default search action
Xingbin Wang
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j6]Xingbin Wang, Yan Wang, Yulan Su, Sisi Zhang, Dan Meng, Rui Hou:
EnsGuard: A Novel Acceleration Framework for Adversarial Ensemble Learning. IEEE Trans. Comput. Aided Des. Integr. Circuits Syst. 43(10): 3088-3101 (2024) - [j5]Xingbin Wang, Boyan Zhao, Yulan Su, Sisi Zhang, Fengkai Yuan, Jun Zhang, Dan Meng, Rui Hou:
A Hybrid Sparse-dense Defensive DNN Accelerator Architecture against Adversarial Example Attacks. ACM Trans. Embed. Comput. Syst. 23(5): 79:1-79:28 (2024) - [c9]Xingbin Wang, Dan Meng, Rui Hou, Yan Wang:
FakeGuard: Novel Architecture Support for Deepfake Detection Networks. Euro-Par (2) 2024: 32-46 - 2023
- [c8]Yi Jiang, Minghua Wang, Xingbin Wang:
A Efficient Adaptive Data Rate Algorithm in LoRaWAN Networks: K-ADR. APNOMS 2023: 183-188 - 2022
- [j4]Ning Liu, Linlu Qi, Manna Huang, Deng Chen, Changfa Yin, Yiying Zhang, Xingbin Wang, Guixin Yuan, Rui-Jin Wang, Jun Yang, You-Liang Peng, Xunli Lu:
Comparative Secretome Analysis of Magnaporthe oryzae Identified Proteins Involved in Virulence and Cell Wall Integrity. Genom. Proteom. Bioinform. 20(4): 728-746 (2022) - [c7]Jing Li, Sisi Zhang, Xingbin Wang, Rui Hou:
Mimic Octopus Attack: Dynamic Camouflage Adversarial Examples Using Mimetic Feature for 3D Humans. Inscrypt 2022: 429-444 - [c6]Qian Zhou, Ming Yang, Shidong Chen, Mengfan Tang, Xingbin Wang:
Multi-modal Face Anti-spoofing Using Channel Cross Fusion Network and Global Depth-Wise Convolution. KSEM (2) 2022: 429-441 - 2021
- [c5]Xingbin Wang, Boyan Zhao, Rui Hou, Amro Awad, Zhihong Tian, Dan Meng:
NASGuard: A Novel Accelerator Architecture for Robust Neural Architecture Search (NAS) Networks. ISCA 2021: 776-789 - 2020
- [c4]Xingbin Wang, Rui Hou, Boyan Zhao, Fengkai Yuan, Jun Zhang, Dan Meng, Xuehai Qian:
DNNGuard: An Elastic Heterogeneous DNN Accelerator Architecture against Adversarial Attacks. ASPLOS 2020: 19-34 - [c3]Xingbin Wang, Boyan Zhao, Rui Hou, Dan Meng:
SNA: A Siamese Network Accelerator to Exploit the Model-Level Parallelism of Hybrid Network Structure. DATE 2020: 192-197
2010 – 2019
- 2019
- [c2]Xingbin Wang, Rui Hou, Yifan Zhu, Jun Zhang, Dan Meng:
NPUFort: a secure architecture of DNN accelerator against model inversion attack. CF 2019: 190-196 - 2015
- [j3]Chen Chen, Xingbin Wang, Yehua Yang, Ye Jin:
Performance analysis of joint relay selection and transmission schemes in multiple-antenna two-way relay systems. EURASIP J. Wirel. Commun. Netw. 2015: 196 (2015) - [c1]Wenyang Guan, Xingbin Wang, Ye Jin:
Channel congestion performance analysis for DSRC vehicle ad hoc network. ChinaCom 2015: 600-606 - 2012
- [j2]Xingbin Wang, Dongwan D. Kang, Kui Shen, Chi Song, Shuya Lu, Lun-Ching Chang, Serena G. Liao, Zhiguang Huo, Shaowu Tang, Ying Ding, Naftali Kaminski, Etienne Sibille, Yan Lin, Jia Li, George C. Tseng:
An R package suite for microarray meta-analysis in quality control, differentially expressed gene analysis and pathway enrichment detection. Bioinform. 28(19): 2534-2536 (2012) - [j1]Xingbin Wang, Yan Lin, Chi Song, Etienne Sibille, George C. Tseng:
Detecting disease-associated genes with confounding variable adjustment and the impact on genomic meta-analysis: With application to major depressive disorder. BMC Bioinform. 13: 52 (2012)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-23 20:33 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint