Follow
Shuo Wang
Title
Cited by
Cited by
Year
Backdoor attacks against transfer learning with pre-trained deep learning models
S Wang, S Nepal, C Rudolph, M Grobler, S Chen, T Chen
IEEE Transactions on Services Computing 15 (3), 1526-1539, 2020
1072020
Protecting personal trajectories of social media users through differential privacy
S Wang, RO Sinnott
Computers & Security 67, 142-163, 2017
612017
Projective ranking: A transferable evasion attack method on graph neural networks
H Zhang, B Wu, X Yang, C Zhou, S Wang, X Yuan, S Pan
Proceedings of the 30th ACM International Conference on Information …, 2021
322021
Privacy-protected statistics publication over social media user trajectory streams
S Wang, R Sinnott, S Nepal
Future Generation Computer Systems 87, 792-802, 2018
282018
Similarity-based gray-box adversarial attack against deep face recognition
H Wang, S Wang, Z Jin, Y Wang, C Chen, M Tistarelli
2021 16th IEEE international conference on automatic face and gesture …, 2021
192021
PART-GAN: Privacy-preserving time-series sharing
S Wang, C Rudolph, S Nepal, M Grobler, S Chen
Artificial Neural Networks and Machine Learning–ICANN 2020: 29th …, 2020
192020
Demystifying uneven vulnerability of link stealing attacks against graph neural networks
H Zhang, B Wu, S Wang, X Yang, M Xue, S Pan, X Yuan
International Conference on Machine Learning, 41737-41752, 2023
182023
Protecting the location privacy of mobile social media users
S Wang, R Sinnott, S Nepal
2016 IEEE International Conference on Big Data (Big Data), 1143-1150, 2016
172016
A duty to forget, a right to be assured? exposing vulnerabilities in machine unlearning services
H Hu, S Wang, J Chang, H Zhong, R Sun, S Hao, H Zhu, M Xue
arXiv preprint arXiv:2309.08230, 2023
152023
Adversarial detection by latent style transformations
S Wang, S Nepal, A Abuadbba, C Rudolph, M Grobler
IEEE Transactions on Information Forensics and Security 17, 1099-1114, 2022
132022
Generating semantic adversarial examples via feature manipulation
S Wang, S Nepal, C Rudolph, M Grobler, S Chen, T Chen
arXiv preprint arXiv:2001.02297, 2020
122020
Privacy by design in aged care monitoring devices? well, not quite yet!
S Alkhatib, J Waycott, G Buchanan, M Grobler, S Wang
Proceedings of the 32nd Australian Conference on Human-Computer Interaction …, 2020
112020
P-STM: Privacy-protected social tie mining of individual trajectories
S Wang, S Nepal, R Sinnott, C Rudolph
2019 IEEE International Conference on Web Services (ICWS), 1-10, 2019
112019
P-GENT: Privacy-preserving geocoding of non-geotagged tweets
S Wang, R Sinnott, S Nepal
2018 17th IEEE International Conference On Trust, Security And Privacy In …, 2018
92018
Learning with mixture of prototypes for out-of-distribution detection
H Lu, D Gong, S Wang, J Xue, L Yao, K Moore
arXiv preprint arXiv:2402.02653, 2024
82024
Reconstruction attack on differential private trajectory protection mechanisms
E Buchholz, A Abuadbba, S Wang, S Nepal, SS Kanhere
Proceedings of the 38th Annual Computer Security Applications Conference …, 2022
82022
Towards web phishing detection limitations and mitigation
A Abuadbba, S Wang, M Almashor, ME Ahmed, R Gaire, S Camtepe, ...
arXiv preprint arXiv:2204.00985, 2022
82022
Oiad: One-for-all image anomaly detection with disentanglement learning
S Wang, T Chen, S Chen, S Nepal, C Rudolph, M Grobler
2020 International Joint Conference on Neural Networks (IJCNN), 1-8, 2020
82020
Learn what you want to unlearn: Unlearning inversion attacks against machine unlearning
H Hu, S Wang, T Dong, M Xue
arXiv preprint arXiv:2404.03233, 2024
72024
Mate! Are you really aware? An explainability-guided testing framework for robustness of malware detectors
R Sun, M Xue, G Tyson, T Dong, S Li, S Wang, H Zhu, S Camtepe, ...
Proceedings of the 31st ACM Joint European Software Engineering Conference …, 2023
72023
The system can't perform the operation now. Try again later.
Articles 1–20