default search action
Xuebin Wang
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j17]Liyan Shen, Zhenhan Ke, Jinqiao Shi, Xi Zhang, Yanwei Sun, Jiapeng Zhao, Xuebin Wang, Xiaojie Zhao:
SPEFL: Efficient Security and Privacy-Enhanced Federated Learning Against Poisoning Attacks. IEEE Internet Things J. 11(8): 13437-13451 (2024) - [j16]Hao Huang, Yongbiao Hu, Xuebin Wang:
A Fusion Positioning System Based on Camera and LiDAR for Unmanned Rollers in Tunnel Construction. Sensors 24(13): 4408 (2024) - [j15]Rui Sun, Guoxi Huang, Ruirui Xie, Xuebin Wang, Long Chen:
Diffusion Augmentation and Pose Generation Based Pre-Training Method for Robust Visible-Infrared Person Re-Identification. IEEE Signal Process. Lett. 31: 2670-2674 (2024) - [c39]Wenyuan Zhang, Xinghua Zhang, Shiyao Cui, Kun Huang, Xuebin Wang, Tingwen Liu:
Adaptive Data Augmentation for Aspect Sentiment Quad Prediction. ICASSP 2024: 11176-11180 - [c38]Qingfeng Zhang, Muqian Chen, Xuebin Wang, Can Zhao, Qingyun Liu, Jinqiao Shi:
Knock-Knock: De-Anonymise Hidden Services by Exploiting Service Answer Vulnerability. WCNC 2024: 1-7 - [c37]Qingfeng Zhang, Zhiyang Teng, Xuebin Wang, Yue Gao, Qingyun Liu, Jinqiao Shi:
HSDirSniper: A New Attack Exploiting Vulnerabilities in Tor's Hidden Service Directories. WWW 2024: 1812-1823 - [i9]Wenyuan Zhang, Xinghua Zhang, Shiyao Cui, Kun Huang, Xuebin Wang, Tingwen Liu:
Adaptive Data Augmentation for Aspect Sentiment Quad Prediction. CoRR abs/2401.06394 (2024) - [i8]Lan Wu, Xuebin Wang, Ruijuan Chu, Guangyi Liu, Yingchun Chen, Jing Zhang, Linyu Wang:
FlightPatchNet: Multi-Scale Patch Network with Differential Coding for Flight Trajectory Prediction. CoRR abs/2405.16200 (2024) - [i7]Rui Ding, Jianguo Liu, Kang Hua, Xuebin Wang, Xiaoben Zhang, Minhua Shao, Yuxin Chen, Junhong Chen:
Leveraging Data Mining, Active Learning, and Domain Adaptation in a Multi-Stage, Machine Learning-Driven Approach for the Efficient Discovery of Advanced Acidic Oxygen Evolution Electrocatalysts. CoRR abs/2407.04877 (2024) - [i6]Xuebin Wang, Chunxiuzi Liu, Meng Zhao, Ke Zhang, Zengru Di, He Liu:
An Artificial Neural Network for Image Classification Inspired by Aversive Olfactory Learning Circuits in Caenorhabditis Elegans. CoRR abs/2409.07466 (2024) - 2023
- [j14]Xuebin Wang, Taifu Wang, Zhihao Xie, Youjin Zhang, Shiqiang Xia, Ruixue Sun, Xinqiu He, Ruizhi Xiang, Qiwen Zheng, Zhencheng Liu, Jin'an Wang, Honglong Wu, Xiangqian Jin, Weijun Chen, Dongfang Li, Zengquan He:
GPMeta: a GPU-accelerated method for ultrarapid pathogen identification from metagenomic sequences. Briefings Bioinform. 24(2) (2023) - [j13]Huashuang Yang, Jinqiao Shi, Yue Gao, Xuebin Wang, Yanwei Sun, Ruisheng Shi, Dongbin Wang:
Evicting and filling attack for linking multiple network addresses of Bitcoin nodes. Cybersecur. 6(1): 50 (2023) - [c36]Xinru Huang, Jiapeng Zhao, Jinqiao Shi, Yanwei Sun, Xuebin Wang, Liyan Shen:
Syntactic Enhanced Euphemisms Identification Based on Graph Convolution Networks and Dependency Parsing. DSC 2023: 172-180 - [c35]Haojie Chen, Jiapeng Zhao, Jinqiao Shi, Xuebin Wang, Liyan Shen, Yanwei Sun:
Self-Disclosure Causality Detection: Discover What Cause the Self-Disclosure. DSC 2023: 298-305 - [c34]Qingfeng Zhang, Jiawei Zhu, Muqian Chen, Xuebin Wang, Qingyun Liu, Jinqiao Shi:
A Comprehensive Evaluation of the Impact on Tor Network Anonymity Caused by ShadowRelay. ISCC 2023: 1369-1375 - [c33]Guobin Fu, Xuebin Wang, Han Zhu, Rui Song, Yang Xu, Dingran Cheng, Yang Cui, Renyue Jing:
The VMD-CNN-Trans model used for ultra-short-term power prediction in wind farms. iSPEC 2023: 1-5 - [c32]Xinghua Zhang, Bowen Yu, Jiangxia Cao, Quangang Li, Xuebin Wang, Tingwen Liu, Hongbo Xu:
Representation and Labeling Gap Bridging for Cross-lingual Named Entity Recognition. SIGIR 2023: 1230-1240 - [c31]Meiqi Wang, Muqian Chen, Zeyu Li, Xuebin Wang, Jinqiao Shi, Binxing Fang:
Deanonymize Tor Hidden Services Using Remote Website Fingerprinting. TrustCom 2023: 998-1005 - [i5]Shiyao Cui, Xin Cong, Jiawei Sheng, Xuebin Wang, Tingwen Liu, Jinqiao Shi:
Prompt2Gaussia: Uncertain Prompt-learning for Script Event Prediction. CoRR abs/2308.02103 (2023) - [i4]Houquan Zhou, Yang Hou, Zhenghua Li, Xuebin Wang, Zhefeng Wang, Xinyu Duan, Min Zhang:
How Well Do Large Language Models Understand Syntax? An Evaluation by Asking Natural Language Questions. CoRR abs/2311.08287 (2023) - 2022
- [j12]Xuebin Wang, Aitao Lu, Tao Lin, Siyi Liu, Tianhua Song, Xin Huang, Lilan Jiang:
Perceived usefulness predicts second language learners' continuance intention toward language learning applications: a serial multiple mediation model of integrative motivation and flow. Educ. Inf. Technol. 27(4): 5033-5049 (2022) - [j11]Qingfeng Tan, Xuebin Wang, Wei Shi, Jian Tang, Zhihong Tian:
An Anonymity Vulnerability in Tor. IEEE/ACM Trans. Netw. 30(6): 2574-2587 (2022) - [c30]Liyan Shen, Ye Dong, Binxing Fang, Jinqiao Shi, Xuebin Wang, Shengli Pan, Ruisheng Shi:
ABNN2: secure two-party arbitrary-bitwidth quantized neural network predictions. DAC 2022: 361-366 - [c29]Xuebin Wang, Zhipeng Chen, Zeyu Li, Wentao Huang, Meiqi Wang, Shengli Pan, Jinqiao Shi:
Identification of MEEK-Based TOR Hidden Service Access Using the Key Packet Sequence. ICCS (1) 2022: 554-568 - 2021
- [j10]Xuan Li, Xuebin Wang, Fan Li, Tao Niu, Guoqiang Lu, Yue Sun, Wei Huang, Bo Hu, Kaigui Xie:
Wind-Thermal-CSP Bundling Model With an Adjustable Heat Storage Strategy for CSP Stations. IEEE Access 9: 25984-25992 (2021) - [j9]Xiangmin Jiao, Xuebin Wang, Qiao Chen:
Optimal and Low-Memory Near-Optimal Preconditioning of Fully Implicit Runge-Kutta Schemes for Parabolic PDEs. SIAM J. Sci. Comput. 43(5): A3527-A3551 (2021) - [j8]Jin Guo, Xuebin Wang, Wenchao Xue, Yanlong Zhao:
System Identification With Binary-Valued Observations Under Data Tampering Attacks. IEEE Trans. Autom. Control. 66(8): 3825-3832 (2021) - [c28]Qingfeng Zhang, Xuebin Wang, Jinqiao Shi, Meiqi Wang, Yue Gao, Can Zhao:
ExitSniffer: Towards Comprehensive Security Analysis of Anomalous Binding Relationship of Exit Routers. CNCERT 2021: 93-109 - [c27]Xuebin Wang, Meiqi Wang, Jinqiao Shi, Zeyu Li, Kexin Zou, Binxing Fang:
Efficient Classification of Darknet Access Activity with Partial Traffic. CNCERT 2021: 113-128 - [c26]Zeyu Li, Meiqi Wang, Xuebin Wang, Jinqiao Shi, Kexin Zou, Majing Su:
Identification Domain Fronting Traffic for Revealing Obfuscated C2 Communications. DSC 2021: 91-98 - [c25]Kexin Zou, Jinqiao Shi, Yue Gao, Xuebin Wang, Meiqi Wang, Zeyu Li, Majing Su:
Bit-FP: A Traffic Fingerprinting Approach for Bitcoin Hidden Service Detection. DSC 2021: 99-105 - [c24]Panpan Zhang, Yao Qi, Yanzeng Li, Jing Ya, Xuebin Wang, Tingwen Liu, Jinqiao Shi:
Identifying Reply Relationships from Telegram Groups Using Multi-Features Fusion. DSC 2021: 321-327 - [c23]Yue Gao, Jinqiao Shi, Xuebin Wang, Ruisheng Shi, Can Zhao, Chenglong Li:
A Two-Stage Deanonymization Attack Towards Bitcoin Hidden Service Nodes. HPCC/DSS/SmartCity/DependSys 2021: 543-550 - [c22]Panpan Zhang, Xuebin Wang, Jing Ya, Jiapeng Zhao, Tingwen Liu, Jinqiao Shi:
Darknet Public Hazard Entity Recognition Based on Deep Learning. ICEA 2021: 94-100 - [c21]Xuebin Wang, Zeyu Li, Wentao Huang, Meiqi Wang, Jinqiao Shi, Yanyan Yang:
Towards Comprehensive Analysis of Tor Hidden Service Access Behavior Identification Under Obfs4 Scenario. ICEA 2021: 205-210 - [c20]Yue Gao, Jinqiao Shi, Xuebin Wang, Ruisheng Shi, Zelin Yin, Yanyan Yang:
Practical Deanonymization Attack in Ethereum Based on P2P Network Analysis. ISPA/BDCloud/SocialCom/SustainCom 2021: 1402-1409 - 2020
- [j7]Yipeng Li, Qiao Chen, Xuebin Wang, Xiangmin Jiao:
WLS-ENO remap: Superconvergent and non-oscillatory weighted least squares data transfer on surfaces. J. Comput. Phys. 417: 109578 (2020) - [c19]Shiyao Cui, Bowen Yu, Tingwen Liu, Zhenyu Zhang, Xuebin Wang, Jinqiao Shi:
Edge-Enhanced Graph Convolution Networks for Event Detection with Syntactic Relation. EMNLP (Findings) 2020: 2329-2339 - [c18]Siyuan Wang, Peng Liu, Jinqiao Shi, Xuebin Wang, Can Zhao, Zelin Yin:
Learn More from Context: Joint Modeling of Local and Global Attention for Aspect Sentiment Classification. ICCS (7) 2020: 271-284 - [c17]Siyuan Wang, Yue Gao, Jinqiao Shi, Xuebin Wang, Can Zhao, Zelin Yin:
Look Deep into the New Deep Network: A Measurement Study on the ZeroNet. ICCS (1) 2020: 595-608 - [c16]Meiqi Wang, Yanzeng Li, Xuebin Wang, Tingwen Liu, Jinqiao Shi, Muqian Chen:
2ch-TCN: A Website Fingerprinting Attack over Tor Using 2-channel Temporal Convolutional Networks. ISCC 2020: 1-7 - [c15]Peng Liu, Tingwen Liu, Jinqiao Shi, Xuebin Wang, Zelin Yin, Can Zhao:
Aspect level sentiment classification with unbiased attention and target enhanced representations. SAC 2020: 843-850 - [c14]Muqian Chen, Xuebin Wang, Jinqiao Shi, Can Zhao, Meiqi Wang, Binxing Fang:
Napping Guard: Deanonymizing Tor Hidden Service in a Stealthy Way. TrustCom 2020: 699-706 - [i3]Shiyao Cui, Bowen Yu, Tingwen Liu, Zhenyu Zhang, Xuebin Wang, Jinqiao Shi:
Event Detection with Relation-Aware Graph Convolutional Neural Networks. CoRR abs/2002.10757 (2020) - [i2]Xiangmin Jiao, Xuebin Wang, Qiao Chen:
Optimal and Low-Memory Near-Optimal Preconditioning of Fully Implicit Runge-Kutta Schemes for Parabolic PDEs. CoRR abs/2012.12779 (2020)
2010 – 2019
- 2019
- [j6]Yu Xu, Zhe Lin, Chong Tang, Yujing Tang, Yue Cai, Hongbin Zhong, Xuebin Wang, Wenwei Zhang, Chongjun Xu, Jingjing Wang, Jian Wang, Huanming Yang, Linfeng Yang, Qiang Gao:
A new massively parallel nanoball sequencing platform for whole exome research. BMC Bioinform. 20(1): 153:1-153:9 (2019) - [j5]Xuebin Wang, Zhengzhou Zhu, Jiaqi Yu, Ruofei Zhu, Deqi Li, Qun Guo:
A learning resource recommendation algorithm based on online learning sequential behavior. Int. J. Wavelets Multiresolution Inf. Process. 17(2): 1940001:1-1940001:17 (2019) - [j4]Qingfeng Tan, Yue Gao, Jinqiao Shi, Xuebin Wang, Binxing Fang, Zhihong Tian:
Toward a Comprehensive Insight Into the Eclipse Attacks of Tor Hidden Services. IEEE Internet Things J. 6(2): 1584-1593 (2019) - [j3]David A. Hrovat, Xuebin Wang, Weston Thatcher Borden:
Calculations on 1, 8-naphthoquinone predict that the ground state of this diradical is a singlet. J. Comput. Chem. 40(1): 119-126 (2019) - [c13]Muqian Chen, Xuebin Wang, Jinqiao Shi, Yue Gao, Can Zhao, Wei Sun:
Towards Comprehensive Security Analysis of Hidden Services Using Binding Guard Relays. ICICS 2019: 521-538 - [c12]Yue Gao, Jinqiao Shi, Xuebin Wang, Qingfeng Tan, Can Zhao, Zelin Yin:
Topology Measurement and Analysis on Ethereum P2P Network. ISCC 2019: 1-7 - [c11]Muqian Chen, Xuebin Wang, Tingwen Liu, Jinqiao Shi, Zelin Yin, Binxing Fang:
SignalCookie: Discovering Guard Relays of Hidden Services in Parallel. ISCC 2019: 1-7 - [i1]Yipeng Li, Qiao Chen, Xuebin Wang, Xiangmin Jiao:
WLS-ENO Remap: Superconvergent and Non-Oscillatory Weighted Least Squares Data Transfer on Surfaces. CoRR abs/1912.00268 (2019) - 2018
- [c10]Xuebin Wang, Qingfeng Tan, Jinqiao Shi, Shen Su, Meiqi Wang:
Insider Threat Detection Using Characterizing User Behavior. DSC 2018: 476-482 - [c9]Meiqi Wang, Qingfeng Tan, Xuebin Wang, Jinqiao Shi:
De-anonymizing Social Networks User via Profile Similarity. DSC 2018: 889-895 - [c8]Meiqi Wang, Xuebin Wang, Jinqiao Shi, Qingfeng Tan, Yue Gao, Muqian Chen, Xiaoming Jiang:
Who are in the Darknet? Measurement and Analysis of Darknet Person Attributes. DSC 2018: 948-955 - 2017
- [c7]Qingfeng Tan, Yue Gao, Jinqiao Shi, Xuebin Wang, Binxing Fang:
A closer look at Eclipse attacks against Tor hidden services. ICC 2017: 1-6 - [c6]Yue Gao, Qingfeng Tan, Jinqiao Shi, Xuebin Wang, Muqian Chen:
Large-scale discovery and empirical analysis for I2P eepSites. ISCC 2017: 444-449 - 2016
- [c5]Kang Li, Peipeng Liu, Qingfeng Tan, Jinqiao Shi, Yue Gao, Xuebin Wang:
Out-of-band discovery and evaluation for tor hidden services. SAC 2016: 2057-2062 - 2015
- [c4]Qingfeng Tan, Jinqiao Shi, Binxing Fang, Wentao Zhang, Xuebin Wang:
StegoP2P: Oblivious user-driven unobservable communications. ICC 2015: 7126-7131 - 2014
- [j2]Peipeng Liu, Lihong Wang, Qingfeng Tan, Quangang Li, Xuebin Wang, Jinqiao Shi:
Empirical Measurement and Analysis of I2P Routers. J. Networks 9(9): 2269-2278 (2014) - 2013
- [c3]Lei Wang, Chenglong Li, Qingfeng Tan, Xuebin Wang:
Generation and Distribution of Decoy Document System. ISCTCS 2013: 123-129 - 2011
- [j1]Xuebin Wang, Changfeng Ma, Meiyan Li:
A globally and superlinearly convergent quasi-Newton method for general box constrained variational inequalities without smoothing approximation. J. Glob. Optim. 50(4): 675-694 (2011) - [c2]Lijuan Duan, Xuebin Wang, Zhen Yang, Haiyan Zhou, Chunpeng Wu, Qi Zhang, Jun Miao:
An Emotional Face Evoked EEG Signal Recognition Method Based on Optimal EEG Feature and Electrodes Selection. ICONIP (1) 2011: 296-305
2000 – 2009
- 2009
- [c1]Houzhang Tan, Xiaohe Xiong, Haiyu Liu, Xuebin Wang, Erqiang Chen:
A Fuzzy Appraisement-based Applied Study on High-temperature Corrosion of a Thermal Power Plant. FSKD (5) 2009: 227-231
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 21:28 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint