Binghui (Alan) Wang
|
Assistant Professor
Department of Computer Science
Illinois Institute of Technology
Email: bwang70@iit.edu
Office: Stuart Building, 216C, 10 W 31st St, Chicago, IL 60616
PhD advisor: Neil Zhenqiang Gong
Research areas: Trustworthy AI, Data-Driven Security and Privacy, and AI/Data Science
Member: Chicago-area IDEAL Institute
Openings: I'm always looking for highly motivated postdocs, Ph.D. students, visiting scholars/students, and research interns to join my group. If you are interested, please send an email to alanwbh@gmail.com with your CV and transcripts attached.
|
About Me
I have been an Assistant Professor in the Department of Computer Science at Illinois Institute of Technology (Illinois Tech) since August 2021. I am interested in Trustworthy AI and Security & Privacy.
I did my postdoc at Duke University from Aug. 2019 to Jul. 2021, working with Neil Gong and Yiran Chen. I earned my Ph.D degree from Iowa State University in May 2019, advised by Neil Gong.
I obtained both my M.Sc and B.E degrees from Dalian University of Technology, China, in 2015 and 2012, respectively, with the highest honor.
I am a recipient of the NSF CAREER Award (2024), Cisco Research Award (2022), Amazon Research Award (2020), and recognized as the Global Top 50 Chinese Rising Stars in AI + X by Baidu Scholar (2022). My work has won multiple best paper awards (CCS’24, CVPRW’20) and honorable mention awards (NDSS’19).
Recent News
10/2024: Our work on the Distributed Backdoor Attacks on FedGL and Certified Defenses recieved the CCS’24 Distinguished Paper Award. Congrats to all the co-authors!
09/2024: Our Provably Robust Watermark for FedGL is accepted by NeurIPS 2024. Congrats to Yuxin!
07/2024: Congrats to Leily for receiving the Student Travel Award for USENIX Security 2024. Thanks for the generous support!
07/2024: Our Optimization-based Atttack (breaking SOTA poisoning defenses to federated learning) is accepted by CIKM 2024. Congrats to Yuxin!
07/2024: Our Information Propagation-based Explanation Framework is accepted by CIKM 2024. Congrats to Ruo!
07/2024: Our Certified Defense for Distributed Backdoor Attack on Federated Graph Learning is accepted by CCS 2024. Congrats to Yuxin!
07/2024: Our Certified Black-Box Attack Framework (breaking SOTA defenses with provable confidence and limited resources) is accepted by CCS 2024. Congrats to Hanbin!
07/2024: Our Causal-Explainable GNN via Neural Causal Models is accepted by ECCV 2024. Congrats to Arman!
06/2024: Our IDEAL insititute is organizing the Annual Meeting on June 6th and Industry Day on June 7th. You are welcome to register for the event here for free.
06/2024: Our Knowledge Poisoning Attack on the Retrieval-Augmented Generation of LLMs is accepted by Usenix Security 2025. Congrats to All!
05/2024: Arman starts his research internship on Causal Explanation and Causal Representation Learning at Mayo Clinic in Summer 2024. Congrats!
05/2024: Leily starts her research internship on Data Analytics at CCC Intelligent Solutions in Summer 2024. Congrats!
05/2024: Our paper on Understanding the Robustness of GNN Explainers is accepted by ICML 2024. Congrats to Jiate!
04/2024: Jane receives the Best Presentation Award for Ph.D. Research at 2024 ECE Day - Student Research Competition. Congrats!
02/2024: Our Information-Theoretic Privacy-Preserving Representation Learning Framework against Inference Attacks is accepted by Usenix Security 2024 (Fall Cycle). Congrats to Leily and Ben!
02/2024: My proposal on Trustworthy Machine Learning Meets Information Theory recevies the NSF CAREER Award. Thank NSF for the generous support!
01/2024: Our Deterministic Certification of GNNs against Adversarial Perturbations is accepted for an ORAL presentation in ICLR 2024. Congrats to All!
12/2023: Our Privacy-Preserving Federated Learning against Attribute Inference Attacks is accepted by AAAI 2024.
Congrats to Caridad and Leily!
08/2023: Our proposal on Learning Evolving Graphs At Scale is funded by the NSF CCF SHF program. Thank NSF for the generous support!
07/2023: Our Generalized Certified Robustness against Textual Adversarial Attacks is accepted by IEEE SP 2024 (Spring Cycle). Congrats to All!
07/2023: Our Power Side Channel based DNN Model Architectures Stealing is accepted by IEEE SP 2024 (Spring Cycle). Congrats to All!
Honors and Awards
2024 CCS Distinguished Paper Award
2024 NSF CAREER Award
2023 NSF CRII Award
2022 Cisco Research Award
2022 Global Top 50 Chinese Rising Stars in AI + X, by Baidu Scholar. 百度学术高潜力AI华人青年学者 (Chinese)
2021 GLSVLSI Service Recognition Award
2020 Amazon Research Award
2020 DeepMind Best Extended Abstract
2019 NDSS Distinguished Paper Award Honorable Mention
2018 Research Excellence Award, Iowa State University
2017 INFOCOM Selected Paper for Fast Tracking
2014 Qu Bochuan Scholarship, the highest honor in DUT
Teaching
Introduction to Machine Learning (CS 484): Fall 2024
Trustworthy Machine Learning (CS 595): Spring 2024, Fall 2022
Machine Learning (CS 584): Fall 2023, Spring 2022
Data Security and Privacy (CS 528): Spring 2023
Professional Services
Conference/Workshop Organizer
Proposal Review and Panelists
Conference Program Committee
ACM Conference on Computer and Communications Security (CCS), 2022-
Neural Information Processing Systems (NeurIPS), 2021-
International Conference on Machine Learning (ICML), 2021-
International Conference on Learning Representations (ICLR), 2021-
Computer Vision and Pattern Recognition (CVPR), 2021-
International Conference on Computer Vision (ICCV), 2021-
European Conference on Computer Vision (ECCV), 2022-
AAAI Conference on Artificial Intelligence (AAAI), 2021-
International Joint Conference on Artificial Intelligence (IJCAI), 2021-
ACM SIGKDD Conference on Knowledge Discovery and Data Mining (KDD), 2022-
Design Automation Conference (DAC), 2022
IEEE Symposium on Security and Privacy (IEEE S & P) , 2019 (Student PC)
Journal Reviewer
Journal of Machine Learning Research (JMLR)
IEEE Transactions on Knowledge and Data Engineering (TKDE)
IEEE Transactions on Neural Networks and Learning Systems (TNNLS)
IEEE Transactions on Information Forensics and Security (TIFS)
IEEE Transactions on Dependable and Secure Computing (TDSC)
Computer & Security
ACM Transactions on Privacy and Security (TOPS)
ACM Computing Surveys (CSUR)
IEEE Transactions on Network Science and Engineering (TNSE)
IEEE Transactions on Wireless Communications (TWC)
IEEE Transactions on Biomedical Engineering (TBME)
|