Differential-Neural Cryptanalysis with Inception Blocks.
IACR Cryptol. ePrint Arch., 2022

A new AI-assisted scoring system for PD-L1 expression in NSCLC.
Comput. Methods Programs Biomed., 2022

LSTMcon: A Novel System of Portfolio Management Based on Feedback LSTM with Confidence.
Proceedings of the 34th International Conference on Software Engineering and Knowledge Engineering, 2022

AdvTraffic: Obfuscating Encrypted Traffic with Adversarial Examples.
Proceedings of the 30th IEEE/ACM International Symposium on Quality of Service, 2022

Similarity-Driven Adaptive Prototypical Network for Class-incremental Few-shot Named Entity Recognition.
Proceedings of the 34th IEEE International Conference on Tools with Artificial Intelligence, 2022

Automatically Generating High-performance Matrix Multiplication Kernels on the Latest Sunway Processor.
Proceedings of the 51st International Conference on Parallel Processing, 2022

Cache Shaping: An Effective Defense Against Cache-Based Website Fingerprinting.
Proceedings of the CODASPY '22: Twelveth ACM Conference on Data and Application Security and Privacy, Baltimore, MD, USA, April 24, 2022

MultiEvasion: Evasion Attacks Against Multiple Malware Detectors.
Proceedings of the 10th IEEE Conference on Communications and Network Security, 2022

RadioNet: Robust Deep-Learning Based Radio Fingerprinting.
Proceedings of the 10th IEEE Conference on Communications and Network Security, 2022

FaultHunter: Automatically Detecting Vulnerabilities in C against Fault Injection Attacks.
Proceedings of the IEEE/ACM International Conference on Big Data Computing, 2022

2021
A Benchmark for Studying Diabetic Retinopathy: Segmentation, Grading, and Transferability.
IEEE Trans. Medical Imaging, 2021

IdeateRelate: An Examples Gallery That Helps Creators Explore Ideas in Relation to Their Own.
Proc. ACM Hum. Comput. Interact., 2021

Prediction of Pedestrian Spatiotemporal Risk Levels for Intelligent Vehicles: A Data-driven Approach.
CoRR, 2021

Robust deep-learning-based radio fingerprinting with fine-tuning.
Proceedings of the WiSec '21: 14th ACM Conference on Security and Privacy in Wireless and Mobile Networks, Abu Dhabi, United Arab Emirates, 28 June, 2021

Slip Estimation for Autonomous Tracked Vehicles via Machine Learning.
Proceedings of the IEEE Intelligent Vehicles Symposium, 2021

Reliability of Convolutional Neural Networks: Failure Metrics with Metamorphic Test Cases.
Proceedings of the 22nd IEEE International Conference on Information Reuse and Integration for Data Science, 2021

HiddenText: Cross-Trace Website Fingerprinting over Encrypted Traffic.
Proceedings of the 22nd IEEE International Conference on Information Reuse and Integration for Data Science, 2021

AdaPDP: Adaptive Personalized Differential Privacy.
Proceedings of the 40th IEEE Conference on Computer Communications, 2021

Adaptive Fingerprinting: Website Fingerprinting over Few Encrypted Traffic.
Proceedings of the CODASPY '21: Eleventh ACM Conference on Data and Application Security and Privacy, 2021

2020
Motion Primitives Representation, Extraction and Connection for Automated Vehicle Motion Planning Applications.
IEEE Trans. Intell. Transp. Syst., 2020

Toward Practical Privacy-Preserving Frequent Itemset Mining on Encrypted Cloud Data.
IEEE Trans. Cloud Comput., 2020

Fingerprinting encrypted voice traffic on smart speakers with deep learning.
Proceedings of the WiSec '20: 13th ACM Conference on Security and Privacy in Wireless and Mobile Networks, 2020

Utility-aware Exponential Mechanism for Personalized Differential Privacy.
Proceedings of the 2020 IEEE Wireless Communications and Networking Conference, 2020

SmartSwitch: Efficient Traffic Obfuscation Against Stream Fingerprinting.
Proceedings of the Security and Privacy in Communication Networks, 2020

Data inference from encrypted databases: a multi-dimensional order-preserving matching approach.
Proceedings of the Mobihoc '20: The Twenty-first ACM International Symposium on Theory, 2020

Sparser: Secure Nearest Neighbor Search with Space-filling Curves.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020

EcoBoost: Efficient Bootstrapping for Confidential Transactions.
Proceedings of the IEEE International Conference on Blockchain and Cryptocurrency, 2020

Faster Region Convolutional Neural Networks Applied to Ultrasonic Images for Breast Lesion Detection and Classification.
Proceedings of the 2020 IEEE International Conference on Electro Information Technology, 2020

Learning FIR Filter Coefficients from Data for Speech-Music Separation.
Proceedings of the 2020 IEEE International Conference on Electro Information Technology, 2020

Embedded Mobile ROS Platform for SLAM Application with RGB-D Cameras.
Proceedings of the 2020 IEEE International Conference on Electro Information Technology, 2020

Near-Ultrasonic Communications for IoT Applications using Android Smartphone.
Proceedings of the 2020 IEEE International Conference on Electro Information Technology, 2020

Design Flow of Wireless Body Sensor Network for Human Activity Classification using Long Short-Term Memory (LSTM) Neural Network.
Proceedings of the 2020 IEEE International Conference on Electro Information Technology, 2020

Mitigating File-Injection Attacks with Natural Language Processing.
Proceedings of the IWSPA@CODASPY '20: Proceedings ofthe Sixth International Workshop on Security and Privacy Analytics, 2020

2019
FastGeo: Efficient Geometric Range Queries on Encrypted Spatial Data.
IEEE Trans. Dependable Secur. Comput., 2019

DR-GAN: Conditional Generative Adversarial Network for Fine-Grained Lesion Synthesis on Diabetic Retinopathy Images.
CoRR, 2019

Feedback-Added Pseudoinverse-Type Balanced Minimization Scheme for Kinematic Control of Redundant Robot Manipulators.
IEEE Access, 2019

A Behavior-Aware Profiling of Smart Contracts.
Proceedings of the Security and Privacy in Communication Networks, 2019

DME-Net: Diabetic Macular Edema Grading by Auxiliary Task Learning.
Proceedings of the Medical Image Computing and Computer Assisted Intervention - MICCAI 2019, 2019

Evaluation of Retinal Image Quality Assessment Networks in Different Color-Spaces.
Proceedings of the Medical Image Computing and Computer Assisted Intervention - MICCAI 2019, 2019

Regeneration and Joining of the Learned Motion Primitives for Automated Vehicle Motion Planning Applications.
Proceedings of the 2019 IEEE Intelligent Vehicles Symposium, 2019

Accelerate Black-Box Attack with White-Box Prior Knowledge.
Proceedings of the Intelligence Science and Big Data Engineering. Big Data and Machine Learning, 2019

Ultrasonic Communication Systems for Data Transmission.
Proceedings of the 2019 IEEE International Conference on Electro Information Technology, 2019

A Single-Camera 3D Microscope Scanner with Image Stitching and Stereo Matching.
Proceedings of the 2019 IEEE International Conference on Electro Information Technology, 2019

Randex: Mitigating Range Injection Attacks on Searchable Encryption.
Proceedings of the 7th IEEE Conference on Communications and Network Security, 2019

Vaccine: : Obfuscating Access Pattern Against File-Injection Attacks.
Proceedings of the 7th IEEE Conference on Communications and Network Security, 2019

I Can Hear Your Alexa: Voice Command Fingerprinting on Smart Home Speakers.
Proceedings of the 7th IEEE Conference on Communications and Network Security, 2019

Capsule Networks for Chinese Opinion Questions Machine Reading Comprehension.
Proceedings of the Chinese Computational Linguistics - 18th China National Conference, 2019

2018
Search Ranges Efficiently and Compatibly as Keywords over Encrypted Data.
IEEE Trans. Dependable Secur. Comput., 2018

Efficient and Secure Top-k Queries With Top Order-Preserving Encryption.
IEEE Access, 2018

Lightweight Verification for Searchable Encryption.
Proceedings of the 17th IEEE International Conference On Trust, 2018

Are Friends of My Friends Too Social?: Limitations of Location Privacy in a Socially-Connected World.
Proceedings of the Nineteenth ACM International Symposium on Mobile Ad Hoc Networking and Computing, 2018

Learning and Generalizing Motion Primitives From Driving Data for Path-Tracking Applications.
Proceedings of the 2018 IEEE Intelligent Vehicles Symposium, 2018

Development and Evaluation of Two Learning-Based Personalized Driver Models for Pure Pursuit Path-Tracking Behaviors.
Proceedings of the 2018 IEEE Intelligent Vehicles Symposium, 2018

Learning to Segment and Represent Motion Primitives from Driving Data for Motion Planning Applications.
Proceedings of the 21st International Conference on Intelligent Transportation Systems, 2018

