关注
Bolun Wang
Bolun Wang
ByteDance
在 bytedance.com 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Neural cleanse: Identifying and mitigating backdoor attacks in neural networks
B Wang, Y Yao, S Shan, H Li, B Viswanath, H Zheng, BY Zhao
2019 IEEE Symposium on Security and Privacy (SP), 707-723, 2019
16402019
Defending against Sybil Devices in Crowdsourced Mapping Services
G Wang, B Wang, T Wang, A Nika, H Zheng, BY Zhao
Proceedings of the 14th Annual International Conference on Mobile Systems …, 2016
1562016
Whispers in the dark: analysis of an anonymous social network
G Wang, B Wang, T Wang, A Nika, H Zheng, BY Zhao
Proceedings of the 2014 Conference on Internet Measurement Conference, 137-150, 2014
1432014
With Great Training Comes Great Vulnerability: Practical Attacks against Transfer Learning
B Wang, Y Yao, B Viswanath, H Zheng, BY Zhao
27th {USENIX} Security Symposium ({USENIX} Security 18), 1281-1297, 2018
1422018
Complexity vs. performance: empirical analysis of machine learning as a service
Y Yao, Z Xiao, B Wang, B Viswanath, H Zheng, BY Zhao
Proceedings of the 2017 Internet Measurement Conference, 384-397, 2017
1232017
Crowds on Wall Street: Extracting Value from Collaborative Investing Platforms
G Wang, T Wang, B Wang, D Sambasivan, Z Zhang, H Zheng, BY Zhao
Proceedings of the 18th ACM Conference on Computer Supported Cooperative …, 2015
106*2015
Anatomy of a personalized livestreaming system
B Wang, X Zhang, G Wang, H Zheng, BY Zhao
Proceedings of the 2016 Internet Measurement Conference, 485-498, 2016
902016
Gotta Catch'Em All: Using Honeypots to Catch Adversarial Attacks on Neural Networks
S Shan, E Wenger, B Wang, B Li, H Zheng, BY Zhao
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020
752020
Ghost riders: Sybil attacks on crowdsourced mobile mapping services
G Wang, B Wang, T Wang, A Nika, H Zheng, BY Zhao
IEEE/ACM transactions on networking 26 (3), 1123-1136, 2018
582018
Deepfake Videos in the Wild: Analysis and Detection
J Pu, N Mangaokar, L Kelly, P Bhattacharya, K Sundaram, M Javed, ...
Proceedings of the Web Conference 2021, 981-992, 2021
572021
Scaling Deep Learning Models for Spectrum Anomaly Detection
Z Li, Z Xiao, B Wang, BY Zhao, H Zheng
Proceedings of the Twentieth ACM International Symposium on Mobile Ad Hoc …, 2019
392019
Using honeypots to catch adversarial attacks on neural networks
S Shan
Proceedings of the 8th ACM Workshop on Moving Target Defense, 25-25, 2021
332021
Noisescope: Detecting deepfake images in a blind setting
J Pu, N Mangaokar, B Wang, CK Reddy, B Viswanath
Proceedings of the 36th Annual Computer Security Applications Conference …, 2020
332020
Value and misinformation in collaborative investing platforms
T Wang, G Wang, B Wang, D Sambasivan, Z Zhang, X Li, H Zheng, ...
ACM Transactions on the Web (TWEB) 11 (2), 1-32, 2017
232017
The power of comments: fostering social interactions in microblog networks
T Wang, Y Chen, Y Wang, B Wang, G Wang, X Li, H Zheng, BY Zhao
Frontiers of Computer Science 10 (5), 889-907, 2016
162016
Wireless Side-Lobe Eavesdropping Attacks
Y Zhu, Y Ju, B Wang, J Cryan, BY Zhao, H Zheng
arXiv preprint arXiv:1810.10157, 2018
92018
Improving and Securing Machine Learning Systems
B Wang
University of California, Santa Barbara, 2018
12018
Go a Catch’Em All: Using Honeypots to Catch Adversarial A acks on Neural Networks
S Shan, E Wenger, B Wang, B Li, H Zheng, BY Zhao
2020
系统目前无法执行此操作,请稍后再试。
文章 1–18