​
Login / Signup
Le Wang
ORCID
Publication Activity (10 Years)
Years Active: 2018-2024
Publications (10 Years): 48
Top Topics
Intrusion Detection
Lightweight
Graph Embedding
Chinese Text
Top Venues
DSC
ICCCS (1)
ICAIS (1)
IEEE Internet Things J.
</>
Publications
</>
Zhaohua Li
,
Le Wang
,
Zhaoquan Gu
,
Yang Lv
,
Zhihong Tian
Labels Are Culprits: Defending Gradient Attack on Privacy.
IEEE Internet Things J.
11 (4) (2024)
Zhiqiang Zhang
,
Le Wang
,
Junyi Zhu
,
Dong Zhu
,
Zhaoquan Gu
,
Yanchun Zhang
MIM: A multiple integration model for intrusion detection on imbalanced samples.
World Wide Web (WWW)
27 (4) (2024)
Lei Du
,
Zhaoquan Gu
,
Ye Wang
,
Le Wang
,
Yan Jia
A Few-Shot Class-Incremental Learning Method for Network Intrusion Detection.
IEEE Trans. Netw. Serv. Manag.
21 (2) (2024)
Junjian Zhang
,
Hao Tan
,
Le Wang
,
Yaguan Qian
,
Zhaoquan Gu
Rethinking multi-spatial information for transferable adversarial attacks on speaker recognition systems.
CAAI Trans. Intell. Technol.
9 (3) (2024)
Denghui Zhang
,
Muhammad Shafiq
,
Gautam Srivastava
,
Thippa Reddy Gadekallu
,
Le Wang
,
Zhaoquan Gu
STBCIoT: Securing the Transmission of Biometric Images in Customer IoT.
IEEE Internet Things J.
11 (9) (2024)
Dong Zhu
,
Haonan Tan
,
Le Wang
,
YuJie Feng
,
Yao Lin
,
Zhaoquan Gu
Knowledge Graph Embedding via Adaptive Negative Subsampling.
DSC
(2023)
Xujian Liang
,
Zhaoquan Gu
,
Yushun Xie
,
Le Wang
,
Zhihong Tian
MUSEDA: Multilingual Unsupervised and Supervised Embedding for Domain Adaption.
Knowl. Based Syst.
273 (2023)
Zhaoquan Gu
,
Huan Zhang
,
Le Wang
,
Muhammad Shafiq
,
Kai Jin
Efficient distributed broadcasting algorithms for cognitive radio networks-enabled smart agriculture.
Comput. Electr. Eng.
108 (2023)
Dong Zhu
,
Yao Lin
,
Haonan Tan
,
Le Wang
,
Zhaoquan Gu
Lightweight Multi-Semantic Hierarchy-Aware Poincaré Knowledge Graph Embeddings.
ICPADS
(2023)
Songxuan Wei
,
Yan Jia
,
Zhaoquan Gu
,
Muhammad Shafiq
,
Le Wang
Extracting Novel Attack Strategies for Industrial Cyber-Physical Systems Based on Cyber Range.
IEEE Syst. J.
17 (4) (2023)
Huan Zhang
,
Zhaoquan Gu
,
Hao Tan
,
Le Wang
,
Ziqi Zhu
,
Yushun Xie
,
Jianxin Li
Masking and purifying inputs for blocking textual adversarial attacks.
Inf. Sci.
648 (2023)
Zhaohua Li
,
Le Wang
,
Guangyao Chen
,
Zhiqiang Zhang
,
Muhammad Shafiq
,
Zhaoquan Gu
E2EGI: End-to-End Gradient Inversion in Federated Learning.
IEEE J. Biomed. Health Informatics
27 (2) (2023)
Dong Zhu
,
Yao Lin
,
Le Wang
,
Yushun Xie
,
Jie Jiang
,
Zhaoquan Gu
Evaluation Framework for Poisoning Attacks on Knowledge Graph Embeddings.
NLPCC (1)
(2023)
Bin Zhu
,
Zhaoquan Gu
,
Le Wang
,
Jinyin Chen
,
Qi Xuan
Improving robustness of language models from a geometry-aware perspective.
CoRR
(2022)
Zhiqiang Zhang
,
Le Wang
,
Guangyao Chen
,
Zhaoquan Gu
,
Zhihong Tian
,
Xiaojiang Du
,
Mohsen Guizani
STG2P: A two-stage pipeline model for intrusion detection based on improved LightGBM and K-means.
Simul. Model. Pract. Theory
120 (2022)
Zhaoquan Gu
,
Le Wang
,
Xiaolong Chen
,
Yunyi Tang
,
Xingang Wang
,
Xiaojiang Du
,
Mohsen Guizani
,
Zhihong Tian
Epidemic Risk Assessment by a Novel Communication Station Based Method.
IEEE Trans. Netw. Sci. Eng.
9 (1) (2022)
Bin Zhu
,
Zhaoquan Gu
,
Le Wang
,
Jinyin Chen
,
Qi Xuan
Improving Robustness of Language Models from a Geometry-aware Perspective.
ACL (Findings)
(2022)
Ziqi Zhu
,
Bin Zhu
,
Huan Zhang
,
Yu Geng
,
Le Wang
,
Denghui Zhang
,
Zhaoquan Gu
Defense Against Query-Based Black-Box Attack With Small Gaussian-Noise.
DSC
(2022)
Ju Yang
,
Liang Zhou
,
Le Wang
,
Shudong Li
,
Ziqing Lin
,
Zhaoquan Gu
A Multi-step Attack Detection Framework for the Power System Network.
DSC
(2022)
Zhaoquan Gu
,
Weixiong Hu
,
Chuanjing Zhang
,
Hui Lu
,
Lihua Yin
,
Le Wang
Gradient Shielding: Towards Understanding Vulnerability of Deep Neural Networks.
IEEE Trans. Netw. Sci. Eng.
8 (2) (2021)
Bin Zhu
,
Zhaoquan Gu
,
Yushun Xie
,
Danni Wu
,
Yaguan Qian
,
Le Wang
Word-Level Textual Adversarial Attack in the Embedding Space.
IJCNN
(2021)
Huili Luo
,
Zhaoquan Gu
,
Chunajing Zhang
,
Le Wang
,
Shuhao Li
,
Zhiqin Chen
A Universal Targeted Attack Method against Image Classification.
DSC
(2021)
Wenrong Xie
,
Fashan Dong
,
Haiyang Yu
,
Zhaoquan Gu
,
Le Wang
,
Zhihong Tian
Generate Adversarial Examples Combined with Image Entropy Distribution.
DSC
(2021)
Bin Zhu
,
Zhaoquan Gu
,
Le Wang
,
Zhihong Tian
TREATED: Towards Universal Defense against Textual Adversarial Attacks.
CoRR
(2021)
Xiaolong Chen
,
Le Wang
,
Yunyi Tang
,
Weihong Han
,
Zhaoquan Gu
Seeds Optimization for Entity Alignment in Knowledge Graph Embedding.
DSC
(2020)
Xiangyi Kong
,
Zhaoquan Gu
,
Le Wang
,
Lihua Yin
,
Shudong Li
,
Weihong Han
Resume Extraction and Validation from Public Information.
CIAT
(2020)
Yushun Xie
,
Zhaoquan Gu
,
Bin Zhu
,
Le Wang
,
Weihong Han
,
Lihua Yin
Adversarial Examples for Chinese Text Classification.
DSC
(2020)
Yushun Xie
,
Zhaoquan Gu
,
Xiaopeng Fu
,
Le Wang
,
Weihong Han
,
Yuexuan Wang
Misleading Sentiment Analysis: Generating Adversarial Texts by the Ensemble Word Addition Algorithm.
iThings/GreenCom/CPSCom/SmartData/Cybermatics
(2020)
Yinyin Cai
,
Zhaoquan Gu
,
Le Wang
,
Shudong Li
,
Weihong Han
An APT Group Knowledge Model based on MDATA.
