Beyond inferring class representatives: User-level privacy leakage from federated learning Z Wang, M Song, Z Zhang, Y Song, Q Wang, H Qi IEEE INFOCOM 2019-IEEE conference on computer communications, 2512-2520, 2019 | 859 | 2019 |
Friendbook: a semantic-based friend recommendation system for social networks Z Wang, J Liao, Q Cao, H Qi IEEE Transactions on Mobile Computing, 538 - 551, 2015 | 317 | 2015 |
Personalized privacy-preserving task allocation for mobile crowdsensing Z Wang, J Hu, R Lv, J Wei, Q Wang, D Yang, H Qi IEEE Transactions on Mobile Computing 18 (6), 1330-1341, 2018 | 235 | 2018 |
Real-time and spatio-temporal crowd-sourced social network data publishing with differential privacy Q Wang, Y Zhang, X Lu, Z Wang, Z Qin, K Ren IEEE Transactions on Dependable and Secure Computing 15 (4), 591-606, 2016 | 215 | 2016 |
Analyzing user-level privacy attack against federated learning M Song, Z Wang, Z Zhang, Y Song, Q Wang, J Ren, H Qi IEEE Journal on Selected Areas in Communications 38 (10), 2430-2444, 2020 | 207 | 2020 |
Feature importance-aware transferable adversarial attacks Z Wang, H Guo, Z Zhang, W Liu, Z Qin, K Ren Proceedings of the IEEE/CVF international conference on computer vision …, 2021 | 206 | 2021 |
Achieving k-barrier Coverage in Hybrid Directional Sensor Networks Z Wang, H Qi, Z Wang, J Liao, Q Cao IEEE Transactions on Mobile Computing (TMC) 13 (7), 1443-1455, 2014 | 176 | 2014 |
Exploring human mobility patterns in urban scenarios: A trajectory data perspective F Xia, J Wang, X Kong, Z Wang, J Li, C Liu IEEE Communications Magazine 56 (3), 142-149, 2018 | 153 | 2018 |
Privacy-preserving crowd-sourced statistical data publishing with an untrusted server Z Wang, X Pang, Y Chen, H Shao, Q Wang, L Wu, H Chen, H Qi IEEE Transactions on Mobile Computing 18 (6), 1356-1367, 2018 | 133 | 2018 |
EveDroid: Event-aware Android malware detection against model degrading for IoT devices T Lei, Z Qin, Z Wang, Q Li, D Ye IEEE Internet of Things Journal 6 (4), 6668-6680, 2019 | 105 | 2019 |
CloudBI: Practical privacy-preserving outsourcing of biometric identification in the cloud Q Wang, S Hu, K Ren, M He, M Du, Z Wang Computer Security--ESORICS 2015: 20th European Symposium on Research in …, 2015 | 91 | 2015 |
Patternlistener: Cracking android pattern lock using acoustic signals M Zhou, Q Wang, J Yang, Q Li, F Xiao, Z Wang, X Chen Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018 | 86 | 2018 |
A traffic adaptive multi-channel MAC protocol with dynamic slot allocation for WSNs S Zhuo, Z Wang, YQ Song, Z Wang, L Almeida IEEE transactions on mobile computing 15 (7), 1600-1613, 2015 | 85 | 2015 |
Achieving location error tolerant barrier coverage for wireless sensor networks Z Wang, H Chen, Q Cao, H Qi, Z Wang, Q Wang Computer Networks 112, 314-328, 2017 | 77 | 2017 |
Securing DV-Hop localization against wormhole attacks in wireless sensor networks H Chen, W Lou, Z Wang, J Wu, Z Wang, A Xia Pervasive and Mobile Computing 16, 22-35, 2015 | 76 | 2015 |
Towards privacy-preserving incentive for mobile crowdsensing under an untrusted platform Z Wang, J Li, J Hu, J Ren, Z Li, Y Li IEEE INFOCOM 2019-IEEE Conference on Computer Communications, 2053-2061, 2019 | 74 | 2019 |
Rain bar: Robust application-driven visual communication using color barcodes Q Wang, M Zhou, K Ren, T Lei, J Li, Z Wang 2015 IEEE 35th International Conference on Distributed Computing Systems …, 2015 | 74 | 2015 |
Pain-FL: Personalized privacy-preserving incentive for federated learning P Sun, H Che, Z Wang, Y Wang, T Wang, L Wu, H Shao IEEE Journal on Selected Areas in Communications 39 (12), 3805-3820, 2021 | 71 | 2021 |
Towards personalized privacy-preserving incentive for truth discovery in mobile crowdsensing systems P Sun, Z Wang, L Wu, Y Feng, X Pang, H Qi, Z Wang IEEE Transactions on Mobile Computing 21 (1), 352-365, 2020 | 70 | 2020 |
Towards a robust deep neural network in texts: A survey W Wang, R Wang, L Wang, Z Wang, A Ye arXiv preprint arXiv:1902.07285, 2019 | 69 | 2019 |