王滨

-
教授
博士生导师
研究生导师
- 性别:男
- 毕业院校:浙江大学
- 学历:研究生(博士后)
- 学位:博士学位
- 在职信息:在岗
- 所在单位:网络与信息安全学院、杭州研究院
- 学科:网络空间安全 密码学
- 电子邮箱:3f8a352a0355d09a48bfedb42318f6c2b9ce87fd593e68fbd3163c8893ad80253244d3147439d38b63f1566ba8aaabb626d8ea91cabe3631f4566bb0c1fa86d54c8cd776864396c48beee5b3093944d0e1f62a8127d6ba23cc9c9afc8206a64addb2873d6ff8088c06afaea5a8764fcc3b0d25d4e067879331c7f53e978bd4db
访问量:
-
[1] EI-MTD: Moving Target Defense for Edge Intelligence against Adversarial Attacks YAGUAN QIAN; YANKAI GUO; QIQI SHAO; JIAMINWANG; BIN WANG*; ZHAOQUAN GU; XIANG LING; CHUNMING WU ACM Transactions on Privacy and Security (TOPS) CCF-B, 2022, 25(3): 1-24.
-
[2] Hierarchical Threshold Pruning Based on Uniform Response Criterion Yaguan Qian; Zhiqiang He; Yuqi Wang; Bin Wang*; Xiang Ling; Zhaoquan Gu; Haijiang Wang; Shaoning Zeng; Wassim Swaileh IEEE Transactions on Neural Networks and Learning Systems (TNNLS) CCF-B, 2024, 35(8).
-
[3] LEA2: A Lightweight Ensemble Adversarial Attack via Non-overlapping Vulnerable Frequency Regions Yaguan Qian; Shuke He; Chenyu Zhao; Jiaqiang Sha; Wei Wang; Bin Wang International Conference on Computer Vision (ICCV-23) CCF-A, Paris, France, 2023-10-02 To 2023-10-06.
-
[4] Enhancing Transferability of Adversarial Examples through Mixed-Frequency Inputs Yaguan Qian; Kecheng Chen; Bin Wang; Zhaoquan Gu; Shouling Ji; Wei Wang; Yanchung Zhang IEEE Transactions on Information Forensics and Security (TIFS), 2024, accepted
-
[5] LEA2: A Lightweight Ensemble Adversarial Attack via Non-overlapping Vulnerable Frequency Regions, Yaguan Qian; Shuke He; Chenyu Zhao; Jiaqiang Sha; Wei Wang; Bin Wang,International Conference on Computer Vision (ICCV-23) CCF-A, Paris, France, 2023-10-02 To 2023-10-06.
-
[6] A Wolf in Sheep’s Clothing: Practical Black-box Adversarial Attacks for Evading Learning-based Windows Malware Detection in the Wild,Xiang Ling, Zhiyu Wu, Bin Wang*, Wei Deng, Jingzheng Wu*,Shouling Ji, Tianyue Luo, and Yanjun Wu,33rd USENIX Security Symposium.August 14–16, 2024 ? Philadelphia, PA, USA.
-
[7] Finding the PISTE: Towards Understanding Privacy Leaks in Vertical Federated Learning Systems,Xiangrui Xu, Wei Wang*, Zheng Chen, Bin Wang, Chao Li, Li Duan, Zhen Han, Yufei Han, IEEE Transactions on Dependable and Secure Computing (TDSC), 2024, accepted
-
[8] CoBA: Collusive Backdoor Attacks with Optimized Trigger to Federated Learning, Xiaoting Lyu, Yufei Han, Wei Wang*, Jingkai Liu, Bin Wang, Kai Chen, Yidong Li, Jiqiang Liu, Xiangliang Zhang,IEEE Transactions on Dependable and Secure Computing (TDSC),2024, accepted
-
[9] FairReward: Towards Fair Reward Distribution using Equity Theory in Blockchain-based Federated Learning,Guorong Chen, Chao Li, Wei Wang, Li Duan, Bin Wang, Zhen Han, Xiangliang Zhang, IEEE Transactions on Dependable and Secure Computing (TDSC),2024, accepted
-
[10] Robust Network Architecture Search via Feature Distortion Restraining Yaguan Qian; Shenghui Huang; Bin Wang*; Xiang Ling; Xiaohui Guan; Zhaoquan Gu; Shaoning Zeng; Wujie Zhou; Haijiang Wang European Conference on Computer Vision (ECCV-22) CCF-B, Tel Aviv, Israel, 2022-10-23 To 2022-10-27.
-
[11] Adversarial perturbation denoising utilizing common characteristics in deep feature space Huang, Jianchang; Dai, Yinyao; Lu, Fang; Wang, Bin; Gu, Zhaoquan; Zhou, Boyang; Qian, Yaguan* Applied Intelligence, 2024, 54(2): 1672-1690.
-
[12] Improving Adversarial Robustness of Medical Imaging Systems via Adding Global Attention Noise Yinyao Dai; Yaguan Qian*; Fang Lu; Bin Wang; Zhaoquan Gu; Wei Wang; Jian Wan; Yanchun Zhang Computers in Biology and Medicine, 2023, 164(2023).
-
[13] Towards Desirable Decision Boundary by Moderate-Margin Adversarial Training Xiaoyu Liang; Yaguan Qian*; Jianchang Huang; Xiang Ling; Bin Wang; Chunming Wu Pattern Recognition Letters, 2023, 173(2023): 30-37.
-
[14] 一种应用于文本分类的段落向量正向激励方法 钱亚冠; 方科彬; 康明; 顾钊铨; 潘俊; 王滨*; Wassim Swaileh 中文信息学报, 2023, 37(7).
-
[15] Object-free Backdoor Attack and Defense on Semantic Segmentation Jiaoze Mao; Yaguan Qian*; Jianchang Huang; Zejie Lian; Renhui Tao; Bin Wang; Wei Wang; Tengteng Yao Computers & Security CCF-B, 2023, 132(2023): 1-15.
-
[16] Adversarial training in logit space against tiny perturbations Guan, Xiaohui; Shao, Qiqi; Qian, Yaguan*; Yao, Tengteng; Wang, Bin Multimedia Systems, 2023.
-
[17] 面向边缘智能的两阶段对抗知识迁移方法 钱亚冠; 马骏; 何念念; 王滨*; 顾钊铨; 凌祥; Wassim Swaileh 软件学报, 2022, 33(12).
-
[18] GAAT: Group Adaptive Adversarial Training to Improve the Trade-Off between Robustness and Accuracy Yaguan Qian; Xiaoyu Liang; Ming Kang; Bin Wang*; Xin Wang; Zhaoquan Gu; Chunming Wu International Journal of Pattern Recognition and Artificial Intelligence, 2022, 36(13).
-
[19] Visually Imperceptible Adversarial Patch Attacks Yaguan Qian; Jiaming Wang; Haijiang Wang; Zhaoquan Gu; Bin Wang*; Shaoning Zeng; Wassim Swaileh Computers & Security CCF-B, 2022, 123(2022): 1-11.
-
[20] 基于剪枝技术和鲁棒蒸馏融合的轻量对抗攻击防御方法 王滨; 李思敏; 钱亚冠; 张君; 李超豪; 朱晨鸣; 张鸿飞 网络与信息安全学报, 2022, 1-8.