Wei Wang

Google Scholar
27 publications in security and cryptology related venues
Year
Venue
Title
2025
conf/uss
From Risk to Resilience: Towards Assessing and Mitigating the Risk of Data Reconstruction Attacks in Federated Learning.
2024
conf/uss
Lurking in the shadows: Unveiling Stealthy Backdoor Attacks against Personalized Federated Learning.

Coauthors

Baigen Cai (1)
Balaji Palanisamy (1)
Bin Wang (8)
Bin Wang (1)
Bin Wang (1)
Binghui Hu (1)
Boyang Wang (1)
Chao Li (1)
Chongzhen Zhang (1)
Cong Wang (1)
Dan Su (1)
Dawei Feng (1)
Georgios Pitsilis (1)
Guangquan Xu (4)
Guorong Chen (1)
Haifei Li (1)
Haining Wang (1)
Hanbiao Du (2)
Hao Xi (1)
Haocong Li (1)
Heng Ye (1)
Hongbo Cao (1)
Hongpeng Bai (1)
James Xi Zheng (1)
Jesse Victors (1)
Jian Liu (1)
Jian Shen (1)
Jianchang Huang (1)
Jiaoze Mao (1)
Jin Li (1)
Jingkai Liu (1)
Jinhe Wu (1)
Jiqiang Liu (12)
Jun Liu (1)
Junyong Wang (2)
Kai Chen (1)
Kaitai Liang (1)
Kecheng Chen (1)
Lei Han (1)
Li Duan (1)
Liehuang Zhu (2)
Liwei Yang (1)
Lixiao Gong (1)
Meng Shen (2)
Ming Fan (1)
Ming Li (1)
Qiang Li (2)
Qinglin Zhao (1)
Qingyang Yan (1)
Ran Wang (1)
Renhui Tao (1)
Rongxing Lu (1)
Runhua Xu (1)
Sencun Zhu (1)
Shaoying Liu (2)
Shicheng Feng (1)
Shouling Ji (3)
Shuo Qiu (1)
Sjouke Mauw (1)
Tao Li (4)
Tengteng Yao (1)
Ting Chen (1)
Ting Liu (1)
Wei Wang (27)
Weizhe Wang (1)
Weizhi Meng (1)
Wenjing Lou (1)
Wenqing Lei (1)
Wenshan Li (1)
Witold Pedrycz (2)
Xiangliang Zhang (4)
Xiangrui Xu (4)
Xiaobo Ma (2)
Xiaohan Yuan (2)
Xiaohong Guan (1)
Xiaoting Lyu (2)
Xiaoyang Wang (1)
Xihui Chen (2)
Xing Liu (1)
Xing Wang (1)
Xu Han (2)
Xuejun Yang (1)
Xuhua Bao (1)
Y. Thomas Hou (1)
Yaguan Qian (3)
Yanchun Zhang (2)
Yanfeng Shi (1)
Yang Liu (1)
Yiming Li (1)
Yiwen Zhao (1)
Yong Liu (1)
Yong Xie (1)
Yongsheng Zhu (3)
Yongzhong He (1)
Yu Huang (1)
Yufei Han (4)
Yurong Hao (2)
Zejie Lian (2)
Zhaoquan Gu (2)
Zhehui Tan (1)
Zhen Han (2)
Zheng Che (2)
Zhenzhou Tian (1)
Zhiguo Wan (1)
Zhihong Tian (1)
Zhiwang Hu (1)
Zhize Li (1)
Filters
Years:  to