Di Wu

Affiliations:
  • University of Southern Queensland, Australia
  • Deakin University, School of Information Technology, Melbourne, Australia (former)
  • University of Technology Sydney, School of Software, Centre for Artificial Intelligence, Sydney, Australia (PhD 2019)


According to our database1, Di Wu authored at least 25 papers between 2011 and 2023.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
VPFL: A verifiable privacy-preserving federated learning scheme for edge computing systems.
Digit. Commun. Networks, August, 2023

Hybrid KD-NFT: A multi-layered NFT assisted robust Knowledge Distillation framework for Internet of Things.
J. Inf. Secur. Appl., June, 2023

2022
Detecting and mitigating poisoning attacks in federated learning using generative adversarial networks.
Concurr. Comput. Pract. Exp., 2022

A Blockchain-based Multi-layer Decentralized Framework for Robust Federated Learning.
Proceedings of the International Joint Conference on Neural Networks, 2022

Campus Network Intrusion Detection based on Federated Learning.
Proceedings of the International Joint Conference on Neural Networks, 2022

2021
Fooling intrusion detection systems using adversarially autoencoder.
Digit. Commun. Networks, 2021

Defending against Membership Inference Attacks in Federated learning via Adversarial Example.
Proceedings of the 17th International Conference on Mobility, Sensing and Networking, 2021

2020
Network Anomaly Detection Using Federated Learning and Transfer Learning.
Proceedings of the Security and Privacy in Digital Economy, 2020

Defending Poisoning Attacks in Federated Learning via Adversarial Training Method.
Proceedings of the Frontiers in Cyber Security - Third International Conference, 2020

2019
Video-based similar gesture action recognition using deep learning and GAN-based approaches
PhD thesis, 2019

Network Anomaly Detection by Using a Time-Decay Closed Frequent Pattern.
Inf., 2019

Poisoning Attack in Federated Learning using Generative Adversarial Nets.
Proceedings of the 18th IEEE International Conference On Trust, 2019

Multi-Task Network Anomaly Detection using Federated Learning.
Proceedings of the Tenth International Symposium on Information and Communication Technology, 2019

Feature-Dependent Graph Convolutional Autoencoders with Adversarial Training Methods.
Proceedings of the International Joint Conference on Neural Networks, 2019

Adversarial Action Data Augmentation for Similar Gesture Action Recognition.
Proceedings of the International Joint Conference on Neural Networks, 2019

PDGAN: A Novel Poisoning Defense Method in Federated Learning Using Generative Adversarial Network.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2019

A Privacy-Preserving Access Control Scheme with Verifiable and Outsourcing Capabilities in Fog-Cloud Computing.
Proceedings of the Algorithms and Architectures for Parallel Processing, 2019

2018
Robust Feature-Based Automated Multi-View Human Action Recognition System.
IEEE Access, 2018

An End-to-End Hierarchical Classification Approach for Similar Gesture Recognition.
Proceedings of the 2018 International Conference on Image and Vision Computing New Zealand, 2018

Similar Gesture Recognition using Hierarchical Classification Approach in RGB Videos.
Proceedings of the 2018 Digital Image Computing: Techniques and Applications, 2018

2017
Recent advances in video-based human action recognition using deep learning: A review.
Proceedings of the 2017 International Joint Conference on Neural Networks, 2017

2015
Detecting stepping stones by abnormal causality probability.
Secur. Commun. Networks, 2015

2014
On Addressing the Imbalance Problem: A Correlated KNN Approach for Network Traffic Classification.
Proceedings of the Network and System Security - 8th International Conference, 2014

2013
Detecting Stepping Stones by Abnormal Causality Probability.
Proceedings of the Cyberspace Safety and Security - 5th International Symposium, 2013

2011
A Survey on Latest Botnet Attack and Defense.
Proceedings of the IEEE 10th International Conference on Trust, 2011


  Loading...