发表论文
[1] He, Yunhua, Zhang, Cui, Wu, Bin, Yang, Yigang, Xiao, Ke, Li, Hong. Cross-Chain Trusted Service Quality Computing Scheme for Multichain-Model-Based 5G Network Slicing SLA. IEEE INTERNET OF THINGS JOURNAL[J]. 2023, 10(14): 12126-12139, http://dx.doi.org/10.1109/JIOT.2021.3132388.[2] 应宗浩, 吴槟. 深度学习模型的后门攻击研究综述. 计算机科学[J]. 2023, 50(3): 333-350, http://lib.cqvip.com/Qikan/Article/Detail?id=7109130539.[3] Zonghao Ying, Bin Wu. NBA: defensive distillation for backdoor removal via neural behavior alignment. CYBERSECURITY[J]. 2023, 6(1): 1-12, http://dx.doi.org/10.1186/s42400-023-00154-z.[4] Zonghao Ying, Bin Wu. DLP: towards active defense against backdoor attacks with decoupled learning process. CYBERSECURITY[J]. 2023, 6(1): 1-13, https://doaj.org/article/87dc5eeea7ea4ca8a96f79b30a1e07eb.[5] Xie, Xianwang, Wu, Bin, Hou, Botao. BEPHAP: A Blockchain-based Efficient Privacy-Preserving Handover Authentication Protocol with key agreement for Internet of Vehicles. JOURNAL OF SYSTEMS ARCHITECTURE[J]. 2023, 138: http://dx.doi.org/10.1016/j.sysarc.2023.102869.[6] He, Yunhua, Zhang, Cui, Wu, Bin, Yang, Yigang, Xiao, Ke, Li, Hong. A Cross-Chain Trusted Reputation Scheme for a Shared Charging Platform Based on Blockchain. IEEE INTERNET OF THINGS JOURNAL[J]. 2022, 9(11): 7989-8000, http://dx.doi.org/10.1109/JIOT.2021.3099898.[7] Siyuan Zheng, Changqing Yin, Bin Wu. Keys as Secret Messages: Provably Secure and Efficiency-balanced Steganography on Blockchain. ISPA/BDCloud/SocialCom/SustainComnull. 2021, [8] Xingxin Yu, Haoyue Zhao, Botao Hou, Zonghao Ying, Bin Wu. DeeSCVHunter: A Deep Learning-Based Framework for Smart Contract Vulnerability Detection. 2021 International Joint Conference on Neural Networks (IJCNN 2021)[J]. 2021, [9] Wang, Huaqun, He, Debiao, Yu, Jia, Xiong, Neal N, Wu, Bin. RDIC: A blockchain-based remote data integrity checking scheme for IoT in 5G networks. JOURNAL OF PARALLEL AND DISTRIBUTED COMPUTING[J]. 2021, 152: 1-10, http://dx.doi.org/10.1016/j.jpdc.2021.02.012.[10] Gao, Xiang, Yu, Jia, Shen, WenTing, Chang, Yan, Zhang, ShiBin, Yang, Ming, Wu, Bin. Achieving low-entropy secure cloud data auditing with file and authenticator deduplication. INFORMATION SCIENCES[J]. 2021, 546: 177-191, http://dx.doi.org/10.1016/j.ins.2020.08.021.[11] Yunhua He, Cui Zhang, Bin Wu, Yigang Yang, Ke Xiao, Hong Li. A Cross-Chain Trusted Reputation Scheme for a Shared Charging Platform Based on Blockchain. IEEE INTERNET OF THINGS JOURNAL[J]. 2021, 9(11): 7989-8000, [12] Yunhua He, Cui Zhang, Bin Wu, Yigang Yang, Ke Xiao, Hong Li. Cross-chain Trusted Service Quality Computing Scheme For Multi-chain Model-based 5G Network Slicing SLA. IEEE INTERNET OF THINGS JOURNAL[J]. 2021, [13] Weipeng Jiang, Bin Wu, Xingxin Yu, Rui Xue, Zhengmin Yu. Restructured Cloning Vulnerability Detection Based on Function Semantic Reserving and Reiteration Screening. The 25th European Symposium on Research in Computer Security(ESORICS 2020) 欧洲系统安全顶级会议[J]. 2020, [14] 王亚宁, 吴槟. 面向无载体信息隐藏的映射关系智能搜索方法. 信息安全学报[J]. 2020, 5(3): 48-61, http://lib.cqvip.com/Qikan/Article/Detail?id=7102294063.[15] 王彬, 蒋鸿玲, 吴槟. 基于Attention-Bi-LSTM的微博评论情感分析研究. 计算机科学与应用[J]. 2020, 10(12): 2380-2387, http://lib.cqvip.com/Qikan/Article/Detail?id=HS724072020012027.[16] Wang, Jinwei, Liu, Renfeng, Wang, Hao, Wu, Bin, Shi, YunQing. Quaternion Markov Splicing Detection for Color Images Based on Quaternion Discrete Cosine Transform. KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS[J]. 2020, 14(7): 2981-2996, http://dx.doi.org/10.3837/tiis.2020.07.014.[17] Botao Hou, Yongqiang Li, Haoyue Zhao, 吴槟. Linear Attack on Round-Reduced DES Using Deep Learning. ESORICS 2020[J]. 2020, [18] Jiang, WeiPeng, Wu, Bin, Jiang, Zhou, Yang, ShaoBo, Zhou, J, Luo, X, Shen, Q, Xu, Z. Cloning Vulnerability Detection in Driver Layer of IoT Devices. INFORMATION AND COMMUNICATIONS SECURITY (ICICS 2019)null. 2020, 11999: 89-104, [19] Wu, Bin, Liu, Hanwen, IEEE. A Behavior-based Covert Channel Based on GPS Deception for Smart Mobile Devices. ICC 2019 - 2019 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC)null. 2019, [20] Li, Meng, Wu, Bin, Wang, Yaning, IEEE. Comment Spam Detection via Effective Features Combination. ICC 2019 - 2019 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS (ICC)null. 2019, [21] Qin Zhengcai, Wu Bin, Li Meng, Schoeffmann K, Chalidabhongse TH, Ngo CW, Aramvith S, OConnor NE, Ho YS, Gabbouj M, Elgammal A. Text Image Deblurring via Intensity Extremums Prior. MULTIMEDIA MODELING, MMM 2018, PT Inull. 2018, 10704: 505-517, [22] Li, Meng, Wu, Bin, Qin, Zhengcai, IEEE. Anomaly User Detection via Comprehensive Keystroke Features Optimization. 2018 INTERNATIONAL JOINT CONFERENCE ON NEURAL NETWORKS (IJCNN)null. 2018, [23] 苏铓, 俞研, 吴槟, 付安民. 面向代理重加密算法的程序设计语言研究. 通信学报[J]. 2018, 39(6): 89-97, http://lib.cqvip.com/Qikan/Article/Detail?id=675866597.[24] 吴槟. Robust Steganography via Patch-based Texture Synthesis. The 9th International Conference on Internet Multimedia Computing and Service (ICIMCS 2017). 2017, [25] Xianfeng Zhao. Motion vector reversion-based steganalysis revisited. 2015 IEEE China Summit and International Conference on Signal and Information Processing. 2015, [26] Lin, Hui, Hu, Jia, Huang, Chuan, Xu, Li, Wu, Bin. Secure Cooperative Spectrum Sensing and Allocation in Distributed Cognitive Radio Networks. INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS[J]. 2015, 11: https://doaj.org/article/12fb9c130f5649028363b0380280ff91.[27] 吴槟. 访问控制系统防隐私泄露证明方案. 计算机学报(已录用). 2013, [28] 吴槟, 冯登国. 多域环境下基于属性的授权委托模型. 软件学报[J]. 2011, 22(7): 1661-1675, http://lib.cqvip.com/Qikan/Article/Detail?id=38271863.[29] Wu Bin, Feng Dengguo, Duan Meijiao. Privacy preserving of trust management credentials based on trusted computing. LECTURE NOTES IN COMPUTER SCIENCE (INCLUDING SUBSERIES LECTURE NOTES IN ARTIFICIAL INTELLIGENCE AND LECTURE NOTES IN BIOINFORMATICS)null. 2010, 251-263, http://124.16.136.157/handle/311060/8858.