default search action
Zhibo Wang 0001
Person information
- affiliation: Zhejiang University, Hangzhou, China
Other persons with the same name
- Zhibo Wang — disambiguation page
- Zhibo Wang 0002 — East China University of Technology, Nanchang, China (and 1 more)
- Zhibo Wang 0003 — Tsinghua University, BNRist and School of Software, Beijing, China
- Zhibo Wang 0004 — Tsinghua University, Department of Electronic Engineering, Beijing, China
- Zhibo Wang 0005 — University of Toronto, Toronto, ON, Canada
- Zhibo Wang 0006 — Binghamton University, State University of New York, Binghamton, NY, USA
- Zhibo Wang 0007 — Guangdong University of Technology, Guangzhou, China (and 1 more)
- Zhibo Wang 0008 — Georgia State University, Atlanta, GA, USA
- Zhibo Wang 0009 — Beijing University of Posts and Telecommunications, Beijing, China
- Zhibo Wang 0010 — Jeonju University, Department of Graduate School of Artificial Intelligence, Artificial Intelligence Research Center, Jeonju-si, Korea
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j101]Peng Sun, Liantao Wu, Zhibo Wang, Jinfei Liu, Juan Luo, Wenqiang Jin:
A Profit-Maximizing Data Marketplace with Differentially Private Federated Learning under Price Competition. Proc. ACM Manag. Data 2(4): 191:1-191:27 (2024) - [j100]Zhibo Wang, Wenxin Liu, Jiahui Hu, Hengchang Guo, Zhan Qin, Jian Liu, Kui Ren:
Label-Free Poisoning Attack Against Deep Unsupervised Domain Adaptation. IEEE Trans. Dependable Secur. Comput. 21(4): 1572-1586 (2024) - [j99]Guodong Cao, Zhibo Wang, Yunhe Feng, Xiaowei Dong, Zhifei Zhang, Zhan Qin, Kui Ren:
Task-Free Fairness-Aware Bias Mitigation for Black-Box Deployed Models. IEEE Trans. Dependable Secur. Comput. 21(4): 3390-3405 (2024) - [j98]Xinyu Zhang, Huiyu Xu, Zhongjie Ba, Zhibo Wang, Yuan Hong, Jian Liu, Zhan Qin, Kui Ren:
PrivacyAsst: Safeguarding User Privacy in Tool-Using Large Language Model Agents. IEEE Trans. Dependable Secur. Comput. 21(6): 5242-5258 (2024) - [j97]Junjian Li, Honglong Chen, Peng Sun, Zhibo Wang, Zhichen Ni, Weifeng Liu:
Call White Black: Enhanced Image-Scaling Attack in Industrial Artificial Intelligence Systems. IEEE Trans. Ind. Informatics 20(4): 6222-6233 (2024) - [j96]Liantao Wu, Peng Sun, Zhibo Wang, Yanjun Li, Yang Yang:
Computation Offloading in Multi-Cell Networks With Collaborative Edge-Cloud Computing: A Game Theoretic Approach. IEEE Trans. Mob. Comput. 23(3): 2093-2106 (2024) - [j95]Zhibo Wang, Yunan Sun, Defang Liu, Jiahui Hu, Xiaoyi Pang, Yuke Hu, Kui Ren:
Location Privacy-Aware Task Offloading in Mobile Edge Computing. IEEE Trans. Mob. Comput. 23(3): 2269-2283 (2024) - [j94]Kai Lin, Honglong Chen, Na Yan, Zhichen Ni, Zhibo Wang, Jiguo Yu:
Double Polling-Based Tag Information Collection for Sensor-Augmented RFID Systems. IEEE Trans. Mob. Comput. 23(5): 3496-3509 (2024) - [j93]Jiahui Hu, Jiacheng Du, Zhibo Wang, Xiaoyi Pang, Yajie Zhou, Peng Sun, Kui Ren:
Does Differential Privacy Really Protect Federated Learning From Gradient Leakage Attacks? IEEE Trans. Mob. Comput. 23(12): 12635-12649 (2024) - [j92]Song Han, Hongxin Ding, Shuai Zhao, Siqi Ren, Zhibo Wang, Jianhong Lin, Shuhao Zhou:
Practical and Robust Federated Learning With Highly Scalable Regression Training. IEEE Trans. Neural Networks Learn. Syst. 35(10): 13801-13815 (2024) - [j91]Jiahui Hu, Zhibo Wang, Yongsheng Shen, Bohan Lin, Peng Sun, Xiaoyi Pang, Jian Liu, Kui Ren:
Shield Against Gradient Leakage Attacks: Adaptive Privacy-Preserving Federated Learning. IEEE/ACM Trans. Netw. 32(2): 1407-1422 (2024) - [j90]Xiaoyi Pang, Jiahui Hu, Peng Sun, Ju Ren, Zhibo Wang:
When Federated Learning Meets Knowledge Distillation. IEEE Wirel. Commun. 31(5): 208-214 (2024) - [c62]Yudong Gao, Honglong Chen, Peng Sun, Junjian Li, Anqing Zhang, Zhibo Wang, Weifeng Liu:
A Dual Stealthy Backdoor: From Both Spatial and Frequency Perspectives. AAAI 2024: 1851-1859 - [c61]Zhixuan Chu, Yan Wang, Longfei Li, Zhibo Wang, Zhan Qin, Kui Ren:
A Causal Explainable Guardrails for Large Language Models. CCS 2024: 1136-1150 - [c60]Zhongjie Ba, Jieming Zhong, Jiachen Lei, Peng Cheng, Qinglong Wang, Zhan Qin, Zhibo Wang, Kui Ren:
SurrogatePrompt: Bypassing the Safety Filter of Text-to-Image Models via Substitution. CCS 2024: 1166-1180 - [c59]Huiyu Xu, Yaopeng Wang, Zhibo Wang, Zhongjie Ba, Wenxin Liu, Lu Jin, Haiqin Weng, Tao Wei, Kui Ren:
ProFake: Detecting Deepfakes in the Wild against Quality Degradation with Progressive Quality-adaptive Learning. CCS 2024: 2207-2221 - [c58]Zhibo Wang, Zhiwei Chang, Jiahui Hu, Xiaoyi Pang, Jiacheng Du, Yongle Chen, Kui Ren:
Breaking Secure Aggregation: Label Leakage from Aggregated Gradients in Federated Learning. INFOCOM 2024: 151-160 - [c57]Yajie Zhou, Xiaoyi Pang, Zhibo Wang, Jiahui Hu, Peng Sun, Kui Ren:
Towards Efficient Asynchronous Federated Learning in Heterogeneous Edge Environments. INFOCOM 2024: 2448-2457 - [c56]Guodong Cao, Zhibo Wang, Yunhe Feng, Xiaowei Dong:
DAAP: Privacy-Preserving Model Accuracy Estimation on Unlabeled Datasets Through Distribution-Aware Adversarial Perturbation. USENIX Security Symposium 2024 - [c55]Shuaifan Jin, He Wang, Zhibo Wang, Feng Xiao, Jiahui Hu, Yuan He, Wenwen Zhang, Zhongjie Ba, Weijie Fang, Shuhong Yuan, Kui Ren:
FaceObfuscator: Defending Deep Learning-based Privacy Attacks with Gradient Descent-resistant Features in Face Recognition. USENIX Security Symposium 2024 - [i24]Jiacheng Du, Jiahui Hu, Zhibo Wang, Peng Sun, Neil Zhenqiang Gong, Kui Ren:
SoK: Gradient Leakage in Federated Learning. CoRR abs/2404.05403 (2024) - [i23]Zhixuan Chu, Yan Wang, Longfei Li, Zhibo Wang, Zhan Qin, Kui Ren:
A Causal Explainable Guardrails for Large Language Models. CoRR abs/2405.04160 (2024) - [i22]Zhixuan Chu, Lei Zhang, Yichen Sun, Siqiao Xue, Zhibo Wang, Zhan Qin, Kui Ren:
Sora Detector: A Unified Hallucination Detection for Large Text-to-Video Models. CoRR abs/2405.04180 (2024) - [i21]Zhibo Wang, Peng Kuang, Zhixuan Chu, Jingyi Wang, Kui Ren:
Towards Real World Debiasing: A Fine-grained Analysis On Spurious Correlation. CoRR abs/2405.15240 (2024) - [i20]Jiacheng Du, Zhibo Wang, Kui Ren:
Textual Unlearning Gives a False Sense of Unlearning. CoRR abs/2406.13348 (2024) - [i19]Zhibo Wang, Zhiwei Chang, Jiahui Hu, Xiaoyi Pang, Jiacheng Du, Yongle Chen, Kui Ren:
Breaking Secure Aggregation: Label Leakage from Aggregated Gradients in Federated Learning. CoRR abs/2406.15731 (2024) - [i18]Huiyu Xu, Wenhui Zhang, Zhibo Wang, Feng Xiao, Rui Zheng, Yunhe Feng, Zhongjie Ba, Kui Ren:
RedAgent: Red Teaming Large Language Models with Context-aware Autonomous Language Agent. CoRR abs/2407.16667 (2024) - [i17]Cheng Wei, Yang Wang, Kuofeng Gao, Shuo Shao, Yiming Li, Zhibo Wang, Zhan Qin:
PointNCBW: Towards Dataset Ownership Verification for Point Clouds via Negative Clean-label Backdoor Watermark. CoRR abs/2408.05500 (2024) - 2023
- [j89]Zhibo Wang, Jingjing Ma, Xue Wang, Jiahui Hu, Zhan Qin, Kui Ren:
Threats to Training: A Survey of Poisoning Attacks and Defenses on Machine Learning Systems. ACM Comput. Surv. 55(7): 134:1-134:36 (2023) - [j88]Meng Chen, Li Lu, Junhao Wang, Jiadi Yu, Yingying Chen, Zhibo Wang, Zhongjie Ba, Feng Lin, Kui Ren:
VoiceCloak: Adversarial Example Enabled Voice De-Identification with Balanced Privacy and Utility. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 7(2): 48:1-48:21 (2023) - [j87]Guoqi Ma, Honglong Chen, Yang Huang, Wentao Wei, Xiang Liu, Zhibo Wang:
Utility-Based Heterogeneous User Recruitment of Multitask in Mobile Crowdsensing. IEEE Internet Things J. 10(11): 9796-9808 (2023) - [j86]Dan Wang, Ju Ren, Zhibo Wang, Yichuan Wang, Yaoxue Zhang:
PrivAim: A Dual-Privacy Preserving and Quality-Aware Incentive Mechanism for Federated Learning. IEEE Trans. Computers 72(7): 1913-1927 (2023) - [j85]Xiaoyi Pang, Zhibo Wang, Zeqing He, Peng Sun, Meng Luo, Ju Ren, Kui Ren:
Towards Class-Balanced Privacy Preserving Heterogeneous Model Aggregation. IEEE Trans. Dependable Secur. Comput. 20(3): 2421-2432 (2023) - [j84]Zhibo Wang, Yuting Huang, Mengkai Song, Libing Wu, Feng Xue, Kui Ren:
Poisoning-Assisted Property Inference Attack Against Federated Learning. IEEE Trans. Dependable Secur. Comput. 20(4): 3328-3340 (2023) - [j83]Wenqi Wang, Run Wang, Lina Wang, Zhibo Wang, Aoshuang Ye:
Towards a Robust Deep Neural Network Against Adversarial Texts: A Survey. IEEE Trans. Knowl. Data Eng. 35(3): 3159-3179 (2023) - [j82]Zhibo Wang, Jingxin Li, Jiahui Hu, Ju Ren, Qian Wang, Zhetao Li, Yanjun Li:
Towards Privacy-Driven Truthful Incentives for Mobile Crowdsensing Under Untrusted Platform. IEEE Trans. Mob. Comput. 22(2): 1198-1212 (2023) - [j81]Liantao Wu, Peng Sun, Zhibo Wang, Yang Yang, Zhi Wang:
Temporal Correlation Enhanced Multiuser Detection for Uplink Grant-Free NOMA. IEEE Trans. Mob. Comput. 22(4): 2446-2457 (2023) - [c54]Defang Liu, Zhibo Wang, Xiaoyi Pang, Yunan Sun, Jiahui Hu, Peng Sun, Yuke Hu:
Towards Efficient Edge Learning for Large Models in Heterogeneous Resource-limited Environments. BIGCOM 2023: 223-230 - [c53]Zhibo Wang, He Wang, Shuaifan Jin, Wenwen Zhang, Jiahui Hu, Yan Wang, Peng Sun, Wei Yuan, Kaixin Liu, Kui Ren:
Privacy-preserving Adversarial Facial Features. CVPR 2023: 8212-8221 - [c52]Zhibo Wang, Hongshan Yang, Yunhe Feng, Peng Sun, Hengchang Guo, Zhifei Zhang, Kui Ren:
Towards Transferable Targeted Adversarial Examples. CVPR 2023: 20534-20543 - [c51]Xue Wang, Zhibo Wang, Haiqin Weng, Hengchang Guo, Zhifei Zhang, Lu Jin, Tao Wei, Kui Ren:
Counterfactual-based Saliency Map: Towards Visual Contrastive Explanations for Neural Networks. ICCV 2023: 2042-2051 - [c50]Lei Zhang, Zhibo Wang, Xiaowei Dong, Yunhe Feng, Xiaoyi Pang, Zhifei Zhang, Kui Ren:
Towards Fairness-aware Adversarial Network Pruning. ICCV 2023: 5145-5154 - [c49]Yuheng Yang, Haipeng Chen, Zhenguang Liu, Yingda Lyu, Beibei Zhang, Shuang Wu, Zhibo Wang, Kui Ren:
Action Recognition with Multi-stream Motion Modeling and Mutual Information Maximization. IJCAI 2023: 1658-1666 - [c48]Feng Lin, Kaiqiang Fu, Hao Luo, Ziyue Zhan, Zhibo Wang, Zhenguang Liu, Lorenzo Cavallaro, Kui Ren:
Cross-Modal and Multi-Attribute Face Recognition: A Benchmark. ACM Multimedia 2023: 271-279 - [c47]Chao Shuai, Jieming Zhong, Shuang Wu, Feng Lin, Zhibo Wang, Zhongjie Ba, Zhenguang Liu, Lorenzo Cavallaro, Kui Ren:
Locate and Verify: A Two-Stream Network for Improved Deepfake Detection. ACM Multimedia 2023: 7131-7142 - [c46]Kun Pan, Yifang Yin, Yao Wei, Feng Lin, Zhongjie Ba, Zhenguang Liu, Zhibo Wang, Lorenzo Cavallaro, Kui Ren:
DFIL: Deepfake Incremental Learning by Exploiting Domain-invariant Forgery Clues. ACM Multimedia 2023: 8035-8046 - [c45]Pengyun Zhu, Long Wen, Jinfei Liu, Feng Xue, Jian Lou, Zhibo Wang, Kui Ren:
CAPP-130: A Corpus of Chinese Application Privacy Policy Summarization and Interpretation. NeurIPS 2023 - [i16]Zhibo Wang, He Wang, Shuaifan Jin, Wenwen Zhang, Jiahui Hu, Yan Wang, Peng Sun, Wei Yuan, Kaixin Liu, Kui Ren:
Privacy-preserving Adversarial Facial Features. CoRR abs/2305.05391 (2023) - [i15]Yuheng Yang, Haipeng Chen, Zhenguang Liu, Yingda Lyu, Beibei Zhang, Shuang Wu, Zhibo Wang, Kui Ren:
Action Recognition with Multi-stream Motion Modeling and Mutual Information Maximization. CoRR abs/2306.07576 (2023) - [i14]Yudong Gao, Honglong Chen, Peng Sun, Junjian Li, Anqing Zhang, Zhibo Wang:
A Dual Stealthy Backdoor: From Both Spatial and Frequency Perspectives. CoRR abs/2307.10184 (2023) - [i13]Kun Pan, Yifang Yin, Yao Wei, Feng Lin, Zhongjie Ba, Zhenguang Liu, Zhibo Wang, Lorenzo Cavallaro, Kui Ren:
DFIL: Deepfake Incremental Learning by Exploiting Domain-invariant Forgery Clues. CoRR abs/2309.09526 (2023) - [i12]Chao Shuai, Jieming Zhong, Shuang Wu, Feng Lin, Zhibo Wang, Zhongjie Ba, Zhenguang Liu, Lorenzo Cavallaro, Kui Ren:
Locate and Verify: A Two-Stream Network for Improved Deepfake Detection. CoRR abs/2309.11131 (2023) - [i11]Zhongjie Ba, Jieming Zhong, Jiachen Lei, Peng Cheng, Qinglong Wang, Zhan Qin, Zhibo Wang, Kui Ren:
SurrogatePrompt: Bypassing the Safety Filter of Text-To-Image Models via Substitution. CoRR abs/2309.14122 (2023) - [i10]Yulong Yang, Chenhao Lin, Xiang Ji, Qiwei Tian, Qian Li, Hongshan Yang, Zhibo Wang, Chao Shen:
Towards Deep Learning Models Resistant to Transfer-based Adversarial Attacks via Data-centric Robust Learning. CoRR abs/2310.09891 (2023) - 2022
- [j80]Xuyang Ding, Ruizhao Lv, Xiaoyi Pang, Jiahui Hu, Zhibo Wang, Xu Yang, Xiong Li:
Privacy-preserving task allocation for edge computing-based mobile crowdsensing. Comput. Electr. Eng. 97: 107528 (2022) - [j79]Zhibo Wang, Defang Liu, Yunan Sun, Xiaoyi Pang, Peng Sun, Feng Lin, John C. S. Lui, Kui Ren:
A Survey on IoT-Enabled Home Automation Systems: Attacks and Defenses. IEEE Commun. Surv. Tutorials 24(4): 2292-2328 (2022) - [j78]Dan Wang, Ju Ren, Zhibo Wang, Yaoxue Zhang, Xuemin (Sherman) Shen:
PrivStream: A privacy-preserving inference framework on IoT streaming data at the edge. Inf. Fusion 80: 282-294 (2022) - [j77]Honglong Chen, Xin Ai, Kai Lin, Na Yan, Zhibo Wang, Nan Jiang, Jiguo Yu:
DAP: Efficient Detection Against Probabilistic Cloning Attacks in Anonymous RFID Systems. IEEE Trans. Ind. Informatics 18(1): 345-355 (2022) - [j76]Yang Huang, Honglong Chen, Guoqi Ma, Kai Lin, Zhichen Ni, Na Yan, Zhibo Wang:
OPAT: Optimized Allocation of Time-Dependent Tasks for Mobile Crowdsensing. IEEE Trans. Ind. Informatics 18(4): 2476-2485 (2022) - [j75]Ben Niu, Yahong Chen, Zhibo Wang, Fenghua Li, Boyang Wang, Hui Li:
Eclipse: Preserving Differential Location Privacy Against Long-Term Observation Attacks. IEEE Trans. Mob. Comput. 21(1): 125-138 (2022) - [j74]Peng Sun, Zhibo Wang, Liantao Wu, Yunhe Feng, Xiaoyi Pang, Hairong Qi, Zhi Wang:
Towards Personalized Privacy-Preserving Incentive for Truth Discovery in Mobile Crowdsensing Systems. IEEE Trans. Mob. Comput. 21(1): 352-365 (2022) - [j73]Zhibo Wang, Tengda Zhao, Jinxin Ma, Hongkai Chen, Kaixin Liu, Huajie Shao, Qian Wang, Ju Ren:
Hear Sign Language: A Real-Time End-to-End Sign Language Recognition System. IEEE Trans. Mob. Comput. 21(7): 2398-2410 (2022) - [j72]Dan Wang, Ju Ren, Zhibo Wang, Xiaoyi Pang, Yaoxue Zhang, Xuemin Shen:
Privacy-Preserving Streaming Truth Discovery in Crowdsourcing With Differential Privacy. IEEE Trans. Mob. Comput. 21(10): 3757-3772 (2022) - [j71]Xiaoyi Pang, Zhibo Wang, Defang Liu, John C. S. Lui, Qian Wang, Ju Ren:
Towards Personalized Privacy-Preserving Truth Discovery Over Crowdsourced Data Streams. IEEE/ACM Trans. Netw. 30(1): 327-340 (2022) - [j70]Liantao Wu, Zhibo Wang, Peng Sun, Yang Yang:
Temporal Correlation Enhanced Sparse Activity Detection in MIMO Enabled Grant-Free NOMA. IEEE Trans. Veh. Technol. 71(3): 2887-2899 (2022) - [c44]Zhibo Wang, Xiaowei Dong, Henry Xue, Zhifei Zhang, Weifeng Chiu, Tao Wei, Kui Ren:
Fairness-aware Adversarial Perturbation Towards Bias Mitigation for Deployed Deep Models. CVPR 2022: 10369-10378 - [c43]Xiaoyi Pang, Zhibo Wang, Jingxin Li, Ruiting Zhou, Ju Ren, Zhetao Li:
Towards Online Privacy-preserving Computation Offloading in Mobile Edge Computing. INFOCOM 2022: 1179-1188 - [c42]Ju Ren, Jiani Liu, Yongmin Zhang, Zhaohui Li, Feng Lyu, Zhibo Wang, Yaoxue Zhang:
An Efficient Two-Layer Task Offloading Scheme for MEC System with Multiple Services Providers. INFOCOM 2022: 1519-1528 - [c41]Chao Wang, Feng Lin, Tiantian Liu, Kaidi Zheng, Zhibo Wang, Zhengxiong Li, Ming-Chun Huang, Wenyao Xu, Kui Ren:
mmEve: eavesdropping on smartphone's earpiece via COTS mmWave device. MobiCom 2022: 338-351 - [c40]Qianniu Chen, Meng Chen, Li Lu, Jiadi Yu, Yingying Chen, Zhibo Wang, Zhongjie Ba, Feng Lin, Kui Ren:
Push the Limit of Adversarial Example Attack on Speaker Recognition in Physical Domain. SenSys 2022: 710-724 - [c39]Rui Zhang, Jian Liu, Yuan Ding, Zhibo Wang, Qingbiao Wu, Kui Ren:
"Adversarial Examples" for Proof-of-Learning. SP 2022: 1408-1422 - [i9]Zhibo Wang, Xiaowei Dong, Henry Xue, Zhifei Zhang, Weifeng Chiu, Tao Wei, Kui Ren:
Fairness-aware Adversarial Perturbation Towards Bias Mitigation for Deployed Deep Models. CoRR abs/2203.01584 (2022) - [i8]Guodong Cao, Zhibo Wang, Xiaowei Dong, Zhifei Zhang, Hengchang Guo, Zhan Qin, Kui Ren:
Vanilla Feature Distillation for Improving the Accuracy-Robustness Trade-Off in Adversarial Training. CoRR abs/2206.02158 (2022) - 2021
- [j69]Kun Wang, Zhibo Wang, Ye-Qiong Song, Dejun Yang, Shibo He, Wei Wang:
IEEE Access Special Section Editorial: Toward Smart Cities With IoT Based on Crowdsensing. IEEE Access 9: 118606-118609 (2021) - [j68]Dai Shi, Dan Tao, Jiangtao Wang, Muyan Yao, Zhibo Wang, Houjin Chen, Sumi Helal:
Fine-Grained and Context-Aware Behavioral Biometrics for Pattern Lock on Smartphones. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 5(1): 33:1-33:30 (2021) - [j67]Liantao Wu, Peng Sun, Zhibo Wang, Yang Yang:
Joint User Activity Identification and Channel Estimation for Grant-Free NOMA: A Spatial-Temporal Structure-Enhanced Approach. IEEE Internet Things J. 8(15): 12339-12349 (2021) - [j66]Peng Sun, Haoxuan Che, Zhibo Wang, Yuwei Wang, Tao Wang, Liantao Wu, Huajie Shao:
Pain-FL: Personalized Privacy-Preserving Incentive for Federated Learning. IEEE J. Sel. Areas Commun. 39(12): 3805-3820 (2021) - [j65]Xiaofeng Su, Yanjun Li, Meihui Gao, Zhibo Wang, Yinglong Li, Yi-hua Zhu:
Online policies for throughput maximization of backscatter assisted wireless powered communication via reinforcement learning approaches. Pervasive Mob. Comput. 77: 101463 (2021) - [j64]Hongliang Bi, Jian Zhang, Yanjiao Chen, Chaoyang Zhou, Zhibo Wang:
Magic-hand: Turn a smartwatch into a mouse. Pervasive Mob. Comput. 78: 101487 (2021) - [j63]Huajie Shao, Dachun Sun, Shuochao Yao, Lu Su, Zhibo Wang, Dongxin Liu, Shengzhong Liu, Lance M. Kaplan, Tarek F. Abdelzaher:
Truth Discovery With Multi-Modal Data in Social Sensing. IEEE Trans. Computers 70(9): 1325-1337 (2021) - [j62]Zhibo Wang, Mengkai Song, Siyan Zheng, Zhifei Zhang, Yang Song, Qian Wang:
Invisible Adversarial Attack against Deep Neural Networks: An Adaptive Penalization Approach. IEEE Trans. Dependable Secur. Comput. 18(3): 1474-1488 (2021) - [j61]Shengshan Hu, Chengjun Cai, Qian Wang, Cong Wang, Zhibo Wang, Dengpan Ye:
Augmenting Encrypted Search: A Decentralized Service Realization with Enforced Execution. IEEE Trans. Dependable Secur. Comput. 18(6): 2569-2581 (2021) - [j60]Xin Ai, Honglong Chen, Kai Lin, Zhibo Wang, Jiguo Yu:
Nowhere to Hide: Efficiently Identifying Probabilistic Cloning Attacks in Large-Scale RFID Systems. IEEE Trans. Inf. Forensics Secur. 16: 714-727 (2021) - [j59]Man Zhou, Qian Wang, Jingxiao Yang, Qi Li, Peipei Jiang, Yanjiao Chen, Zhibo Wang:
Stealing Your Android Patterns via Acoustic Signals. IEEE Trans. Mob. Comput. 20(4): 1656-1671 (2021) - [j58]Zhibo Wang, Yuting Huang, Xinkai Wang, Ju Ren, Qian Wang, Libing Wu:
SocialRecruiter: Dynamic Incentive Mechanism for Mobile Crowdsourcing Worker Recruitment With Social Networks. IEEE Trans. Mob. Comput. 20(5): 2055-2066 (2021) - [j57]Zhibo Wang, Jing Zhao, Jiahui Hu, Tianqing Zhu, Qian Wang, Ju Ren, Chao Li:
Towards Personalized Task-Oriented Worker Recruitment in Mobile Crowdsensing. IEEE Trans. Mob. Comput. 20(5): 2080-2093 (2021) - [j56]Peng Sun, Zhibo Wang, Liantao Wu, Huajie Shao, Hairong Qi, Zhi Wang:
Trustworthy and Cost-Effective Cell Selection for Sparse Mobile Crowdsensing Systems. IEEE Trans. Veh. Technol. 70(6): 6108-6121 (2021) - [c38]Zhibo Wang, Hengchang Guo, Zhifei Zhang, Wenxin Liu, Zhan Qin, Kui Ren:
Feature Importance-aware Transferable Adversarial Attacks. ICCV 2021: 7619-7628 - [c37]Ruiting Zhou, Jinlong Pang, Zhibo Wang, John C. S. Lui, Zongpeng Li:
A Truthful Procurement Auction for Incentivizing Heterogeneous Clients in Federated Learning. ICDCS 2021: 183-193 - [c36]Ben Niu, Yahong Chen, Boyang Wang, Zhibo Wang, Fenghua Li, Jin Cao:
AdaPDP: Adaptive Personalized Differential Privacy. INFOCOM 2021: 1-10 - [i7]Zhibo Wang, Hengchang Guo, Zhifei Zhang, Wenxin Liu, Zhan Qin, Kui Ren:
Feature Importance-aware Transferable Adversarial Attacks. CoRR abs/2107.14185 (2021) - 2020
- [j55]Honglong Chen, Yuting Qin, Kai Lin, Yingxin Luan, Zhibo Wang, Jiguo Yu, Yanjun Li:
PWEND: Proactive wakeup based energy-efficient neighbor discovery for mobile sensor networks. Ad Hoc Networks 107: 102247 (2020) - [j54]Xiaoyi Pang, Dengfeng Guo, Zhibo Wang, Peng Sun, Liqiang Zhang:
Towards fair and efficient task allocation in blockchain-based crowdsourcing. CCF Trans. Netw. 3(3-4): 193-204 (2020) - [j53]Zhetao Li, Wenlin Li, Fuyuan Lin, Yi Sun, Min Yang, Yuan Zhang, Zhibo Wang:
Hybrid malware detection approach with feedback-directed machine learning. Sci. China Inf. Sci. 63(3) (2020) - [j52]Peng Sun, Liantao Wu, Zhibo Wang, Yunhe Feng, Zhi Wang:
SCRA: Structured Compressive Random Access for Efficient Information Collection in IoT. IEEE Internet Things J. 7(3): 2356-2367 (2020) - [j51]Liantao Wu, Peng Sun, Zhibo Wang, Yang Yang, Zhi Wang:
Toward Efficient Compressed-Sensing-Based RFID Identification: A Sparsity-Controlled Approach. IEEE Internet Things J. 7(8): 7714-7724 (2020) - [j50]Mengkai Song, Zhibo Wang, Zhifei Zhang, Yang Song, Qian Wang, Ju Ren, Hairong Qi:
Analyzing User-Level Privacy Attack Against Federated Learning. IEEE J. Sel. Areas Commun. 38(10): 2430-2444 (2020) - [j49]Feng Xia, Jinzhong Wang, Xiangjie Kong, Da Zhang, Zhibo Wang:
Ranking Station Importance With Human Mobility Patterns Using Subway Network Datasets. IEEE Trans. Intell. Transp. Syst. 21(7): 2840-2852 (2020) - [j48]Run Wang, Zhibo Wang, Benxiao Tang, Lei Zhao, Lina Wang:
SmartPI: Understanding Permission Implications of Android Apps from User Reviews. IEEE Trans. Mob. Comput. 19(12): 2933-2945 (2020) - [j47]Yunhe Feng, Zheng Lu, Wenjun Zhou, Zhibo Wang, Qing Cao:
New Emoji Requests from Twitter Users: When, Where, Why, and What We Can Do About Them. ACM Trans. Soc. Comput. 3(2): 8:1-8:25 (2020) - [j46]Youhua Xia, Libing Wu, Zhibo Wang, Xi Zheng, Jiong Jin:
Cluster-Enabled Cooperative Scheduling Based on Reinforcement Learning for High-Mobility Vehicular Networks. IEEE Trans. Veh. Technol. 69(11): 12664-12678 (2020) - [j45]Jiahui Hu, Zhibo Wang, Jian Wei, Ruizhao Lv, Jing Zhao, Qian Wang, Honglong Chen, Dejun Yang:
Towards Demand-Driven Dynamic Incentive for Mobile Crowdsensing Systems. IEEE Trans. Wirel. Commun. 19(7): 4907-4918 (2020) - [c35]Zhibo Wang, Jinxin Ma, Yongquan Zhang, Qian Wang, Ju Ren, Peng Sun:
Attention-over-Attention Field-Aware Factorization Machine. AAAI 2020: 6323-6330 - [c34]Xuhui Zhang, Feilong Tang, Lijun Cao, Long Chen, Jiadi Yu, Wenchao Xu, Xingjun Zhang, Jianjun Lei, Zhibo Wang:
Dynamical Controller Placement Among SDN Space-Terrestrial Integrated Networks. HPCC/DSS/SmartCity 2020: 352-359 - [c33]Zhibo Wang, Wenxin Liu, Xiaoyi Pang, Ju Ren, Zhe Liu, Yongle Chen:
Towards Pattern-aware Privacy-preserving Real-time Data Collection. INFOCOM 2020: 109-118 - [c32]Peng Sun, Zhibo Wang, Yunhe Feng, Liantao Wu, Yanjun Li, Hairong Qi, Zhi Wang:
Towards Personalized Privacy-Preserving Incentive for Truth Discovery in Crowdsourced Binary-Choice Question Answering. INFOCOM 2020: 1133-1142 - [c31]Zhibo Wang, Hengchang Guo, Zhifei Zhang, Mengkai Song, Siyan Zheng, Qian Wang, Ben Niu:
Towards compression-resistant privacy-preserving photo sharing on social networks. MobiHoc 2020: 81-90 - [c30]Xuyang Ding, Feng Xiao, Man Zhou, Zhibo Wang:
Active Link Obfuscation to Thwart Link-flooding Attacks for Internet of Things. TrustCom 2020: 217-224 - [i6]Minghui Li, Sherman S. M. Chow, Shengshan Hu, Yuejing Yan, Minxin Du, Zhibo Wang:
Optimizing Privacy-Preserving Outsourced Convolutional Neural Network Predictions. CoRR abs/2002.10944 (2020)
2010 – 2019
- 2019
- [j44]Zhibo Wang, Jiahui Hu, Qian Wang, Ruizhao Lv, Jian Wei, Honglong Chen, Xiaoguang Niu:
Task-Bundling-Based Incentive for Location-Dependent Mobile Crowdsourcing. IEEE Commun. Mag. 57(2): 54-59 (2019) - [j43]Zhibo Wang, Jiahui Hu, Qian Wang, Ruizhao Lv, Jian Wei, Honglong Chen, Xiaoguang Niu:
Task Bundling Based Incentive for Location-Dependent Mobile Crowdsourcing. IEEE Commun. Mag. 57(3): 132-137 (2019) - [j42]Zhibo Wang, Xiaoyi Pang, Jiahui Hu, Wenxin Liu, Qian Wang, Yanjun Li, Honglong Chen:
When Mobile Crowdsensing Meets Privacy. IEEE Commun. Mag. 57(9): 72-78 (2019) - [j41]Peng Sun, Zhi Tian, Zhibo Wang, Zhi Wang:
PRSS: A Prejudiced Random Sensing Strategy for Energy-Efficient Information Collection in the Internet of Things. IEEE Internet Things J. 6(2): 2717-2728 (2019) - [j40]Yanjun Li, Yuzhe Chen, Chung Shue Chen, Zhibo Wang, Yi-hua Zhu:
Simultaneous Sensor Placement and Scheduling for Fusion-Based Detection in RF-Powered Sensor Networks. IEEE Internet Things J. 6(3): 5595-5606 (2019) - [j39]Tao Lei, Zhan Qin, Zhibo Wang, Qi Li, Dengpan Ye:
EveDroid: Event-Aware Android Malware Detection Against Model Degrading for IoT Devices. IEEE Internet Things J. 6(4): 6668-6680 (2019) - [j38]Zhibo Wang, Yijie Li, Bonan Jin, Qian Wang, Yunhe Feng, Yanjun Li, Huajie Shao:
AirMouse: Turning a Pair of Glasses Into a Mouse in the Air. IEEE Internet Things J. 6(5): 7473-7483 (2019) - [j37]Xuxin Zhang, Honglong Chen, Kai Lin, Zhibo Wang, Jiguo Yu, Leyi Shi:
RMTS: A robust clock synchronization scheme for wireless sensor networks. J. Netw. Comput. Appl. 135: 1-10 (2019) - [j36]Jie Shen, Ming Yin, Ji-An Luo, Zhibo Wang, Zhi Wang, Zhen-Hui Li:
An Energy Efficient Synchronization Protocol for Target Tracking in Wireless Sensor Array Networks. Sensors 19(6): 1367 (2019) - [j35]Zhibo Wang, Jiahui Hu, Ruizhao Lv, Jian Wei, Qian Wang, Dejun Yang, Hairong Qi:
Personalized Privacy-Preserving Task Allocation for Mobile Crowdsensing. IEEE Trans. Mob. Comput. 18(6): 1330-1341 (2019) - [j34]Zhibo Wang, Xiaoyi Pang, Yahong Chen, Huajie Shao, Qian Wang, Libing Wu, Honglong Chen, Hairong Qi:
Privacy-Preserving Crowd-Sourced Statistical Data Publishing with An Untrusted Server. IEEE Trans. Mob. Comput. 18(6): 1356-1367 (2019) - [c29]Huajie Shao, Shuochao Yao, Yiran Zhao, Lu Su, Zhibo Wang, Dongxin Liu, Shengzhong Liu, Lance M. Kaplan, Tarek F. Abdelzaher:
Unsupervised Fact-finding with Multi-modal Data in Social Sensing. FUSION 2019: 1-8 - [c28]Dan Wang, Ju Ren, Chugui Xu, Juncheng Liu, Zhibo Wang, Yaoxue Zhang, Xuemin Shen:
PrivStream: Enabling Privacy-Preserving Inferences on IoT Data Stream at the Edge. HPCC/SmartCity/DSS 2019: 1290-1297 - [c27]Zhibo Wang, Siyan Zheng, Mengkai Song, Qian Wang, Alireza Rahimpour, Hairong Qi:
advPattern: Physical-World Attacks on Deep Person Re-Identification via Adversarially Transformable Patterns. ICCV 2019: 8340-8349 - [c26]Zhibo Wang, Jingxin Li, Jiahui Hu, Ju Ren, Zhetao Li, Yanjun Li:
Towards Privacy-preserving Incentive for Mobile Crowdsensing Under An Untrusted Platform. INFOCOM 2019: 2053-2061 - [c25]Zhibo Wang, Mengkai Song, Zhifei Zhang, Yang Song, Qian Wang, Hairong Qi:
Beyond Inferring Class Representatives: User-Level Privacy Leakage From Federated Learning. INFOCOM 2019: 2512-2520 - [c24]Yunhe Feng, Wenjun Zhou, Zheng Lu, Zhibo Wang, Qing Cao:
The World Wants Mangoes and Kangaroos: A Study of New Emoji Requests Based on Thirty Million Tweets. WWW 2019: 2722-2728 - [i5]Zhibo Wang, Siyan Zheng, Mengkai Song, Qian Wang, Alireza Rahimpour, Hairong Qi:
advPattern: Physical-World Attacks on Deep Person Re-Identification via Adversarially Transformable Patterns. CoRR abs/1908.09327 (2019) - [i4]Shengshan Hu, Chengjun Cai, Qian Wang, Cong Wang, Minghui Li, Zhibo Wang, Dengpan Ye:
Augmenting Encrypted Search: A Decentralized Service Realization with Enforced Execution. CoRR abs/1909.09472 (2019) - 2018
- [j33]Libing Wu, Youhua Xia, Zhibo Wang, Hao Wang:
Be Stable and Fair: Robust Data Scheduling for Vehicular Networks. IEEE Access 6: 32839-32849 (2018) - [j32]Peng Sun, Liantao Wu, Zhibo Wang, Ming Xiao, Zhi Wang:
Sparsest Random Sampling for Cluster-Based Compressive Data Gathering in Wireless Sensor Networks. IEEE Access 6: 36383-36394 (2018) - [j31]Noor Ullah, Xiangjie Kong, Liangtian Wan, Honglong Chen, Zhibo Wang, Feng Xia:
A Social Utility-Based Dissemination Scheme for Emergency Warning Messages in Vehicular Social Networks. Comput. J. 61(7): 971-986 (2018) - [j30]Feng Xia, Jinzhong Wang, Xiangjie Kong, Zhibo Wang, Jianxin Li, Chengfei Liu:
Exploring Human Mobility Patterns in Urban Scenarios: A Trajectory Data Perspective. IEEE Commun. Mag. 56(3): 142-149 (2018) - [j29]Zhibo Wang, Ran Tan, Jiahui Hu, Jing Zhao, Qian Wang, Feng Xia, Xiaoguang Niu:
Heterogeneous incentive mechanism for time-sensitive and location-dependent crowdsensing networks with random arrivals. Comput. Networks 131: 96-109 (2018) - [j28]Yanjun Li, Kaikai Chi, Honglong Chen, Zhibo Wang, Yihua Zhu:
Narrowband Internet of Things Systems With Opportunistic D2D Communication. IEEE Internet Things J. 5(3): 1474-1484 (2018) - [j27]Honglong Chen, Zhibo Wang, Feng Xia, Yanjun Li, Leyi Shi:
Efficiently and Completely Identifying Missing Key Tags for Anonymous RFID Systems. IEEE Internet Things J. 5(4): 2915-2926 (2018) - [j26]Qian Wang, Yan Zhang, Xiao Lu, Zhibo Wang, Zhan Qin, Kui Ren:
Real-Time and Spatio-Temporal Crowd-Sourced Social Network Data Publishing with Differential Privacy. IEEE Trans. Dependable Secur. Comput. 15(4): 591-606 (2018) - [j25]Honglong Chen, Wei Lou, Zhibo Wang, Feng Xia:
On Achieving Asynchronous Energy-Efficient Neighbor Discovery for Mobile Sensor Networks. IEEE Trans. Emerg. Top. Comput. 6(4): 553-565 (2018) - [j24]Lipeng Wan, Zhibo Wang, Zheng Lu, Yunhe Feng, Hairong Qi, Wenjun Zhou, Qing Cao:
Approximate and Sublinear Spatial Queries for Large-Scale Vehicle Networks. IEEE Trans. Veh. Technol. 67(2): 1561-1569 (2018) - [j23]Honglong Chen, Guolei Ma, Zhibo Wang, Qian Wang, Jiguo Yu:
MAC: Missing Tag Iceberg Queries for Multi-Category RFID Systems. IEEE Trans. Veh. Technol. 67(10): 9947-9958 (2018) - [j22]Yanjun Li, Yuzhe Chen, Chung Shue Chen, Zhibo Wang, Yi-hua Zhu:
Charging While Moving: Deploying Wireless Chargers for Powering Wearable Devices. IEEE Trans. Veh. Technol. 67(12): 11575-11586 (2018) - [j21]Man Zhou, Qian Wang, Tao Lei, Zhibo Wang, Kui Ren:
Enabling Online Robust Barcode-Based Visible Light Communication With Realtime Feedback. IEEE Trans. Wirel. Commun. 17(12): 8063-8076 (2018) - [j20]Benxiao Tang, Zhibo Wang, Run Wang, Lei Zhao, Lina Wang:
Niffler: A Context-Aware and User-Independent Side-Channel Attack System for Password Inference. Wirel. Commun. Mob. Comput. 2018: 4627108:1-4627108:19 (2018) - [c23]Zhetao Li, Fei Gui, Jinkun Geng, Dan Li, Zhibo Wang, Junfeng Li, Yang Cheng, Usama Zafar:
Dante: Enabling FOV-Aware Adaptive FEC Coding for 360-Degree Video Streaming. APNet 2018: 15-21 - [c22]Man Zhou, Qian Wang, Jingxiao Yang, Qi Li, Feng Xiao, Zhibo Wang, Xiaofeng Chen:
PatternListener: Cracking Android Pattern Lock Using Acoustic Signals. CCS 2018: 1775-1787 - [c21]Zhibo Wang, Jiahui Hu, Jing Zhao, Dejun Yang, Honglong Chen, Qian Wang:
Pay On-Demand: Dynamic Incentive and Task Selection for Location-Dependent Mobile Crowdsensing Systems. ICDCS 2018: 611-621 - [c20]Zhibo Wang, Yongquan Zhang, Honglong Chen, Zhetao Li, Feng Xia:
Deep User Modeling for Content-based Event Recommendation in Event-based Social Networks. INFOCOM 2018: 1304-1312 - [i3]Man Zhou, Qian Wang, Jingxiao Yang, Qi Li, Feng Xiao, Zhibo Wang, Xiaofeng Chen:
PatternListener: Cracking Android Pattern Lock Using Acoustic Signals. CoRR abs/1810.02242 (2018) - [i2]Zhibo Wang, Mengkai Song, Zhifei Zhang, Yang Song, Qian Wang, Hairong Qi:
Beyond Inferring Class Representatives: User-Level Privacy Leakage From Federated Learning. CoRR abs/1812.00535 (2018) - 2017
- [j19]Zhibo Wang, Qing Cao, Hairong Qi, Honglong Chen, Qian Wang:
Cost-effective barrier coverage formation in heterogeneous wireless sensor networks. Ad Hoc Networks 64: 65-79 (2017) - [j18]Qing Cao, Yunhe Feng, Zheng Lu, Hairong Qi, Leon M. Tolbert, Lipeng Wan, Zhibo Wang, Wenjun Zhou:
Approximate Cardinality Estimation (ACE) in large-scale Internet of Things deployments. Ad Hoc Networks 66: 52-63 (2017) - [j17]Zhibo Wang, Honglong Chen, Qing Cao, Hairong Qi, Zhi Wang, Qian Wang:
Achieving location error tolerant barrier coverage for wireless sensor networks. Comput. Networks 112: 314-328 (2017) - [j16]Honglong Chen, Guoliang Xue, Zhibo Wang:
Efficient and Reliable Missing Tag Identification for Large-Scale RFID Systems With Unknown Tags. IEEE Internet Things J. 4(3): 736-748 (2017) - [j15]Honglong Chen, Guolei Ma, Zhibo Wang, Jiguo Yu, Leyi Shi, Xiangyuan Jiang:
Efficient 3-dimensional localization for RFID systems using jumping probe. Pervasive Mob. Comput. 41: 300-318 (2017) - [j14]Honglong Chen, Guolei Ma, Zhibo Wang, Feng Xia, Jiguo Yu:
Probabilistic Detection of Missing Tags for Anonymous Multicategory RFID Systems. IEEE Trans. Veh. Technol. 66(12): 11295-11305 (2017) - [c19]Zhibo Wang, Yongquan Zhang, Yijie Li, Qian Wang, Feng Xia:
Exploiting social influence for context-aware event recommendation in event-based social networks. INFOCOM 2017: 1-9 - [i1]Qian Wang, Feng Xiao, Man Zhou, Zhibo Wang, Hongyu Ding:
Mitigating Link-flooding Attacks With Active Link Obfuscation. CoRR abs/1703.09521 (2017) - 2016
- [j13]Shuguo Zhuo, Zhi Wang, Yeqiong Song, Zhibo Wang, Luís Almeida:
A Traffic Adaptive Multi-Channel MAC Protocol with Dynamic Slot Allocation for WSNs. IEEE Trans. Mob. Comput. 15(7): 1600-1613 (2016) - [j12]Honglong Chen, Wei Lou, Zhibo Wang, Qian Wang:
A Secure Credit-Based Incentive Mechanism for Message Forwarding in Noncooperative DTNs. IEEE Trans. Veh. Technol. 65(8): 6377-6388 (2016) - [c18]Jian Zhang, Yang Yang, Zhibo Wang:
Outsourcing Large-Scale Systems of Linear Matrix Equations in Cloud Computing. ICPADS 2016: 438-447 - [c17]Qian Wang, Shengshan Hu, Kui Ren, Jingjun Wang, Zhibo Wang, Minxin Du:
Catch me in the dark: Effective privacy-preserving outsourcing of feature extractions over image data. INFOCOM 2016: 1-9 - [c16]Qian Wang, Yan Zhang, Xiao Lu, Zhibo Wang, Zhan Qin, Kui Ren:
RescueDP: Real-time spatio-temporal crowd-sourced data publishing with differential privacy. INFOCOM 2016: 1-9 - [c15]Qian Wang, Xiao Lu, Yan Zhang, Zhibo Wang, Zhan Qin, Kui Ren:
SecWeb: Privacy-Preserving Web Browsing Monitoring with w-Event Differential Privacy. SecureComm 2016: 454-474 - 2015
- [j11]Liantao Wu, Shuguo Zhuo, Zhibo Wang, Zhi Wang:
pQueue-MAC: An Energy Efficient Hybrid MAC Protocol for Event-Driven Sensor Networks. Int. J. Distributed Sens. Networks 11: 160167:1-160167:11 (2015) - [j10]Jie Shen, Zhibo Wang, Zhi Wang:
Fault Tolerant Line-Based Barrier Coverage Formation in Mobile Wireless Sensor Networks. Int. J. Distributed Sens. Networks 11: 930585:1-930585:11 (2015) - [j9]Jie Shen, Wenbo He, Xue Liu, Zhibo Wang, Zhi Wang, Jianguo Yao:
End-to-end delay analysis for networked systems. Frontiers Inf. Technol. Electron. Eng. 16(9): 732-743 (2015) - [j8]Honglong Chen, Wei Lou, Zhi Wang, Junfeng Wu, Zhibo Wang, Aihua Xia:
Securing DV-Hop localization against wormhole attacks in wireless sensor networks. Pervasive Mob. Comput. 16: 22-35 (2015) - [j7]Zhibo Wang, Jilong Liao, Qing Cao, Hairong Qi, Zhi Wang:
Friendbook: A Semantic-Based Friend Recommendation System for Social Networks. IEEE Trans. Mob. Comput. 14(3): 538-551 (2015) - [c14]Qian Wang, Kui Ren, Guancheng Li, Chenbo Xia, Xiaobing Chen, Zhibo Wang, Qin Zou:
Walls Have Ears! Opportunistically Communicating Secret Messages Over the Wiretap Channel: from Theory to Practice. CCS 2015: 376-387 - [c13]Qian Wang, Shengshan Hu, Kui Ren, Meiqi He, Minxin Du, Zhibo Wang:
CloudBI: Practical Privacy-Preserving Outsourcing of Biometric Identification in the Cloud. ESORICS (2) 2015: 186-205 - [c12]Qian Wang, Man Zhou, Kui Ren, Tao Lei, Jikun Li, Zhibo Wang:
Rain Bar: Robust Application-Driven Visual Communication Using Color Barcodes. ICDCS 2015: 537-546 - 2014
- [j6]Honglong Chen, Wendong Chen, Zhibo Wang, Zhi Wang, Yanjun Li:
Mobile Beacon Based Wormhole Attackers Detection and Positioning in Wireless Sensor Networks. Int. J. Distributed Sens. Networks 10 (2014) - [j5]Xiong Li, Jianwei Niu, Zhibo Wang, Cai-Sen Chen:
Applying biometrics to design three-factor remote user authentication scheme with key agreement. Secur. Commun. Networks 7(10): 1488-1497 (2014) - [j4]Zhibo Wang, Jilong Liao, Qing Cao, Hairong Qi, Zhi Wang:
Achieving k-Barrier Coverage in Hybrid Directional Sensor Networks. IEEE Trans. Mob. Comput. 13(7): 1443-1455 (2014) - [j3]Hua-Jie Shao, Lei Rao, Zhi Wang, Xue Liu, Zhibo Wang, Kui Ren:
Optimal Load Balancing and Energy Cost Management for Internet Data Centers in Deregulated Electricity Markets. IEEE Trans. Parallel Distributed Syst. 25(10): 2659-2669 (2014) - [c11]Lipeng Wan, Zhibo Wang, Zheng Lu, Hairong Qi, Wenjun Zhou, Qing Cao:
Towards approximate spatial queries for large-scale vehicle networks. SIGSPATIAL/GIS 2014: 505-508 - [c10]Zhibo Wang, Honglong Chen, Qing Cao, Hairong Qi, Zhi Wang:
Fault tolerant barrier coverage for wireless sensor networks. INFOCOM 2014: 1869-1877 - 2013
- [j2]Zhibo Wang, Wei Lou, Zhi Wang, Junchao Ma, Honglong Chen:
A Hybrid Cluster-Based Target Tracking Protocol for Wireless Sensor Networks. Int. J. Distributed Sens. Networks 9 (2013) - [j1]Zhibo Wang, Zhi Wang, Honglong Chen, Jianfeng Li, Hongbin Li, Jie Shen:
HierTrack: an energy-efficient cluster-based target tracking system forwireless sensor networks. J. Zhejiang Univ. Sci. C 14(6): 395-406 (2013) - [c9]Zhibo Wang, Jilong Liao, Qing Cao, Hairong Qi, Zhi Wang:
Barrier Coverage in Hybrid Directional Sensor Networks. MASS 2013: 222-230 - [c8]Shuguo Zhuo, Zhi Wang, Ye-Qiong Song, Zhibo Wang, Luís Almeida:
iQueue-MAC: A traffic adaptive duty-cycled MAC protocol with dynamic slot allocation. SECON 2013: 95-103 - 2012
- [c7]Xiang Liu, Zhibo Wang, Zhi Wang, Shugang Lv, Tao Guan:
A Novel Real-Time Traffic Information Collection System Based on Smartphone. CWSN 2012: 291-303 - [c6]Shuguo Zhuo, Yeqiong Song, Zhi Wang, Zhibo Wang:
Queue-MAC: A queue-length aware hybrid CSMA/TDMA MAC protocol for providing dynamic adaptation to traffic and duty-cycle variation in wireless sensor networks. WFCS 2012: 105-114 - 2011
- [c5]Zhibo Wang, Zhi Wang, Honglong Chen, Jianfeng Li, Hongbin Li:
HierTrack: an energy efficient target tracking system for wireless sensor networks. SenSys 2011: 377-378 - [c4]Zhibo Wang, Clayton Edward Taylor, Qing Cao, Hairong Qi, Zhi Wang:
Friendbook: privacy preserving friend matching based on shared interests. SenSys 2011: 397-398 - 2010
- [c3]Zhibo Wang, Wei Lou, Zhi Wang, Junchao Ma, Honglong Chen:
A Novel Mobility Management Scheme for Target Tracking in Cluster-Based Sensor Networks. DCOSS 2010: 172-186 - [c2]Junfeng Wu, Honglong Chen, Wei Lou, Zhibo Wang, Zhi Wang:
Label-Based DV-Hop Localization Against Wormhole Attacks in Wireless Sensor Networks. NAS 2010: 79-88
2000 – 2009
- 2008
- [c1]Zhibo Wang, Hongbin Li, Xingfa Shen, Xice Sun, Zhi Wang:
Tracking and Predicting Moving Targets in Hierarchical Sensor Networks. ICNSC 2008: 1169-1173
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-23 19:34 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint