Bolun Wang
Bolun Wang
Verified email at fb.com - Homepage
TitleCited byYear
Whispers in the dark: analysis of an anonymous social network
G Wang, B Wang, T Wang, A Nika, H Zheng, BY Zhao
Proceedings of the 2014 Conference on Internet Measurement Conference, 137-150, 2014
862014
Defending against Sybil Devices in Crowdsourced Mapping Services
G Wang, B Wang, T Wang, A Nika, H Zheng, BY Zhao
Proceedings of the 14th Annual International Conference on Mobile Systems …, 2016
752016
Anatomy of a personalized livestreaming system
B Wang, X Zhang, G Wang, H Zheng, BY Zhao
Proceedings of the 2016 Internet Measurement Conference, 485-498, 2016
542016
Neural cleanse: Identifying and mitigating backdoor attacks in neural networks
B Wang, Y Yao, S Shan, H Li, B Viswanath, H Zheng, BY Zhao
2019 IEEE Symposium on Security and Privacy (SP), 707-723, 2019
492019
Crowds on Wall Street: Extracting Value from Collaborative Investing Platforms
G Wang, T Wang, B Wang, D Sambasivan, Z Zhang, H Zheng, BY Zhao
Proceedings of the 18th ACM Conference on Computer Supported Cooperative …, 2015
48*2015
With Great Training Comes Great Vulnerability: Practical Attacks against Transfer Learning
B Wang, Y Yao, B Viswanath, H Zheng, BY Zhao
27th {USENIX} Security Symposium ({USENIX} Security 18), 1281-1297, 2018
242018
Complexity vs. performance: empirical analysis of machine learning as a service
Y Yao, Z Xiao, B Wang, B Viswanath, H Zheng, BY Zhao
Proceedings of the 2017 Internet Measurement Conference, 384-397, 2017
212017
Ghost riders: Sybil attacks on crowdsourced mobile mapping services
G Wang, B Wang, T Wang, A Nika, H Zheng, BY Zhao
IEEE/ACM transactions on networking 26 (3), 1123-1136, 2018
102018
Value and misinformation in collaborative investing platforms
T Wang, G Wang, B Wang, D Sambasivan, Z Zhang, X Li, H Zheng, ...
ACM Transactions on the Web (TWEB) 11 (2), 1-32, 2017
72017
The power of comments: fostering social interactions in microblog networks
T Wang, Y Chen, Y Wang, B Wang, G Wang, X Li, H Zheng, BY Zhao
Frontiers of Computer Science 10 (5), 889-907, 2016
62016
Gotta Catch'Em All: Using Concealed Trapdoors to Detect Adversarial Attacks on Neural Networks
S Shan, E Willson, B Wang, B Li, H Zheng, BY Zhao
arXiv preprint arXiv:1904.08554, 2019
52019
Wireless Side-Lobe Eavesdropping Attacks
Y Zhu, Y Ju, B Wang, J Cryan, BY Zhao, H Zheng
arXiv preprint arXiv:1810.10157, 2018
22018
Scaling Deep Learning Models for Spectrum Anomaly Detection
Z Li, Z Xiao, B Wang, BY Zhao, H Zheng
Proceedings of the Twentieth ACM International Symposium on Mobile Ad Hoc …, 2019
2019
Improving and Securing Machine Learning Systems
B Wang
UC Santa Barbara, 2018
2018
The system can't perform the operation now. Try again later.
Articles 1–14