フォロー
Tingmin (Tina) Wu
Tingmin (Tina) Wu
CSIRO's Data61, Monash University
確認したメール アドレス: data61.csiro.au - ホームページ
タイトル
引用先
引用先
Twitter spam detection: Survey of new approaches and comparative study
T Wu, S Wen, Y Xiang, W Zhou
Computers & Security 76, 265-284, 2018
2272018
Twitter spam detection based on deep learning
T Wu, S Liu, J Zhang, Y Xiang
Proceedings of the australasian computer science week multiconference, 1-8, 2017
1902017
Copyright protection and accountability of generative ai: Attack, watermarking and attribution
H Zhong, J Chang, Z Yang, T Wu, PC Mahawaga Arachchige, ...
Companion Proceedings of the ACM Web Conference 2023, 94-98, 2023
482023
Detecting spamming activities in twitter based on deep‐learning technique
T Wu, S Wen, S Liu, J Zhang, Y Xiang, M Alrubaian, MM Hassan
Concurrency and Computation: Practice and Experience 29 (19), e4209, 2017
362017
Raider: Reinforcement-aided spear phishing detector
K Evans, A Abuadbba, T Wu, K Moore, M Ahmed, G Pogrebna, S Nepal, ...
International Conference on Network and System Security, 23-50, 2022
252022
What risk? i don't understand. an empirical study on users' understanding of the terms used in security texts
T Wu, R Zhang, W Ma, S Wen, X Xia, C Paris, S Nepal, Y Xiang
Proceedings of the 15th ACM Asia Conference on Computer and Communications …, 2020
162020
Email summarization to assist users in phishing identification
A Kashapov, T Wu, S Abuadbba, C Rudolph
Proceedings of the 2022 ACM on Asia Conference on Computer and …, 2022
152022
Pokémon GO in Melbourne CBD: A case study of the cyber-physical symbiotic social networks
D Wang, T Wu, S Wen, D Liu, Y Xiang, W Zhou, H Hassan, A Alelaiwi
Journal of computational science 26, 456-467, 2018
142018
Investigating users’ understanding of privacy policies of virtual personal assistant applications
B Chen, T Wu, Y Zhang, MB Chhetri, G Bai
Proceedings of the 2023 ACM Asia Conference on Computer and Communications …, 2023
82023
Catering to your concerns: automatic generation of personalised security-centric descriptions for Android apps
T Wu, L Tang, R Zhang, S Wen, C Paris, S Nepal, M Grobler, Y Xiang
ACM Transactions on Cyber-Physical Systems 3 (4), 1-21, 2019
82019
Analysis of trending topics and text-based channels of information delivery in cybersecurity
T Wu, W Ma, S Wen, X Xia, C Paris, S Nepal, Y Xiang
ACM Transactions on Internet Technology (TOIT) 22 (2), 1-27, 2021
72021
How COVID-19 impacts telehealth: an empirical study of telehealth services, users and the use of metaverse
L Tang, T Wu, X Chen, S Wen, W Zhou, X Zhu, Y Xiang
Connection Science 36 (1), 2282942, 2024
52024
How spam features change in Twitter and the impact to machine learning based detection
T Wu, D Wang, S Wen, Y Xiang
Information Security Practice and Experience: 13th International Conference …, 2017
42017
Deep Learning-Based Out-of-distribution Source Code Data Identification: How Far We Have Gone?
V Nguyen, X Yuan, T Wu, S Nepal, M Grobler, C Rudolph
arXiv preprint arXiv:2404.05964, 2024
32024
A Pioneering Study and An Innovative Information Theory-based Approach to Enhance The Transparency in Phishing Detection
V Nguyen, T Wu, X Yuan, M Grobler, S Nepal, C Rudolph
arXiv preprint arXiv:2402.17092, 2024
32024
Profiler: Profile-Based Model to Detect Phishing Emails
M Shmalko, A Abuadbba, R Gaire, T Wu, HY Paik, S Nepal
arXiv preprint arXiv:2208.08745, 2022
32022
Profiler: Distributed model to detect phishing
M Shmalko, A Abuadbba, R Gaire, T Wu, HY Paik, S Nepal
2022 IEEE 42nd International Conference on Distributed Computing Systems …, 2022
32022
Utilizing large language models with human feedback integration for generating dedicated warning for phishing emails
QH Nguyen, T Wu, V Nguyen, X Yuan, J Xue, C Rudolph
Proceedings of the 2nd ACM Workshop on Secure and Trustworthy Deep Learning …, 2024
22024
How Does Visualisation Help App Practitioners Analyse Android Apps?
L Tang, T Wu, X Chen, S Wen, L Li, X Xia, M Grobler, Y Xiang
IEEE Transactions on Dependable and Secure Computing 20 (3), 2238-2255, 2022
22022
Every word is valuable: Studied influence of negative words that spread during election period in social media
X Hu, L Li, T Wu, X Ai, J Gu, S Wen
Concurrency and Computation: Practice and Experience 31 (21), e4525, 2019
22019
現在システムで処理を実行できません。しばらくしてからもう一度お試しください。
論文 1–20