default search action
Wenbo Jiang
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j18]Wenbo Jiang, Yuan Zhang:
Forging synergies: Crafting a hybrid curriculum in internet technology and environmental design for enhanced educational outcomes. J. Comput. Methods Sci. Eng. 24(4-5): 2485-2501 (2024) - [j17]Wenbo Jiang, Jingchun Wang, Yidi Yang, Yun Bu:
A Review of Microsphere Super-Resolution Imaging Techniques. Sensors 24(8): 2511 (2024) - [j16]Wenbo Jiang, Tianwei Zhang, Han Qiu, Hongwei Li, Guowen Xu:
Incremental Learning, Incremental Backdoor Threats. IEEE Trans. Dependable Secur. Comput. 21(2): 559-572 (2024) - [j15]Wenbo Jiang, Hongwei Li, Guowen Xu, Tianwei Zhang, Rongxing Lu:
A Comprehensive Defense Framework Against Model Extraction Attacks. IEEE Trans. Dependable Secur. Comput. 21(2): 685-700 (2024) - [j14]Wenshu Fan, Hongwei Li, Wenbo Jiang, Meng Hao, Shui Yu, Xiao Zhang:
Stealthy Targeted Backdoor Attacks Against Image Captioning. IEEE Trans. Inf. Forensics Secur. 19: 5655-5667 (2024) - [c15]Ran Zhang, Hongwei Li, Xinyuan Qian, Wenbo Jiang, Xilin Zhang:
An Efficient and Secure Privacy-Preserving Federated Learning Via Lattice-Based Functional Encryption. ICC 2024: 2185-2190 - [c14]Jiaming He, Hongwei Li, Wenbo Jiang, Yuan Zhang:
Mtisa: Multi-Target Image-Scaling Attack. ICC 2024: 2191-2196 - [c13]Rui Zhang, Hongwei Li, Rui Wen, Wenbo Jiang, Yuan Zhang, Michael Backes, Yun Shen, Yang Zhang:
Instruction Backdoor Attacks Against Customized LLMs. USENIX Security Symposium 2024 - [i8]Rui Zhang, Hongwei Li, Rui Wen, Wenbo Jiang, Yuan Zhang, Michael Backes, Yun Shen, Yang Zhang:
Rapid Adoption, Hidden Risks: The Dual Impact of Large Language Model Customization. CoRR abs/2402.09179 (2024) - [i7]Jiaming He, Wenbo Jiang, Guanyu Hou, Wenshu Fan, Rui Zhang, Hongwei Li:
Talk Too Much: Poisoning Large Language Models under Token Limit. CoRR abs/2404.14795 (2024) - [i6]Wenshu Fan, Hongwei Li, Wenbo Jiang, Meng Hao, Shui Yu, Xiao Zhang:
Stealthy Targeted Backdoor Attacks against Image Captioning. CoRR abs/2406.05874 (2024) - [i5]Wenbo Jiang, Hongwei Li, Jiaming He, Rui Zhang, Guowen Xu, Tianwei Zhang, Rongxing Lu:
Backdoor Attacks against Image-to-Image Networks. CoRR abs/2407.10445 (2024) - [i4]Wenbo Jiang, Rui Zhang, Hongwei Li, Xiaoyuan Liu, Haomiao Yang, Shui Yu:
DDFAD: Dataset Distillation Framework for Audio Data. CoRR abs/2407.10446 (2024) - [i3]Ji Guo, Wenbo Jiang, Rui Zhang, Wenshu Fan, Jiachen Li, Guoming Lu:
Backdoor Attacks against Hybrid Classical-Quantum Neural Networks. CoRR abs/2407.16273 (2024) - [i2]Shuai Yuan, Hongwei Li, Xingshuo Han, Guowen Xu, Wenbo Jiang, Tao Ni, Qingchuan Zhao, Yuguang Fang:
ITPatch: An Invisible and Triggered Physical Adversarial Patch against Traffic Sign Recognition. CoRR abs/2409.12394 (2024) - [i1]Shuai Yuan, Hongwei Li, Xinyuan Qian, Wenbo Jiang, Guowen Xu:
OnePath: Efficient and Privacy-Preserving Decision Tree Inference in the Cloud. CoRR abs/2409.19334 (2024) - 2023
- [j13]Wenbo Jiang, Yanrui Sun:
Social-RippleNet: Jointly modeling of ripple net and social information for recommendation. Appl. Intell. 53(3): 3472-3487 (2023) - [j12]Wenbo Jiang, Hongwei Li, Guowen Xu, Tianwei Zhang, Rongxing Lu:
Physical Black-Box Adversarial Attacks Through Transformations. IEEE Trans. Big Data 9(3): 964-974 (2023) - [c12]Wenbo Jiang, Hongwei Li, Guowen Xu, Tianwei Zhang:
Color Backdoor: A Robust Poisoning Attack in Color Space. CVPR 2023: 8133-8142 - 2022
- [j11]Wenbo Jiang, Anshun Liu:
Image Motion Deblurring Based on Deep Residual Shrinkage and Generative Adversarial Networks. Comput. Intell. Neurosci. 2022: 5605846:1-5605846:15 (2022) - [j10]Guangyao Zhang, Yanting Li, Wenbo Jiang, Lianjie Shu:
A fault diagnosis method for wind turbines with limited labeled data based on balanced joint adaptive network. Neurocomputing 481: 133-153 (2022) - 2021
- [j9]Wenbo Jiang, Min Liu, Yunuo Peng, Lehui Wu, Yaonan Wang:
HDCB-Net: A Neural Network With the Hybrid Dilated Convolution for Pixel-Level Crack Detection on Concrete Bridges. IEEE Trans. Ind. Informatics 17(8): 5485-5494 (2021) - 2020
- [j8]Qianhua Fu, Shouming Zhong, Wenbo Jiang, Wenqian Xie:
Projective synchronization of fuzzy memristive neural networks with pinning impulsive control. J. Frankl. Inst. 357(15): 10387-10409 (2020) - [j7]Shihui Liu, Wenbo Jiang, Lehui Wu, He Wen, Min Liu, Yaonan Wang:
Real-Time Classification of Rubber Wood Boards Using an SSR-Based CNN. IEEE Trans. Instrum. Meas. 69(11): 8725-8734 (2020) - [j6]Wenbo Jiang, Hongwei Li, Sen Liu, Xizhao Luo, Rongxing Lu:
Poisoning and Evasion Attacks Against Deep Learning Algorithms in Autonomous Vehicles. IEEE Trans. Veh. Technol. 69(4): 4439-4449 (2020) - [c11]Wenshu Fan, Hongwei Li, Wenbo Jiang, Guowen Xu, Rongxing Lu:
A Practical Black-Box Attack Against Autonomous Speech Recognition Model. GLOBECOM 2020: 1-6 - [c10]Wenbo Jiang, Hongwei Li, Li Gong, Haomiao Yang, Rongxing Lu:
Accelerating Poisoning Attack Through Momentum and Adam Algorithms. VTC Fall 2020: 1-6
2010 – 2019
- 2019
- [j5]Wenbo Jiang, Hongwei Li, Guowen Xu, Mi Wen, Guishan Dong, Xiaodong Lin:
PTAS: Privacy-preserving Thin-client Authentication Scheme in blockchain-based PKI. Future Gener. Comput. Syst. 96: 185-195 (2019) - [j4]Wenbo Jiang, Yuan Zhang:
Application of 3D Visualization in Landscape Design Teaching. Int. J. Emerg. Technol. Learn. 14(6): 53-62 (2019) - [j3]Wenbo Jiang, Lehui Wu, Shihui Liu, Min Liu:
CNN-based two-stage cell segmentation improves plant cell tracking. Pattern Recognit. Lett. 128: 311-317 (2019) - [c9]Wenbo Jiang, Hongwei Li, Sen Liu, Yanzhi Ren, Miao He:
A Flexible Poisoning Attack Against Machine Learning. ICC 2019: 1-6 - 2018
- [j2]Yuan Zhang, Wenbo Jiang:
Score Prediction Model of MOOCs Learners Based on Neural Network. Int. J. Emerg. Technol. Learn. 13(10): 171-182 (2018) - [c8]Wenbo Jiang, Hongwei Li, Guowen Xu, Mi Wen, Guishan Dong, Xiaodong Lin:
A Privacy-Preserving Thin-Client Scheme in Blockchain-Based PKI. GLOBECOM 2018: 1-6 - 2017
- [c7]Mingshan Xie, Yanfang Deng, Yong Bai, Mengxing Huang, Wenbo Jiang, Zhuhuan Hu:
The Computing of Optimized Clustering Threshold Values Based on Quasi-Classes Space for the Merchandise Recommendation. PDCAT 2017: 217-222 - 2016
- [c6]Wenbo Jiang, Huaqi Chai:
Research on big data in business model innovation based on GA-BP model. SOLI 2016: 174-177 - 2015
- [j1]Lei Sui, Yuanbo Guo, Wenbo Jiang, Kuiwu Yang:
基于无线信道特征的密钥生成与提取研究 (Generation and Extraction of Secret Keys Based on Properties of Wireless Channels). 计算机科学 42(2): 137-141 (2015) - [c5]Wenbo Jiang, Huaqi Chai:
A risk management methodology for R&D Project risk based on AHP and fuzzy comprehensive evaluation method. IEEM 2015: 320-324 - [c4]Wenbo Jiang, Tianyu Wo, Mingming Zhang, Renyu Yang, Jie Xu:
A Method for Private Car Transportation Dispatching Based on a Passenger Demand Model. IOV 2015: 37-48 - 2014
- [c3]Yuda Wang, Renyu Yang, Tianyu Wo, Wenbo Jiang, Chunming Hu:
Improving utilization through dynamic VM resource allocation in hybrid cloud environment. ICPADS 2014: 241-248 - 2012
- [c2]Wenbo Jiang, Kay C. Wiese:
Non-coding RNA gene finding with combined partial covariance models. CIBCB 2012: 306-313 - 2011
- [c1]Wenbo Jiang, Kay C. Wiese:
Combined covariance model for non-coding RNA gene finding. CIBCB 2011: 22-26
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-18 19:22 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint