default search action
Bin Wu 0011
Person information
- affiliation: Chinese Academy of Sciences, State Key Laboratory of Information Security, Beijing, China
Other persons with the same name
- Bin Wu — disambiguation page
- Bin Wu 0001 — Beijing University of Posts and Telecommunications, Beijing Key Laboratory of Intelligent Telecommunications Software and Multimedia, China (and 1 more)
- Bin Wu 0002 — Tianjin University, School of Computer Science and Technology, China (and 2 more)
- Bin Wu 0003 — Alibaba Group, Hangzhou, China (and 1 more)
- Bin Wu 0004 — University of California, Irvine, Department of Electrical Engineering and Computer Science, CA, USA
- Bin Wu 0005 — Ocean University of China, College of Information Science and Engineering, Qingdao, China
- Bin Wu 0006 — Chinese Academy of Sciences, Institute of Microelectronics, Beijing, China
- Bin Wu 0007 — Ryerson University, Department of Electrical and Computer Engineering, Toronto, ON, Canada (and 1 more)
- Bin Wu 0008 — Kunming Medical University, First Affiliated Hospital, China
- Bin Wu 0009 — University of Waterloo, Ontario, Canada
- Bin Wu 0010 — East China Normal University, Shanghai, China
- Bin Wu 0012 — Beijing University of Posts and Telecommunications, School of Cyberspace Security, National Disaster Recovery Technology Engineering Laboratory, China (and 1 more)
- Bin Wu 0013 — Hong Kong University of Science and Technology, Department of Computer Science and Engineering, Hong Kong
- Bin Wu 0014 — University of Illinois at Chicago, Department of Computer Science, IL, USA
- Bin Wu 0015 — Zhejiang University, College of Biomedical Engineering & Instrument Science, Hangzhou, China
- Bin Wu 0016 — Beijing University of Posts and Telecommunications, School of Sciences, China
- Bin Wu 0017 — Army Engineering University, Department of UAV Engineering, Shijiazhuang, China
- Bin Wu 0018 — Western Norway University of Applied Sciences, Department of Computer Science, Electrical Engineering and Mathematical Sciences, Bergen, Norway (and 1 more)
- Bin Wu 0019 — Zhengzhou University, School of Information Engineering, China
- Bin Wu 0020 — Jilin University, College of Electronic Science and Engineering, State Key Laboratory of Integrated Optoelectronics, Changchun, China (and 2 more)
- Bin Wu 0021 — Jiujiang University, School of Information Science and Technology, China (and 1 more)
- Bin Wu 0022 — Jimei University, Chengyi University College, Xiamen, China (and 1 more)
- Bin Wu 0023 — Northwest Normal University, College of Mathematics and Statistics, Lanzhou, China
- Bin Wu 0024 — Xidian University, School of Electronic Engineering, Xi'an, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [j16]Yanan Chen, Botao Hou, Bin Wu, Hao Hu:
CD-Net: Robust mobile traffic classification against apps updating. Comput. Secur. 150: 104214 (2025) - 2024
- [j15]Yunhua He, Shuang Wang, Zhihao Zhou, Ke Xiao, Anke Xie, Bin Wu:
A Blockchain-based carbon emission security accounting scheme. Comput. Networks 243: 110304 (2024) - [j14]Chang Ren, Bin Wu:
A Robust joint coverless image steganography scheme based on two independent modules. Cybersecur. 7(1): 73 (2024) - [j13]Jie Deng, Bin Wu:
A Practical Data Trading Protocol for Sudoku Solutions. IEEE Trans. Inf. Forensics Secur. 19: 6935-6948 (2024) - [j12]Mingshun Luo, Yunhua He, Tingli Yuan, Bin Wu, Yongdong Wu, Ke Xiao:
A Poisson Game-Based Incentive Mechanism for Federated Learning in Web 3.0. IEEE Trans. Netw. Sci. Eng. 11(6): 5576-5588 (2024) - [j11]Yunhua He, Zhihao Zhou, Bin Wu, Ke Xiao, Chao Wang, Xiuzhen Cheng:
Game-Theoretic Incentive Mechanism for Collaborative Quality Control in Blockchain-Enhanced Carbon Emissions Verification. IEEE Trans. Netw. Sci. Eng. 11(6): 6535-6549 (2024) - [i3]Zonghao Ying, Bin Wu:
NBA: defensive distillation for backdoor removal via neural behavior alignment. CoRR abs/2406.10846 (2024) - [i2]Zonghao Ying, Bin Wu:
DLP: towards active defense against backdoor attacks with decoupled learning process. CoRR abs/2406.13098 (2024) - 2023
- [j10]Zonghao Ying, Bin Wu:
DLP: towards active defense against backdoor attacks with decoupled learning process. Cybersecur. 6(1): 9 (2023) - [j9]Zonghao Ying, Bin Wu:
NBA: defensive distillation for backdoor removal via neural behavior alignment. Cybersecur. 6(1): 20 (2023) - [j8]Yunhua He, Cui Zhang, Bin Wu, Yigang Yang, Ke Xiao, Hong Li:
Cross-Chain Trusted Service Quality Computing Scheme for Multichain-Model-Based 5G Network Slicing SLA. IEEE Internet Things J. 10(14): 12126-12139 (2023) - [j7]Yunhua He, Mingshun Luo, Bin Wu, Limin Sun, Yongdong Wu, Zhiquan Liu, Ke Xiao:
A Game Theory-Based Incentive Mechanism for Collaborative Security of Federated Learning in Energy Blockchain Environment. IEEE Internet Things J. 10(24): 21294-21308 (2023) - [j6]Xianwang Xie, Bin Wu, Botao Hou:
BEPHAP: A Blockchain-based Efficient Privacy-Preserving Handover Authentication Protocol with key agreement for Internet of Vehicles. J. Syst. Archit. 138: 102869 (2023) - 2022
- [j5]Yunhua He, Cui Zhang, Bin Wu, Yigang Yang, Ke Xiao, Hong Li:
A Cross-Chain Trusted Reputation Scheme for a Shared Charging Platform Based on Blockchain. IEEE Internet Things J. 9(11): 7989-8000 (2022) - [j4]Lin Yao, Zhenyu Chen, Haibo Hu, Guowei Wu, Bin Wu:
Privacy Preservation for Trajectory Publication Based on Differential Privacy. ACM Trans. Intell. Syst. Technol. 13(3): 42:1-42:21 (2022) - [i1]Xianwang Xie, Bin Wu, Botao Hou:
BEPHAP: A Blockchain-Based Efficient Privacy-Preserving Handover Authentication Protocol with Key Agreement for Internet of Vehicles. CoRR abs/2210.16595 (2022) - 2021
- [j3]Lin Yao, Zhenyu Chen, Haibo Hu, Guowei Wu, Bin Wu:
Sensitive attribute privacy preservation of trajectory data publishing based on l-diversity. Distributed Parallel Databases 39(3): 785-811 (2021) - [j2]Xiang Gao, Jia Yu, Wenting Shen, Yan Chang, Shibin Zhang, Ming Yang, Bin Wu:
Achieving low-entropy secure cloud data auditing with file and authenticator deduplication. Inf. Sci. 546: 177-191 (2021) - [j1]Huaqun Wang, Debiao He, Jia Yu, Neal N. Xiong, Bin Wu:
RDIC: A blockchain-based remote data integrity checking scheme for IoT in 5G networks. J. Parallel Distributed Comput. 152: 1-10 (2021) - [c12]Lin Yao, Jia Li, Guowei Wu, Bin Wu:
New Dynamic Switch Migration Technique Based on Deep Q-learning. EUC 2021: 125-130 - [c11]Xingxin Yu, Haoyue Zhao, Botao Hou, Zonghao Ying, Bin Wu:
DeeSCVHunter: A Deep Learning-Based Framework for Smart Contract Vulnerability Detection. IJCNN 2021: 1-8 - [c10]Siyuan Zheng, Changqing Yin, Bin Wu:
Keys as Secret Messages: Provably Secure and Efficiency-balanced Steganography on Blockchain. ISPA/BDCloud/SocialCom/SustainCom 2021: 1269-1278 - [c9]Siyuan Zheng, Changqing Yin, Bin Wu:
Malicious Conspiracy on Permissioned Blockchain to Mount Denial-of-endorsement Attacks. ISPA/BDCloud/SocialCom/SustainCom 2021: 1625-1630 - 2020
- [c8]Botao Hou, Yongqiang Li, Haoyue Zhao, Bin Wu:
Linear Attack on Round-Reduced DES Using Deep Learning. ESORICS (2) 2020: 131-145 - [c7]Weipeng Jiang, Bin Wu, Xingxin Yu, Rui Xue, Zhengmin Yu:
Restructured Cloning Vulnerability Detection Based on Function Semantic Reserving and Reiteration Screening. ESORICS (1) 2020: 359-376
2010 – 2019
- 2019
- [c6]Meng Li, Bin Wu, Yaning Wang:
Comment Spam Detection via Effective Features Combination. ICC 2019: 1-6 - [c5]WeiPeng Jiang, Bin Wu, Zhou Jiang, ShaoBo Yang:
Cloning Vulnerability Detection in Driver Layer of IoT Devices. ICICS 2019: 89-104 - 2018
- [c4]Meng Li, Bin Wu, Zhengcai Qin:
Anomaly User Detection via Comprehensive Keystroke Features Optimization. IJCNN 2018: 1-7 - [c3]Zhengcai Qin, Bin Wu, Meng Li:
Text Image Deblurring via Intensity Extremums Prior. MMM (1) 2018: 505-517 - 2017
- [c2]Zhengcai Qin, Meng Li, Bin Wu:
Robust Steganography via Patch-Based Texture Synthesis. ICIMCS 2017: 429-439 - 2010
- [c1]Bin Wu, Dengguo Feng, Meijiao Duan:
Privacy Preserving of Trust Management Credentials Based on Trusted Computing. ISPEC 2010: 251-263
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-02-03 21:14 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint