关注
Binghui Wang
Binghui Wang
在 iit.edu 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Stealing Hyperparameters in Machine Learning
B Wang, NZ Gong
IEEE Symposium on Security and Privacy (S & P), 2018
6322018
Backdoor attacks to graph neural networks
Z Zhang, J Jia, B Wang, NZ Gong
SACMAT2021, 2021
2292021
Lotteryfl: Personalized and communication-efficient federated learning with lottery ticket hypothesis on non-iid datasets
A Li, J Sun, B Wang, L Duan, S Li, Y Chen, H Li
ACM/IEEE 6th Symposium on Edge Computing (SEC), 2021
216*2021
Soteria: Provable defense against privacy leakage in federated learning from representation perspective
J Sun, A Li, B Wang, H Yang, H Li, Y Chen
Proceedings of the IEEE/CVF conference on computer vision and pattern …, 2021
199*2021
Attacking Graph-based Classification via Manipulating the Graph Structure
B Wang, NZ Gong
ACM Conference on Computer and Communications Security (CCS), 2019
1682019
Random walk based fake account detection in online social networks
J Jia, B Wang, NZ Gong
2017 47th annual IEEE/IFIP international conference on dependable systems …, 2017
1442017
Graphfl: A federated learning framework for semi-supervised node classification on graphs
B Wang, A Li, M Pang, H Li, Y Chen
2022 IEEE International Conference on Data Mining (ICDM), 498-507, 2022
1352022
On Certifying Robustness against Backdoor Attacks via Randomized Smoothing
B Wang, X Cao, J Jia, NZ Gong
2020 CVPR Workshop - Best Abstract Award, 2020
1262020
AttriInfer: Inferring user attributes in online social networks using markov random fields
J Jia, B Wang, L Zhang, NZ Gong
Proceedings of the 26th International Conference on World Wide Web, 1561-1569, 2017
1112017
Sybilfuse: Combining local attributes with global structure to perform robust sybil detection
P Gao, B Wang, NZ Gong, SR Kulkarni, K Thomas, P Mittal
2018 IEEE conference on communications and network security (CNS), 1-9, 2018
109*2018
GANG: Detecting Fraudulent Users in Online Social Networks via Guilt-by-Association on Directed Graphs
B Wang, NZ Gong, H Fu
IEEE International Conference on Data Mining (ICDM), 2017
1042017
SybilSCAR: Sybil detection in online social networks via local rule based propagation
B Wang, L Zhang, NZ Gong
IEEE INFOCOM 2017-IEEE Conference on Computer Communications, 1-9, 2017
1032017
Certified Robustness for Top-k Predictions against Adversarial Perturbations via Randomized Smoothing
J Jia, X Cao, B Wang, NZ Gong
International Conference on Learning Representations (ICLR), 2020
1022020
Perturbing Across the Feature Hierarchy to Improve Standard and Strict Blackbox Attack Transferability
N Inkawhich, KJ Liang, B Wang, M Inkawhich, L Carin, Y Chen
NeurIPS, 2020
892020
Certified Robustness of Community Detection against Adversarial Structural Perturbation via Randomized Smoothing
B Wang*, J Jia*, X Cao, NZ Gong
The Web Conference (WWW), 2020
882020
A turn-on fluorescence probe Eu3+ functionalized Ga-MOF integrated with logic gate operation for detecting ppm-level ciprofloxacin (CIP) in urine
B Wang, B Yan
Talanta 208, 120438, 2020
842020
Certified robustness of graph neural networks against adversarial structural perturbation
B Wang, J Jia, X Cao, NZ Gong
ACM SIGKDD'21, 2021
772021
Robust extraction of basis functions for simultaneous and proportional myoelectric control via sparse non-negative matrix factorization
C Lin, B Wang, N Jiang, D Farina
Journal of neural engineering 15 (2), 026017, 2018
762018
Structure-based sybil detection in social networks via local rule-based propagation
B Wang, J Jia, L Zhang, NZ Gong
IEEE Transactions on Network Science and Engineering 6 (3), 523-537, 2018
622018
Poisonedrag: Knowledge corruption attacks to retrieval-augmented generation of large language models
W Zou, R Geng, B Wang, J Jia
arXiv preprint arXiv:2402.07867, 2024
612024
系统目前无法执行此操作,请稍后再试。
文章 1–20