Bolun Wang
Bolun Wang
Verified email at fb.com - Homepage
Title
Cited by
Cited by
Year
Neural cleanse: Identifying and mitigating backdoor attacks in neural networks
B Wang, Y Yao, S Shan, H Li, B Viswanath, H Zheng, BY Zhao
2019 IEEE Symposium on Security and Privacy (SP), 707-723, 2019
2122019
Whispers in the dark: analysis of an anonymous social network
G Wang, B Wang, T Wang, A Nika, H Zheng, BY Zhao
Proceedings of the 2014 Conference on Internet Measurement Conference, 137-150, 2014
1052014
Defending against Sybil Devices in Crowdsourced Mapping Services
G Wang, B Wang, T Wang, A Nika, H Zheng, BY Zhao
Proceedings of the 14th Annual International Conference on Mobile Systems …, 2016
962016
Anatomy of a personalized livestreaming system
B Wang, X Zhang, G Wang, H Zheng, BY Zhao
Proceedings of the 2016 Internet Measurement Conference, 485-498, 2016
692016
Crowds on Wall Street: Extracting Value from Collaborative Investing Platforms
G Wang, T Wang, B Wang, D Sambasivan, Z Zhang, H Zheng, BY Zhao
Proceedings of the 18th ACM Conference on Computer Supported Cooperative …, 2015
61*2015
Complexity vs. performance: empirical analysis of machine learning as a service
Y Yao, Z Xiao, B Wang, B Viswanath, H Zheng, BY Zhao
Proceedings of the 2017 Internet Measurement Conference, 384-397, 2017
492017
With Great Training Comes Great Vulnerability: Practical Attacks against Transfer Learning
B Wang, Y Yao, B Viswanath, H Zheng, BY Zhao
27th {USENIX} Security Symposium ({USENIX} Security 18), 1281-1297, 2018
472018
Ghost riders: Sybil attacks on crowdsourced mobile mapping services
G Wang, B Wang, T Wang, A Nika, H Zheng, BY Zhao
IEEE/ACM transactions on networking 26 (3), 1123-1136, 2018
222018
Gotta Catch'Em All: Using Honeypots to Catch Adversarial Attacks on Neural Networks
S Shan, E Wenger, B Wang, B Li, H Zheng, BY Zhao
Proceedings of the 2020 ACM SIGSAC Conference on Computer and Communications …, 2020
17*2020
Value and misinformation in collaborative investing platforms
T Wang, G Wang, B Wang, D Sambasivan, Z Zhang, X Li, H Zheng, ...
ACM Transactions on the Web (TWEB) 11 (2), 1-32, 2017
112017
The power of comments: fostering social interactions in microblog networks
T Wang, Y Chen, Y Wang, B Wang, G Wang, X Li, H Zheng, BY Zhao
Frontiers of Computer Science 10 (5), 889-907, 2016
82016
Scaling Deep Learning Models for Spectrum Anomaly Detection
Z Li, Z Xiao, B Wang, BY Zhao, H Zheng
Proceedings of the Twentieth ACM International Symposium on Mobile Ad Hoc …, 2019
42019
Wireless Side-Lobe Eavesdropping Attacks
Y Zhu, Y Ju, B Wang, J Cryan, BY Zhao, H Zheng
arXiv preprint arXiv:1810.10157, 2018
42018
NoiseScope: Detecting Deepfake Images in a Blind Setting
J Pu, N Mangaokar, B Wang, CK Reddy, B Viswanath
Annual Computer Security Applications Conference, 913-927, 2020
12020
Improving and Securing Machine Learning Systems
B Wang
UC Santa Barbara, 2018
2018
The system can't perform the operation now. Try again later.
Articles 1–15