Beyond inferring class representatives: User-level privacy leakage from federated learning Z Wang, M Song, Z Zhang, Y Song, Q Wang, H Qi IEEE INFOCOM 2019-IEEE conference on computer communications, 2512-2520, 2019 | 536 | 2019 |
Friendbook: a semantic-based friend recommendation system for social networks Z Wang, J Liao, Q Cao, H Qi IEEE Transactions on Mobile Computing, 538 - 551, 2015 | 298 | 2015 |
Personalized privacy-preserving task allocation for mobile crowdsensing Z Wang, J Hu, R Lv, J Wei, Q Wang, D Yang, H Qi IEEE Transactions on Mobile Computing 18 (6), 1330-1341, 2018 | 188 | 2018 |
Real-time and spatio-temporal crowd-sourced social network data publishing with differential privacy Q Wang, Y Zhang, X Lu, Z Wang, Z Qin, K Ren IEEE Transactions on Dependable and Secure Computing 15 (4), 591-606, 2016 | 174 | 2016 |
Achieving k-barrier Coverage in Hybrid Directional Sensor Networks Z Wang, H Qi, Z Wang, J Liao, Q Cao IEEE Transactions on Mobile Computing (TMC) 13 (7), 1443-1455, 2014 | 170 | 2014 |
Exploring human mobility patterns in urban scenarios: A trajectory data perspective F Xia, J Wang, X Kong, Z Wang, J Li, C Liu IEEE Communications Magazine 56 (3), 142-149, 2018 | 122 | 2018 |
Analyzing user-level privacy attack against federated learning M Song, Z Wang, Z Zhang, Y Song, Q Wang, J Ren, H Qi IEEE Journal on Selected Areas in Communications 38 (10), 2430-2444, 2020 | 116 | 2020 |
Privacy-preserving crowd-sourced statistical data publishing with an untrusted server Z Wang, X Pang, Y Chen, H Shao, Q Wang, L Wu, H Chen, H Qi IEEE Transactions on Mobile Computing 18 (6), 1356-1367, 2018 | 108 | 2018 |
A traffic adaptive multi-channel MAC protocol with dynamic slot allocation for WSNs S Zhuo, Z Wang, YQ Song, Z Wang, L Almeida IEEE transactions on mobile computing 15 (7), 1600-1613, 2015 | 79 | 2015 |
CloudBI: Practical privacy-preserving outsourcing of biometric identification in the cloud Q Wang, S Hu, K Ren, M He, M Du, Z Wang Computer Security--ESORICS 2015: 20th European Symposium on Research in …, 2015 | 79 | 2015 |
EveDroid: Event-aware Android malware detection against model degrading for IoT devices T Lei, Z Qin, Z Wang, Q Li, D Ye IEEE Internet of Things Journal 6 (4), 6668-6680, 2019 | 74 | 2019 |
Achieving location error tolerant barrier coverage for wireless sensor networks Z Wang, H Chen, Q Cao, H Qi, Z Wang, Q Wang Computer Networks 112, 314-328, 2017 | 71 | 2017 |
Securing DV-Hop localization against wormhole attacks in wireless sensor networks H Chen, W Lou, Z Wang, J Wu, Z Wang, A Xia Pervasive and Mobile Computing 16, 22-35, 2015 | 69 | 2015 |
A novel mobility management scheme for target tracking in cluster-based sensor networks Z Wang, W Lou, Z Wang, J Ma, H Chen Distributed Computing in Sensor Systems: 6th IEEE International Conference …, 2010 | 67 | 2010 |
Patternlistener: Cracking android pattern lock using acoustic signals M Zhou, Q Wang, J Yang, Q Li, F Xiao, Z Wang, X Chen Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018 | 66 | 2018 |
Towards a robust deep neural network in texts: A survey W Wang, R Wang, L Wang, Z Wang, A Ye arXiv preprint arXiv:1902.07285, 2019 | 65 | 2019 |
Queue-MAC: A queue-length aware hybrid CSMA/TDMA MAC protocol for providing dynamic adaptation to traffic and duty-cycle variation in wireless sensor networks S Zhuo, YQ Song, Z Wang, Z Wang 2012 9th IEEE International Workshop on Factory Communication Systems, 105-114, 2012 | 65 | 2012 |
Cost-effective barrier coverage formation in heterogeneous wireless sensor networks Z Wang, Q Cao, H Qi, H Chen, Q Wang Ad Hoc Networks 64, 65-79, 2017 | 64 | 2017 |
Rain bar: Robust application-driven visual communication using color barcodes Q Wang, M Zhou, K Ren, T Lei, J Li, Z Wang 2015 IEEE 35th International Conference on Distributed Computing Systems …, 2015 | 63 | 2015 |
Feature importance-aware transferable adversarial attacks Z Wang, H Guo, Z Zhang, W Liu, Z Qin, K Ren Proceedings of the IEEE/CVF international conference on computer vision …, 2021 | 62 | 2021 |