Binghui (Alan) Wang

alt text 

Assistant Professor
Department of Computer Science
Illinois Institute of Technology
Email: bwang70@iit.edu
Office: Stuart Building, 216C, 10 W 31st St, Chicago, IL 60616
PhD advisor: Neil Zhenqiang Gong
Research areas: Trustworthy AI, Data-Driven Security and Privacy, and AI/Data Science

Member: Chicago-area IDEAL Institute

Openings: I'm always looking for highly motivated postdocs, Ph.D. students, visiting scholars/students, and research interns to join my group. If you are interested, please send an email to alanwbh@gmail.com with your CV and transcripts attached.

About Me

I have been an Assistant Professor in the Department of Computer Science at Illinois Institute of Technology (Illinois Tech) since August 2021.

I did my postdoc at Duke University from August 2019 to July 2021, working with Dr. Neil Gong and Dr. Yiran Chen. I received the Ph.D degree from Iowa State University in July 2019, M.Sc degree and B.E degree from Dalian University of Technology, China, in 2015 and 2012, respectively.

My research has been published in top conferences in Security (S&P, CCS, Security, NDSS), AI/CV/DM (e.g., ICML, NeurIPS, ICLR, AAAI, CVPR, ECCV, ACM MM, KDD, WWW, WSDM), as well as top (interdisciplinary) journals (e.g., JNE, TNSRE, TIFS, TNNLS).

I am a recipient of the NSF CAREER Award, NSF CRII Award, Cisco Research Award, Amazon Research Award, and recognized as the Global Top 50 Chinese Rising Stars in AI + X by Baidu Scholar. I received Qu Bochuan Scholarship, the highest honor in Dalian University of Technology.

Recent News

  • 07/2024: Congrats to Leily for receiving the Student Travel Award for USENIX Security 2024. Thanks for the generous support!

  • 07/2024: Our Optimization-based Atttack (breaking SOTA poisoning defenses to federated learning) is accepted by CIKM 2024. Congrats to Yuxin!

  • 07/2024: Our Information Propagation-based Explanation Framework is accepted by CIKM 2024. Congrats to Ruo!

  • 07/2024: Our Certified Defense for Distributed Backdoor Attack on Federated Graph Learning is accepted by CCS 2024. Congrats to Yuxin!

  • 07/2024: Our Certified Black-Box Attack Framework (breaking SOTA defenses with provable confidence and limited resources) is accepted by CCS 2024. Congrats to Hanbin!

  • 07/2024: Our Causal-Explainable GNN via Neural Causal Models is accepted by ECCV 2024. Congrats to Arman!

  • 06/2024: Our IDEAL insititute is organizing the Annual Meeting on June 6th and Industry Day on June 7th. You are welcome to register for the event here for free.

  • 06/2024: Our Knowledge Poisoning Attack on the Retrieval-Augmented Generation of LLMs is accepted by Usenix Security 2025. Congrats to All!

  • 05/2024: Arman starts his research internship on Causal Explanation and Causal Representation Learning at Mayo Clinic in Summer 2024. Congrats!

  • 05/2024: Leily starts her research internship on Data Analytics at CCC Intelligent Solutions in Summer 2024. Congrats!

  • 05/2024: Our paper on Understanding the Robustness of GNN Explainers is accepted by ICML 2024. Congrats to Jiate!

  • 04/2024: Jane receives the Best Presentation Award for Ph.D. Research at 2024 ECE Day - Student Research Competition. Congrats!

  • 02/2024: Our Information-Theoretic Privacy-Preserving Representation Learning Framework against Inference Attacks is accepted by Usenix Security 2024 (Fall Cycle). Congrats to Leily and Ben!

  • 02/2024: My proposal on Trustworthy Machine Learning Meets Information Theory recevies the NSF CAREER Award. Thank NSF for the generous support!

  • 01/2024: Our Deterministic Certification of GNNs against Adversarial Perturbations is accepted for an ORAL presentation in ICLR 2024. Congrats to All!

  • 12/2023: Our Privacy-Preserving Federated Learning against Attribute Inference Attacks is accepted by AAAI 2024. Congrats to Caridad and Leily!

  • 08/2023: Our proposal on Learning Evolving Graphs At Scale is funded by the NSF CCF SHF program. Thank NSF for the generous support!

  • 07/2023: Our Generalized Certified Robustness against Textual Adversarial Attacks is accepted by IEEE SP 2024 (Spring Cycle). Congrats to All!

  • 07/2023: Our Power Side Channel based DNN Model Architectures Stealing is accepted by IEEE SP 2024 (Spring Cycle). Congrats to All!

Honors and Awards

  • 2024 NSF CAREER Award

  • 2023 NSF CRII Award

  • 2022 Cisco Research Award

  • 2022 Global Top 50 Chinese Rising Stars in AI + X, by Baidu Scholar. 百度学术高潜力AI华人青年学者 (Chinese)

  • 2021 GLSVLSI Service Recognition Award

  • 2020 Amazon Research Award

  • 2020 DeepMind Best Extended Abstract

  • 2019 NDSS Distinguished Paper Award Honorable Mention

  • 2018 Research Excellence Award, Iowa State University

  • 2017 INFOCOM Selected Paper for Fast Tracking

  • 2014 Qu Bochuan Scholarship, the highest honor in DUT

Teaching

  • Introduction to Machine Learning (CS 484): Fall 2024

  • Trustworthy Machine Learning (CS 595): Spring 2024, Fall 2022

  • Machine Learning (CS 584): Fall 2023, Spring 2022

  • Data Security and Privacy (CS 528): Spring 2023

Professional Services

Conference/Workshop Organizer

Proposal Review and Panelists

  • National Science Foundation (NSF)

  • Research Grants Council (RGC) of Hong Kong

Conference Program Committee

  • ACM Conference on Computer and Communications Security (CCS), 2022-

  • Neural Information Processing Systems (NeurIPS), 2021-

  • International Conference on Machine Learning (ICML), 2021-

  • International Conference on Learning Representations (ICLR), 2021-

  • Computer Vision and Pattern Recognition (CVPR), 2021-

  • International Conference on Computer Vision (ICCV), 2021-

  • European Conference on Computer Vision (ECCV), 2022-

  • AAAI Conference on Artificial Intelligence (AAAI), 2021-

  • International Joint Conference on Artificial Intelligence (IJCAI), 2021-

  • ACM SIGKDD Conference on Knowledge Discovery and Data Mining (KDD), 2022-

  • Design Automation Conference (DAC), 2022

  • IEEE Symposium on Security and Privacy (IEEE S & P) , 2019 (Student PC)

Journal Reviewer

  • Journal of Machine Learning Research (JMLR)

  • IEEE Transactions on Knowledge and Data Engineering (TKDE)

  • IEEE Transactions on Neural Networks and Learning Systems (TNNLS)

  • IEEE Transactions on Information Forensics and Security (TIFS)

  • IEEE Transactions on Dependable and Secure Computing (TDSC)

  • Computer & Security

  • ACM Transactions on Privacy and Security (TOPS)

  • ACM Computing Surveys (CSUR)

  • IEEE Transactions on Network Science and Engineering (TNSE)

  • IEEE Transactions on Wireless Communications (TWC)

  • IEEE Transactions on Biomedical Engineering (TBME)