Follow
Shuo Wang
Title
Cited by
Cited by
Year
Backdoor attacks against transfer learning with pre-trained deep learning models
S Wang, S Nepal, C Rudolph, M Grobler, S Chen, T Chen
IEEE Transactions on Services Computing 15 (3), 1526-1539, 2020
1302020
Protecting personal trajectories of social media users through differential privacy
S Wang, RO Sinnott
Computers & Security 67, 142-163, 2017
632017
Projective ranking: A transferable evasion attack method on graph neural networks
H Zhang, B Wu, X Yang, C Zhou, S Wang, X Yuan, S Pan
Proceedings of the 30th ACM International Conference on Information …, 2021
352021
Privacy-protected statistics publication over social media user trajectory streams
S Wang, R Sinnott, S Nepal
Future Generation Computer Systems 87, 792-802, 2018
282018
Learn what you want to unlearn: Unlearning inversion attacks against machine unlearning
H Hu, S Wang, T Dong, M Xue
2024 IEEE Symposium on Security and Privacy (SP), 3257-3275, 2024
272024
Learning with mixture of prototypes for out-of-distribution detection
H Lu, D Gong, S Wang, J Xue, L Yao, K Moore
arXiv preprint arXiv:2402.02653, 2024
272024
A duty to forget, a right to be assured? exposing vulnerabilities in machine unlearning services
H Hu, S Wang, J Chang, H Zhong, R Sun, S Hao, H Zhu, M Xue
arXiv preprint arXiv:2309.08230, 2023
272023
PART-GAN: Privacy-preserving time-series sharing
S Wang, C Rudolph, S Nepal, M Grobler, S Chen
Artificial Neural Networks and Machine Learning–ICANN 2020: 29th …, 2020
242020
Demystifying uneven vulnerability of link stealing attacks against graph neural networks
H Zhang, B Wu, S Wang, X Yang, M Xue, S Pan, X Yuan
International Conference on Machine Learning, 41737-41752, 2023
232023
Similarity-based gray-box adversarial attack against deep face recognition
H Wang, S Wang, Z Jin, Y Wang, C Chen, M Tistarelli
2021 16th IEEE international conference on automatic face and gesture …, 2021
222021
Adversarial detection by latent style transformations
S Wang, S Nepal, A Abuadbba, C Rudolph, M Grobler
IEEE Transactions on Information Forensics and Security 17, 1099-1114, 2022
172022
Protecting the location privacy of mobile social media users
S Wang, R Sinnott, S Nepal
2016 IEEE International Conference on Big Data (Big Data), 1143-1150, 2016
172016
Mate! Are you really aware? An explainability-guided testing framework for robustness of malware detectors
R Sun, M Xue, G Tyson, T Dong, S Li, S Wang, H Zhu, S Camtepe, ...
Proceedings of the 31st ACM Joint European Software Engineering Conference …, 2023
152023
“Who wants to know all this stuff?!”: understanding older adults’ privacy concerns in aged care monitoring devices
S Alkhatib, R Kelly, J Waycott, G Buchanan, M Grobler, S Wang
Interacting with Computers 33 (5), 481-498, 2021
132021
Generating semantic adversarial examples via feature manipulation
S Wang, S Nepal, C Rudolph, M Grobler, S Chen, T Chen
arXiv preprint arXiv:2001.02297, 2020
132020
P-STM: Privacy-protected social tie mining of individual trajectories
S Wang, S Nepal, R Sinnott, C Rudolph
2019 IEEE International Conference on Web Services (ICWS), 1-10, 2019
132019
Towards web phishing detection limitations and mitigation
A Abuadbba, S Wang, M Almashor, ME Ahmed, R Gaire, S Camtepe, ...
arXiv preprint arXiv:2204.00985, 2022
122022
Privacy by design in aged care monitoring devices? well, not quite yet!
S Alkhatib, J Waycott, G Buchanan, M Grobler, S Wang
Proceedings of the 32nd Australian Conference on Human-Computer Interaction …, 2020
112020
Graphguard: Detecting and counteracting training data misuse in graph neural networks
B Wu, H Zhang, X Yang, S Wang, M Xue, S Pan, X Yuan
arXiv preprint arXiv:2312.07861, 2023
102023
Not seen, not heard in the digital world! measuring privacy practices in children’s apps
R Sun, M Xue, G Tyson, S Wang, S Camtepe, S Nepal
Proceedings of the ACM Web Conference 2023, 2166-2177, 2023
102023
The system can't perform the operation now. Try again later.
Articles 1–20