关注
Shuo Wang
Shuo Wang
在 sjtu.edu.cn 的电子邮件经过验证
标题
引用次数
引用次数
年份
Backdoor attacks against transfer learning with pre-trained deep learning models
S Wang, S Nepal, C Rudolph, M Grobler, S Chen, T Chen
IEEE Transactions on Services Computing 15 (3), 1526-1539, 2020
962020
Protecting personal trajectories of social media users through differential privacy
S Wang, RO Sinnott
Computers & Security 67, 142-163, 2017
612017
Privacy-protected statistics publication over social media user trajectory streams
S Wang, R Sinnott, S Nepal
Future Generation Computer Systems 87, 792-802, 2018
282018
Projective ranking: A transferable evasion attack method on graph neural networks
H Zhang, B Wu, X Yang, C Zhou, S Wang, X Yuan, S Pan
Proceedings of the 30th ACM International Conference on Information …, 2021
252021
Protecting the location privacy of mobile social media users
S Wang, R Sinnott, S Nepal
2016 IEEE International Conference on Big Data (Big Data), 1143-1150, 2016
172016
PART-GAN: Privacy-preserving time-series sharing
S Wang, C Rudolph, S Nepal, M Grobler, S Chen
Artificial Neural Networks and Machine Learning–ICANN 2020: 29th …, 2020
142020
Demystifying uneven vulnerability of link stealing attacks against graph neural networks
H Zhang, B Wu, S Wang, X Yang, M Xue, S Pan, X Yuan
International Conference on Machine Learning, 41737-41752, 2023
122023
Similarity-based gray-box adversarial attack against deep face recognition
H Wang, S Wang, Z Jin, Y Wang, C Chen, M Tistarelli
2021 16th IEEE international conference on automatic face and gesture …, 2021
122021
Generating semantic adversarial examples via feature manipulation
S Wang, S Nepal, C Rudolph, M Grobler, S Chen, T Chen
arXiv preprint arXiv:2001.02297, 2020
122020
Adversarial detection by latent style transformations
S Wang, S Nepal, A Abuadbba, C Rudolph, M Grobler
IEEE Transactions on Information Forensics and Security 17, 1099-1114, 2022
112022
Privacy by design in aged care monitoring devices? well, not quite yet!
S Alkhatib, J Waycott, G Buchanan, M Grobler, S Wang
Proceedings of the 32nd Australian Conference on Human-Computer Interaction …, 2020
102020
A Duty to Forget, a Right to be Assured? Exposing Vulnerabilities in Machine Unlearning Services
H Hu, S Wang, J Chang, H Zhong, R Sun, S Hao, H Zhu, M Xue
arXiv preprint arXiv:2309.08230, 2023
82023
Towards web phishing detection limitations and mitigation
A Abuadbba, S Wang, M Almashor, ME Ahmed, R Gaire, S Camtepe, ...
arXiv preprint arXiv:2204.00985, 2022
82022
Oiad: One-for-all image anomaly detection with disentanglement learning
S Wang, T Chen, S Chen, S Nepal, C Rudolph, M Grobler
2020 International Joint Conference on Neural Networks (IJCNN), 1-8, 2020
82020
P-STM: Privacy-protected social tie mining of individual trajectories
S Wang, S Nepal, R Sinnott, C Rudolph
2019 IEEE International Conference on Web Services (ICWS), 1-10, 2019
82019
P-GENT: Privacy-preserving geocoding of non-geotagged tweets
S Wang, R Sinnott, S Nepal
2018 17th IEEE International Conference On Trust, Security And Privacy In …, 2018
82018
Octopus: Overcoming performance and privatization bottlenecks in distributed learning
S Wang, S Nepal, K Moore, M Grobler, C Rudolph, A Abuadbba
IEEE Transactions on Parallel and Distributed Systems 33 (12), 3460-3477, 2022
62022
“Who Wants to Know all this Stuff?!”: Understanding Older Adults’ Privacy Concerns in Aged Care Monitoring Devices
S Alkhatib, R Kelly, J Waycott, G Buchanan, M Grobler, S Wang
Interacting with Computers 33 (5), 481-498, 2021
62021
Towards defeating misclassification attacks against transfer learning
B Wu, S Wang, X Yuan, C Wang, C Rudolph, X Yang
arXiv: 1908.11230, 2020
6*2020
Privacy-protected place of activity mining on big location data
S Wang, R Sinnott, S Nepal
2017 IEEE International Conference on Big Data (Big Data), 1101-1108, 2017
62017
系统目前无法执行此操作,请稍后再试。
文章 1–20