Tianbo Wang

Orcid: 0000-0003-0765-1693

According to our database1, Tianbo Wang authored at least 41 papers between 2012 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
PPBFL: A Privacy Protected Blockchain-based Federated Learning Model.
CoRR, 2024

2023
FedDroidMeter: A Privacy Risk Evaluator for FL-Based Android Malware Classification Systems.
Entropy, July, 2023

From the Dialectical Perspective: Modeling and Exploiting of Hybrid Worm Propagation.
IEEE Trans. Inf. Forensics Secur., 2023

Capturing Dynamics of Information Diffusion in SNS: A Survey of Methodology and Techniques.
ACM Comput. Surv., 2023

FBChain: A Blockchain-based Federated Learning Model with Efficiency and Secure Communication.
CoRR, 2023

HL-DPoS: An Enhanced Anti-Long-Range Attack DPoS Algorithm.
CoRR, 2023

BRFL: A Blockchain-based Byzantine-Robust Federated Learning Model.
CoRR, 2023

FedDroidADP: An Adaptive Privacy-Preserving Framework for Federated-Learning-Based Android Malware Classification System.
Proceedings of the Knowledge Science, Engineering and Management, 2023

Service Resources Mining Based on Association Rules.
Proceedings of the 8th International Conference on Data Science in Cyberspace, 2023

2022
Epidemic Heterogeneity and Hierarchy: A Study of Wireless Hybrid Worm Propagation.
IEEE Trans. Mob. Comput., 2022

Secure and Temporary Access Delegation With Equality Test for Cloud-Assisted IoV.
IEEE Trans. Intell. Transp. Syst., 2022

Exponential Synchronization of Complex Dynamical Networks via a Novel Sampled-Data Control.
Complex., 2022

CRCS: Learning Synergistic Cascade Correlation for Microscopic Cascade Prediction.
Proceedings of the IEEE Smartworld, 2022

Few-shot X-ray Prohibited Item Detection: A Benchmark and Weak-feature Enhancement Network.
Proceedings of the MM '22: The 30th ACM International Conference on Multimedia, Lisboa, Portugal, October 10, 2022

Exploring Endogenous Shift for Cross-domain Detection: A Large-scale Benchmark and Perturbation Suppression Network.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022

Applying Value-Based Deep Reinforcement Learning on KPI Time Series Anomaly Detection.
Proceedings of the IEEE 15th International Conference on Cloud Computing, 2022

2021
HNN: A Novel Model to Study the Intrusion Detection Based on Multi-Feature Correlation and Temporal-Spatial Analysis.
IEEE Trans. Netw. Sci. Eng., 2021

Finite-Time Sliding Mode Control for Uncertain Neutral Systems With Time Delays.
IEEE Access, 2021

Robust Finite-Time H∞ Control for the Uncertain Singular System.
IEEE Access, 2021

Detection, Traceability, and Propagation of Mobile Malware Threats.
IEEE Access, 2021

2020
A Cognitive Method for Automatically Retrieving Complex Information on a Large Scale.
Sensors, 2020

A behavior-aware SLA-based framework for guaranteeing the security conformance of cloud service.
Frontiers Comput. Sci., 2020

Robust Reasoning Over Heterogeneous Textual Information for Fact Verification.
IEEE Access, 2020

GHSCN: A Graph Neural Network-Based API Popularity Prediction Method in Service Ecosystem.
IEEE Access, 2020

H2P: A Novel Model to Study the Propagation of Modern Hybrid Worm in Hierarchical Networks.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2020

Mental Workload Classification By Eye Movements In Visual Search Tasks.
Proceedings of the 13th International Congress on Image and Signal Processing, 2020

2019
SADI: A Novel Model to Study the Propagation of Social Worms in Hierarchical Networks.
IEEE Trans. Dependable Secur. Comput., 2019

Individual cylinder air-fuel ratio estimation and control for a large-bore gas fuel engine.
Int. J. Distributed Sens. Networks, 2019

An Information Source Identification Algorithm Based on Shortest Arborescence of Network.
Proceedings of the 8th International Conference on Software and Computer Applications, 2019

Feature Generation: A Novel Intrusion Detection Model Based on Prototypical Network.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2019

Which Node Properties Identify the Propagation Source in Networks?
Proceedings of the Algorithms and Architectures for Parallel Processing, 2019

Topic Reconstruction: A Novel Method Based on LDA Oriented to Intrusion Detection.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2019

A Novel Intrusion Detector Based on Deep Learning Hybrid Methods.
Proceedings of the 5th IEEE International Conference on Big Data Security on Cloud, 2019

2017
The Spatial-Temporal Perspective: The Study of the Propagation of Modern Social Worms.
IEEE Trans. Inf. Forensics Secur., 2017

CloudSec: A Novel Approach to Verifying Security Conformance at the Bottom of the Cloud.
Proceedings of the 2017 IEEE International Congress on Big Data, 2017

2015
Finite-time state estimation for delayed Hopfield neural networks with Markovian jump.
Neurocomputing, 2015

The Temporal Characteristic of Human Mobility: Modeling and Analysis of Social Worm Propagation.
IEEE Commun. Lett., 2015

2014
Controllability for a class of time-varying controlled switching impulsive systems with time delays.
Appl. Math. Comput., 2014

2013
Robust synchronization for stochastic delayed complex networks with switching topology and unmodeled dynamics via adaptive control approach.
Commun. Nonlinear Sci. Numer. Simul., 2013

2012
Mean square exponential synchronization in Lagrange sense for uncertain complex dynamical networks.
J. Frankl. Inst., 2012

Target-synchronization of the distributed wireless sensor networks under the same sleeping-awaking method.
J. Frankl. Inst., 2012


  Loading...