Le Wang

ORCID: 0000-0002-3610-9185
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Adversarial Robustness in Machine Learning
  • Anomaly Detection Techniques and Applications
  • Network Security and Intrusion Detection
  • Advanced Malware Detection Techniques
  • Topic Modeling
  • Advanced Graph Neural Networks
  • Gender, Labor, and Family Dynamics
  • Internet Traffic Analysis and Secure E-voting
  • Natural Language Processing Techniques
  • Quantum Information and Cryptography
  • Advanced Neural Network Applications
  • Quantum Mechanics and Applications
  • Smart Grid Security and Resilience
  • Privacy-Preserving Technologies in Data
  • Algorithms and Data Compression
  • Income, Poverty, and Inequality
  • Labor market dynamics and wage inequality
  • 3D Shape Modeling and Analysis
  • Information and Cyber Security
  • Security and Verification in Computing
  • Retirement, Disability, and Employment
  • Nuclear Materials and Properties
  • Domain Adaptation and Few-Shot Learning
  • Complex Network Analysis Techniques
  • Human Mobility and Location-Based Analysis

Guangzhou University
2018-2024

Peng Cheng Laboratory
2022-2024

Anhui University of Science and Technology
2024

Taiyuan University of Technology
2024

Anhui Science and Technology University
2024

Yanbian University
2023

Academic Degrees & Graduate Education
2022

National University of Defense Technology
2022

Dalian Ocean University
2022

Shanghai University
2021

Deep neural networks (DNNs) have been widely adopted but they are vulnerable to intentionally crafted adversarial examples. Various attack methods against DNNs proposed, yet there still lacks theoretical explanation of In this paper, we aim understand examples from the attacking process and assume adding perturbations key/sensitive regions image could fool classification DNNs. We propose gradient shielding verify assumption which ignores insensitive information during generating...

10.1109/tnse.2020.2996738 article EN IEEE Transactions on Network Science and Engineering 2020-05-22

The COVID-19 pandemic has caused serious consequences in the last few months and trying to control it been most important objective. With effective prevention methods, epidemic gradually under some countries is essential ensure safe work resumption future. Although approaches are proposed measure people's healthy conditions, such as filling health information forms or evaluating travel records, they cannot provide a fine-grained assessment of risk. In this paper, we propose novel risk method...

10.1109/tnse.2021.3058762 article EN IEEE Transactions on Network Science and Engineering 2021-02-13

Speaker recognition is a task that identifies the speaker from multiple audios. Recently, advances in deep learning have considerably boosted development of speech signal processing techniques. or has been widely adopted such applications as smart locks, vehicle-mounted systems, and financial services. However, neural network-based systems (SRSs) are susceptible to adversarial attacks, which fool system make wrong decisions by small perturbations, this drawn attention researchers security...

10.3390/electronics11142183 article EN Electronics 2022-07-12

With the rapid development of information technologies, security cyberspace has become increasingly serious. Network intrusion detection is a practical scheme to protect network systems from cyber attacks. However, as new vulnerabilities and unknown attack types are constantly emerging, only few samples such attacks can be captured for analysis, which cannot handled by existing methods deployed in real systems. To handle this problem, we propose few-shot class-incremental learning method...

10.1109/tnsm.2023.3332284 article EN IEEE Transactions on Network and Service Management 2023-11-13

In order to cope with ever-evolving and increasing cyber threats, intrusion detection systems have become a crucial component of security. Compared signature-based methods, anomaly-based methods typically employ machine learning techniques train models possess the capability discover unknown attacks. However, face challenge low rates for minority class attacks due imbalanced data distributions. Traditional algorithms address this issue by resampling or generating synthetic data....

10.3390/math12070948 article EN cc-by Mathematics 2024-03-23

The recent advancement of the Internet Things (IoT) and information technology has led to rapid expansion interconnectivity among a billion devices across various applications. advent massive data resulted in greater computational dependence, posing obstacles applying security policies energy-sensitive devices. However, public-key-based encryption algorithms are impractical or impossible execute on these resource-limited terminals. In this paper, we propose lightweight framework called...

10.1109/jiot.2024.3351988 article EN IEEE Internet of Things Journal 2024-01-10

A plethora of healthcare data is produced every day due to the proliferation prominent technologies such as Internet Medical Things (IoMT). Digital-driven smart devices like wearable watches, wristbands and bracelets are utilized extensively in modern applications. Mining valuable information from distributed at owners' level useful, but it challenging preserve privacy. Federated learning (FL) has swiftly surged popularity its efficacy dealing privacy vulnerabilities. Recent studies have...

10.1109/jbhi.2022.3204455 article EN IEEE Journal of Biomedical and Health Informatics 2022-09-05

This paper addresses the challenges of data sparsity and personalization limitations inherent in current recommendation systems when processing extensive academic datasets. To overcome these issues, present work introduces an innovative model that integrates wealth structured information from knowledge graphs refines amalgamation temporal relational data. By applying attention mechanisms neural network technologies, thoroughly explores text characteristics papers evolving patterns user...

10.3390/app14125022 article EN cc-by Applied Sciences 2024-06-09

A digital twin (DT) is an electronic replica of a real-world item. It built on top asset-specific data items and often enhanced using semantic technologies simulation environments. The DT lays the way for anything from routine monitoring to hands-off administration physical entity. With development metaverse concept gains importance. As it helps manage entity in metaverse. Therefore, beneficial use detection mitigation different types cyber attacks. In this context, we identification DDoS...

10.1109/icce56470.2023.10043433 article EN 2023 IEEE International Conference on Consumer Electronics (ICCE) 2023-01-06

With the rapid development of information technologies, more and cyberattacks are emerging to cause serious consequences critical infrastructures in industrial cyber-physical systems. As becoming complicated, which might be composed by multiple steps, obtaining attack strategies can help understand better defend these attacks. However, there many unknown every day, while attackers will not reveal steps tools normally, it is a persistent challenging problem obtain strategies. Cyber range...

10.1109/jsyst.2023.3303361 article EN IEEE Systems Journal 2023-08-23

The license plate recognition system (LPRS) has been widely adopted in daily life due to its efficiency and high accuracy. Deep neural networks are commonly used the LPRS improve However, researchers have found that deep their own security problems may lead unexpected results. Specifically, they can be easily attacked by adversarial examples generated adding small perturbations original images, resulting incorrect recognition. There some classic methods generate examples, but cannot on...

10.32604/cmc.2020.011834 article EN Computers, materials & continua/Computers, materials & continua (Print) 2020-01-01

A lattice basis reduction multisequence synthesis (LBRMS) algorithm was presented with a new, intuitive and vector-form model. In this paper, refined version of the LBRMS is deduced, from which Massey's conjectured can be derived. Moreover, if we modify used in algorithm, new equivalent to generalization Berlekamp-Massey proposed by Feng Tzeng (1989). Therefore, provides unified approach shift-register problem.

10.1109/tit.2004.836670 article EN IEEE Transactions on Information Theory 2004-10-26

Neural network models have proved capable of achieving remarkable performance in sentence and document modeling. Convolutional neural networks (CNNs) recurrent (RNNs), two mainstream architectures for such modeling tasks, adopt totally different ways understanding natural languages. The classical CNN, despite its wide application image classification, is rarely used text classification. RNN processing texts variable lengths can hence facilitate In this study, we aim to analyze the both on...

10.1109/dsc.2019.00050 article EN 2019-06-01

The experimental results of this paper showed that the final grades most students would be improved in class with low English proficiency case textbooks same difficulty. However, when multimodal instruction was used, failure rate second semester decreased by 13 percentage points compared first semester, while high-achieving increased 6 points. Therefore, using teaching method, learning effect from mid-term to end term has been significantly improved, which method more superior than...

10.1080/10447318.2023.2188531 article EN International Journal of Human-Computer Interaction 2023-03-20

Abstract We compare several income distributions in urban China the late 1980s and mid-1990s using tests for stochastic dominance order to decompose gender differentials. Examination of entire distribution gives insight into uniformity such differentials across distribution. Moreover, based on allow robust welfare comparisons. Our analysis reveals: (i) large increasing predicted earnings lower tail distribution, but few differences upper tail, (ii) discrimination explains one-third one-half...

10.1515/1538-0645.1461 article EN The B E Journal of Economic Analysis & Policy 2006-02-14

The development of ICT following Moore's Law has resulted in a situation where mobile users are able to make use wealth versatile services. Yet, battery and electronics technology not followed this as well, which user's can only enable few hours active use. Therefore, we need focus increasingly on energy efficient wireless communication reduce consumption, but also cut down greenhouse emissions improve business competitiveness. Due significant consumption transmitting data over networks,...

10.1109/cyberc.2009.5342172 article EN 2009-10-01
Coming Soon ...