フォロー
Derui (Derek) Wang
Derui (Derek) Wang
Research Scientist, CSIRO's Data61
確認したメール アドレス: data61.csiro.au - ホームページ
タイトル
引用先
引用先
Strip: A defence against trojan attacks on deep neural networks
Y Gao, C Xu, D Wang, S Chen, DC Ranasinghe, S Nepal
Proceedings of the 35th Annual Computer Security Applications Conference …, 2019
8812019
Android HIV: A study of repackaging malware for evading machine-learning detection
X Chen, C Li, D Wang, S Wen, J Zhang, S Nepal, Y Xiang, K Ren
IEEE Transactions on Information Forensics and Security 15, 987-1001, 2019
3282019
Daedalus: Breaking non-maximum suppression in object detection via adversarial examples
D Wang, C Li, S Wen, QL Han, S Nepal, X Zhang, Y Xiang
IEEE Transactions on Cybernetics 52 (8), 7427-7440, 2021
1252021
The "Beatrix'' Resurrections: Robust Backdoor Detection via Gram Matrices
W Ma, D Wang, R Sun, M Xue, S Wen, Y Xiang
The Network and Distributed System Security (NDSS) Symposium 2023, 2022
752022
Backdoor attack on machine learning based android malware detectors
C Li, X Chen, D Wang, S Wen, ME Ahmed, S Camtepe, Y Xiang
IEEE Transactions on dependable and secure computing 19 (5), 3357-3370, 2021
642021
Man-in-the-Middle Attacks against Machine Learning Classifiers via Malicious Generative Models
D Wang, C Li, S Wen, S Nepal, Y Xiang
IEEE Transactions on Dependable and Secure Computing 18 (5), 2074-2087, 2020
402020
Defending against Adversarial Attack towards Deep Neural Networks via Collaborative Multi-Task Training
D Wang, C Li, S Wen, S Nepal, Y Xiang
IEEE Transactions on Dependable and Secure Computing 19 (2), 953-965, 2020
362020
StyleFool: Fooling Video Classification Systems via Style Transfer
Y Cao, X Xiao, R Sun, D Wang, M Xue, S Wen
IEEE Symposium on Security and Privacy (SP) 2023, 2023
292023
Explore the hidden treasure in protein–protein interaction networks—An iterative model for predicting protein functions
D Wang, J Hou
Journal of bioinformatics and computational biology 13 (05), 1550026, 2015
102015
Reinforcement Unlearning
D Ye, T Zhu, C Zhu, D Wang, Z Shi, S Shen, W Zhou, M Xue
Network and Distributed System Security (NDSS) Symposium 2025, 2023
62023
Catch me if you can: detecting compromised users through partial observation on networks
D Wang, S Wen, Y Xiang, W Zhou, J Zhang, S Nepal
2017 IEEE 37th International Conference on Distributed Computing Systems …, 2017
62017
LogoStyleFool: Vitiating Video Recognition Systems via Logo Style Transfer
Y Cao, Z Zhao, X Xiao, D Wang, M Xue, J Lu
The 38th Annual AAAI Conference on Artificial Intelligence (AAAI), 2023
52023
On the Neural Backdoor of Federated Generative Models in Edge Computing
D Wang, S Wen, A Jolfaei, MS Haghighi, S Nepal, Y Xiang
ACM Transactions on Internet Technology 22 (2), 1-21, 2021
52021
Who spread to whom? Inferring online social networks with user features
D Wang, W Zhou, JX Zheng, S Wen, J Zhang, Y Xiang
2018 IEEE International Conference on Communications (ICC), 1-6, 2018
52018
LocGuard: A Location Privacy Defender for Image Sharing
W Ma, D Wang, C Chen, S Wen, G Fei, Y Xiang
IEEE Transactions on Dependable and Secure Computing, 2024
42024
How spam features change in Twitter and the impact to machine learning based detection
T Wu, D Wang, S Wen, Y Xiang
Information Security Practice and Experience: 13th International Conference …, 2017
42017
Optimizing Cyber Defense in Dynamic Active Directories through Reinforcement Learning
D Goel, K Moore, M Guo, D Wang, M Kim, S Camtepe
European Symposium on Research in Computer Security, 332-352, 2024
22024
STC: exposing hidden compromised devices in networked sustainable green smart computing platforms by partial observation
D Wang, T Wu, S Wen, X Chen, Y Xiang, W Zhou
IEEE Transactions on Sustainable Computing 4 (2), 178-190, 2017
22017
Provably Unlearnable Data Examples
D Wang, M Xue, B Li, S Camtepe, L Zhu
Network and Distributed System Security (NDSS) Symposium 2025, 2024
1*2024
Mitigating Unauthorized Speech Synthesis for Voice Protection
Z Zhang, Q Yang, D Wang, P Huang, Y Cao, K Ye, J Hao
CCS-LAMPS 2024, 2024
12024
現在システムで処理を実行できません。しばらくしてからもう一度お試しください。
論文 1–20