![](https://dblp1.uni-trier.de/img/logo.320x120.png)
![search dblp search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
![search dblp](https://dblp1.uni-trier.de/img/search.dark.16x16.png)
default search action
Zhibo Wang 0001
Person information
- affiliation: Zhejiang University, Hangzhou, China
Other persons with the same name
- Zhibo Wang — disambiguation page
- Zhibo Wang 0002
— East China University of Technology, Nanchang, China (and 1 more)
- Zhibo Wang 0003
— Tsinghua University, BNRist and School of Software, Beijing, China
- Zhibo Wang 0004 — Tsinghua University, Department of Electronic Engineering, Beijing, China
- Zhibo Wang 0005 — University of Toronto, Toronto, ON, Canada
- Zhibo Wang 0006 — Binghamton University, State University of New York, Binghamton, NY, USA
- Zhibo Wang 0007
— Guangdong University of Technology, Guangzhou, China (and 1 more)
- Zhibo Wang 0008 — Georgia State University, Atlanta, GA, USA
- Zhibo Wang 0009 — Beijing University of Posts and Telecommunications, Beijing, China
- Zhibo Wang 0010
— Jeonju University, Department of Graduate School of Artificial Intelligence, Artificial Intelligence Research Center, Jeonju-si, Korea
Refine list
![note](https://dblp1.uni-trier.de/img/note-mark.dark.12x12.png)
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2025
- [j102]Cheng Wei, Yang Wang, Kuofeng Gao, Shuo Shao, Yiming Li, Zhibo Wang, Zhan Qin:
PointNCBW: Toward Dataset Ownership Verification for Point Clouds via Negative Clean-Label Backdoor Watermark. IEEE Trans. Inf. Forensics Secur. 20: 191-206 (2025) - 2024
- [j101]Peng Sun
, Liantao Wu
, Zhibo Wang
, Jinfei Liu
, Juan Luo
, Wenqiang Jin
:
A Profit-Maximizing Data Marketplace with Differentially Private Federated Learning under Price Competition. Proc. ACM Manag. Data 2(4): 191:1-191:27 (2024) - [j100]Zhibo Wang
, Wenxin Liu
, Jiahui Hu
, Hengchang Guo
, Zhan Qin
, Jian Liu
, Kui Ren
:
Label-Free Poisoning Attack Against Deep Unsupervised Domain Adaptation. IEEE Trans. Dependable Secur. Comput. 21(4): 1572-1586 (2024) - [j99]Guodong Cao
, Zhibo Wang
, Yunhe Feng
, Xiaowei Dong
, Zhifei Zhang
, Zhan Qin
, Kui Ren
:
Task-Free Fairness-Aware Bias Mitigation for Black-Box Deployed Models. IEEE Trans. Dependable Secur. Comput. 21(4): 3390-3405 (2024) - [j98]Xinyu Zhang
, Huiyu Xu
, Zhongjie Ba
, Zhibo Wang
, Yuan Hong
, Jian Liu
, Zhan Qin
, Kui Ren
:
PrivacyAsst: Safeguarding User Privacy in Tool-Using Large Language Model Agents. IEEE Trans. Dependable Secur. Comput. 21(6): 5242-5258 (2024) - [j97]Junjian Li
, Honglong Chen
, Peng Sun
, Zhibo Wang
, Zhichen Ni
, Weifeng Liu
:
Call White Black: Enhanced Image-Scaling Attack in Industrial Artificial Intelligence Systems. IEEE Trans. Ind. Informatics 20(4): 6222-6233 (2024) - [j96]Liantao Wu
, Peng Sun
, Zhibo Wang
, Yanjun Li
, Yang Yang
:
Computation Offloading in Multi-Cell Networks With Collaborative Edge-Cloud Computing: A Game Theoretic Approach. IEEE Trans. Mob. Comput. 23(3): 2093-2106 (2024) - [j95]Zhibo Wang
, Yunan Sun
, Defang Liu, Jiahui Hu
, Xiaoyi Pang
, Yuke Hu
, Kui Ren
:
Location Privacy-Aware Task Offloading in Mobile Edge Computing. IEEE Trans. Mob. Comput. 23(3): 2269-2283 (2024) - [j94]Kai Lin
, Honglong Chen
, Na Yan
, Zhichen Ni
, Zhibo Wang
, Jiguo Yu
:
Double Polling-Based Tag Information Collection for Sensor-Augmented RFID Systems. IEEE Trans. Mob. Comput. 23(5): 3496-3509 (2024) - [j93]Jiahui Hu
, Jiacheng Du, Zhibo Wang
, Xiaoyi Pang
, Yajie Zhou, Peng Sun
, Kui Ren
:
Does Differential Privacy Really Protect Federated Learning From Gradient Leakage Attacks? IEEE Trans. Mob. Comput. 23(12): 12635-12649 (2024) - [j92]Song Han
, Hongxin Ding, Shuai Zhao
, Siqi Ren, Zhibo Wang
, Jianhong Lin, Shuhao Zhou:
Practical and Robust Federated Learning With Highly Scalable Regression Training. IEEE Trans. Neural Networks Learn. Syst. 35(10): 13801-13815 (2024) - [j91]Jiahui Hu
, Zhibo Wang
, Yongsheng Shen, Bohan Lin, Peng Sun
, Xiaoyi Pang
, Jian Liu
, Kui Ren
:
Shield Against Gradient Leakage Attacks: Adaptive Privacy-Preserving Federated Learning. IEEE/ACM Trans. Netw. 32(2): 1407-1422 (2024) - [j90]Xiaoyi Pang, Jiahui Hu, Peng Sun, Ju Ren, Zhibo Wang:
When Federated Learning Meets Knowledge Distillation. IEEE Wirel. Commun. 31(5): 208-214 (2024) - [c62]Yudong Gao, Honglong Chen, Peng Sun, Junjian Li, Anqing Zhang, Zhibo Wang, Weifeng Liu:
A Dual Stealthy Backdoor: From Both Spatial and Frequency Perspectives. AAAI 2024: 1851-1859 - [c61]Zhixuan Chu
, Yan Wang
, Longfei Li
, Zhibo Wang
, Zhan Qin
, Kui Ren
:
A Causal Explainable Guardrails for Large Language Models. CCS 2024: 1136-1150 - [c60]Zhongjie Ba
, Jieming Zhong
, Jiachen Lei
, Peng Cheng
, Qinglong Wang
, Zhan Qin
, Zhibo Wang
, Kui Ren
:
SurrogatePrompt: Bypassing the Safety Filter of Text-to-Image Models via Substitution. CCS 2024: 1166-1180 - [c59]Huiyu Xu
, Yaopeng Wang
, Zhibo Wang
, Zhongjie Ba
, Wenxin Liu
, Lu Jin
, Haiqin Weng
, Tao Wei
, Kui Ren
:
ProFake: Detecting Deepfakes in the Wild against Quality Degradation with Progressive Quality-adaptive Learning. CCS 2024: 2207-2221 - [c58]Zhibo Wang, Zhiwei Chang, Jiahui Hu, Xiaoyi Pang, Jiacheng Du, Yongle Chen, Kui Ren:
Breaking Secure Aggregation: Label Leakage from Aggregated Gradients in Federated Learning. INFOCOM 2024: 151-160 - [c57]Yajie Zhou, Xiaoyi Pang, Zhibo Wang, Jiahui Hu, Peng Sun, Kui Ren:
Towards Efficient Asynchronous Federated Learning in Heterogeneous Edge Environments. INFOCOM 2024: 2448-2457 - [c56]Guodong Cao, Zhibo Wang, Yunhe Feng, Xiaowei Dong:
DAAP: Privacy-Preserving Model Accuracy Estimation on Unlabeled Datasets Through Distribution-Aware Adversarial Perturbation. USENIX Security Symposium 2024 - [c55]Shuaifan Jin, He Wang, Zhibo Wang, Feng Xiao, Jiahui Hu, Yuan He, Wenwen Zhang, Zhongjie Ba, Weijie Fang, Shuhong Yuan, Kui Ren:
FaceObfuscator: Defending Deep Learning-based Privacy Attacks with Gradient Descent-resistant Features in Face Recognition. USENIX Security Symposium 2024 - [i25]Jiacheng Du, Jiahui Hu, Zhibo Wang, Peng Sun, Neil Zhenqiang Gong, Kui Ren:
SoK: Gradient Leakage in Federated Learning. CoRR abs/2404.05403 (2024) - [i24]Zhixuan Chu, Yan Wang, Longfei Li, Zhibo Wang, Zhan Qin, Kui Ren:
A Causal Explainable Guardrails for Large Language Models. CoRR abs/2405.04160 (2024) - [i23]Zhixuan Chu, Lei Zhang, Yichen Sun, Siqiao Xue, Zhibo Wang, Zhan Qin, Kui Ren:
Sora Detector: A Unified Hallucination Detection for Large Text-to-Video Models. CoRR abs/2405.04180 (2024) - [i22]Zhibo Wang, Peng Kuang, Zhixuan Chu, Jingyi Wang, Kui Ren:
Towards Real World Debiasing: A Fine-grained Analysis On Spurious Correlation. CoRR abs/2405.15240 (2024) - [i21]Jiacheng Du, Zhibo Wang, Kui Ren:
Textual Unlearning Gives a False Sense of Unlearning. CoRR abs/2406.13348 (2024) - [i20]Zhibo Wang, Zhiwei Chang, Jiahui Hu, Xiaoyi Pang, Jiacheng Du, Yongle Chen, Kui Ren:
Breaking Secure Aggregation: Label Leakage from Aggregated Gradients in Federated Learning. CoRR abs/2406.15731 (2024) - [i19]Huiyu Xu, Wenhui Zhang, Zhibo Wang, Feng Xiao, Rui Zheng, Yunhe Feng, Zhongjie Ba, Kui Ren:
RedAgent: Red Teaming Large Language Models with Context-aware Autonomous Language Agent. CoRR abs/2407.16667 (2024) - [i18]Cheng Wei, Yang Wang, Kuofeng Gao, Shuo Shao, Yiming Li, Zhibo Wang, Zhan Qin:
PointNCBW: Towards Dataset Ownership Verification for Point Clouds via Negative Clean-label Backdoor Watermark. CoRR abs/2408.05500 (2024) - [i17]Zeqing He, Zhibo Wang, Zhixuan Chu, Huiyu Xu, Rui Zheng, Kui Ren, Chun Chen:
JailbreakLens: Interpreting Jailbreak Mechanism in the Lens of Representation and Circuit. CoRR abs/2411.11114 (2024) - 2023
- [j89]Zhibo Wang
, Jingjing Ma
, Xue Wang
, Jiahui Hu
, Zhan Qin
, Kui Ren
:
Threats to Training: A Survey of Poisoning Attacks and Defenses on Machine Learning Systems. ACM Comput. Surv. 55(7): 134:1-134:36 (2023) - [j88]Meng Chen
, Li Lu
, Junhao Wang
, Jiadi Yu
, Yingying Chen
, Zhibo Wang
, Zhongjie Ba
, Feng Lin
, Kui Ren
:
VoiceCloak: Adversarial Example Enabled Voice De-Identification with Balanced Privacy and Utility. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 7(2): 48:1-48:21 (2023) - [j87]Guoqi Ma
, Honglong Chen
, Yang Huang
, Wentao Wei, Xiang Liu, Zhibo Wang
:
Utility-Based Heterogeneous User Recruitment of Multitask in Mobile Crowdsensing. IEEE Internet Things J. 10(11): 9796-9808 (2023) - [j86]Dan Wang
, Ju Ren
, Zhibo Wang
, Yichuan Wang
, Yaoxue Zhang:
