Zhibo Wang
Zhibo Wang
Professor at College of Computer Science and Technology, Zhejiang University
Verified email at - Homepage
Cited by
Cited by
Beyond inferring class representatives: User-level privacy leakage from federated learning
Z Wang, M Song, Z Zhang, Y Song, Q Wang, H Qi
IEEE INFOCOM 2019-IEEE conference on computer communications, 2512-2520, 2019
Friendbook: a semantic-based friend recommendation system for social networks
Z Wang, J Liao, Q Cao, H Qi
IEEE Transactions on Mobile Computing, 538 - 551, 2015
Personalized privacy-preserving task allocation for mobile crowdsensing
Z Wang, J Hu, R Lv, J Wei, Q Wang, D Yang, H Qi
IEEE Transactions on Mobile Computing 18 (6), 1330-1341, 2018
Real-time and spatio-temporal crowd-sourced social network data publishing with differential privacy
Q Wang, Y Zhang, X Lu, Z Wang, Z Qin, K Ren
IEEE Transactions on Dependable and Secure Computing 15 (4), 591-606, 2016
Achieving k-barrier Coverage in Hybrid Directional Sensor Networks
Z Wang, H Qi, Z Wang, J Liao, Q Cao
IEEE Transactions on Mobile Computing (TMC) 13 (7), 1443-1455, 2014
Analyzing user-level privacy attack against federated learning
M Song, Z Wang, Z Zhang, Y Song, Q Wang, J Ren, H Qi
IEEE Journal on Selected Areas in Communications 38 (10), 2430-2444, 2020
Exploring human mobility patterns in urban scenarios: A trajectory data perspective
F Xia, J Wang, X Kong, Z Wang, J Li, C Liu
IEEE Communications Magazine 56 (3), 142-149, 2018
Feature importance-aware transferable adversarial attacks
Z Wang, H Guo, Z Zhang, W Liu, Z Qin, K Ren
Proceedings of the IEEE/CVF international conference on computer vision …, 2021
Privacy-preserving crowd-sourced statistical data publishing with an untrusted server
Z Wang, X Pang, Y Chen, H Shao, Q Wang, L Wu, H Chen, H Qi
IEEE Transactions on Mobile Computing 18 (6), 1356-1367, 2018
CloudBI: Practical privacy-preserving outsourcing of biometric identification in the cloud
Q Wang, S Hu, K Ren, M He, M Du, Z Wang
Computer Security--ESORICS 2015: 20th European Symposium on Research in …, 2015
EveDroid: Event-aware Android malware detection against model degrading for IoT devices
T Lei, Z Qin, Z Wang, Q Li, D Ye
IEEE Internet of Things Journal 6 (4), 6668-6680, 2019
A traffic adaptive multi-channel MAC protocol with dynamic slot allocation for WSNs
S Zhuo, Z Wang, YQ Song, Z Wang, L Almeida
IEEE transactions on mobile computing 15 (7), 1600-1613, 2015
Patternlistener: Cracking android pattern lock using acoustic signals
M Zhou, Q Wang, J Yang, Q Li, F Xiao, Z Wang, X Chen
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
Achieving location error tolerant barrier coverage for wireless sensor networks
Z Wang, H Chen, Q Cao, H Qi, Z Wang, Q Wang
Computer Networks 112, 314-328, 2017
Rain bar: Robust application-driven visual communication using color barcodes
Q Wang, M Zhou, K Ren, T Lei, J Li, Z Wang
2015 IEEE 35th International Conference on Distributed Computing Systems …, 2015
Towards a robust deep neural network in texts: A survey
W Wang, R Wang, L Wang, Z Wang, A Ye
arXiv preprint arXiv:1902.07285, 2019
Securing DV-Hop localization against wormhole attacks in wireless sensor networks
H Chen, W Lou, Z Wang, J Wu, Z Wang, A Xia
Pervasive and Mobile Computing 16, 22-35, 2015
Cost-effective barrier coverage formation in heterogeneous wireless sensor networks
Z Wang, Q Cao, H Qi, H Chen, Q Wang
Ad Hoc Networks 64, 65-79, 2017
A novel mobility management scheme for target tracking in cluster-based sensor networks
Z Wang, W Lou, Z Wang, J Ma, H Chen
Distributed Computing in Sensor Systems: 6th IEEE International Conference …, 2010
Queue-MAC: A queue-length aware hybrid CSMA/TDMA MAC protocol for providing dynamic adaptation to traffic and duty-cycle variation in wireless sensor networks
S Zhuo, YQ Song, Z Wang, Z Wang
2012 9th IEEE International Workshop on Factory Communication Systems, 105-114, 2012
The system can't perform the operation now. Try again later.
Articles 1–20