Zhibo Wang
Zhibo Wang
Professor at College of Computer Science and Technology, Zhejiang University
Verified email at - Homepage
Cited by
Cited by
Beyond inferring class representatives: User-level privacy leakage from federated learning
Z Wang, M Song, Z Zhang, Y Song, Q Wang, H Qi
IEEE INFOCOM 2019-IEEE conference on computer communications, 2512-2520, 2019
Friendbook: a semantic-based friend recommendation system for social networks
Z Wang, J Liao, Q Cao, H Qi
IEEE Transactions on Mobile Computing, 538 - 551, 2015
Personalized privacy-preserving task allocation for mobile crowdsensing
Z Wang, J Hu, R Lv, J Wei, Q Wang, D Yang, H Qi
IEEE Transactions on Mobile Computing 18 (6), 1330-1341, 2018
Real-time and spatio-temporal crowd-sourced social network data publishing with differential privacy
Q Wang, Y Zhang, X Lu, Z Wang, Z Qin, K Ren
IEEE Transactions on Dependable and Secure Computing 15 (4), 591-606, 2016
Feature importance-aware transferable adversarial attacks
Z Wang, H Guo, Z Zhang, W Liu, Z Qin, K Ren
Proceedings of the IEEE/CVF international conference on computer visioná…, 2021
Analyzing user-level privacy attack against federated learning
M Song, Z Wang, Z Zhang, Y Song, Q Wang, J Ren, H Qi
IEEE Journal on Selected Areas in Communications 38 (10), 2430-2444, 2020
Achieving k-barrier Coverage in Hybrid Directional Sensor Networks
Z Wang, H Qi, Z Wang, J Liao, Q Cao
IEEE Transactions on Mobile Computing (TMC) 13 (7), 1443-1455, 2014
Exploring human mobility patterns in urban scenarios: A trajectory data perspective
F Xia, J Wang, X Kong, Z Wang, J Li, C Liu
IEEE Communications Magazine 56 (3), 142-149, 2018
Privacy-preserving crowd-sourced statistical data publishing with an untrusted server
Z Wang, X Pang, Y Chen, H Shao, Q Wang, L Wu, H Chen, H Qi
IEEE Transactions on Mobile Computing 18 (6), 1356-1367, 2018
EveDroid: Event-aware Android malware detection against model degrading for IoT devices
T Lei, Z Qin, Z Wang, Q Li, D Ye
IEEE Internet of Things Journal 6 (4), 6668-6680, 2019
CloudBI: Practical privacy-preserving outsourcing of biometric identification in the cloud
Q Wang, S Hu, K Ren, M He, M Du, Z Wang
Computer Security--ESORICS 2015: 20th European Symposium on Research iná…, 2015
Patternlistener: Cracking android pattern lock using acoustic signals
M Zhou, Q Wang, J Yang, Q Li, F Xiao, Z Wang, X Chen
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communicationsá…, 2018
A traffic adaptive multi-channel MAC protocol with dynamic slot allocation for WSNs
S Zhuo, Z Wang, YQ Song, Z Wang, L Almeida
IEEE transactions on mobile computing 15 (7), 1600-1613, 2015
Achieving location error tolerant barrier coverage for wireless sensor networks
Z Wang, H Chen, Q Cao, H Qi, Z Wang, Q Wang
Computer Networks 112, 314-328, 2017
Securing DV-Hop localization against wormhole attacks in wireless sensor networks
H Chen, W Lou, Z Wang, J Wu, Z Wang, A Xia
Pervasive and Mobile Computing 16, 22-35, 2015
Rain bar: Robust application-driven visual communication using color barcodes
Q Wang, M Zhou, K Ren, T Lei, J Li, Z Wang
2015 IEEE 35th International Conference on Distributed Computing Systemsá…, 2015
Towards privacy-preserving incentive for mobile crowdsensing under an untrusted platform
Z Wang, J Li, J Hu, J Ren, Z Li, Y Li
IEEE INFOCOM 2019-IEEE Conference on Computer Communications, 2053-2061, 2019
Pain-FL: Personalized privacy-preserving incentive for federated learning
P Sun, H Che, Z Wang, Y Wang, T Wang, L Wu, H Shao
IEEE Journal on Selected Areas in Communications 39 (12), 3805-3820, 2021
Towards personalized privacy-preserving incentive for truth discovery in mobile crowdsensing systems
P Sun, Z Wang, L Wu, Y Feng, X Pang, H Qi, Z Wang
IEEE Transactions on Mobile Computing 21 (1), 352-365, 2020
Towards a robust deep neural network in texts: A survey
W Wang, R Wang, L Wang, Z Wang, A Ye
arXiv preprint arXiv:1902.07285, 2019
The system can't perform the operation now. Try again later.
Articles 1–20