PrivAim: A Dual-Privacy Preserving and Quality-Aware Incentive Mechanism for Federated Learning. IEEE Trans. Computers 72(7): 1913-1927 (2023) - [j85]Xiaoyi Pang
, Zhibo Wang
, Zeqing He, Peng Sun
, Meng Luo
, Ju Ren
, Kui Ren:
Towards Class-Balanced Privacy Preserving Heterogeneous Model Aggregation. IEEE Trans. Dependable Secur. Comput. 20(3): 2421-2432 (2023) - [j84]Zhibo Wang
, Yuting Huang
, Mengkai Song
, Libing Wu, Feng Xue, Kui Ren:
Poisoning-Assisted Property Inference Attack Against Federated Learning. IEEE Trans. Dependable Secur. Comput. 20(4): 3328-3340 (2023) - [j83]Wenqi Wang
, Run Wang
, Lina Wang
, Zhibo Wang
, Aoshuang Ye
:
Towards a Robust Deep Neural Network Against Adversarial Texts: A Survey. IEEE Trans. Knowl. Data Eng. 35(3): 3159-3179 (2023) - [j82]Zhibo Wang
, Jingxin Li, Jiahui Hu
, Ju Ren
, Qian Wang
, Zhetao Li
, Yanjun Li
:
Towards Privacy-Driven Truthful Incentives for Mobile Crowdsensing Under Untrusted Platform. IEEE Trans. Mob. Comput. 22(2): 1198-1212 (2023) - [j81]Liantao Wu
, Peng Sun
, Zhibo Wang
, Yang Yang
, Zhi Wang:
Temporal Correlation Enhanced Multiuser Detection for Uplink Grant-Free NOMA. IEEE Trans. Mob. Comput. 22(4): 2446-2457 (2023) - [c54]Defang Liu, Zhibo Wang, Xiaoyi Pang, Yunan Sun, Jiahui Hu, Peng Sun, Yuke Hu:
Towards Efficient Edge Learning for Large Models in Heterogeneous Resource-limited Environments. BIGCOM 2023: 223-230 - [c53]Zhibo Wang, He Wang, Shuaifan Jin, Wenwen Zhang, Jiahui Hu, Yan Wang, Peng Sun, Wei Yuan, Kaixin Liu, Kui Ren:
Privacy-preserving Adversarial Facial Features. CVPR 2023: 8212-8221 - [c52]Zhibo Wang, Hongshan Yang, Yunhe Feng, Peng Sun, Hengchang Guo, Zhifei Zhang, Kui Ren:
Towards Transferable Targeted Adversarial Examples. CVPR 2023: 20534-20543 - [c51]Xue Wang, Zhibo Wang, Haiqin Weng, Hengchang Guo, Zhifei Zhang, Lu Jin, Tao Wei, Kui Ren:
Counterfactual-based Saliency Map: Towards Visual Contrastive Explanations for Neural Networks. ICCV 2023: 2042-2051 - [c50]Lei Zhang, Zhibo Wang, Xiaowei Dong, Yunhe Feng, Xiaoyi Pang, Zhifei Zhang, Kui Ren:
Towards Fairness-aware Adversarial Network Pruning. ICCV 2023: 5145-5154 - [c49]Yuheng Yang, Haipeng Chen, Zhenguang Liu, Yingda Lyu, Beibei Zhang, Shuang Wu, Zhibo Wang, Kui Ren:
Action Recognition with Multi-stream Motion Modeling and Mutual Information Maximization. IJCAI 2023: 1658-1666 - [c48]Feng Lin
, Kaiqiang Fu
, Hao Luo
, Ziyue Zhan
, Zhibo Wang
, Zhenguang Liu
, Lorenzo Cavallaro
, Kui Ren
:
Cross-Modal and Multi-Attribute Face Recognition: A Benchmark. ACM Multimedia 2023: 271-279 - [c47]Chao Shuai
, Jieming Zhong
, Shuang Wu
, Feng Lin
, Zhibo Wang
, Zhongjie Ba
, Zhenguang Liu
, Lorenzo Cavallaro
, Kui Ren
:
Locate and Verify: A Two-Stream Network for Improved Deepfake Detection. ACM Multimedia 2023: 7131-7142 - [c46]Kun Pan
, Yifang Yin
, Yao Wei
, Feng Lin
, Zhongjie Ba
, Zhenguang Liu
