Bin Wu

ORCID: 0000-0002-7112-126X
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Topic Modeling
  • Advanced Text Analysis Techniques
  • Natural Language Processing Techniques
  • Complex Network Analysis Techniques
  • Advanced Graph Neural Networks
  • Sentiment Analysis and Opinion Mining
  • Network Security and Intrusion Detection
  • Advanced Malware Detection Techniques
  • Data Quality and Management
  • Multimodal Machine Learning Applications
  • Advanced Computational Techniques and Applications
  • Cloud Computing and Resource Management
  • Human Pose and Action Recognition
  • Advanced Database Systems and Queries
  • Spam and Phishing Detection
  • Bioinformatics and Genomic Networks
  • Internet Traffic Analysis and Secure E-voting
  • Video Analysis and Summarization
  • Semantic Web and Ontologies
  • Web Data Mining and Analysis
  • Graph Theory and Algorithms
  • Data Management and Algorithms
  • Domain Adaptation and Few-Shot Learning
  • Text and Document Classification Technologies
  • Advanced Image and Video Retrieval Techniques

Beijing University of Posts and Telecommunications
2016-2025

Hunan University
2025

Jishou University
2025

Chengdu Surveying Geotechnical Research Institute
2023

Northeastern University
2022

Beijing Jiaotong University
2010-2022

Institute of Microelectronics
2022

Tencent (China)
2019-2022

University of Electronic Science and Technology of China
2022

Jiangnan University
2021

Successful software maintenance is becoming increasingly critical due to the increasing dependence of our society and economy on systems. One key problem difficulty in understanding evolving Program workflows can help system operators administrators understand behaviors verify executions so as greatly facilitate maintenance. In this paper, we propose an algorithm automatically discover program from event traces that record events during execution. Different existing workflow mining...

10.1145/1835804.1835883 article EN 2010-07-25

Log is the main source of system operation status, user behavior analysis etc. needs not only massive and stable data processing ability but also adaptation to a variety scenarios under requirement efficiency, which can't be achieved from standalone tools or even single cloud computing framework. We present unified platform for batch log with combination Hadoop Spark. provides distributed file off-line framework, while pattern in Spark based on memory. The joint Hadoop, warehouse Hive Shark...

10.1109/icbnmt.2013.6823956 article EN 2013-11-01

Visual Emotion Analysis (VEA) is attracting increasing attention. One of the biggest challenges VEA to bridge affective gap between visual clues in a picture and emotion expressed by picture. As granularity emotions increases, increases as well. Existing deep approaches try directly learning discrimination among globally one shot. They ignore hierarchical relationship at different levels, variation level be classified. In this paper, we present multi-level dependent attention network (MDAN)...

10.1109/cvpr52688.2022.00926 article EN 2022 IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR) 2022-06-01

The next challenge of game AI lies in Real Time Strategy (RTS) games. RTS games provide partially observable gaming environments, where agents interact with one another an action space much larger than that GO. Mastering requires both strong macro strategies and delicate micro level execution. Recently, great progress has been made execution, while complete solutions for are still lacking. In this paper, we propose a novel learning-based Hierarchical Macro model mastering MOBA games,...

10.1609/aaai.v33i01.33011206 article EN Proceedings of the AAAI Conference on Artificial Intelligence 2019-07-17

Advanced Persistent Threat (APT) imposes increasing threats on cyber security with the developing network attack technologies. APT is a highly interactive, specifically targeted and extremely harmful network-centric attack, which employs various technologies to evade detection during attacks leading result that victims will not be aware of until they suffer from tremendous losses. Since command control (C&C) an essential component lifetime APT, it practical measure defend against APT. In...

10.1109/icc.2016.7511197 article EN 2016-05-01

Gliomas are frequently occurring tumors in the nervous system. The secretory carrier membrane protein 5 (SCAMP5) plays a distinct role cytosolic function of mammalian cells and is associated with different neurological disorders. However, how SCAMP5 expressed its prognostic value gliomas unclear. datasets were downloaded from Chinese Glioma Genome Atlas website (http://www.cgga.org.cn/). We conducted Cox survival analysis to establish correlation between gene expression general rate patients...

10.1097/md.0000000000041147 article EN cc-by-nc Medicine 2025-01-03

Practical Byzantine Fault Tolerance (PBFT) is a blockchain consensus mechanism that widely used at present, but the confidence of node in PBFT cannot be guaranteed, and large amount communication resources will consumed process reaching consensus. The paper proposes new mechanism, namely Dynamic Grouping Mechanism (DGBFT) based on confidence. principles DGBFT are as follows: 1) By extending node's attributes with confidence, designing to evaluate therefore, adjustment grouping can performed...

10.1109/ctisc49998.2020.00009 article EN 2020-03-01

Honeypots have become an important tool for capturing attacks. Hybrid honeypots, including the front end and back end, are widely used in research because of scalability high interactivity end. However, traditional hybrid honeypots some problems that flow control is difficult topology simulation not realistic. This paper proposes a new architecture based on SDN applied to honeypot system network attack traffic migration. Our uses good expansibility controllability controller simulate large...

10.1109/itnec.2019.8729425 article EN 2019 IEEE 3rd Information Technology, Networking, Electronic and Automation Control Conference (ITNEC) 2019-03-01

Classroom teaching, as the basic form of provides students with an important channel to acquire information and skills. The academic performance can be evaluated predicted objectively based on data their classroom behaviors. Considering complexity environment, this paper firstly envisages a moving target detection algorithm for student behavior recognition in class. Based region interest (ROI) face tracking, authors proposed two algorithms recognize standing Moreover, was developed hand...

10.18280/ts.380123 article EN Traitement du signal 2021-02-28

Researchers have previously looked into the problem of determining connection between invasive events and network risk, attack graph (AG) was proposed to seek countermeasures. However, AG has proved various limitations in practical applications. To overcome such defects, this study presents a risk flow (RFAG)-based assessment approach. In particular, approach applies RFAG represent scenarios, which are then fed model for computing flow. A bi-objective sorting algorithm is employed...

10.1049/iet-ifs.2014.0272 article EN IET Information Security 2015-07-10

10.1109/imcec59810.2024.10575293 article EN 2022 IEEE 5th Advanced Information Management, Communicates, Electronic and Automation Control Conference (IMCEC) 2024-05-24

This paper describes a novel keyword extraction algorithm position weight (PW) that utilizes linguistic features to represent the importance of word in document. Topical terms and their previous-term next-term co-occurrence collections are extracted. To measure degree correlation between topical term its terms, three methods employed including frequency inverse (TFITF), (PWIPW), CHI-square (chi <sup xmlns:mml="http://www.w3.org/1998/Math/MathML"...

10.1109/icdmw.2006.36 article EN 2006-12-01

The accurate identification of gait asymmetry is very beneficial to the assessment at-risk in clinical applications. This paper investigated application classification method based on statistical learning algorithm quantify symmetry assumption that degree intrinsic change dynamical system associated with different distributions between variables from left-right side lower limbs; is, discrimination small difference similarity limbs considered reorganization their probability distribution....

10.1155/2015/528971 article EN BioMed Research International 2015-01-01

In order to solve the problem that traditional signature-based detection technology cannot effectively detect unknown malware, we propose in this study a smartphone malware model (SP-MDM) based on artificial immune system, which static analysis and dynamic techniques are combined, antigens generated by encoding characteristics extracted from malware. Based negative selection algorithm, mature detectors generated. By introducing clonal with higher affinity selected undergo proliferation...

10.1109/cc.2014.7022530 article EN China Communications 2014-01-01

“Phishing emails” are phishing emails with illegal links that direct users to pages of some real websites spoofed, or where HTML has been inserted dangerous code, so as deceive users' private information such bank credit card account numbers, email and passwords. People the most vulnerable part security. Phishing use human weaknesses attack. This article describes application principle persuasion in emails, based on existing methods, this paper proposes a detection method principle. The is...

10.1109/itnec48623.2020.9084766 article EN 2020 IEEE 4th Information Technology, Networking, Electronic and Automation Control Conference (ITNEC) 2020-05-05

The purpose of this study was to determine the effect video-based nursing education on perioperative anxiety and depression. A total 128 patients scheduled for minimally invasive gastrectomy were randomly divided into intervention (n = 64) control group. The. depression scores, systolic blood pressure (SBP), diastolic (DBP), heart rate (HR) assessed before intervention, 1 h surgery 24 after surgery. And cortisol levels measured No significant difference observed in baseline score, vital...

10.1080/13548506.2020.1825756 article EN Psychology Health & Medicine 2020-10-12

As a crucial task for video analysis, social relation recognition from characters provides intelligent applications with great potential to better understand the behaviors or emotions of human beings. Most existing methods mainly focus on training models large amount labeled data. However, labeling relations in videos is time-consuming. To solve this problem, we propose Pre-trained Multimodal Feature Learning (PMFL) framework self-supervised learning unlabeled data, and then transfer...

10.1109/lsp.2022.3181849 article EN IEEE Signal Processing Letters 2022-01-01

In a real network environment, multiple types of attacks can occur. The more important the service or network, it may suffer simultaneously. Moving target defense (MTD) technology is revolutionary game-changing cyberspace that has found various applications in recent years. However, existing strategies are targeted at defending against specific and do not meet security requirements for attacks. Therefore, we propose joint strategy based on MTD select one mutant elements to defend different...

10.1109/access.2019.2918319 article EN cc-by-nc-nd IEEE Access 2019-01-01

As e-commerce is becoming more and popular, the number of customer reviews for online products grows rapidly. For a popular product, there can be hundreds reviews. This makes it difficult potential to read all them in order get as much information possible make decision on purchasing. Therefore, summarization product would purchase convenient reliable. The conventional way summarizing review select or rewrite subset original sentences from review, which inefficient. In this paper, we propose...

10.1109/wi-iat.2009.234 article EN 2009-01-01

Black-box attacks generate adversarial examples by querying the target model and updating noise according to feedback. However, current black-box attack methods require excessive queries examples, increasing risk of detection defense systems. Furthermore, primarily focus on controlling magnitude perturbations while neglecting impact perturbation placement stealthiness examples. To this end, we propose a novel edge noise-constrained method using artificial fish swarm algorithm (EFSAttack)....

10.3390/electronics13132446 article EN Electronics 2024-06-21
Coming Soon ...