关注
Bangzhou Xin
Bangzhou Xin
在 mail.ustc.edu.cn 的电子邮件经过验证
标题
引用次数
引用次数
年份
Private fl-gan: Differential privacy synthetic data generation based on federated learning
B Xin, W Yang, Y Geng, S Chen, S Wang, L Huang
ICASSP 2020-2020 IEEE International Conference on Acoustics, Speech and …, 2020
972020
Efficient intrusion detection toward IoT networks using cloud–edge collaboration
R Yang, H He, Y Xu, B Xin, Y Wang, Y Qu, W Zhang
Computer Networks 228, 109724, 2023
272023
Federated synthetic data generation with differential privacy
B Xin, Y Geng, T Hu, S Chen, W Yang, S Wang, L Huang
Neurocomputing 468, 1-10, 2022
252022
Differentially private greedy decision forest
B Xin, W Yang, S Wang, L Huang
ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and …, 2019
192019
Tracking the insider attacker: A blockchain traceability system for insider threats
T Hu, B Xin, X Liu, T Chen, K Ding, X Zhang
Sensors 20 (18), 5297, 2020
152020
AFall: Wi-Fi-based device-free fall detection system using spatial angle of arrival
S Chen, W Yang, Y Xu, Y Geng, B Xin, L Huang
IEEE Transactions on Mobile Computing 22 (8), 4471-4484, 2022
122022
Unsupervised anomaly detection for container cloud via bilstm-based variational auto-encoder
Y Wang, X Chen, Q Wang, R Yang, B Xin
ICASSP 2022-2022 IEEE International Conference on Acoustics, Speech and …, 2022
112022
Shuffle differential private data aggregation for random population
S Wang, X Luo, Y Qian, Y Zhu, K Chen, Q Chen, B Xin, W Yang
IEEE Transactions on Parallel and Distributed Systems 34 (5), 1667-1681, 2023
82023
Sparse black-box inversion attack with limited information
Y Xu, X Liu, T Hu, B Xin, R Yang
ICASSP 2023-2023 IEEE International Conference on Acoustics, Speech and …, 2023
52023
DockerWatch: a two-phase hybrid detection of malware using various static features in container cloud
Y Wang, Q Wang, X Qin, X Chen, B Xin, R Yang
Soft Computing 27 (2), 1015-1031, 2023
52023
IBD: An Interpretable Backdoor-Detection Method via Multivariate Interactions
Y Xu, X Liu, K Ding, B Xin
Sensors 22 (22), 8697, 2022
12022
Efficient Intrusion Detection Towards Iot Networks Using Cloud-Edge Collaboration
H He, Y Xu, B Xin, Y Wang, Y Qu, W Zhang
1
Attack Detection Model for BCoT based on Contrastive Variational Autoencoder and Metric Learning
C Wu, X Liu, K Ding, B Xin, J Lu, J Liu, C Huang
2024
Cybersecurity entity recognition for blockchain of things via Hierarchical Attention Mechanism
C Wu, X Liu, K Ding, B Xin, J Lu, J Liu, C Huang
2024
RSBA: Robust Statistical Backdoor Attack under Privilege-Constrained Scenarios
X Liu, M Yi, K Ding, B Xin, Y Xu, L Yan, C Shen
arXiv preprint arXiv:2304.10985, 2023
2023
Private FLI: Anti-Gradient Leakage Recovery Data Privacy Architecture
H Wang, W Yang, B Xin, Y Geng, Z Shi, L Huang
2021 International Joint Conference on Neural Networks (IJCNN), 1-7, 2021
2021
系统目前无法执行此操作,请稍后再试。
文章 1–16