Backdoor attacks against transfer learning with pre-trained deep learning models S Wang, S Nepal, C Rudolph, M Grobler, S Chen, T Chen IEEE Transactions on Services Computing 15 (3), 1526-1539, 2020 | 107 | 2020 |
Protecting personal trajectories of social media users through differential privacy S Wang, RO Sinnott Computers & Security 67, 142-163, 2017 | 61 | 2017 |
Projective ranking: A transferable evasion attack method on graph neural networks H Zhang, B Wu, X Yang, C Zhou, S Wang, X Yuan, S Pan Proceedings of the 30th ACM International Conference on Information …, 2021 | 32 | 2021 |
Privacy-protected statistics publication over social media user trajectory streams S Wang, R Sinnott, S Nepal Future Generation Computer Systems 87, 792-802, 2018 | 28 | 2018 |
Similarity-based gray-box adversarial attack against deep face recognition H Wang, S Wang, Z Jin, Y Wang, C Chen, M Tistarelli 2021 16th IEEE international conference on automatic face and gesture …, 2021 | 19 | 2021 |
PART-GAN: Privacy-preserving time-series sharing S Wang, C Rudolph, S Nepal, M Grobler, S Chen Artificial Neural Networks and Machine Learning–ICANN 2020: 29th …, 2020 | 19 | 2020 |
Demystifying uneven vulnerability of link stealing attacks against graph neural networks H Zhang, B Wu, S Wang, X Yang, M Xue, S Pan, X Yuan International Conference on Machine Learning, 41737-41752, 2023 | 18 | 2023 |
Protecting the location privacy of mobile social media users S Wang, R Sinnott, S Nepal 2016 IEEE International Conference on Big Data (Big Data), 1143-1150, 2016 | 17 | 2016 |
A duty to forget, a right to be assured? exposing vulnerabilities in machine unlearning services H Hu, S Wang, J Chang, H Zhong, R Sun, S Hao, H Zhu, M Xue arXiv preprint arXiv:2309.08230, 2023 | 15 | 2023 |
Adversarial detection by latent style transformations S Wang, S Nepal, A Abuadbba, C Rudolph, M Grobler IEEE Transactions on Information Forensics and Security 17, 1099-1114, 2022 | 13 | 2022 |
Generating semantic adversarial examples via feature manipulation S Wang, S Nepal, C Rudolph, M Grobler, S Chen, T Chen arXiv preprint arXiv:2001.02297, 2020 | 12 | 2020 |
Privacy by design in aged care monitoring devices? well, not quite yet! S Alkhatib, J Waycott, G Buchanan, M Grobler, S Wang Proceedings of the 32nd Australian Conference on Human-Computer Interaction …, 2020 | 11 | 2020 |
P-STM: Privacy-protected social tie mining of individual trajectories S Wang, S Nepal, R Sinnott, C Rudolph 2019 IEEE International Conference on Web Services (ICWS), 1-10, 2019 | 11 | 2019 |
P-GENT: Privacy-preserving geocoding of non-geotagged tweets S Wang, R Sinnott, S Nepal 2018 17th IEEE International Conference On Trust, Security And Privacy In …, 2018 | 9 | 2018 |
Learning with mixture of prototypes for out-of-distribution detection H Lu, D Gong, S Wang, J Xue, L Yao, K Moore arXiv preprint arXiv:2402.02653, 2024 | 8 | 2024 |
Reconstruction attack on differential private trajectory protection mechanisms E Buchholz, A Abuadbba, S Wang, S Nepal, SS Kanhere Proceedings of the 38th Annual Computer Security Applications Conference …, 2022 | 8 | 2022 |
Towards web phishing detection limitations and mitigation A Abuadbba, S Wang, M Almashor, ME Ahmed, R Gaire, S Camtepe, ... arXiv preprint arXiv:2204.00985, 2022 | 8 | 2022 |
Oiad: One-for-all image anomaly detection with disentanglement learning S Wang, T Chen, S Chen, S Nepal, C Rudolph, M Grobler 2020 International Joint Conference on Neural Networks (IJCNN), 1-8, 2020 | 8 | 2020 |
Learn what you want to unlearn: Unlearning inversion attacks against machine unlearning H Hu, S Wang, T Dong, M Xue arXiv preprint arXiv:2404.03233, 2024 | 7 | 2024 |
Mate! Are you really aware? An explainability-guided testing framework for robustness of malware detectors R Sun, M Xue, G Tyson, T Dong, S Li, S Wang, H Zhu, S Camtepe, ... Proceedings of the 31st ACM Joint European Software Engineering Conference …, 2023 | 7 | 2023 |