Derui Wang
Orcid: 0000-0003-1388-7715
According to our database1,
Derui Wang
authored at least 45 papers
between 2015 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2025
CoRR, August, 2025
SafeSpeech: Robust and Universal Voice Protection Against Malicious Speech Synthesis.
CoRR, April, 2025
Whispering Under the Eaves: Protecting User Privacy Against Commercial and LLM-powered Automatic Speech Recognition Systems.
CoRR, April, 2025
CAMP in the Odyssey: Provably Robust Reinforcement Learning with Certified Radius Maximization.
CoRR, January, 2025
Bones of Contention: Exploring Query-Efficient Attacks Against Skeleton Recognition Systems.
CoRR, January, 2025
CAMP in the Odyssey: Provably Robust Reinforcement Learning with Certified Radius Maximization.
Dataset, January, 2025
IEEE Trans. Inf. Forensics Secur., 2025
IEEE Trans. Inf. Forensics Secur., 2025
IEEE Trans. Inf. Forensics Secur., 2025
Endogenous Merger Decisions Among Competitors: Impact of Limited Capacity and Loyal Segments.
Manag. Sci., 2025
Proceedings of the ACM on Web Conference 2025, 2025
Proceedings of the Companion Proceedings of the ACM on Web Conference 2025, 2025
Proceedings of the 32nd Annual Network and Distributed System Security Symposium, 2025
Proceedings of the 32nd Annual Network and Distributed System Security Symposium, 2025
Proceedings of the 2025 IEEE International Conference on Acoustics, 2025
2024
IEEE Trans. Dependable Secur. Comput., 2024
Rethinking the Threat and Accessibility of Adversarial Attacks against Face Recognition Systems.
CoRR, 2024
Proceedings of the IEEE Security and Privacy, 2024
Towards Evaluating the Robustness of Automatic Speech Recognition Systems via Audio Style Transfer.
Proceedings of the 2nd ACM Workshop on Secure and Trustworthy Deep Learning Systems, 2024
Proceedings of the 1st ACM Workshop on Large AI Systems and Models with Privacy and Safety Analysis, 2024
Effects of Exponential Gaussian Distribution on (Double Sampling) Randomized Smoothing.
Proceedings of the Forty-first International Conference on Machine Learning, 2024
Proceedings of the Algorithms and Architectures for Parallel Processing, 2024
Optimizing Cyber Defense in Dynamic Active Directories Through Reinforcement Learning.
Proceedings of the Computer Security - ESORICS 2024, 2024
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024
2023
CoRR, 2023
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023
2022
ACM Trans. Internet Techn., 2022
Defending Against Adversarial Attack Towards Deep Neural Networks Via Collaborative Multi-Task Training.
IEEE Trans. Dependable Secur. Comput., 2022
IEEE Trans. Dependable Secur. Comput., 2022
Daedalus: Breaking Nonmaximum Suppression in Object Detection via Adversarial Examples.
IEEE Trans. Cybern., 2022
Found. Trends Technol. Inf. Oper. Manag., 2022
2021
Man-in-the-Middle Attacks Against Machine Learning Classifiers Via Malicious Generative Models.
IEEE Trans. Dependable Secur. Comput., 2021
2020
IEEE Trans. Inf. Forensics Secur., 2020
2019
Daedalus: Breaking Non-Maximum Suppression in Object Detection via Adversarial Examples.
CoRR, 2019
Proceedings of the 35th Annual Computer Security Applications Conference, 2019
2015
Explore the hidden treasure in protein-protein interaction networks - An iterative model for predicting protein functions.
J. Bioinform. Comput. Biol., 2015