Chen Wang

Orcid: 0000-0003-1963-4954

Affiliations:
  • Huazhong University of Science and Technology, School of Electronic Information and Communications, Wuhan, China
  • Wuhan University, China (2013)


According to our database1, Chen Wang authored at least 62 papers between 2012 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Gradient-Leaks: Enabling Black-Box Membership Inference Attacks Against Machine Learning Models.
IEEE Trans. Inf. Forensics Secur., 2024

Manipulating Pre-Trained Encoder for Targeted Poisoning Attacks in Contrastive Learning.
IEEE Trans. Inf. Forensics Secur., 2024

2023
CP-Link: Exploiting Continuous Spatio-Temporal Check-In Patterns for User Identity Linkage.
IEEE Trans. Mob. Comput., August, 2023

Efficient Point-of-Interest Recommendation Services With Heterogenous Hypergraph Embedding.
IEEE Trans. Serv. Comput., 2023

Manipulating Supply Chain Demand Forecasting With Targeted Poisoning Attacks.
IEEE Trans. Ind. Informatics, 2023

Knowledge Representation of Training Data With Adversarial Examples Supporting Decision Boundary.
IEEE Trans. Inf. Forensics Secur., 2023

TEAR: Exploring Temporal Evolution of Adversarial Robustness for Membership Inference Attacks Against Federated Learning.
IEEE Trans. Inf. Forensics Secur., 2023

Membership Inference Attacks Against Machine Learning Models via Prediction Sensitivity.
IEEE Trans. Dependable Secur. Comput., 2023

Boundary Unlearning.
CoRR, 2023

Boundary Unlearning: Rapid Forgetting of Deep Networks via Shifting the Decision Boundary.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2023

Disentangling Client Contributions: Improving Federated Learning Accuracy in the Presence of Heterogeneous Data.
Proceedings of the IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2023

Partial Deep Domain Adaptation for Non-Intrusive Load Monitoring.
Proceedings of the IEEE Intl Conf on Parallel & Distributed Processing with Applications, 2023

2022
Spatial-Temporal Conv-Sequence Learning With Accident Encoding for Traffic Flow Prediction.
IEEE Trans. Netw. Sci. Eng., 2022

Enabling Energy Trading in Cooperative Microgrids: A Scalable Blockchain-Based Approach With Redundant Data Exchange.
IEEE Trans. Ind. Informatics, 2022

Your Model Trains on My Data? Protecting Intellectual Property of Training Data via Membership Fingerprint Authentication.
IEEE Trans. Inf. Forensics Secur., 2022

OPTDP: Towards optimal personalized trajectory differential privacy for trajectory data publishing.
Neurocomputing, 2022

Safeguarding cross-silo federated learning with local differential privacy.
Digit. Commun. Networks, 2022

Poisoning attacks and countermeasures in intelligent networks: Status quo and prospects.
Digit. Commun. Networks, 2022

Leveraging Model Poisoning Attacks on License Plate Recognition Systems.
Proceedings of the IEEE International Conference on Trust, 2022

Revisiting Cold-Start Problem in CTR Prediction: Augmenting Embedding via GAN.
Proceedings of the 31st ACM International Conference on Information & Knowledge Management, 2022

2021
Attacking Recommender Systems With Plausible Profile.
IEEE Trans. Inf. Forensics Secur., 2021

De-Pois: An Attack-Agnostic Defense against Data Poisoning Attacks.
IEEE Trans. Inf. Forensics Secur., 2021

Keep Your Data Locally: Federated-Learning-Based Data Privacy Preservation in Edge Computing.
IEEE Netw., 2021

Security Challenges and Opportunities for Smart Contracts in Internet of Things: A Survey.
IEEE Internet Things J., 2021

GPS spoofed or not? Exploiting RSSI and TSS in crowdsourced air traffic control data.
Distributed Parallel Databases, 2021

Spatial-Temporal Conv-sequence Learning with Accident Encoding for Traffic Flow Prediction.
CoRR, 2021

Protecting Locations with Differential Privacy against Location-Dependent Attacks in Continuous LBS Queries.
Proceedings of the 20th IEEE International Conference on Trust, 2021

ML-Stealer: Stealing Prediction Functionality of Machine Learning Models with Mere Black-Box Access.
Proceedings of the 20th IEEE International Conference on Trust, 2021

FedEraser: Enabling Efficient Client-Level Data Removal from Federated Learning Models.
Proceedings of the 29th IEEE/ACM International Symposium on Quality of Service, 2021

2020
Recent advances in consensus protocols for blockchain: a survey.
Wirel. Networks, 2020

MIASec: Enabling Data Indistinguishability Against Membership Inference Attacks in MLaaS.
IEEE Trans. Sustain. Comput., 2020

Resilient Range-Based d-Dimensional Localization for Mobile Sensor Networks.
IEEE/ACM Trans. Netw., 2020

Anomaly detection in bitcoin information networks with multi-constrained meta path.
J. Syst. Archit., 2020

Federated Unlearning.
CoRR, 2020

Privacy Preserving Trajectory Data Publishing with Personalized Differential Privacy.
Proceedings of the IEEE International Conference on Parallel & Distributed Processing with Applications, 2020

User Identity Linkage across Location-Based Social Networks with Spatio- Temporal Check-in Patterns.
Proceedings of the IEEE International Conference on Parallel & Distributed Processing with Applications, 2020

Blockchain consensuses and incentives.
Proceedings of the Blockchains for Network Security: Principles, 2020

2019
SocInf: Membership Inference Attacks on Social Media Health Data With Machine Learning.
IEEE Trans. Comput. Soc. Syst., 2019

On the Performance of $k$ -Anonymity Against Inference Attacks With Background Information.
IEEE Internet Things J., 2019

Classifying transportation mode and speed from trajectory data via deep multi-scale learning.
Comput. Networks, 2019

Clustering Noisy Trajectories via Robust Deep Attention Auto-Encoders.
Proceedings of the 20th IEEE International Conference on Mobile Data Management, 2019

Synchronization-Free GPS Spoofing Detection with Crowdsourced Air Traffic Control Data.
Proceedings of the 20th IEEE International Conference on Mobile Data Management, 2019

Multi-Task Learning for Location Prediction with Deep Multi-Model Ensembles.
Proceedings of the 21st IEEE International Conference on High Performance Computing and Communications; 17th IEEE International Conference on Smart City; 5th IEEE International Conference on Data Science and Systems, 2019

traj2bits: indexing trajectory data for efficient query.
Proceedings of the ACM Turing Celebration Conference - China, 2019

2018
P<sup>3</sup>-LOC: A Privacy-Preserving Paradigm-Driven Framework for Indoor Localization.
IEEE/ACM Trans. Netw., 2018

RobLoP: Towards Robust Privacy Preserving Against Location Dependent Attacks in Continuous LBS Queries.
IEEE/ACM Trans. Netw., 2018

SNP: A 1-Manifold Skeleton-Based Navigation Protocol in 3D Sensor Networks.
IEEE Trans. Mob. Comput., 2018

Low Human-Effort, Device-Free Localization with Fine-Grained Subcarrier Information.
IEEE Trans. Mob. Comput., 2018

ILLIA: Enabling k-Anonymity-Based Privacy Preserving Against Location Injection Attacks in Continuous LBS Queries.
IEEE Internet Things J., 2018

Understanding Mobility via Deep Multi-Scale Learning.
Proceedings of the 2018 International Conference on Identification, 2018

Non-asymptotic Bound on the Performance of k-Anonymity against Inference Attacks.
Proceedings of the 20th IEEE International Conference on High Performance Computing and Communications; 16th IEEE International Conference on Smart City; 4th IEEE International Conference on Data Science and Systems, 2018

2017
SEND: A Situation-Aware Emergency Navigation Algorithm with Sensor Networks.
IEEE Trans. Mob. Comput., 2017

2016
A novel networking architecture for mobile content delivery in urban transport systems.
Wirel. Networks, 2016

Chain-based barrier coverage in WSNs: toward identifying and repairing weak zones.
Wirel. Networks, 2016

BLOW-UP: Toward Distributed and Scalable Space Filling Curve Construction in 3D Volumetric WSNs.
ACM Trans. Sens. Networks, 2016

Connectivity-Based Space Filling Curve Construction Algorithms in High Genus 3D Surface WSNs.
ACM Trans. Sens. Networks, 2016

SLICE: Enabling Greedy Routing in High Genus 3-D WSNs With General Topologies.
IEEE/ACM Trans. Netw., 2016

CANS: Towards Congestion-Adaptive and Small Stretch Emergency Navigation with Wireless Sensor Networks.
IEEE Trans. Mob. Comput., 2016

2015
Boundary-free skeleton extraction and its evaluation in sensor networks.
Wirel. Networks, 2015

SURF: A connectivity-based space filling curve construction algorithm in high genus 3D surface WSNs.
Proceedings of the 2015 IEEE Conference on Computer Communications, 2015

2014
Trajectory-based multi-dimensional outlier detection in wireless sensor networks using Hidden Markov Models.
Wirel. Networks, 2014

2012
On optimizing the transmission power of multi-hop underwater acoustic networks.
Proceedings of the 18th IEEE International Conference on Networks, 2012


  Loading...