Остановите войну!
for scientists:
default search action
Shuo Wang 0012
Person information
- affiliation: Monash University, Melbourne, CSIRO, Data61, Cybersecurity CRC, Australia
- affiliation (PhD 2018): University of Melbourne, Computing and Information Systems, Australia
Other persons with the same name
- Shuo Wang — disambiguation page
- Shuo Wang 0001 — Chinese Academy of Sciences, Institute of Automation, State Key Laboratory of Management and Control for Complex Systems, Beijing, China
- Shuo Wang 0002 — Hong Kong Polytechnic University, Department of Land Surveying and Geo-Informatics, Hong Kong (and 3 more)
- Shuo Wang 0003 — University of Florida, Department of Electrical and Computer Engineering, Gainesville, FL, USA (and 3 more)
- Shuo Wang 0004 — Beijing University of Posts and Telecommunications, Department of Information and Communications Engineering, China
- Shuo Wang 0005 — University of Birmingham, School of Computer Science, UK
- Shuo Wang 0006 — Beijing University of Posts and Telecommunications, State Key Laboratory of Networking and Switching Technology, China
- Shuo Wang 0007 — University of Bonn, Germany
- Shuo Wang 0008 — University of Science and Technology of China, School of Information Science and Technology, Hefei, China (and 1 more)
- Shuo Wang 0009 — Peking University, School of EECS, Beijing, China (and 1 more)
- Shuo Wang 0010 — Beijing, Normal University, Beijing, China
- Shuo Wang 0011 — Fudan University, Digital Medical Research Center, School of Basic Medical Sciences, Shanghai Key Laboratory of MICCAI, China (and 1 more)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c20]Nan Wu, Xin Yuan, Shuo Wang, Hongsheng Hu, Minhui Xue:
Cardinality Counting in "Alcatraz": A Privacy-aware Federated Learning Approach. WWW 2024: 3076-3084 - [i15]Haodong Lu, Dong Gong, Shuo Wang, Jason Xue, Lina Yao, Kristen Moore:
Learning with Mixture of Prototypes for Out-of-Distribution Detection. CoRR abs/2402.02653 (2024) - [i14]Erik Buchholz, Alsharif Abuadbba, Shuo Wang, Surya Nepal, Salil S. Kanhere:
SoK: Can Trajectory Generation Combine Privacy and Utility? CoRR abs/2403.07218 (2024) - 2023
- [j8]Hui Li, Yan Yan, Shuo Wang, Juan Liu, Yunpeng Cui:
Text classification on heterogeneous information network via enhanced GCN and knowledge. Neural Comput. Appl. 35(20): 14911-14927 (2023) - [j7]Bang Wu, Shuo Wang, Xingliang Yuan, Cong Wang, Carsten Rudolph, Xiangwen Yang:
Defeating Misclassification Attacks Against Transfer Learning. IEEE Trans. Dependable Secur. Comput. 20(2): 886-901 (2023) - [c19]Seonhye Park, Alsharif Abuadbba, Shuo Wang, Kristen Moore, Yansong Gao, Hyoungshick Kim, Surya Nepal:
DeepTaster: Adversarial Perturbation-Based Fingerprinting to Identify Proprietary Dataset Use in Deep Neural Networks. ACSAC 2023: 535-549 - [c18]Mahathir Almashor, M. Ejaz Ahmed, Benjamin Pick, Jason Xue, Sharif Abuadbba, Raj Gaire, Shuo Wang, Seyit Camtepe, Surya Nepal:
Unraveling Threat Intelligence Through the Lens of Malicious URL Campaigns. AINTEC 2023: 78-86 - [c17]Shuo Wang, Mahathir Almashor, Alsharif Abuadbba, Ruoxi Sun, Minhui Xue, Calvin Wang, Raj Gaire, Surya Nepal, Seyit Camtepe:
DOITRUST: Dissecting On-chain Compromised Internet Domains via Graph Learning. NDSS 2023 - [c16]Ruoxi Sun, Minhui Xue, Gareth Tyson, Tian Dong, Shaofeng Li, Shuo Wang, Haojin Zhu, Seyit Camtepe, Surya Nepal:
