Le Wang
Orcid: 0000-0002-3610-9185Affiliations:
- Guangzhou University, Cyberspace Institute of Advanced Technology, China
According to our database1,
Le Wang
authored at least 55 papers
between 2018 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
World Wide Web (WWW), July, 2024
IEEE Internet Things J., May, 2024
IEEE Trans. Netw. Serv. Manag., April, 2024
IEEE Internet Things J., February, 2024
Rethinking multi-spatial information for transferable adversarial attacks on speaker recognition systems.
CAAI Trans. Intell. Technol., 2024
2023
Extracting Novel Attack Strategies for Industrial Cyber-Physical Systems Based on Cyber Range.
IEEE Syst. J., December, 2023
Inf. Sci., November, 2023
Efficient distributed broadcasting algorithms for cognitive radio networks-enabled smart agriculture.
Comput. Electr. Eng., May, 2023
IEEE J. Biomed. Health Informatics, February, 2023
Knowl. Based Syst., 2023
Proceedings of the Natural Language Processing and Chinese Computing, 2023
Proceedings of the 29th IEEE International Conference on Parallel and Distributed Systems, 2023
Proceedings of the IEEE International Conference on Consumer Electronics, 2023
Proceedings of the 8th International Conference on Data Science in Cyberspace, 2023
Anti-Breast Cancer Active Compound Screening Method Based on Simulated Annealing Algorithm and BP Neural Network.
Proceedings of the 8th International Conference on Data Science in Cyberspace, 2023
Cybersecurity Knowledge Graph Enables Targeted Data Collection for Cybersecurity Analysis.
Proceedings of the 8th International Conference on Data Science in Cyberspace, 2023
DAoB: A Transferable Adversarial Attack via Boundary Information for Speaker Recognition Systems.
Proceedings of the Workshop on Deepfake Audio Detection and Analysis co-located with 32th International Joint Conference on Artificial Intelligence (IJCAI 2023), 2023
2022
IEEE Trans. Netw. Sci. Eng., 2022
STG2P: A two-stage pipeline model for intrusion detection based on improved LightGBM and K-means.
Simul. Model. Pract. Theory, 2022
Improving adversarial transferability by temporal and spatial momentum in urban speaker recognition systems.
Comput. Electr. Eng., 2022
NRI-FGSM: An Efficient Transferable Adversarial Attack for Speaker Recognition Systems.
Proceedings of the 23rd Annual Conference of the International Speech Communication Association, 2022
Proceedings of the 7th IEEE International Conference on Data Science in Cyberspace, 2022
Proceedings of the 7th IEEE International Conference on Data Science in Cyberspace, 2022
Proceedings of the Findings of the Association for Computational Linguistics: ACL 2022, 2022
2021
Proceedings of the MDATA: A New Knowledge Representation Model, 2021
Proceedings of the MDATA: A New Knowledge Representation Model, 2021
IEEE Trans. Netw. Sci. Eng., 2021
Proceedings of the International Joint Conference on Neural Networks, 2021
Proceedings of the Sixth IEEE International Conference on Data Science in Cyberspace, 2021
Proceedings of the Sixth IEEE International Conference on Data Science in Cyberspace, 2021
2020
IEEE Access, 2020
Misleading Sentiment Analysis: Generating Adversarial Texts by the Ensemble Word Addition Algorithm.
Proceedings of the 2020 International Conferences on Internet of Things (iThings) and IEEE Green Computing and Communications (GreenCom) and IEEE Cyber, 2020
Proceedings of the 5th IEEE International Conference on Data Science in Cyberspace, 2020
Proceedings of the 5th IEEE International Conference on Data Science in Cyberspace, 2020
Proceedings of the CIAT 2020: International Conference on Cyberspace Innovation of Advanced Technologies, 2020
Proceedings of the CIAT 2020: International Conference on Cyberspace Innovation of Advanced Technologies, 2020
2019
Crowdsourcing Approach for Developing Hands-On Experiments in Cybersecurity Education.
IEEE Access, 2019
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019
Proceedings of the Artificial Intelligence and Security - 5th International Conference, 2019
Proceedings of the Fourth IEEE International Conference on Data Science in Cyberspace, 2019
2018
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018
Research on Risk Aversion Enterprise Financial Crisis Warning Based on Support Vector Data Description.
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018
Proceedings of the Cloud Computing and Security - 4th International Conference, 2018