Private fl-gan: Differential privacy synthetic data generation based on federated learning B Xin, W Yang, Y Geng, S Chen, S Wang, L Huang ICASSP 2020-2020 IEEE International Conference on Acoustics, Speech and …, 2020 | 97 | 2020 |
Efficient intrusion detection toward IoT networks using cloud–edge collaboration R Yang, H He, Y Xu, B Xin, Y Wang, Y Qu, W Zhang Computer Networks 228, 109724, 2023 | 27 | 2023 |
Federated synthetic data generation with differential privacy B Xin, Y Geng, T Hu, S Chen, W Yang, S Wang, L Huang Neurocomputing 468, 1-10, 2022 | 25 | 2022 |
Differentially private greedy decision forest B Xin, W Yang, S Wang, L Huang ICASSP 2019-2019 IEEE International Conference on Acoustics, Speech and …, 2019 | 19 | 2019 |
Tracking the insider attacker: A blockchain traceability system for insider threats T Hu, B Xin, X Liu, T Chen, K Ding, X Zhang Sensors 20 (18), 5297, 2020 | 15 | 2020 |
AFall: Wi-Fi-based device-free fall detection system using spatial angle of arrival S Chen, W Yang, Y Xu, Y Geng, B Xin, L Huang IEEE Transactions on Mobile Computing 22 (8), 4471-4484, 2022 | 12 | 2022 |
Unsupervised anomaly detection for container cloud via bilstm-based variational auto-encoder Y Wang, X Chen, Q Wang, R Yang, B Xin ICASSP 2022-2022 IEEE International Conference on Acoustics, Speech and …, 2022 | 11 | 2022 |
Shuffle differential private data aggregation for random population S Wang, X Luo, Y Qian, Y Zhu, K Chen, Q Chen, B Xin, W Yang IEEE Transactions on Parallel and Distributed Systems 34 (5), 1667-1681, 2023 | 8 | 2023 |
Sparse black-box inversion attack with limited information Y Xu, X Liu, T Hu, B Xin, R Yang ICASSP 2023-2023 IEEE International Conference on Acoustics, Speech and …, 2023 | 5 | 2023 |
DockerWatch: a two-phase hybrid detection of malware using various static features in container cloud Y Wang, Q Wang, X Qin, X Chen, B Xin, R Yang Soft Computing 27 (2), 1015-1031, 2023 | 5 | 2023 |
IBD: An Interpretable Backdoor-Detection Method via Multivariate Interactions Y Xu, X Liu, K Ding, B Xin Sensors 22 (22), 8697, 2022 | 1 | 2022 |
Efficient Intrusion Detection Towards Iot Networks Using Cloud-Edge Collaboration H He, Y Xu, B Xin, Y Wang, Y Qu, W Zhang | 1 | |
Attack Detection Model for BCoT based on Contrastive Variational Autoencoder and Metric Learning C Wu, X Liu, K Ding, B Xin, J Lu, J Liu, C Huang | | 2024 |
Cybersecurity entity recognition for blockchain of things via Hierarchical Attention Mechanism C Wu, X Liu, K Ding, B Xin, J Lu, J Liu, C Huang | | 2024 |
RSBA: Robust Statistical Backdoor Attack under Privilege-Constrained Scenarios X Liu, M Yi, K Ding, B Xin, Y Xu, L Yan, C Shen arXiv preprint arXiv:2304.10985, 2023 | | 2023 |
Private FLI: Anti-Gradient Leakage Recovery Data Privacy Architecture H Wang, W Yang, B Xin, Y Geng, Z Shi, L Huang 2021 International Joint Conference on Neural Networks (IJCNN), 1-7, 2021 | | 2021 |