Le Wang

Orcid: 0000-0002-3610-9185

Affiliations:
  • Guangzhou University, Cyberspace Institute of Advanced Technology, China


According to our database1, Le Wang authored at least 50 papers between 2018 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Labels Are Culprits: Defending Gradient Attack on Privacy.
IEEE Internet Things J., February, 2024

2023
Extracting Novel Attack Strategies for Industrial Cyber-Physical Systems Based on Cyber Range.
IEEE Syst. J., December, 2023

Masking and purifying inputs for blocking textual adversarial attacks.
Inf. Sci., November, 2023

Efficient distributed broadcasting algorithms for cognitive radio networks-enabled smart agriculture.
Comput. Electr. Eng., May, 2023

E2EGI: End-to-End Gradient Inversion in Federated Learning.
IEEE J. Biomed. Health Informatics, February, 2023

MUSEDA: Multilingual Unsupervised and Supervised Embedding for Domain Adaption.
Knowl. Based Syst., 2023

Evaluation Framework for Poisoning Attacks on Knowledge Graph Embeddings.
Proceedings of the Natural Language Processing and Chinese Computing, 2023

Lightweight Multi-Semantic Hierarchy-Aware Poincaré Knowledge Graph Embeddings.
Proceedings of the 29th IEEE International Conference on Parallel and Distributed Systems, 2023

DDoS Attack Detection Through Digital Twin Technique in Metaverse.
Proceedings of the IEEE International Conference on Consumer Electronics, 2023

Knowledge Graph Embedding via Adaptive Negative Subsampling.
Proceedings of the 8th International Conference on Data Science in Cyberspace, 2023

Anti-Breast Cancer Active Compound Screening Method Based on Simulated Annealing Algorithm and BP Neural Network.
Proceedings of the 8th International Conference on Data Science in Cyberspace, 2023

DAoB: A Transferable Adversarial Attack via Boundary Information for Speaker Recognition Systems.
Proceedings of the Workshop on Deepfake Audio Detection and Analysis co-located with 32th International Joint Conference on Artificial Intelligence (IJCAI 2023), 2023

2022
Epidemic Risk Assessment by a Novel Communication Station Based Method.
IEEE Trans. Netw. Sci. Eng., 2022

STG2P: A two-stage pipeline model for intrusion detection based on improved LightGBM and K-means.
Simul. Model. Pract. Theory, 2022

Improving adversarial transferability by temporal and spatial momentum in urban speaker recognition systems.
Comput. Electr. Eng., 2022

NRI-FGSM: An Efficient Transferable Adversarial Attack for Speaker Recognition Systems.
Proceedings of the Interspeech 2022, 2022

Defense Against Query-Based Black-Box Attack With Small Gaussian-Noise.
Proceedings of the 7th IEEE International Conference on Data Science in Cyberspace, 2022

A Multi-step Attack Detection Framework for the Power System Network.
Proceedings of the 7th IEEE International Conference on Data Science in Cyberspace, 2022

Improving Robustness of Language Models from a Geometry-aware Perspective.
Proceedings of the Findings of the Association for Computational Linguistics: ACL 2022, 2022

2021
Knowledge Extraction: Automatic Classification of Matching Rules.
Proceedings of the MDATA: A New Knowledge Representation Model, 2021

Entity Alignment: Optimization by Seed Selection.
Proceedings of the MDATA: A New Knowledge Representation Model, 2021

Gradient Shielding: Towards Understanding Vulnerability of Deep Neural Networks.
IEEE Trans. Netw. Sci. Eng., 2021

TREATED: Towards Universal Defense against Textual Adversarial Attacks.
CoRR, 2021

Word-Level Textual Adversarial Attack in the Embedding Space.
Proceedings of the International Joint Conference on Neural Networks, 2021

Generate Adversarial Examples Combined with Image Entropy Distribution.
Proceedings of the Sixth IEEE International Conference on Data Science in Cyberspace, 2021

A Universal Targeted Attack Method against Image Classification.
Proceedings of the Sixth IEEE International Conference on Data Science in Cyberspace, 2021

2020
Restricted Region Based Iterative Gradient Method for Non-Targeted Attack.
IEEE Access, 2020

Misleading Sentiment Analysis: Generating Adversarial Texts by the Ensemble Word Addition Algorithm.
Proceedings of the 2020 International Conferences on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2020

Adversarial Examples for Chinese Text Classification.
Proceedings of the 5th IEEE International Conference on Data Science in Cyberspace, 2020

Seeds Optimization for Entity Alignment in Knowledge Graph Embedding.
Proceedings of the 5th IEEE International Conference on Data Science in Cyberspace, 2020

Resume Extraction and Validation from Public Information.
Proceedings of the CIAT 2020: International Conference on Cyberspace Innovation of Advanced Technologies, 2020

An APT Group Knowledge Model based on MDATA.
Proceedings of the CIAT 2020: International Conference on Cyberspace Innovation of Advanced Technologies, 2020

2019
Crowdsourcing Approach for Developing Hands-On Experiments in Cybersecurity Education.
IEEE Access, 2019

A Graph Updating Method of Data Theft Detection Based on Rough Set.
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019

A Dynamic Event Region Tracking Approach Based on Node Calibration.
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019

A Review of Network Representation Learning.
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019

High-Speed File Transferring Over Linux Bridge for QGA Enhancement in Cyber Range.
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019

A Distributed Cryptanalysis Framework Based on Mobile Phones.
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019

Network-Embedding Based Storage Location Assignment in Mobile Rack Warehouse.
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019

Implementation of MD5 Collision Attack in Program.
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019

A Tutorial of Graph Representation.
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019

Chinese Text Classification Based on Neural Networks and Word2vec.
Proceedings of the Fourth IEEE International Conference on Data Science in Cyberspace, 2019

2018
3D Airway Tree Centerline Extraction Algorithm for Virtual Bronchoscope.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

Research on Risk Aversion Enterprise Financial Crisis Warning Based on Support Vector Data Description.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

Greedy Embedding Strategy for Dynamic Graphs Based on Spanning Tree.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

Analysis of LSTM-RNN Based on Attack Type of KDD-99 Dataset.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

A Trusted Computing Base for Information System Classified Protection.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

The Research on Security Audit for Information System Classified Protection.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

Quality-Aware Query Based on Relative Source Quality.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018

An Encryption Traffic Analysis Countermeasure Model Based on Game Theory.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018


  Loading...