CIAT
(2020)
Zhaoquan Gu
,
Weixiong Hu
,
Chuanjing Zhang
,
Le Wang
,
Chunsheng Zhu
,
Zhihong Tian
Restricted Region Based Iterative Gradient Method for Non-Targeted Attack.
IEEE Access
8 (2020)
Jiajun Xie
,
Chunrui Zhang
,
Fang Lou
,
Yu Cui
,
Lun An
,
Le Wang
High-Speed File Transferring Over Linux Bridge for QGA Enhancement in Cyber Range.
ICAIS (4)
(2019)
Yuanyuan Chen
,
Hui Lu
,
Jing Qiu
,
Le Wang
A Tutorial of Graph Representation.
ICAIS (1)
(2019)
Xiang Yu
,
Hui Lu
,
Le Wang
,
Dapeng Man
A Dynamic Event Region Tracking Approach Based on Node Calibration.
ICAIS (1)
(2019)
Dan Xu
,
Le Wang
,
Jing Qiu
,
Hui Lu
A Review of Network Representation Learning.
ICAIS (2)
(2019)
Chaobin Wang
,
Le Wang
,
Mohan Li
,
Yu Jiang
,
Hui Lu
A Distributed Cryptanalysis Framework Based on Mobile Phones.
ICAIS (4)
(2019)
Xiang Yu
,
Le Wang
,
Shuang Chen
,
Yanbo Li
A Graph Updating Method of Data Theft Detection Based on Rough Set.
ICAIS (1)
(2019)
Weixiong Hu
,
Zhaoquan Gu
,
Yushun Xie
,
Le Wang
,
Keke Tang
Chinese Text Classification Based on Neural Networks and Word2vec.
DSC
(2019)
Yuying Li
,
Xiaohan Helu
,
Mohan Li
,
Yanbin Sun
,
Le Wang
Implementation of MD5 Collision Attack in Program.
ICAIS (1)
(2019)
Le Wang
,
Zhihong Tian
,
Zhaoquan Gu
,
Hui Lu
Crowdsourcing Approach for Developing Hands-On Experiments in Cybersecurity Education.
IEEE Access
7 (2019)
Jing Qiu
,
Yaqi Si
,
Yuhan Chai
,
Yan Liu
,
Dongwen Zhang
,
Hao Han
,
Le Wang
Network-Embedding Based Storage Location Assignment in Mobile Rack Warehouse.
ICAIS (1)
(2019)
Hui Lu
,
Xiang Cui
,
Le Wang
,
Yu Jiang
,
Meng Cui
The Research on Security Audit for Information System Classified Protection.
ICCCS (2)
(2018)
Xiang Yu
,
Yanbo Li
,
Hui Lu
,
Le Wang
3D Airway Tree Centerline Extraction Algorithm for Virtual Bronchoscope.
ICCCS (1)
(2018)
Xiang Yu
,
Shuang Chen
,
Yanbo Li
,
Hui Lu
,
Le Wang
Research on Risk Aversion Enterprise Financial Crisis Warning Based on Support Vector Data Description.
ICCCS (3)
(2018)
Xiangsong Gao
,
Hui Lu
,
Xiang Cui
,
Le Wang
An Encryption Traffic Analysis Countermeasure Model Based on Game Theory.
ICCCS (1)
(2018)
Chaochao Luo
,
Le Wang
,
Hui Lu
Analysis of LSTM-RNN Based on Attack Type of KDD-99 Dataset.
ICCCS (1)
(2018)
Yanbin Sun
,
Mohan Li
,
Le Wang
,
Hui Lu
Greedy Embedding Strategy for Dynamic Graphs Based on Spanning Tree.
ICCCS (1)
(2018)
Mohan Li
,
Yanbin Sun
,
Le Wang
,
Hui Lu
Quality-Aware Query Based on Relative Source Quality.
ICCCS (2)
(2018)
Hui Lu
,
Xiang Cui
,
Le Wang
,
Yu Jiang
,
Ronglai Jia
A Trusted Computing Base for Information System Classified Protection.
ICCCS (1)
(2018)