Design Flow of Neural Network Application for IoT Based Fall Detection System.
Proceedings of the 2018 IEEE International Conference on Electro/Information Technology, 2018

Software Defined Ultrasonic System for Communication Through Solid Structures.
Proceedings of the 2018 IEEE International Conference on Electro/Information Technology, 2018

Fetal Electrocardiogram Recognition Using Multilayer Perceptron Neural Network.
Proceedings of the 2018 IEEE International Conference on Electro/Information Technology, 2018

2017
Secure Geometric Search on Encrypted Spatial Data.
PhD thesis, 2017

SecReach: Secure Reachability Computation on Encrypted Location Check-in Data.
IACR Cryptol. ePrint Arch., 2017

A novel method and system for stereotactic surgical procedures.
Proceedings of the 2017 IEEE International Conference on Signal Processing, 2017

Ultrasonic target echo detection using neural network.
Proceedings of the IEEE International Conference on Electro Information Technology, 2017

2016
Geometric Range Search on Encrypted Spatial Data.
IEEE Trans. Inf. Forensics Secur., 2016

Hardware and software architectures for computationally efficient three-dimensional ultrasonic data compression.
IET Circuits Devices Syst., 2016

Practical and secure nearest neighbor search on encrypted large-scale data.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

Ultrasonic Signal Acquisition and Processing platform based on Zynq SoC.
Proceedings of the 2016 IEEE International Conference on Electro Information Technology, 2016

Fast, Private and Verifiable: Server-aided Approximate Similarity Computation over Large-Scale Datasets.
Proceedings of the 4th ACM International Workshop on Security in Cloud Computing, 2016

2015
Comments on a Public Auditing Mechanism for Shared Cloud Data Service.
IEEE Trans. Serv. Comput., 2015

Panda: Public Auditing for Shared Data with Efficient User Revocation in the Cloud.
IEEE Trans. Serv. Comput., 2015

A novel algorithm for detecting center of tropical cyclone in satellite infrared images.
Proceedings of the 2015 IEEE International Geoscience and Remote Sensing Symposium, 2015

Acceleration of ultrasonic data compression using OpenCL on GPU.
Proceedings of the IEEE International Conference on Electro/Information Technology, 2015

Design and evaluation of reconfigurable ultrasonic testing system.
Proceedings of the IEEE International Conference on Electro/Information Technology, 2015

Circular range search on encrypted spatial data.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

2014
Oruta: Privacy-Preserving Public Auditingfor Shared Data in the Cloud.
IEEE Trans. Cloud Comput., 2014

Preserving identity privacy on multi-owner cloud data during public verification.
Secur. Commun. Networks, 2014

An anonymous data aggregation scheme for smart grid systems.
Secur. Commun. Networks, 2014

Efficient public verification on the integrity of multi-owner data in the cloud.
J. Commun. Networks, 2014

Tree-Based Multi-dimensional Range Search on Encrypted Data with Enhanced Privacy.
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014

A tale of two clouds: Computing on data encrypted under multiple keys.
Proceedings of the IEEE Conference on Communications and Network Security, 2014

Maple: scalable multi-dimensional range search over encrypted cloud data with tree-based index.
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014

2013
Mona: Secure Multi-Owner Data Sharing for Dynamic Groups in the Cloud.
IEEE Trans. Parallel Distributed Syst., 2013

Public auditing for shared data with efficient user revocation in the cloud.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

Storing Shared Data on the Cloud via Security-Mediator.
Proceedings of the IEEE 33rd International Conference on Distributed Computing Systems, 2013

Privacy-preserving public auditing for shared cloud data supporting group dynamics.
Proceedings of IEEE International Conference on Communications, 2013

Certificateless public auditing for data integrity in the cloud.
Proceedings of the IEEE Conference on Communications and Network Security, 2013

Computing encrypted cloud data efficiently under multiple keys.
Proceedings of the IEEE Conference on Communications and Network Security, 2013

2012
An efficient MAC scheme for secure network coding with probabilistic detection.
Frontiers Comput. Sci., 2012

Gmatch: Secure and privacy-preserving group matching in social networks.
Proceedings of the 2012 IEEE Global Communications Conference, 2012

Knox: Privacy-Preserving Auditing for Shared Data with Large Groups in the Cloud.
Proceedings of the Applied Cryptography and Network Security, 2012

Oruta: Privacy-Preserving Public Auditing for Shared Data in the Cloud.
Proceedings of the 2012 IEEE Fifth International Conference on Cloud Computing, 2012


  Loading...