Подписаться
Derui (Derek) Wang
Derui (Derek) Wang
Research Scientist, CSIRO's Data61
Подтвержден адрес электронной почты в домене data61.csiro.au - Главная страница
Название
Процитировано
Процитировано
Год
Strip: A defence against trojan attacks on deep neural networks
Y Gao, C Xu, D Wang, S Chen, DC Ranasinghe, S Nepal
ACSAC'19, 2019
8832019
Android HIV: A study of repackaging malware for evading machine-learning detection
X Chen, C Li, D Wang, S Wen, J Zhang, S Nepal, Y Xiang, K Ren
IEEE Transactions on Information Forensics and Security 15, 987-1001, 2019
3282019
Daedalus: Breaking non-maximum suppression in object detection via adversarial examples
D Wang, C Li, S Wen, QL Han, S Nepal, X Zhang, Y Xiang
IEEE Transactions on Cybernetics 52 (8), 7427-7440, 2021
1222021
The "Beatrix'' Resurrections: Robust Backdoor Detection via Gram Matrices
W Ma, D Wang, R Sun, M Xue, S Wen, Y Xiang
NDSS'23, 2022
752022
Backdoor attack on machine learning based android malware detectors
C Li, X Chen, D Wang, S Wen, ME Ahmed, S Camtepe, Y Xiang
IEEE Transactions on dependable and secure computing 19 (5), 3357-3370, 2021
642021
Man-in-the-Middle Attacks against Machine Learning Classifiers via Malicious Generative Models
D Wang, C Li, S Wen, S Nepal, Y Xiang
IEEE Transactions on Dependable and Secure Computing 18 (5), 2074-2087, 2020
392020
Defending against Adversarial Attack towards Deep Neural Networks via Collaborative Multi-Task Training
D Wang, C Li, S Wen, S Nepal, Y Xiang
IEEE Transactions on Dependable and Secure Computing 19 (2), 953-965, 2020
362020
StyleFool: Fooling Video Classification Systems via Style Transfer
Y Cao, X Xiao, R Sun, D Wang, M Xue, S Wen
IEEE SP'23, 2023
292023
Explore the hidden treasure in protein–protein interaction networks—An iterative model for predicting protein functions
D Wang, J Hou
Journal of bioinformatics and computational biology 13 (05), 1550026, 2015
102015
Reinforcement Unlearning
D Ye, T Zhu, C Zhu, D Wang, Z Shi, S Shen, W Zhou, M Xue
NDSS'25, 2023
62023
Catch me if you can: detecting compromised users through partial observation on networks
D Wang, S Wen, Y Xiang, W Zhou, J Zhang, S Nepal
ICDCS'17, 2017
62017
LogoStyleFool: Vitiating Video Recognition Systems via Logo Style Transfer
Y Cao, Z Zhao, X Xiao, D Wang, M Xue, J Lu
AAAI'24, 2023
52023
On the Neural Backdoor of Federated Generative Models in Edge Computing
D Wang, S Wen, A Jolfaei, MS Haghighi, S Nepal, Y Xiang
ACM Transactions on Internet Technology 22 (2), 1-21, 2021
52021
Who spread to whom? Inferring online social networks with user features
D Wang, W Zhou, JX Zheng, S Wen, J Zhang, Y Xiang
2018 IEEE International Conference on Communications (ICC), 1-6, 2018
52018
LocGuard: a location privacy defender for image sharing
W Ma, D Wang, C Chen, S Wen, G Fei, Y Xiang
IEEE Transactions on dependable and Secure Computing, 2024
42024
How spam features change in Twitter and the impact to machine learning based detection
T Wu, D Wang, S Wen, Y Xiang
Information Security Practice and Experience: 13th International Conference …, 2017
42017
Optimizing Cyber Defense in Dynamic Active Directories through Reinforcement Learning
D Goel, K Moore, M Guo, D Wang, M Kim, S Camtepe
ESORICS'24, 2024
32024
Provably Unlearnable Data Examples
D Wang, M Xue, B Li, S Camtepe, L Zhu
NDSS'25, 2024
2*2024
Effects of Exponential Gaussian Distribution on (Double Sampling) Randomized Smoothing
Y Shu, X Xiao, D Wang, Y Cao, S Chen, J Xue, L Li, B Li
ICML'24, 2024
22024
STC: exposing hidden compromised devices in networked sustainable green smart computing platforms by partial observation
D Wang, T Wu, S Wen, X Chen, Y Xiang, W Zhou
IEEE Transactions on Sustainable Computing 4 (2), 178-190, 2017
22017
В данный момент система не может выполнить эту операцию. Повторите попытку позднее.
Статьи 1–20