Login / Signup
Bin Wang
ORCID
Publication Activity (10 Years)
Years Active: 2023-2024
Publications (10 Years): 17
Top Topics
Malware Detection
Chip Design
Hyperplane
Power Network
Top Venues
IEEE Trans. Inf. Forensics Secur.
CoRR
ICML
IEEE Trans. Neural Networks Learn. Syst.
</>
Publications
</>
Guo Li
,
Haibin Zhang
,
Chengcai Wang
,
Bin Wang
Model-Driven Channel Extrapolation for Massive Fluid Antenna.
ICC Workshops
(2024)
Yadong Zhang
,
Haibin Zhang
,
Yunlong Lu
,
Wen Sun
,
Lan Wei
,
Yan Zhang
,
Bin Wang
Adaptive Digital Twin Placement and Transfer in Wireless Computing Power Network.
IEEE Internet Things J.
11 (6) (2024)
Yaguan Qian
,
Zhiqiang He
,
Yuqi Wang
,
Bin Wang
,
Xiang Ling
,
Zhaoquan Gu
,
Haijiang Wang
,
Shaoning Zeng
,
Wassim Swaileh
Hierarchical Threshold Pruning Based on Uniform Response Criterion.
IEEE Trans. Neural Networks Learn. Syst.
35 (8) (2024)
Xiang Ling
,
Zhiyu Wu
,
Bin Wang
,
Wei Deng
,
Jingzheng Wu
,
Shouling Ji
,
Tianyue Luo
,
Yanjun Wu
A Wolf in Sheep's Clothing: Practical Black-box Adversarial Attacks for Evading Learning-based Windows Malware Detection in the Wild.
CoRR
(2024)
Siyang Wang
,
Haitao Zhao
,
Wanli Wen
,
Wenchao Xia
,
Bin Wang
,
Hongbo Zhu
Contract Theory Based Incentive Mechanism for Clustered Vehicular Federated Learning.
IEEE Trans. Intell. Transp. Syst.
25 (7) (2024)
Xiaohan Yuan
,
Jiqiang Liu
,
Bin Wang
,
Wei Wang
,
Bin Wang
,
Tao Li
,
Xiaobo Ma
,
Witold Pedrycz
FedComm: A Privacy-Enhanced and Efficient Authentication Protocol for Federated Learning in Vehicular Ad-Hoc Networks.
IEEE Trans. Inf. Forensics Secur.
19 (2024)
Jiangyi Deng
,
Xiaoyu Ji
,
Beibei Wang
,
Bin Wang
,
Wenyuan Xu
Dr. Defender: Proactive Detection of Autopilot Drones Based on CSI.
IEEE Trans. Inf. Forensics Secur.
19 (2024)
Yaguan Qian
,
Kecheng Chen
,
Bin Wang
,
Zhaoquan Gu
,
Shouling Ji
,
Wei Wang
,
Yanchun Zhang
Enhancing Transferability of Adversarial Examples Through Mixed-Frequency Inputs.
IEEE Trans. Inf. Forensics Secur.
19 (2024)
Xiang Ling
,
Zhiyu Wu
,
Bin Wang
,
Wei Deng
,
Jingzheng Wu
,
Shouling Ji
,
Tianyue Luo
,
Yanjun Wu
A Wolf in Sheep's Clothing: Practical Black-box Adversarial Attacks for Evading Learning-based Windows Malware Detection in the Wild.
USENIX Security Symposium
(2024)
Yao Lai
,
Jinxin Liu
,
Zhentao Tang
,
Bin Wang
,
Jianye Hao
,
Ping Luo
ChiPFormer: Transferable Chip Placement via Offline Decision Transformer.
ICML
(2023)
Ming Yan
,
Junjie Chen
,
Hangyu Mao
,
Jiajun Jiang
,
Jianye Hao
,
Xingjian Li
,
Zhao Tian
,
Zhichao Chen
,
Dong Li
,
Zhangkong Xian
,
Yanwei Guo
,
Wulong Liu
,
Bin Wang
,
Yuefeng Sun
,
Yongshun Cui
Achieving Last-Mile Functional Coverage in Testing Chip Design Software Implementations.
ICSE-SEIP
(2023)
Xiangrui Xu
,
Pengrui Liu
,
Wei Wang
,
Hongliang Ma
,
Bin Wang
,
Zhen Han
,
Yufei Han
CGIR: Conditional Generative Instance Reconstruction Attacks Against Federated Learning.
IEEE Trans. Dependable Secur. Comput.
20 (6) (2023)
Xiaohui Guan
,
Qiqi Shao
,
Yaguan Qian
,
Tengteng Yao
,
Bin Wang
Adversarial training in logit space against tiny perturbations.
Multim. Syst.
29 (6) (2023)
Jiaoze Mao
,
Yaguan Qian
,
Jianchang Huang
,
Zejie Lian
,
Renhui Tao
,
Bin Wang
,
Wei Wang
,
Tengteng Yao
Object-free backdoor attack and defense on semantic segmentation.
Comput. Secur.
132 (2023)
Yao Lai
,
Jinxin Liu
,
Zhentao Tang
,
Bin Wang
,
Jianye Hao
,
Ping Luo
ChiPFormer: Transferable Chip Placement via Offline Decision Transformer.
CoRR
(2023)
Xiaoyu Liang
,
Yaguan Qian
,
Jianchang Huang
,
Xiang Ling
,
Bin Wang
,
Chunming Wu
,
Wassim Swaileh
Towards desirable decision boundary by Moderate-Margin Adversarial Training.
Pattern Recognit. Lett.
173 (2023)
Fei Ni
,
Jianye Hao
,
Yao Mu
,
Yifu Yuan
,
Yan Zheng
,
Bin Wang
,
Zhixuan Liang
MetaDiffuser: Diffusion Model as Conditional Planner for Offline Meta-RL.
ICML
(2023)