default search action
Le Wang 0008
Person information
- affiliation: Guangzhou University, Cyberspace Institute of Advanced Technology, China
Other persons with the same name
- Le Wang — disambiguation page
- Le Wang 0001 — National University of Defense Technology, School of Computer, Changsha, China
- Le Wang 0002 — Aalto University, Finland
- Le Wang 0003 — Xi'an Jiaotong University, Institute of Artificial Intelligence and Robotics, China
- Le Wang 0004 — Army Engineering University of PLA, College of Communications Engineering, Nanjing, China
- Le Wang 0005 — Xi'an Jiaotong University, School of Energy and Power Engineering, China
- Le Wang 0006 — Xi'an Jiaotong University, School of Economics and Finance, China (and 2 more)
- Le Wang 0007 — PLA Rocket Force University of Engineering, Xi'an, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j16]Junjian Zhang, Hao Tan, Le Wang, Yaguan Qian, Zhaoquan Gu:
Rethinking multi-spatial information for transferable adversarial attacks on speaker recognition systems. CAAI Trans. Intell. Technol. 9(3): 620-631 (2024) - [j15]Zhaohua Li, Le Wang, Zhaoquan Gu, Yang Lv, Zhihong Tian:
Labels Are Culprits: Defending Gradient Attack on Privacy. IEEE Internet Things J. 11(4): 6007-6019 (2024) - [j14]Denghui Zhang, Muhammad Shafiq, Gautam Srivastava, Thippa Reddy Gadekallu, Le Wang, Zhaoquan Gu:
STBCIoT: Securing the Transmission of Biometric Images in Customer IoT. IEEE Internet Things J. 11(9): 16279-16288 (2024) - [j13]Lei Du, Zhaoquan Gu, Ye Wang, Le Wang, Yan Jia:
A Few-Shot Class-Incremental Learning Method for Network Intrusion Detection. IEEE Trans. Netw. Serv. Manag. 21(2): 2389-2401 (2024) - [j12]Zhiqiang Zhang, Le Wang, Junyi Zhu, Dong Zhu, Zhaoquan Gu, Yanchun Zhang:
MIM: A multiple integration model for intrusion detection on imbalanced samples. World Wide Web (WWW) 27(4): 47 (2024) - [c38]Yushun Xie, Haiyan Wang, Le Wang, Lei Luo, Jianxin Li, Zhaoquan Gu:
Reinforced Negative Sampling for Knowledge Graph Embedding. DASFAA (4) 2024: 358-374 - [c37]Keke Tang, Zhensu Wang, Weilong Peng, Lujie Huang, Le Wang, Peican Zhu, Wenping Wang, Zhihong Tian:
SymAttack: Symmetry-aware Imperceptible Adversarial Attacks on 3D Point Clouds. ACM Multimedia 2024: 3131-3140 - 2023
- [j11]Zhaoquan Gu, Huan Zhang, Le Wang, Muhammad Shafiq, Kai Jin:
Efficient distributed broadcasting algorithms for cognitive radio networks-enabled smart agriculture. Comput. Electr. Eng. 108: 108690 (2023) - [j10]Huan Zhang, Zhaoquan Gu, Hao Tan, Le Wang, Ziqi Zhu, Yushun Xie, Jianxin Li:
Masking and purifying inputs for blocking textual adversarial attacks. Inf. Sci. 648: 119501 (2023) - [j9]Xujian Liang, Zhaoquan Gu, Yushun Xie, Le Wang, Zhihong Tian:
MUSEDA: Multilingual Unsupervised and Supervised Embedding for Domain Adaption. Knowl. Based Syst. 273: 110560 (2023) - [j8]Songxuan Wei, Yan Jia, Zhaoquan Gu, Muhammad Shafiq, Le Wang:
Extracting Novel Attack Strategies for Industrial Cyber-Physical Systems Based on Cyber Range. IEEE Syst. J. 17(4): 5292-5302 (2023) - [j7]Zhaohua Li, Le Wang, Guangyao Chen, Zhiqiang Zhang, Muhammad Shafiq, Zhaoquan Gu:
E2EGI: End-to-End Gradient Inversion in Federated Learning. IEEE J. Biomed. Health Informatics 27(2): 756-767 (2023) - [c36]Junjian Zhang, Binyue Deng, Hao Tan, Le Wang, Zhaoquan Gu:
DAoB: A Transferable Adversarial Attack via Boundary Information for Speaker Recognition Systems. DADA@IJCAI 2023: 12-17 - [c35]Dong Zhu, Haonan Tan, Le Wang, YuJie Feng, Yao Lin, Zhaoquan Gu:
Knowledge Graph Embedding via Adaptive Negative Subsampling. DSC 2023: 38-43 - [c34]Haonan Tan, Yunhui Liu, Le Wang, Jie Jiang, Jianyu Deng, Dong Zhu:
Anti-Breast Cancer Active Compound Screening Method Based on Simulated Annealing Algorithm and BP Neural Network. DSC 2023: 166-171 - [c33]Changchang Ma, Denghui Zhang, Junjian Zhang, Le Wang, Hao Li, Zhaoquan Gu:
Cybersecurity Knowledge Graph Enables Targeted Data Collection for Cybersecurity Analysis. DSC 2023: 583-590 - [c32]Brij B. Gupta, Akshat Gaurav, Kwok Tai Chui, Le Wang, Varsha Arya, Anupam Shukla, Dragan Perakovic:
DDoS Attack Detection Through Digital Twin Technique in Metaverse. ICCE 2023: 1-5 - [c31]Dong Zhu, Yao Lin, Haonan Tan, Le Wang, Zhaoquan Gu:
Lightweight Multi-Semantic Hierarchy-Aware Poincaré Knowledge Graph Embeddings. ICPADS 2023: 1358-1364 - [c30]Dong Zhu, Yao Lin, Le Wang, Yushun Xie, Jie Jiang, Zhaoquan Gu:
Evaluation Framework for Poisoning Attacks on Knowledge Graph Embeddings. NLPCC (1) 2023: 184-196 - 2022
- [j6]Hao Tan, Zhaoquan Gu, Le Wang, Huan Zhang, Brij B. Gupta, Zhihong Tian:
Improving adversarial transferability by temporal and spatial momentum in urban speaker recognition systems. Comput. Electr. Eng. 104(Part): 108446 (2022) - [j5]Zhiqiang Zhang, Le Wang, Guangyao Chen, Zhaoquan Gu, Zhihong Tian, Xiaojiang Du, Mohsen Guizani:
STG2P: A two-stage pipeline model for intrusion detection based on improved LightGBM and K-means. Simul. Model. Pract. Theory 120: 102614 (2022) - [j4]Zhaoquan Gu, Le Wang, Xiaolong Chen, Yunyi Tang, Xingang Wang, Xiaojiang Du, Mohsen Guizani, Zhihong Tian:
Epidemic Risk Assessment by a Novel Communication Station Based Method. IEEE Trans. Netw. Sci. Eng. 9(1): 332-344 (2022) - [c29]Bin Zhu, Zhaoquan Gu, Le Wang, Jinyin Chen, Qi Xuan:
Improving Robustness of Language Models from a Geometry-aware Perspective. ACL (Findings) 2022: 3115-3125 - [c28]Ju Yang, Liang Zhou, Le Wang, Shudong Li, Ziqing Lin, Zhaoquan Gu:
A Multi-step Attack Detection Framework for the Power System Network. DSC 2022: 1-8 - [c27]Ziqi Zhu, Bin Zhu, Huan Zhang, Yu Geng, Le Wang, Denghui Zhang, Zhaoquan Gu:
Defense Against Query-Based Black-Box Attack With Small Gaussian-Noise. DSC 2022: 249-256 - [c26]Hao Tan, Junjian Zhang, Huan Zhang, Le Wang, Yaguan Qian, Zhaoquan Gu:
NRI-FGSM: An Efficient Transferable Adversarial Attack for Speaker Recognition Systems. INTERSPEECH 2022: 4386-4390 - [i2]Bin Zhu, Zhaoquan Gu, Le Wang, Jinyin Chen, Qi Xuan:
Improving robustness of language models from a geometry-aware perspective. CoRR abs/2204.13309 (2022) - 2021
- [j3]Zhaoquan Gu, Weixiong Hu, Chuanjing Zhang, Hui Lu, Lihua Yin, Le Wang:
Gradient Shielding: Towards Understanding Vulnerability of Deep Neural Networks. IEEE Trans. Netw. Sci. Eng. 8(2): 921-932 (2021) - [c25]Huili Luo, Zhaoquan Gu, Chunajing Zhang, Le Wang, Shuhao Li, Zhiqin Chen:
A Universal Targeted Attack Method against Image Classification. DSC 2021: 179-186 - [c24]Wenrong Xie, Fashan Dong, Haiyang Yu, Zhaoquan Gu, Le Wang, Zhihong Tian:
Generate Adversarial Examples Combined with Image Entropy Distribution. DSC 2021: 272-279 - [c23]Bin Zhu, Zhaoquan Gu, Yushun Xie, Danni Wu, Yaguan Qian, Le Wang:
Word-Level Textual Adversarial Attack in the Embedding Space. IJCNN 2021: 1-8 - [p2]Xiaolong Chen, Le Wang, Yunyi Tang, Weihong Han, Zhihong Tian, Zhaoquan Gu:
Entity Alignment: Optimization by Seed Selection. MDATA: A New Knowledge Representation Model 2021: 99-116 - [p1]Yunyi Tang, Le Wang, Xiaolong Chen, Zhaoquan Gu, Zhihong Tian:
Knowledge Extraction: Automatic Classification of Matching Rules. MDATA: A New Knowledge Representation Model 2021: 117-130 - [i1]Bin Zhu, Zhaoquan Gu, Le Wang, Zhihong Tian:
TREATED: Towards Universal Defense against Textual Adversarial Attacks. CoRR abs/2109.06176 (2021) - 2020
- [j2]Zhaoquan Gu, Weixiong Hu, Chuanjing Zhang, Le Wang, Chunsheng Zhu, Zhihong Tian:
Restricted Region Based Iterative Gradient Method for Non-Targeted Attack. IEEE Access 8: 25262-25271 (2020) - [c22]Xiangyi Kong, Zhaoquan Gu, Le Wang, Lihua Yin, Shudong Li, Weihong Han:
Resume Extraction and Validation from Public Information. CIAT 2020: 355-359 - [c21]Yinyin Cai, Zhaoquan Gu, Le Wang, Shudong Li, Weihong Han:
An APT Group Knowledge Model based on MDATA. CIAT 2020: 374-378 - [c20]Yushun Xie, Zhaoquan Gu, Bin Zhu, Le Wang, Weihong Han, Lihua Yin:
Adversarial Examples for Chinese Text Classification. DSC 2020: 238-245 - [c19]Xiaolong Chen, Le Wang, Yunyi Tang, Weihong Han, Zhaoquan Gu:
Seeds Optimization for Entity Alignment in Knowledge Graph Embedding. DSC 2020: 333-338 - [c18]Yushun Xie, Zhaoquan Gu, Xiaopeng Fu, Le Wang, Weihong Han, Yuexuan Wang:
Misleading Sentiment Analysis: Generating Adversarial Texts by the Ensemble Word Addition Algorithm. iThings/GreenCom/CPSCom/SmartData/Cybermatics 2020: 590-596
2010 – 2019
- 2019
- [j1]Le Wang, Zhihong Tian, Zhaoquan Gu, Hui Lu:
Crowdsourcing Approach for Developing Hands-On Experiments in Cybersecurity Education. IEEE Access 7: 169066-169072 (2019) - [c17]Weixiong Hu, Zhaoquan Gu, Yushun Xie, Le Wang, Keke Tang:
Chinese Text Classification Based on Neural Networks and Word2vec. DSC 2019: 284-291 - [c16]Dan Xu, Le Wang, Jing Qiu, Hui Lu:
A Review of Network Representation Learning. ICAIS (2) 2019: 124-132 - [c15]Chaobin Wang, Le Wang, Mohan Li, Yu Jiang, Hui Lu:
A Distributed Cryptanalysis Framework Based on Mobile Phones. ICAIS (4) 2019: 318-331 - [c14]Xiang Yu, Hui Lu, Le Wang, Dapeng Man:
A Dynamic Event Region Tracking Approach Based on Node Calibration. ICAIS (1) 2019: 347-357 - [c13]Xiang Yu, Le Wang, Shuang Chen, Yanbo Li:
A Graph Updating Method of Data Theft Detection Based on Rough Set. ICAIS (1) 2019: 358-367 - [c12]Yuanyuan Chen, Hui Lu, Jing Qiu, Le Wang:
A Tutorial of Graph Representation. ICAIS (1) 2019: 368-378 - [c11]Jiajun Xie, Chunrui Zhang, Fang Lou, Yu Cui, Lun An, Le Wang:
High-Speed File Transferring Over Linux Bridge for QGA Enhancement in Cyber Range. ICAIS (4) 2019: 452-462 - [c10]Yuying Li, Xiaohan Helu, Mohan Li, Yanbin Sun, Le Wang:
Implementation of MD5 Collision Attack in Program. ICAIS (1) 2019: 595-604 - [c9]Jing Qiu, Yaqi Si, Yuhan Chai, Yan Liu, Dongwen Zhang, Hao Han, Le Wang:
Network-Embedding Based Storage Location Assignment in Mobile Rack Warehouse. ICAIS (1) 2019: 630-639 - 2018
- [c8]Mohan Li, Yanbin Sun, Le Wang, Hui Lu:
Quality-Aware Query Based on Relative Source Quality. ICCCS (2) 2018: 3-8 - [c7]Xiang Yu, Yanbo Li, Hui Lu, Le Wang:
3D Airway Tree Centerline Extraction Algorithm for Virtual Bronchoscope. ICCCS (1) 2018: 3-12 - [c6]Xiang Yu, Shuang Chen, Yanbo Li, Hui Lu, Le Wang:
Research on Risk Aversion Enterprise Financial Crisis Warning Based on Support Vector Data Description. ICCCS (3) 2018: 227-233 - [c5]Hui Lu, Xiang Cui, Le Wang, Yu Jiang, Ronglai Jia:
A Trusted Computing Base for Information System Classified Protection. ICCCS (1) 2018: 253-262 - [c4]Xiangsong Gao, Hui Lu, Xiang Cui, Le Wang:
An Encryption Traffic Analysis Countermeasure Model Based on Game Theory. ICCCS (1) 2018: 285-292 - [c3]Hui Lu, Xiang Cui, Le Wang, Yu Jiang, Meng Cui:
The Research on Security Audit for Information System Classified Protection. ICCCS (2) 2018: 300-308 - [c2]Chaochao Luo, Le Wang, Hui Lu:
Analysis of LSTM-RNN Based on Attack Type of KDD-99 Dataset. ICCCS (1) 2018: 326-333 - [c1]Yanbin Sun, Mohan Li, Le Wang, Hui Lu:
Greedy Embedding Strategy for Dynamic Graphs Based on Spanning Tree. ICCCS (1) 2018: 525-530
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-15 20:38 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint