Xuebin Wang

Orcid: 0000-0002-3487-2830

According to our database1, Xuebin Wang authored at least 54 papers between 2009 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
SPEFL: Efficient Security and Privacy-Enhanced Federated Learning Against Poisoning Attacks.
IEEE Internet Things J., April, 2024

Adaptive Data Augmentation for Aspect Sentiment Quad Prediction.
CoRR, 2024

2023
Evicting and filling attack for linking multiple network addresses of Bitcoin nodes.
Cybersecur., December, 2023

GPMeta: a GPU-accelerated method for ultrarapid pathogen identification from metagenomic sequences.
Briefings Bioinform., March, 2023

How Well Do Large Language Models Understand Syntax? An Evaluation by Asking Natural Language Questions.
CoRR, 2023

Prompt2Gaussia: Uncertain Prompt-learning for Script Event Prediction.
CoRR, 2023

Representation and Labeling Gap Bridging for Cross-lingual Named Entity Recognition.
Proceedings of the 46th International ACM SIGIR Conference on Research and Development in Information Retrieval, 2023

The VMD-CNN-Trans model used for ultra-short-term power prediction in wind farms.
Proceedings of the IEEE Sustainable Power and Energy Conference, 2023

A Comprehensive Evaluation of the Impact on Tor Network Anonymity Caused by ShadowRelay.
Proceedings of the IEEE Symposium on Computers and Communications, 2023

Syntactic Enhanced Euphemisms Identification Based on Graph Convolution Networks and Dependency Parsing.
Proceedings of the 8th International Conference on Data Science in Cyberspace, 2023

Self-Disclosure Causality Detection: Discover What Cause the Self-Disclosure.
Proceedings of the 8th International Conference on Data Science in Cyberspace, 2023

2022
An Anonymity Vulnerability in Tor.
IEEE/ACM Trans. Netw., 2022

Perceived usefulness predicts second language learners' continuance intention toward language learning applications: a serial multiple mediation model of integrative motivation and flow.
Educ. Inf. Technol., 2022

Identification of MEEK-Based TOR Hidden Service Access Using the Key Packet Sequence.
Proceedings of the Computational Science - ICCS 2022, 2022

ABNN<sup>2</sup>: secure two-party arbitrary-bitwidth quantized neural network predictions.
Proceedings of the DAC '22: 59th ACM/IEEE Design Automation Conference, San Francisco, California, USA, July 10, 2022

2021
System Identification With Binary-Valued Observations Under Data Tampering Attacks.
IEEE Trans. Autom. Control., 2021

Optimal and Low-Memory Near-Optimal Preconditioning of Fully Implicit Runge-Kutta Schemes for Parabolic PDEs.
SIAM J. Sci. Comput., 2021

Wind-Thermal-CSP Bundling Model With an Adjustable Heat Storage Strategy for CSP Stations.
IEEE Access, 2021

Practical Deanonymization Attack in Ethereum Based on P2P Network Analysis.
Proceedings of the 2021 IEEE Intl Conf on Parallel & Distributed Processing with Applications, Big Data & Cloud Computing, Sustainable Computing & Communications, Social Computing & Networking (ISPA/BDCloud/SocialCom/SustainCom), New York City, NY, USA, September 30, 2021

Darknet Public Hazard Entity Recognition Based on Deep Learning.
Proceedings of the ACM ICEA '21: 2021 ACM International Conference on Intelligent Computing and its Emerging Applications, Jinan, China, December 28, 2021

Towards Comprehensive Analysis of Tor Hidden Service Access Behavior Identification Under Obfs4 Scenario.
Proceedings of the ACM ICEA '21: 2021 ACM International Conference on Intelligent Computing and its Emerging Applications, Jinan, China, December 28, 2021

A Two-Stage Deanonymization Attack Towards Bitcoin Hidden Service Nodes.
Proceedings of the 2021 IEEE 23rd Int Conf on High Performance Computing & Communications; 7th Int Conf on Data Science & Systems; 19th Int Conf on Smart City; 7th Int Conf on Dependability in Sensor, 2021

Bit-FP: A Traffic Fingerprinting Approach for Bitcoin Hidden Service Detection.
Proceedings of the Sixth IEEE International Conference on Data Science in Cyberspace, 2021

Identifying Reply Relationships from Telegram Groups Using Multi-Features Fusion.
Proceedings of the Sixth IEEE International Conference on Data Science in Cyberspace, 2021

Identification Domain Fronting Traffic for Revealing Obfuscated C2 Communications.
Proceedings of the Sixth IEEE International Conference on Data Science in Cyberspace, 2021

ExitSniffer: Towards Comprehensive Security Analysis of Anomalous Binding Relationship of Exit Routers.
Proceedings of the Cyber Security - 18th China Annual Conference, 2021

Efficient Classification of Darknet Access Activity with Partial Traffic.
Proceedings of the Cyber Security - 18th China Annual Conference, 2021

2020
WLS-ENO remap: Superconvergent and non-oscillatory weighted least squares data transfer on surfaces.
J. Comput. Phys., 2020

Event Detection with Relation-Aware Graph Convolutional Neural Networks.
CoRR, 2020

Napping Guard: Deanonymizing Tor Hidden Service in a Stealthy Way.
Proceedings of the 19th IEEE International Conference on Trust, 2020

Aspect level sentiment classification with unbiased attention and target enhanced representations.
Proceedings of the SAC '20: The 35th ACM/SIGAPP Symposium on Applied Computing, online event, [Brno, Czech Republic], March 30, 2020

2ch-TCN: A Website Fingerprinting Attack over Tor Using 2-channel Temporal Convolutional Networks.
Proceedings of the IEEE Symposium on Computers and Communications, 2020

Learn More from Context: Joint Modeling of Local and Global Attention for Aspect Sentiment Classification.
Proceedings of the Computational Science - ICCS 2020, 2020

Look Deep into the New Deep Network: A Measurement Study on the ZeroNet.
Proceedings of the Computational Science - ICCS 2020, 2020

Edge-Enhanced Graph Convolution Networks for Event Detection with Syntactic Relation.
Proceedings of the Findings of the Association for Computational Linguistics: EMNLP 2020, 2020

2019
Calculations on 1, 8-naphthoquinone predict that the ground state of this diradical is a singlet.
J. Comput. Chem., 2019

Toward a Comprehensive Insight Into the Eclipse Attacks of Tor Hidden Services.
IEEE Internet Things J., 2019

A learning resource recommendation algorithm based on online learning sequential behavior.
Int. J. Wavelets Multiresolution Inf. Process., 2019

A new massively parallel nanoball sequencing platform for whole exome research.
BMC Bioinform., 2019

SignalCookie: Discovering Guard Relays of Hidden Services in Parallel.
Proceedings of the 2019 IEEE Symposium on Computers and Communications, 2019

Topology Measurement and Analysis on Ethereum P2P Network.
Proceedings of the 2019 IEEE Symposium on Computers and Communications, 2019

Towards Comprehensive Security Analysis of Hidden Services Using Binding Guard Relays.
Proceedings of the Information and Communications Security - 21st International Conference, 2019

2018
Who are in the Darknet? Measurement and Analysis of Darknet Person Attributes.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018

De-anonymizing Social Networks User via Profile Similarity.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018

Insider Threat Detection Using Characterizing User Behavior.
Proceedings of the Third IEEE International Conference on Data Science in Cyberspace, 2018

2017
Large-scale discovery and empirical analysis for I2P eepSites.
Proceedings of the 2017 IEEE Symposium on Computers and Communications, 2017

A closer look at Eclipse attacks against Tor hidden services.
Proceedings of the IEEE International Conference on Communications, 2017

2016
Out-of-band discovery and evaluation for tor hidden services.
Proceedings of the 31st Annual ACM Symposium on Applied Computing, 2016

2015
StegoP2P: Oblivious user-driven unobservable communications.
Proceedings of the 2015 IEEE International Conference on Communications, 2015

2014
Empirical Measurement and Analysis of I2P Routers.
J. Networks, 2014

2013
Generation and Distribution of Decoy Document System.
Proceedings of the Trustworthy Computing and Services, 2013

2011
A globally and superlinearly convergent quasi-Newton method for general box constrained variational inequalities without smoothing approximation.
J. Glob. Optim., 2011

An Emotional Face Evoked EEG Signal Recognition Method Based on Optimal EEG Feature and Electrodes Selection.
Proceedings of the Neural Information Processing - 18th International Conference, 2011

2009
A Fuzzy Appraisement-based Applied Study on High-temperature Corrosion of a Thermal Power Plant.
Proceedings of the Sixth International Conference on Fuzzy Systems and Knowledge Discovery, 2009


  Loading...