, Zhibo Wang
, Lorenzo Cavallaro
, Kui Ren
:
DFIL: Deepfake Incremental Learning by Exploiting Domain-invariant Forgery Clues. ACM Multimedia 2023: 8035-8046 - [c45]Pengyun Zhu, Long Wen, Jinfei Liu, Feng Xue, Jian Lou, Zhibo Wang, Kui Ren:
CAPP-130: A Corpus of Chinese Application Privacy Policy Summarization and Interpretation. NeurIPS 2023 - [i16]Zhibo Wang, He Wang, Shuaifan Jin, Wenwen Zhang, Jiahui Hu, Yan Wang, Peng Sun, Wei Yuan, Kaixin Liu, Kui Ren:
Privacy-preserving Adversarial Facial Features. CoRR abs/2305.05391 (2023) - [i15]Yuheng Yang, Haipeng Chen, Zhenguang Liu, Yingda Lyu, Beibei Zhang, Shuang Wu, Zhibo Wang, Kui Ren:
Action Recognition with Multi-stream Motion Modeling and Mutual Information Maximization. CoRR abs/2306.07576 (2023) - [i14]Yudong Gao, Honglong Chen, Peng Sun, Junjian Li, Anqing Zhang, Zhibo Wang:
A Dual Stealthy Backdoor: From Both Spatial and Frequency Perspectives. CoRR abs/2307.10184 (2023) - [i13]Kun Pan, Yifang Yin, Yao Wei, Feng Lin, Zhongjie Ba, Zhenguang Liu, Zhibo Wang, Lorenzo Cavallaro, Kui Ren:
DFIL: Deepfake Incremental Learning by Exploiting Domain-invariant Forgery Clues. CoRR abs/2309.09526 (2023) - [i12]Chao Shuai, Jieming Zhong, Shuang Wu, Feng Lin, Zhibo Wang, Zhongjie Ba, Zhenguang Liu, Lorenzo Cavallaro, Kui Ren:
Locate and Verify: A Two-Stream Network for Improved Deepfake Detection. CoRR abs/2309.11131 (2023) - [i11]Zhongjie Ba, Jieming Zhong, Jiachen Lei, Peng Cheng, Qinglong Wang, Zhan Qin, Zhibo Wang, Kui Ren:
SurrogatePrompt: Bypassing the Safety Filter of Text-To-Image Models via Substitution. CoRR abs/2309.14122 (2023) - [i10]Yulong Yang, Chenhao Lin, Xiang Ji, Qiwei Tian, Qian Li, Hongshan Yang, Zhibo Wang, Chao Shen:
Towards Deep Learning Models Resistant to Transfer-based Adversarial Attacks via Data-centric Robust Learning. CoRR abs/2310.09891 (2023) - 2022
- [j80]Xuyang Ding, Ruizhao Lv, Xiaoyi Pang
, Jiahui Hu
, Zhibo Wang, Xu Yang, Xiong Li
:
Privacy-preserving task allocation for edge computing-based mobile crowdsensing. Comput. Electr. Eng. 97: 107528 (2022) - [j79]Zhibo Wang
, Defang Liu, Yunan Sun
, Xiaoyi Pang
, Peng Sun
, Feng Lin
, John C. S. Lui
, Kui Ren
:
A Survey on IoT-Enabled Home Automation Systems: Attacks and Defenses. IEEE Commun. Surv. Tutorials 24(4): 2292-2328 (2022) - [j78]Dan Wang
, Ju Ren
, Zhibo Wang
, Yaoxue Zhang, Xuemin (Sherman) Shen
:
PrivStream: A privacy-preserving inference framework on IoT streaming data at the edge. Inf. Fusion 80: 282-294 (2022) - [j77]Honglong Chen
, Xin Ai
, Kai Lin
, Na Yan, Zhibo Wang
, Nan Jiang
, Jiguo Yu
:
DAP: Efficient Detection Against Probabilistic Cloning Attacks in Anonymous RFID Systems. IEEE Trans. Ind. Informatics 18(1): 345-355 (2022) - [j76]Yang Huang
, Honglong Chen
, Guoqi Ma, Kai Lin
, Zhichen Ni
, Na Yan, Zhibo Wang
:
OPAT: Optimized Allocation of Time-Dependent Tasks for Mobile Crowdsensing. IEEE Trans. Ind. Informatics 18(4): 2476-2485 (2022) - [j75]Ben Niu, Yahong Chen, Zhibo Wang, Fenghua Li, Boyang Wang, Hui Li:
Eclipse: Preserving Differential Location Privacy Against Long-Term Observation Attacks. IEEE Trans. Mob. Comput. 21(1): 125-138 (2022) - [j74]Peng Sun
, Zhibo Wang
, Liantao Wu
, Yunhe Feng
, Xiaoyi Pang
, Hairong Qi
, Zhi Wang
:
Towards Personalized Privacy-Preserving Incentive for Truth Discovery in Mobile Crowdsensing Systems. IEEE Trans. Mob. Comput. 21(1): 352-365 (2022) - [j73]Zhibo Wang
, Tengda Zhao, Jinxin Ma
, Hongkai Chen, Kaixin Liu, Huajie Shao
, Qian Wang
, Ju Ren
:
Hear Sign Language: A Real-Time End-to-End Sign Language Recognition System. IEEE Trans. Mob. Comput. 21(7): 2398-2410 (2022) - [j72]Dan Wang
, Ju Ren
, Zhibo Wang
, Xiaoyi Pang
, Yaoxue Zhang
, Xuemin Shen
:
Privacy-Preserving Streaming Truth Discovery in Crowdsourcing With Differential Privacy. IEEE Trans. Mob. Comput. 21(10): 3757-3772 (2022) - [j71]Xiaoyi Pang
, Zhibo Wang
, Defang Liu, John C. S. Lui
, Qian Wang
, Ju Ren
:
Towards Personalized Privacy-Preserving Truth Discovery Over Crowdsourced Data Streams. IEEE/ACM Trans. Netw. 30(1): 327-340 (2022) - [j70]Liantao Wu
, Zhibo Wang
, Peng Sun
, Yang Yang
:
Temporal Correlation Enhanced Sparse Activity Detection in MIMO Enabled Grant-Free NOMA. IEEE Trans. Veh. Technol. 71(3): 2887-2899 (2022) - [c44]Zhibo Wang, Xiaowei Dong, Henry Xue, Zhifei Zhang, Weifeng Chiu, Tao Wei, Kui Ren:
Fairness-aware Adversarial Perturbation Towards Bias Mitigation for Deployed Deep Models. CVPR 2022: 10369-10378 - [c43]Xiaoyi Pang, Zhibo Wang, Jingxin Li, Ruiting Zhou, Ju Ren, Zhetao Li:
Towards Online Privacy-preserving Computation Offloading in Mobile Edge Computing. INFOCOM 2022: 1179-1188 - [c42]Ju Ren, Jiani Liu, Yongmin Zhang, Zhaohui Li, Feng Lyu, Zhibo Wang, Yaoxue Zhang:
An Efficient Two-Layer Task Offloading Scheme for MEC System with Multiple Services Providers. INFOCOM 2022: 1519-1528 - [c41]Chao Wang
, Feng Lin
, Tiantian Liu, Kaidi Zheng, Zhibo Wang, Zhengxiong Li, Ming-Chun Huang, Wenyao Xu, Kui Ren:
mmEve: eavesdropping on smartphone's earpiece via COTS mmWave device. MobiCom 2022: 338-351 - [c40]Qianniu Chen
, Meng Chen, Li Lu
, Jiadi Yu, Yingying Chen, Zhibo Wang, Zhongjie Ba, Feng Lin, Kui Ren:
Push the Limit of Adversarial Example Attack on Speaker Recognition in Physical Domain. SenSys 2022: 710-724 - [c39]Rui Zhang
, Jian Liu, Yuan Ding, Zhibo Wang, Qingbiao Wu, Kui Ren:
"Adversarial Examples" for Proof-of-Learning. SP 2022: 1408-1422 - [i9]Zhibo Wang, Xiaowei Dong, Henry Xue, Zhifei Zhang, Weifeng Chiu, Tao Wei, Kui Ren:
Fairness-aware Adversarial Perturbation Towards Bias Mitigation for Deployed Deep Models. CoRR abs/2203.01584 (2022) - [i8]Guodong Cao, Zhibo Wang, Xiaowei Dong, Zhifei Zhang, Hengchang Guo, Zhan Qin, Kui Ren:
Vanilla Feature Distillation for Improving the Accuracy-Robustness Trade-Off in Adversarial Training. CoRR abs/2206.02158 (2022) - 2021
- [j69]Kun Wang, Zhibo Wang
, Ye-Qiong Song, Dejun Yang
, Shibo He, Wei Wang:
IEEE Access Special Section Editorial: Toward Smart Cities With IoT Based on Crowdsensing. IEEE Access 9: 118606-118609 (2021) - [j68]Dai Shi, Dan Tao, Jiangtao Wang
, Muyan Yao
, Zhibo Wang, Houjin Chen, Sumi Helal:
Fine-Grained and Context-Aware Behavioral Biometrics for Pattern Lock on Smartphones. Proc. ACM Interact. Mob. Wearable Ubiquitous Technol. 5(1): 33:1-33:30 (2021) - [j67]Liantao Wu
, Peng Sun
, Zhibo Wang
, Yang Yang
:
Joint User Activity Identification and Channel Estimation for Grant-Free NOMA: A Spatial-Temporal Structure-Enhanced Approach. IEEE Internet Things J. 8(15): 12339-12349 (2021) - [j66]Peng Sun
, Haoxuan Che
, Zhibo Wang
, Yuwei Wang
, Tao Wang, Liantao Wu
, Huajie Shao
:
Pain-FL: Personalized Privacy-Preserving Incentive for Federated Learning. IEEE J. Sel. Areas Commun. 39(12): 3805-3820 (2021) - [j65]Xiaofeng Su, Yanjun Li
, Meihui Gao
, Zhibo Wang, Yinglong Li, Yi-hua Zhu:
Online policies for throughput maximization of backscatter assisted wireless powered communication via reinforcement learning approaches. Pervasive Mob. Comput. 77: 101463 (2021) - [j64]Hongliang Bi, Jian Zhang, Yanjiao Chen, Chaoyang Zhou, Zhibo Wang:
Magic-hand: Turn a smartwatch into a mouse. Pervasive Mob. Comput. 78: 101487 (2021) - [j63]Huajie Shao
, Dachun Sun
, Shuochao Yao
, Lu Su
, Zhibo Wang
, Dongxin Liu, Shengzhong Liu, Lance M. Kaplan
, Tarek F. Abdelzaher
:
Truth Discovery With Multi-Modal Data in Social Sensing. IEEE Trans. Computers 70(9): 1325-1337 (2021) - [j62]Zhibo Wang
, Mengkai Song
, Siyan Zheng
, Zhifei Zhang
, Yang Song
, Qian Wang
:
Invisible Adversarial Attack against Deep Neural Networks: An Adaptive Penalization Approach. IEEE Trans. Dependable Secur. Comput. 18(3): 1474-1488 (2021) - [j61]Shengshan Hu, Chengjun Cai
, Qian Wang
, Cong Wang
, Zhibo Wang
, Dengpan Ye
:
Augmenting Encrypted Search: A Decentralized Service Realization with Enforced Execution. IEEE Trans. Dependable Secur. Comput. 18(6): 2569-2581 (2021) - [j60]Xin Ai, Honglong Chen
, Kai Lin, Zhibo Wang
, Jiguo Yu
:
Nowhere to Hide: Efficiently Identifying Probabilistic Cloning Attacks in Large-Scale RFID Systems. IEEE Trans. Inf. Forensics Secur. 16: 714-727 (2021) - [j59]Man Zhou
, Qian Wang
, Jingxiao Yang
, Qi Li
, Peipei Jiang
, Yanjiao Chen, Zhibo Wang
:
Stealing Your Android Patterns via Acoustic Signals. IEEE Trans. Mob. Comput. 20(4): 1656-1671 (2021) - [j58]Zhibo Wang
, Yuting Huang
, Xinkai Wang
, Ju Ren
, Qian Wang
, Libing Wu
:
