default search action
Bin Wu 0012
Person information
- affiliation: Beijing University of Posts and Telecommunications, School of Cyberspace Security, National Disaster Recovery Technology Engineering Laboratory, China
- affiliation (PhD 2008): Beijing University of Posts and Telecommunications, China
- not to be confused with: Bin Wu 0001
- not to be confused with: Bin Wu 0016
Other persons with the same name
- Bin Wu — disambiguation page
- Bin Wu 0001 — Beijing University of Posts and Telecommunications, Beijing Key Laboratory of Intelligent Telecommunications Software and Multimedia, China (and 1 more)
- Bin Wu 0002 — Tianjin University, School of Computer Science and Technology, China (and 2 more)
- Bin Wu 0003 — Alibaba Group, Hangzhou, China (and 1 more)
- Bin Wu 0004 — University of California, Irvine, Department of Electrical Engineering and Computer Science, CA, USA
- Bin Wu 0005 — Ocean University of China, College of Information Science and Engineering, Qingdao, China
- Bin Wu 0006 — Chinese Academy of Sciences, Institute of Microelectronics, Beijing, China
- Bin Wu 0007 — Ryerson University, Department of Electrical and Computer Engineering, Toronto, ON, Canada (and 1 more)
- Bin Wu 0008 — Kunming Medical University, First Affiliated Hospital, China
- Bin Wu 0009 — University of Waterloo, Ontario, Canada
- Bin Wu 0010 — East China Normal University, Shanghai, China
- Bin Wu 0011 — Chinese Academy of Sciences, State Key Laboratory of Information Security, Beijing, China
- Bin Wu 0013 — Hong Kong University of Science and Technology, Department of Computer Science and Engineering, Hong Kong
- Bin Wu 0014 — University of Illinois at Chicago, Department of Computer Science, IL, USA
- Bin Wu 0015 — Zhejiang University, College of Biomedical Engineering & Instrument Science, Hangzhou, China
- Bin Wu 0016 — Beijing University of Posts and Telecommunications, School of Sciences, China
- Bin Wu 0017 — Army Engineering University, Department of UAV Engineering, Shijiazhuang, China
- Bin Wu 0018 — Western Norway University of Applied Sciences, Department of Computer Science, Electrical Engineering and Mathematical Sciences, Bergen, Norway (and 1 more)
- Bin Wu 0019 — Zhengzhou University, School of Information Engineering, China
- Bin Wu 0020 — Jilin University, College of Electronic Science and Engineering, State Key Laboratory of Integrated Optoelectronics, Changchun, China (and 2 more)
- Bin Wu 0021 — Jiujiang University, School of Information Science and Technology, China (and 1 more)
- Bin Wu 0022 — Jimei University, Chengyi University College, Xiamen, China (and 1 more)
- Bin Wu 0023 — Northwest Normal University, College of Mathematics and Statistics, Lanzhou, China
- Bin Wu 0024 — Xidian University, School of Electronic Engineering, Xi'an, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2023
- [j14]Rundong Yang, Kangfeng Zheng, Xiujuan Wang, Bin Wu, Chunhua Wu:
Social Engineering Attack-Defense Strategies Based on Reinforcement Learning. Comput. Syst. Sci. Eng. 47(2): 2153-2170 (2023) - 2022
- [j13]Rundong Yang, Kangfeng Zheng, Bin Wu, Di Li, Zhe Wang, Xiujuan Wang:
Predicting User Susceptibility to Phishing Based on Multidimensional Features. Comput. Intell. Neurosci. 2022: 7058972:1-7058972:11 (2022) - 2021
- [j12]Rundong Yang, Kangfeng Zheng, Bin Wu, Chunhua Wu, Xiujuan Wang:
Phishing Website Detection Based on Deep Convolutional Neural Network and Random Forest Ensemble Learning. Sensors 21(24): 8281 (2021) - [c7]Qinghuan Rao, Bin Wu:
Evaluation Model Based on Hesitation Fuzzy Theory. AISS 2021: 35:1-35:8 - 2020
- [j11]Bin Wu, Le Liu, Yanqing Yang, Kangfeng Zheng, Xiujuan Wang:
Using Improved Conditional Generative Adversarial Networks to Detect Social Bots on Twitter. IEEE Access 8: 36664-36680 (2020) - [j10]Yanqing Yang, Kangfeng Zheng, Bin Wu, Yixian Yang, Xiujuan Wang:
Network Intrusion Detection Based on Supervised Adversarial Variational Auto-Encoder With Regularization. IEEE Access 8: 42169-42184 (2020) - [j9]Kangfeng Zheng, Xiujuan Wang, Bin Wu, Tong Wu:
Feature subset selection combining maximal information entropy and maximal information coefficient. Appl. Intell. 50(2): 487-501 (2020) - [j8]Zhe Wang, Bo Yan, Chunhua Wu, Bin Wu, Xiujuan Wang, Kangfeng Zheng:
Graph Adaptation Network with Domain-Specific Word Alignment for Cross-Domain Relation Extraction. Sensors 20(24): 7180 (2020) - [c6]Meiqi Miao, Bin Wu:
A Flexible Phishing Detection Approach Based on Software-Defined Networking Using Ensemble Learning Method. HP3C 2020: 70-73
2010 – 2019
- 2019
- [j7]Huan Zhang, Kangfeng Zheng, Xiujuan Wang, Shoushan Luo, Bin Wu:
Efficient Strategy Selection for Moving Target Defense Under Multiple Attacks. IEEE Access 7: 65982-65995 (2019) - [j6]Kangfeng Zheng, Tong Wu, Xiujuan Wang, Bin Wu, Chunhua Wu:
A Session and Dialogue-Based Social Engineering Framework. IEEE Access 7: 67781-67794 (2019) - [j5]Bin Wu, Le Liu, Zhengge Dai, Xiujuan Wang, Kangfeng Zheng:
Detecting Malicious Social Robots with Generative Adversarial Networks. KSII Trans. Internet Inf. Syst. 13(11): 5594-5515 (2019) - [c5]Huan Zhang, Kangfeng Zheng, Xiaodan Yan, Shoushan Luo, Bin Wu:
Moving Target Defense Against Injection Attacks. ICA3PP (1) 2019: 518-532 - 2018
- [c4]Xiaoji Chen, Chuan Shi, Aimin Zhou, Siyong Xu, Bin Wu:
A Hybrid Replacement Strategy for MOEA/D. BIC-TA (1) 2018: 246-262 - 2016
- [j4]Weixin Liu, Kangfeng Zheng, Bin Wu, Chunhua Wu, Xinxin Niu:
Flow-based Anomaly Detection Using Access Behavior Profiling and Time-sequenced Relation Mining. KSII Trans. Internet Inf. Syst. 10(6): 2781-2800 (2016) - [c3]Xu Wang, Kangfeng Zheng, Xinxin Niu, Bin Wu, Chunhua Wu:
Detection of command and control in advanced persistent threat based on independent access. ICC 2016: 1-6 - 2015
- [j3]Fangfang Dai, Ying Hu, Kangfeng Zheng, Bin Wu:
Exploring risk flow attack graph for security risk assessment. IET Inf. Secur. 9(6): 344-353 (2015) - [j2]Fangfang Dai, Kangfeng Zheng, Bin Wu, Shoushan Luo:
Using Genetic Algorithm for Optimal Security Hardening in Risk Flow Attack Graph. KSII Trans. Internet Inf. Syst. 9(5): 1920-1937 (2015) - [c2]Fangfang Dai, Kangfeng Zheng, Shoushan Luo, Bin Wu:
Towards a multiobjective framework for evaluating network security under exploit attacks. ICC 2015: 7186-7191 - 2012
- [j1]Tianliang Lu, Kangfeng Zheng, Rongrong Fu, Yingqing Liu, Bin Wu, Shize Guo:
A Danger Theory Based Mobile Virus Detection Model and Its Application in Inhibiting Virus. J. Networks 7(8): 1227-1232 (2012)
2000 – 2009
- 2007
- [c1]Bin Wu, Kangfeng Zheng, Yixian Yang:
A Data Safety Transmission Solution in Web Application. Web Intelligence/IAT Workshops 2007: 303-306
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-26 21:44 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint