フォロー
Wanlun Ma
タイトル
引用先
引用先
The "Beatrix'' Resurrections: Robust Backdoor Detection via Gram Matrices
W Ma, D Wang, R Sun, M Xue, S Wen, Y Xiang
Proceedings of the 30th Network and Distributed System Security (NDSS) Symposium, 2023
752023
Event detection in online social network: Methodologies, state-of-art, and evolution
X Hu, W Ma, C Chen, S Wen, J Zhang, Y Xiang, G Fei
Computer Science Review 46, 100500, 2022
532022
What risk? i don't understand. an empirical study on users' understanding of the terms used in security texts
T Wu, R Zhang, W Ma, S Wen, X Xia, C Paris, S Nepal, Y Xiang
Proceedings of the 15th ACM Asia Conference on Computer and Communications …, 2020
162020
Faces are protected as privacy: An automatic tagging framework against unpermitted photo sharing in social media
L Tang, W Ma, M Grobler, W Meng, Y Wang, S Wen
IEEE Access 7, 75556-75567, 2019
142019
AI Agents Under Threat: A Survey of Key Security Challenges and Future Pathways
Z Deng, Y Guo, C Han, W Ma, J Xiong, S Wen, Y Xiang
arXiv preprint arXiv:2406.02630, 2024
102024
Social media event prediction using DNN with feedback mechanism
W Ma, X Hu, C Chen, S Wen, KR Choo, Y Xiang
ACM Transactions on Management Information Systems (TMIS) 13 (3), 1-24, 2022
92022
Real-time detection of COVID-19 events from Twitter: A spatial-temporally Bursty-Aware method
G Fei, Y Cheng, W Ma, C Chen, S Wen, G Hu
IEEE Transactions on Computational Social Systems 10 (2), 656-672, 2022
72022
Analysis of trending topics and text-based channels of information delivery in cybersecurity
T Wu, W Ma, S Wen, X Xia, C Paris, S Nepal, Y Xiang
ACM Transactions on Internet Technology (TOIT) 22 (2), 1-27, 2021
72021
The “Code” of Ethics: A Holistic Audit of AI Code Generators
W Ma, Y Song, M Xue, S Wen, Y Xiang
IEEE Transactions on Dependable and Secure Computing (TDSC) 21 (5), 4997-5013, 2024
52024
LocGuard: A Location Privacy Defender for Image Sharing
W Ma, D Wang, C Chen, S Wen, G Fei, Y Xiang
IEEE Transactions on Dependable and Secure Computing (TDSC) 21 (6), 5526 - 5537, 2024
42024
Online event detection in social media with bursty event recognition
W Ma, Z Liu, X Hu
Security and Privacy in Social Networks and Big Data: 5th International …, 2019
42019
When software security meets large language models: A survey
X Zhu, W Zhou, QL Han, W Ma, S Wen, Y Xiang
IEEE/CAA Journal of Automatica Sinica 12 (2), 317-334, 2025
32025
Multi-modal Representation Learning for Social Post Location Inference
RT Dai, J Luo, X Luo, L Mo, W Ma, F Zhou
ICC 2023-IEEE International Conference on Communications, 6331-6336, 2023
32023
My face is mine: Fighting unpermitted tagging on personal/group photos in social media
L Tang, W Ma, S Wen, M Grobler, Y Xiang, W Zhou
Web Information Systems Engineering–WISE 2017: 18th International Conference …, 2017
32017
Pager Explosion: Cybersecurity Insights and Afterthoughts
C Sheng, W Ma, QL Han, W Zhou, X Zhu, S Wen, Y Xiang, FY Wang
IEEE/CAA Journal of Automatica Sinica 11 (12), 2359-2362, 2024
2024
現在システムで処理を実行できません。しばらくしてからもう一度お試しください。
論文 1–15