Follow
Derui (Derek) Wang
Derui (Derek) Wang
Other namesDerek Wang
CSIRO's Data61
Verified email at data61.csiro.au - Homepage
Title
Cited by
Cited by
Year
Strip: A defence against trojan attacks on deep neural networks
Y Gao, C Xu, D Wang, S Chen, DC Ranasinghe, S Nepal
Proceedings of the 35th Annual Computer Security Applications Conference …, 2019
6582019
Android HIV: A study of repackaging malware for evading machine-learning detection
X Chen, C Li, D Wang, S Wen, J Zhang, S Nepal, Y Xiang, K Ren
IEEE Transactions on Information Forensics and Security 15, 987-1001, 2019
2742019
Daedalus: Breaking non-maximum suppression in object detection via adversarial examples
D Wang, C Li, S Wen, QL Han, S Nepal, X Zhang, Y Xiang
IEEE Transactions on Cybernetics 52 (8), 7427-7440, 2021
992021
Backdoor attack on machine learning based android malware detectors
C Li, X Chen, D Wang, S Wen, ME Ahmed, S Camtepe, Y Xiang
IEEE Transactions on dependable and secure computing 19 (5), 3357-3370, 2021
412021
The "Beatrix'' Resurrections: Robust Backdoor Detection via Gram Matrices
W Ma, D Wang, R Sun, M Xue, S Wen, Y Xiang
The Network and Distributed System Security (NDSS) Symposium 2023, 2022
382022
Man-in-the-Middle Attacks against Machine Learning Classifiers via Malicious Generative Models
D Wang, C Li, S Wen, S Nepal, Y Xiang
IEEE Transactions on Dependable and Secure Computing 18 (5), 2074-2087, 2020
292020
Defending against Adversarial Attack towards Deep Neural Networks via Collaborative Multi-Task Training
D Wang, C Li, S Wen, S Nepal, Y Xiang
IEEE Transactions on Dependable and Secure Computing 19 (2), 953-965, 2020
292020
StyleFool: Fooling Video Classification Systems via Style Transfer
Y Cao, X Xiao, R Sun, D Wang, M Xue, S Wen
IEEE Symposium on Security and Privacy (SP) 2023, 2023
162023
Explore the hidden treasure in protein–protein interaction networks—An iterative model for predicting protein functions
D Wang, J Hou
Journal of bioinformatics and computational biology 13 (05), 1550026, 2015
102015
Who spread to whom? Inferring online social networks with user features
D Wang, W Zhou, JX Zheng, S Wen, J Zhang, Y Xiang
2018 IEEE International Conference on Communications (ICC), 1-6, 2018
52018
Catch me if you can: detecting compromised users through partial observation on networks
D Wang, S Wen, Y Xiang, W Zhou, J Zhang, S Nepal
2017 IEEE 37th International Conference on Distributed Computing Systems …, 2017
52017
On the Neural Backdoor of Federated Generative Models in Edge Computing
D Wang, S Wen, A Jolfaei, MS Haghighi, S Nepal, Y Xiang
ACM Transactions on Internet Technology 22 (2), 1-21, 2021
32021
How spam features change in Twitter and the impact to machine learning based detection
T Wu, D Wang, S Wen, Y Xiang
Information Security Practice and Experience: 13th International Conference …, 2017
32017
LogoStyleFool: Vitiating Video Recognition Systems via Logo Style Transfer
Y Cao, Z Zhao, X Xiao, D Wang, M Xue, J Lu
The 38th Annual AAAI Conference on Artificial Intelligence (AAAI), 2023
22023
Localstylefool: Regional video style transfer attack using segment anything model
Y Cao, J Li, X Xiao, D Wang, M Xue, H Ge, W Liu, G Hu
IEEE Security and Privacy Workshops (SPW) 2024, 2024
12024
Reinforcement Unlearning
D Ye, T Zhu, C Zhu, D Wang, S Shen, W Zhou
arXiv preprint arXiv:2312.15910, 2023
12023
STC: exposing hidden compromised devices in networked sustainable green smart computing platforms by partial observation
D Wang, T Wu, S Wen, X Chen, Y Xiang, W Zhou
IEEE Transactions on Sustainable Computing 4 (2), 178-190, 2017
12017
LocGuard: A Location Privacy Defender for Image Sharing
W Ma, D Wang, C Chen, S Wen, G Fei, Y Xiang
IEEE Transactions on Dependable and Secure Computing, 1-12, 2024
2024
Flow-Attention-based Spatio-Temporal Aggregation Network for 3D Mask Detection
Y Cao, Y Li, Y Zhu, D Wang, M Xue
Advances in Neural Information Processing Systems (NeurIPS), 2023, 2023
2023
The system can't perform the operation now. Try again later.
Articles 1–19