Derui Wang

Orcid: 0000-0003-1388-7715

According to our database1, Derui Wang authored at least 19 papers between 2015 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
LocalStyleFool: Regional Video Style Transfer Attack Using Segment Anything Model.
CoRR, 2024

LogoStyleFool: Vitiating Video Recognition Systems via Logo Style Transfer.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

2023
Reinforcement Unlearning.
CoRR, 2023

Double-Flow-based Steganography without Embedding for Image-to-Image Hiding.
CoRR, 2023

StyleFool: Fooling Video Classification Systems via Style Transfer.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

Flow-Attention-based Spatio-Temporal Aggregation Network for 3D Mask Detection.
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023

The "Beatrix" Resurrections: Robust Backdoor Detection via Gram Matrices.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023

2022
On the Neural Backdoor of Federated Generative Models in Edge Computing.
ACM Trans. Internet Techn., 2022

Defending Against Adversarial Attack Towards Deep Neural Networks Via Collaborative Multi-Task Training.
IEEE Trans. Dependable Secur. Comput., 2022

Backdoor Attack on Machine Learning Based Android Malware Detectors.
IEEE Trans. Dependable Secur. Comput., 2022

Daedalus: Breaking Nonmaximum Suppression in Object Detection via Adversarial Examples.
IEEE Trans. Cybern., 2022

Visual Subtitle Feature Enhanced Video Outline Generation.
CoRR, 2022

KGEA: A Knowledge Graph Enhanced Article Quality Identification Dataset.
CoRR, 2022

2021
Man-in-the-Middle Attacks Against Machine Learning Classifiers Via Malicious Generative Models.
IEEE Trans. Dependable Secur. Comput., 2021

2020
Android HIV: A Study of Repackaging Malware for Evading Machine-Learning Detection.
IEEE Trans. Inf. Forensics Secur., 2020

2019
Daedalus: Breaking Non-Maximum Suppression in Object Detection via Adversarial Examples.
CoRR, 2019

Flight Schedule Recovery: A Simulation-Based Approach.
Asia Pac. J. Oper. Res., 2019

STRIP: a defence against trojan attacks on deep neural networks.
Proceedings of the 35th Annual Computer Security Applications Conference, 2019

2015
Explore the hidden treasure in protein-protein interaction networks - An iterative model for predicting protein functions.
J. Bioinform. Comput. Biol., 2015


  Loading...