Mate! Are You Really Aware? An Explainability-Guided Testing Framework for Robustness of Malware Detectors. ESEC/SIGSOFT FSE 2023: 1573-1585 - [c15]Shuo Wang, Sharif Abuadbba, Sidharth Agarwal, Kristen Moore, Ruoxi Sun, Minhui Xue, Surya Nepal, Seyit Camtepe, Salil S. Kanhere:
PublicCheck: Public Integrity Verification for Services of Run-time Deep Models. SP 2023: 1348-1365 - [c14]Ruoxi Sun, Minhui Xue, Gareth Tyson, Shuo Wang, Seyit Camtepe, Surya Nepal:
Not Seen, Not Heard in the Digital World! Measuring Privacy Practices in Children's Apps. WWW 2023: 2166-2177 - [d2]Ruoxi Sun, Minhui Xue, Gareth Tyson, Tian Dong, Shaofeng Li, Shuo Wang, Haojin Zhu, Seyit Camtepe, Surya Nepal:
An Explainability-Guided Testing Framework for Robustness of Malware Detectors. Version 1. Zenodo, 2023 [all versions] - [d1]Ruoxi Sun, Minhui Xue, Gareth Tyson, Tian Dong, Shaofeng Li, Shuo Wang, Haojin Zhu, Seyit Camtepe, Surya Nepal:
An Explainability-Guided Testing Framework for Robustness of Malware Detectors. Version 2. Zenodo, 2023 [all versions] - [i13]Ruoxi Sun, Minhui Xue, Gareth Tyson, Shuo Wang, Seyit Camtepe, Surya Nepal:
Not Seen, Not Heard in the Digital World! Measuring Privacy Practices in Children's Apps. CoRR abs/2303.09008 (2023) - 2022
- [j6]Shuo Wang, Surya Nepal, Alsharif Abuadbba, Carsten Rudolph, Marthie Grobler:
Adversarial Detection by Latent Style Transformations. IEEE Trans. Inf. Forensics Secur. 17: 1099-1114 (2022) - [j5]Shuo Wang, Surya Nepal, Kristen Moore, Marthie Grobler, Carsten Rudolph, Alsharif Abuadbba:
OCTOPUS: Overcoming Performance and Privatization Bottlenecks in Distributed Learning. IEEE Trans. Parallel Distributed Syst. 33(12): 3460-3477 (2022) - [j4]Shuo Wang, Surya Nepal, Carsten Rudolph, Marthie Grobler, Shangyu Chen, Tianle Chen:
Backdoor Attacks Against Transfer Learning With Pre-Trained Deep Learning Models. IEEE Trans. Serv. Comput. 15(3): 1526-1539 (2022) - [j3]Shuo Wang, Surya Nepal, Carsten Rudolph, Marthie Grobler, Shangyu Chen, Tianle Chen, Zike An:
Defending Adversarial Attacks via Semantic Feature Manipulation. IEEE Trans. Serv. Comput. 15(6): 3184-3197 (2022) - [c13]Erik Buchholz, Alsharif Abuadbba, Shuo Wang, Surya Nepal, Salil Subhash Kanhere:
Reconstruction Attack on Differential Private Trajectory Protection Mechanisms. ACSAC 2022: 279-292 - [c12]Shuo Wang, Jinyuan Qin, Carsten Rudolph, Surya Nepal, Marthie Grobler:
R-Net: Robustness Enhanced Financial Time-Series Prediction with Differential Privacy. IJCNN 2022: 1-9 - [i12]Shuo Wang, Sharif Abuadbba, Sidharth Agarwal, Kristen Moore, Surya Nepal, Salil S. Kanhere:
Integrity Fingerprinting of DNN with Double Black-box Design and Verification. CoRR abs/2203.10902 (2022) - [i11]Alsharif Abuadbba, Shuo Wang, Mahathir Almashor, Muhammad Ejaz Ahmed, Raj Gaire, Seyit Camtepe, Surya Nepal:
Towards Web Phishing Detection Limitations and Mitigation. CoRR abs/2204.00985 (2022) - [i10]Mahathir Almashor, M. Ejaz Ahmed, Benjamin Pick, Sharif Abuadbba, Jason Xue, Raj Gaire, Shuo Wang, Seyit Camtepe, Surya Nepal:
Unraveling Threat Intelligence Through the Lens of Malicious URL Campaigns. CoRR abs/2208.12449 (2022) - [i9]Erik Buchholz, Alsharif Abuadbba, Shuo Wang, Surya Nepal, Salil S. Kanhere:
Reconstruction Attack on Differential Private Trajectory Protection Mechanisms. CoRR abs/2210.09375 (2022) - [i8]Seonhye Park, Alsharif Abuadbba, Shuo Wang, Kristen Moore, Yansong Gao, Hyoungshick Kim, Surya Nepal:
Tracking Dataset IP Use in Deep Neural Networks. CoRR abs/2211.13535 (2022) - 2021
- [i7]Shuo Wang, Surya Nepal, Kristen Moore, Marthie Grobler, Carsten Rudolph, Alsharif Abuadbba:
