Follow
Bolun Wang
Bolun Wang
ByteDance
Verified email at bytedance.com - Homepage
Title
Cited by
Cited by
Year
Neural cleanse: Identifying and mitigating backdoor attacks in neural networks
B Wang, Y Yao, S Shan, H Li, B Viswanath, H Zheng, BY Zhao
2019 IEEE Symposium on Security and Privacy (SP), 707-723, 2019
13062019
Defending against Sybil Devices in Crowdsourced Mapping Services
G Wang, B Wang, T Wang, A Nika, H Zheng, BY Zhao
Proceedings of the 14th Annual International Conference on Mobile Systems …, 2016
1512016
Whispers in the dark: analysis of an anonymous social network
G Wang, B Wang, T Wang, A Nika, H Zheng, BY Zhao
Proceedings of the 2014 Conference on Internet Measurement Conference, 137-150, 2014
1372014
With Great Training Comes Great Vulnerability: Practical Attacks against Transfer Learning
B Wang, Y Yao, B Viswanath, H Zheng, BY Zhao
27th {USENIX} Security Symposium ({USENIX} Security 18), 1281-1297, 2018
1272018
Complexity vs. performance: empirical analysis of machine learning as a service
Y Yao, Z Xiao, B Wang, B Viswanath, H Zheng, BY Zhao
Proceedings of the 2017 Internet Measurement Conference, 384-397, 2017
1142017
Crowds on Wall Street: Extracting Value from Collaborative Investing Platforms
G Wang, T Wang, B Wang, D Sambasivan, Z Zhang, H Zheng, BY Zhao
Proceedings of the 18th ACM Conference on Computer Supported Cooperative …, 2015
90*2015
Anatomy of a personalized livestreaming system
B Wang, X Zhang, G Wang, H Zheng, BY Zhao
Proceedings of the 2016 Internet Measurement Conference, 485-498, 2016
872016
Gotta Catch'Em All: Using Honeypots to Catch Adversarial Attacks on Neural Networks
S Shan, E Wenger, B Wang, B Li, H Zheng, BY Zhao
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020
852020
Ghost riders: Sybil attacks on crowdsourced mobile mapping services
G Wang, B Wang, T Wang, A Nika, H Zheng, BY Zhao
IEEE/ACM transactions on networking 26 (3), 1123-1136, 2018
492018
Deepfake Videos in the Wild: Analysis and Detection
J Pu, N Mangaokar, L Kelly, P Bhattacharya, K Sundaram, M Javed, ...
Proceedings of the Web Conference 2021, 981-992, 2021
422021
Scaling Deep Learning Models for Spectrum Anomaly Detection
Z Li, Z Xiao, B Wang, BY Zhao, H Zheng
Proceedings of the Twentieth ACM International Symposium on Mobile Ad Hoc …, 2019
342019
NoiseScope: Detecting Deepfake Images in a Blind Setting
J Pu, N Mangaokar, B Wang, CK Reddy, B Viswanath
Annual Computer Security Applications Conference, 913-927, 2020
252020
Value and misinformation in collaborative investing platforms
T Wang, G Wang, B Wang, D Sambasivan, Z Zhang, X Li, H Zheng, ...
ACM Transactions on the Web (TWEB) 11 (2), 1-32, 2017
222017
The power of comments: fostering social interactions in microblog networks
T Wang, Y Chen, Y Wang, B Wang, G Wang, X Li, H Zheng, BY Zhao
Frontiers of Computer Science 10 (5), 889-907, 2016
142016
Wireless Side-Lobe Eavesdropping Attacks
Y Zhu, Y Ju, B Wang, J Cryan, BY Zhao, H Zheng
arXiv preprint arXiv:1810.10157, 2018
72018
Using honeypots to catch adversarial attacks on neural networks
S Shan
Proceedings of the 8th ACM Workshop on Moving Target Defense, 25-25, 2021
42021
Improving and Securing Machine Learning Systems
B Wang
University of California, Santa Barbara, 2018
12018
Go a Catch’Em All: Using Honeypots to Catch Adversarial A acks on Neural Networks
S Shan, E Wenger, B Wang, B Li, H Zheng, BY Zhao
2020
The system can't perform the operation now. Try again later.
Articles 1–18