Derui (Derek) Wang
Derui (Derek) Wang
Other namesDerek Wang
CSIRO's Data61
Verified email at - Homepage
Cited by
Cited by
Strip: A defence against trojan attacks on deep neural networks
Y Gao, C Xu, D Wang, S Chen, DC Ranasinghe, S Nepal
Proceedings of the 35th Annual Computer Security Applications Conference …, 2019
Android HIV: A study of repackaging malware for evading machine-learning detection
X Chen, C Li, D Wang, S Wen, J Zhang, S Nepal, Y Xiang, K Ren
IEEE Transactions on Information Forensics and Security 15, 987-1001, 2019
Daedalus: Breaking non-maximum suppression in object detection via adversarial examples
D Wang, C Li, S Wen, QL Han, S Nepal, X Zhang, Y Xiang
IEEE Transactions on Cybernetics 52 (8), 7427-7440, 2021
Backdoor attack on machine learning based android malware detectors
C Li, X Chen, D Wang, S Wen, ME Ahmed, S Camtepe, Y Xiang
IEEE Transactions on Dependable and Secure Computing 19 (5), 3357-3370, 2021
Defending against Adversarial Attack towards Deep Neural Networks via Collaborative Multi-Task Training
D Wang, C Li, S Wen, S Nepal, Y Xiang
IEEE Transactions on Dependable and Secure Computing 19 (2), 953-965, 2020
Man-in-the-Middle Attacks against Machine Learning Classifiers via Malicious Generative Models
D Wang, C Li, S Wen, S Nepal, Y Xiang
IEEE Transactions on Dependable and Secure Computing 18 (5), 2074-2087, 2020
The "Beatrix'' Resurrections: Robust Backdoor Detection via Gram Matrices
W Ma, D Wang, R Sun, M Xue, S Wen, Y Xiang
The Network and Distributed System Security (NDSS) Symposium 2023, 2022
StyleFool: Fooling Video Classification Systems via Style Transfer
Y Cao, X Xiao, R Sun, D Wang, M Xue, S Wen
IEEE Symposium on Security and Privacy (S&P) 2023, 2023
Explore the hidden treasure in protein–protein interaction networks—An iterative model for predicting protein functions
D Wang, J Hou
Journal of bioinformatics and computational biology 13 (05), 1550026, 2015
Catch me if you can: detecting compromised users through partial observation on networks
D Wang, S Wen, Y Xiang, W Zhou, J Zhang, S Nepal
2017 IEEE 37th International Conference on Distributed Computing Systems …, 2017
Who spread to whom? Inferring online social networks with user features
D Wang, W Zhou, JX Zheng, S Wen, J Zhang, Y Xiang
2018 IEEE International Conference on Communications (ICC), 1-6, 2018
On the Neural Backdoor of Federated Generative Models in Edge Computing
D Wang, S Wen, A Jolfaei, MS Haghighi, S Nepal, Y Xiang
ACM Transactions on Internet Technology (TOIT) 22 (2), 1-21, 2021
How spam features change in Twitter and the impact to machine learning based detection
T Wu, D Wang, S Wen, Y Xiang
Information Security Practice and Experience: 13th International Conference …, 2017
STC: exposing hidden compromised devices in networked sustainable green smart computing platforms by partial observation
D Wang, T Wu, S Wen, X Chen, Y Xiang, W Zhou
IEEE Transactions on Sustainable Computing 4 (2), 178-190, 2017
Flow-Attention-based Spatio-Temporal Aggregation Network for 3D Mask Detection
Y Cao, Y Li, Y Zhu, D Wang, M Xue
Advances in Neural Information Processing Systems (NeurIPS), 2023, 2023
Secure Deep Neural Networks in Adversarial Settings
W Derui Derek
The system can't perform the operation now. Try again later.
Articles 1–16