OCTOPUS: Overcoming Performance andPrivatization Bottlenecks in Distributed Learning. CoRR abs/2105.00602 (2021) - [i6]Shuo Wang, Lingjuan Lyu, Surya Nepal, Carsten Rudolph, Marthie Grobler, Kristen Moore:
Robust Training Using Natural Transformation. CoRR abs/2105.04070 (2021) - 2020
- [j2]Hui Li, Yunpeng Cui, Shuo Wang, Juan Liu, Jinyuan Qin, Yilin Yang:
Multivariate Financial Time-Series Prediction With Certified Robustness. IEEE Access 8: 109133-109143 (2020) - [c11]Shuo Wang, Carsten Rudolph, Surya Nepal, Marthie Grobler, Shangyu Chen:
PART-GAN: Privacy-Preserving Time-Series Sharing. ICANN (1) 2020: 578-593 - [c10]Shuo Wang, Tianle Chen, Shangyu Chen, Surya Nepal, Carsten Rudolph, Marthie Grobler:
OIAD: One-for-all Image Anomaly Detection with Disentanglement Learning. IJCNN 2020: 1-8 - [c9]Shuo Wang, Lingjuan Lyu, Tianle Chen, Shangyu Chen, Surya Nepal, Carsten Rudolph, Marthie Grobler:
Privacy-Preserving Data Generation and Sharing Using Identification Sanitizer. WISE (2) 2020: 185-200 - [i5]Shuo Wang, Shangyu Chen, Tianle Chen, Surya Nepal, Carsten Rudolph, Marthie Grobler:
Generating Semantic Adversarial Examples via Feature Manipulation. CoRR abs/2001.02297 (2020) - [i4]Shuo Wang, Surya Nepal, Carsten Rudolph, Marthie Grobler, Shangyu Chen, Tianle Chen:
Backdoor Attacks against Transfer Learning with Pre-trained Deep Learning Models. CoRR abs/2001.03274 (2020) - [i3]Shuo Wang, Tianle Chen, Shangyu Chen, Carsten Rudolph, Surya Nepal, Marthie Grobler:
OIAD: One-for-all Image Anomaly Detection with Disentanglement Learning. CoRR abs/2001.06640 (2020) - [i2]Shuo Wang, Tianle Chen, Surya Nepal, Carsten Rudolph, Marthie Grobler, Shangyu Chen:
Defending Adversarial Attacks via Semantic Feature Manipulation. CoRR abs/2002.02007 (2020) - [i1]Shuo Wang, Surya Nepal, Marthie Grobler, Carsten Rudolph, Tianle Chen, Shangyu Chen:
Adversarial Defense by Latent Style Transformations. CoRR abs/2006.09701 (2020)
2010 – 2019
- 2019
- [c8]Shuo Wang, Surya Nepal, Richard O. Sinnott, Carsten Rudolph:
P-STM: Privacy-Protected Social Tie Mining of Individual Trajectories. ICWS 2019: 1-10 - 2018
- [j1]Shuo Wang, Richard O. Sinnott, Surya Nepal:
Privacy-protected statistics publication over social media user trajectory streams. Future Gener. Comput. Syst. 87: 792-802 (2018) - [c7]Shuo Wang, Richard O. Sinnott, Surya Nepal:
A Privacy-Preserving Semantic Annotation Framework Using Online Social Media. ICWS 2018: 353-372 - [c6]Shuo Wang, Richard O. Sinnott, Surya Nepal:
PAIRS: Privacy-Aware Identification and Recommendation of Spatio-Friends. TrustCom/BigDataSE 2018: 920-931 - [c5]Shuo Wang, Richard O. Sinnott, Surya Nepal:
P-GENT: Privacy-Preserving Geocoding of Non-Geotagged Tweets. TrustCom/BigDataSE 2018: 972-983 - 2017
- [c4]Shuo Wang, Richard O. Sinnott, Surya Nepal:
Privacy-protected place of activity mining on big location data. IEEE BigData 2017: 1101-1108 - [c3]Shuo Wang, Richard O. Sinnott, Surya Nepal:
Sensitive gazetteer discovery and protection for mobile social media users. IEEE BigData 2017: 1109-1116 - 2016
- [c2]Shuo Wang, Richard O. Sinnott, Surya Nepal:
Protecting the location privacy of mobile social media users. IEEE BigData 2016: 1143-1150 - [c1]Shuo Wang, Richard O. Sinnott, Surya Nepal:
Privacy-protected social media user trajectories calibration. eScience 2016: 293-302
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-06-20 20:43 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint