发表论文
[1] 邓杰, 吴槟. A Practical Data Trading Protocol for Sudoku Solutions. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY[J]. 2024, 第 2 作者 通讯作者 null(null): [2] 何云华, 罗明顺, 胡晴, 吴槟, 王超, 肖珂. 能源区块链的跨链服务安全技术研究进展. 计算机研究与发展[J]. 2024, 第 4 作者61(4): 1018-1037, http://lib.cqvip.com/Qikan/Article/Detail?id=7111670762.[3] He, Yunhua, Zhang, Cui, Wu, Bin, Yang, Yigang, Xiao, Ke, Li, Hong. Cross-Chain Trusted Service Quality Computing Scheme for Multichain-Model-Based 5G Network Slicing SLA. IEEE INTERNET OF THINGS JOURNAL[J]. 2023, 第 3 作者 通讯作者 10(14): 12126-12139, http://dx.doi.org/10.1109/JIOT.2021.3132388.[4] 应宗浩, 吴槟. 深度学习模型的后门攻击研究综述. 计算机科学[J]. 2023, 第 2 作者 通讯作者 50(3): 333-350, http://lib.cqvip.com/Qikan/Article/Detail?id=7109130539.[5] Zonghao Ying, Bin Wu. DLP: towards active defense against backdoor attacks with decoupled learning process. CYBERSECURITY[J]. 2023, 第 2 作者 通讯作者 6(1): 1-13, https://doaj.org/article/87dc5eeea7ea4ca8a96f79b30a1e07eb.[6] Zonghao Ying, Bin Wu. NBA: defensive distillation for backdoor removal via neural behavior alignment. CYBERSECURITY[J]. 2023, 第 2 作者 通讯作者 6(1): 1-12, http://dx.doi.org/10.1186/s42400-023-00154-z.[7] Xie, Xianwang, Wu, Bin, Hou, Botao. BEPHAP: A Blockchain-based Efficient Privacy-Preserving Handover Authentication Protocol with key agreement for Internet of Vehicles. JOURNAL OF SYSTEMS ARCHITECTURE[J]. 2023, 第 2 作者 通讯作者 138: http://dx.doi.org/10.1016/j.sysarc.2023.102869.[8] He, Yunhua, Luo, Mingshun, Wu, Bin, Sun, Limin, Wu, Yongdong, Liu, Zhiquan, Xiao, Ke. A Game Theory-Based Incentive Mechanism for Collaborative Security of Federated Learning in Energy Blockchain Environment. IEEE INTERNET OF THINGS JOURNAL[J]. 2023, 第 3 作者10(24): 21294-21308, http://dx.doi.org/10.1109/JIOT.2023.3282732.[9] He, Yunhua, Zhang, Cui, Wu, Bin, Yang, Yigang, Xiao, Ke, Li, Hong. A Cross-Chain Trusted Reputation Scheme for a Shared Charging Platform Based on Blockchain. IEEE INTERNET OF THINGS JOURNAL[J]. 2022, 第 3 作者 通讯作者 9(11): 7989-8000, http://dx.doi.org/10.1109/JIOT.2021.3099898.[10] Siyuan Zheng, Changqing Yin, Bin Wu. Keys as Secret Messages: Provably Secure and Efficiency-balanced Steganography on Blockchain. ISPA/BDCloud/SocialCom/SustainCom. 2021, 第 3 作者[11] Xingxin Yu, Haoyue Zhao, Botao Hou, Zonghao Ying, Bin Wu. DeeSCVHunter: A Deep Learning-Based Framework for Smart Contract Vulnerability Detection. 2021 International Joint Conference on Neural Networks (IJCNN 2021)[J]. 2021, 第 5 作者 通讯作者 [12] Wang, Huaqun, He, Debiao, Yu, Jia, Xiong, Neal N, Wu, Bin. RDIC: A blockchain-based remote data integrity checking scheme for IoT in 5G networks. JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING[J]. 2021, 第 5 作者152: 1-10, http://dx.doi.org/10.1016/j.jpdc.2021.02.012.[13] Gao, Xiang, Yu, Jia, Shen, WenTing, Chang, Yan, Zhang, ShiBin, Yang, Ming, Wu, Bin. Achieving low-entropy secure cloud data auditing with file and authenticator deduplication. INFORMATION SCIENCES[J]. 2021, 第 7 作者546: 177-191, http://dx.doi.org/10.1016/j.ins.2020.08.021.[14] Yunhua He, Cui Zhang, Bin Wu, Yigang Yang, Ke Xiao, Hong Li. A Cross-Chain Trusted Reputation Scheme for a Shared Charging Platform Based on Blockchain. IEEE INTERNET OF THINGS JOURNAL[J]. 2021, 第 3 作者9(11): 7989-8000, [15] Yunhua He, Cui Zhang, Bin Wu, Yigang Yang, Ke Xiao, Hong Li. Cross-chain Trusted Service Quality Computing Scheme For Multi-chain Model-based 5G Network Slicing SLA. IEEE INTERNET OF THINGS JOURNAL[J]. 2021, 第 3 作者[16] Weipeng Jiang, Bin Wu, Xingxin Yu, Rui Xue, Zhengmin Yu. Restructured Cloning Vulnerability Detection Based on Function Semantic Reserving and Reiteration Screening. The 25th European Symposium on Research in Computer Security(ESORICS 2020) 欧洲系统安全顶级会议[J]. 2020, 第 2 作者 通讯作者 [17] 王亚宁, 吴槟. 面向无载体信息隐藏的映射关系智能搜索方法. 信息安全学报[J]. 2020, 第 2 作者 通讯作者 5(3): 48-61, http://lib.cqvip.com/Qikan/Article/Detail?id=7102294063.[18] 王彬, 蒋鸿玲, 吴槟. 基于Attention-Bi-LSTM的微博评论情感分析研究. 计算机科学与应用[J]. 2020, 第 3 作者10(12): 2380-2387, http://lib.cqvip.com/Qikan/Article/Detail?id=HS724072020012027.[19] Wang, Jinwei, Liu, Renfeng, Wang, Hao, Wu, Bin, Shi, YunQing. Quaternion Markov Splicing Detection for Color Images Based on Quaternion Discrete Cosine Transform. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS[J]. 2020, 第 4 作者14(7): 2981-2996, http://dx.doi.org/10.3837/tiis.2020.07.014.[20] Botao Hou, Yongqiang Li, Haoyue Zhao, 吴槟. Linear Attack on Round-Reduced DES Using Deep Learning. ESORICS 2020[J]. 2020, 第 4 作者 通讯作者 [21] Jiang, WeiPeng, Wu, Bin, Jiang, Zhou, Yang, ShaoBo, Zhou, J, Luo, X, Shen, Q, Xu, Z. Cloning Vulnerability Detection in Driver Layer of IoT Devices. INFORMATION AND COMMUNICATIONS SECURITY (ICICS 2019). 2020, 第 2 作者 通讯作者 11999: 89-104, [22] Wu, Bin, Liu, Hanwen, IEEE. A Behavior-based Covert Channel Based on GPS Deception for Smart Mobile Devices. ICC 2019 - 2019 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC). 2019, 第 1 作者 通讯作者 [23] Li, Meng, Wu, Bin, Wang, Yaning, IEEE. Comment Spam Detection via Effective Features Combination. ICC 2019 - 2019 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC). 2019, 第 2 作者 通讯作者 [24] Qin Zhengcai, Wu Bin, Li Meng, Schoeffmann K, Chalidabhongse TH, Ngo CW, Aramvith S, OConnor NE, Ho YS, Gabbouj M, Elgammal A. Text Image Deblurring via Intensity Extremums Prior. MULTIMEDIA MODELING, MMM 2018, PT I. 2018, 第 2 作者 通讯作者 10704: 505-517, [25] Li, Meng, Wu, Bin, Qin, Zhengcai, IEEE. Anomaly User Detection via Comprehensive Keystroke Features Optimization. 2018 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN). 2018, 第 2 作者 通讯作者 [26] 苏铓, 俞研, 吴槟, 付安民. 面向代理重加密算法的程序设计语言研究. 通信学报[J]. 2018, 第 3 作者 通讯作者 39(6): 89-97, http://lib.cqvip.com/Qikan/Article/Detail?id=675866597.[27] 吴槟. Robust Steganography via Patch-based Texture Synthesis. The 9th International Conference on Internet Multimedia Computing and Service (ICIMCS 2017). 2017, 第 1 作者 通讯作者 [28] Xianfeng Zhao. Motion vector reversion-based steganalysis revisited. 2015 IEEE China Summit and International Conference on Signal and Information Processing. 2015, [29] Hui Lin, Jia Hu, Chuan Huang, Li Xu, Bin Wu. Secure Cooperative Spectrum Sensing and Allocation in Distributed Cognitive Radio Networks. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS[J]. 2015, 第 5 作者11: https://doaj.org/article/12fb9c130f5649028363b0380280ff91.[30] 吴槟. 访问控制系统防隐私泄露证明方案. 计算机学报(已录用). 2013, 第 1 作者[31] 吴槟, 冯登国. 多域环境下基于属性的授权委托模型. 软件学报[J]. 2011, 第 1 作者22(7): 1661-1675, http://lib.cqvip.com/Qikan/Article/Detail?id=38271863.[32] Wu Bin, Feng Dengguo, Duan Meijiao. Privacy preserving of trust management credentials based on trusted computing. LECTURE NOTES IN COMPUTER SCIENCE (INCLUDING SUBSERIES LECTURE NOTES IN ARTIFICIAL INTELLIGENCE AND LECTURE NOTES IN BIOINFORMATICS). 2010, 第 1 作者251-263, http://124.16.136.157/handle/311060/8858.