SocialRecruiter: Dynamic Incentive Mechanism for Mobile Crowdsourcing Worker Recruitment With Social Networks. IEEE Trans. Mob. Comput. 20(5): 2055-2066 (2021) - [j57]Zhibo Wang
, Jing Zhao
, Jiahui Hu
, Tianqing Zhu
, Qian Wang
, Ju Ren
, Chao Li:
Towards Personalized Task-Oriented Worker Recruitment in Mobile Crowdsensing. IEEE Trans. Mob. Comput. 20(5): 2080-2093 (2021) - [j56]Peng Sun
, Zhibo Wang
, Liantao Wu
, Huajie Shao
, Hairong Qi, Zhi Wang:
Trustworthy and Cost-Effective Cell Selection for Sparse Mobile Crowdsensing Systems. IEEE Trans. Veh. Technol. 70(6): 6108-6121 (2021) - [c38]Zhibo Wang, Hengchang Guo, Zhifei Zhang, Wenxin Liu, Zhan Qin, Kui Ren:
Feature Importance-aware Transferable Adversarial Attacks. ICCV 2021: 7619-7628 - [c37]Ruiting Zhou, Jinlong Pang, Zhibo Wang, John C. S. Lui, Zongpeng Li:
A Truthful Procurement Auction for Incentivizing Heterogeneous Clients in Federated Learning. ICDCS 2021: 183-193 - [c36]Ben Niu, Yahong Chen, Boyang Wang, Zhibo Wang, Fenghua Li, Jin Cao:
AdaPDP: Adaptive Personalized Differential Privacy. INFOCOM 2021: 1-10 - [i7]Zhibo Wang, Hengchang Guo, Zhifei Zhang, Wenxin Liu, Zhan Qin, Kui Ren:
Feature Importance-aware Transferable Adversarial Attacks. CoRR abs/2107.14185 (2021) - 2020
- [j55]Honglong Chen, Yuting Qin, Kai Lin, Yingxin Luan, Zhibo Wang, Jiguo Yu, Yanjun Li:
PWEND: Proactive wakeup based energy-efficient neighbor discovery for mobile sensor networks. Ad Hoc Networks 107: 102247 (2020) - [j54]Xiaoyi Pang, Dengfeng Guo, Zhibo Wang, Peng Sun, Liqiang Zhang:
Towards fair and efficient task allocation in blockchain-based crowdsourcing. CCF Trans. Netw. 3(3-4): 193-204 (2020) - [j53]Zhetao Li, Wenlin Li, Fuyuan Lin, Yi Sun, Min Yang, Yuan Zhang, Zhibo Wang:
Hybrid malware detection approach with feedback-directed machine learning. Sci. China Inf. Sci. 63(3) (2020) - [j52]Peng Sun
, Liantao Wu
, Zhibo Wang
, Yunhe Feng
, Zhi Wang
:
SCRA: Structured Compressive Random Access for Efficient Information Collection in IoT. IEEE Internet Things J. 7(3): 2356-2367 (2020) - [j51]Liantao Wu
, Peng Sun
, Zhibo Wang
, Yang Yang
, Zhi Wang
:
Toward Efficient Compressed-Sensing-Based RFID Identification: A Sparsity-Controlled Approach. IEEE Internet Things J. 7(8): 7714-7724 (2020) - [j50]Mengkai Song
, Zhibo Wang
, Zhifei Zhang, Yang Song, Qian Wang
, Ju Ren
, Hairong Qi:
Analyzing User-Level Privacy Attack Against Federated Learning. IEEE J. Sel. Areas Commun. 38(10): 2430-2444 (2020) - [j49]Feng Xia
, Jinzhong Wang, Xiangjie Kong
, Da Zhang
, Zhibo Wang
:
Ranking Station Importance With Human Mobility Patterns Using Subway Network Datasets. IEEE Trans. Intell. Transp. Syst. 21(7): 2840-2852 (2020) - [j48]Run Wang
, Zhibo Wang
, Benxiao Tang
, Lei Zhao, Lina Wang
:
SmartPI: Understanding Permission Implications of Android Apps from User Reviews. IEEE Trans. Mob. Comput. 19(12): 2933-2945 (2020) - [j47]