Run Wang

Orcid: 0000-0002-2842-5137

Affiliations:
  • Wuhan University, School of Cyber Science and Engineering, MoE Key Laboratory of Aerospace Information Security and Trusted Computing, China
  • Nanyang Technological University, Singapore (2019 - 2021)
  • Wuhan University, China (PhD 2018)


According to our database1, Run Wang authored at least 46 papers between 2015 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Hard Adversarial Example Mining for Improving Robust Fairness.
IEEE Trans. Inf. Forensics Secur., 2025

Exposing the Forgery Clues of DeepFakes via Exploring the Inconsistent Expression Cues.
Int. J. Intell. Syst., 2025

Towards Reliable Verification of Unauthorized Data Usage in Personalized Text-to-Image Diffusion Models.
Proceedings of the IEEE Symposium on Security and Privacy, 2025

Transfer Learning of Real Image Features with Soft Contrastive Loss for Fake Image Detection.
Proceedings of the AAAI-25, Sponsored by the Association for the Advancement of Artificial Intelligence, February 25, 2025

Perception-Guided Jailbreak Against Text-to-Image Models.
Proceedings of the AAAI-25, Sponsored by the Association for the Advancement of Artificial Intelligence, February 25, 2025

2024
Towards Action Hijacking of Large Language Model-based Agent.
CoRR, 2024

Text Modality Oriented Image Feature Extraction for Detecting Diffusion-based DeepFake.
CoRR, 2024

Let Real Images be as a Judger, Spotting Fake Images Synthesized with Generative Models.
CoRR, 2024

SSL-OTA: Unveiling Backdoor Threats in Self-Supervised Learning for Object Detection.
CoRR, 2024

GhostEncoder: Stealthy backdoor attacks with dynamic triggers to pre-trained encoders in self-supervised learning.
Comput. Secur., 2024

Purifying Quantization-conditioned Backdoors via Layer-wise Activation Correction with Distribution Approximation.
Proceedings of the Forty-first International Conference on Machine Learning, 2024

Fingerprinting Image-to-Image Generative Adversarial Networks.
Proceedings of the 9th IEEE European Symposium on Security and Privacy, 2024

TraceEvader: Making DeepFakes More Untraceable via Evading the Forgery Model Attribution.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024

2023
Towards a Robust Deep Neural Network Against Adversarial Texts: A Survey.
IEEE Trans. Knowl. Data Eng., March, 2023

SSL-Auth: An Authentication Framework by Fragile Watermarking for Pre-trained Encoders in Self-supervised Learning.
CoRR, 2023

Hard Adversarial Example Mining for Improving Robust Fairness.
CoRR, 2023

What can Discriminator do? Towards Box-free Ownership Verification of Generative Adversarial Network.
CoRR, 2023

Dual-level Interaction for Domain Adaptive Semantic Segmentation.
CoRR, 2023

Free Fine-tuning: A Plug-and-Play Watermarking Scheme for Deep Neural Networks.
Proceedings of the 31st ACM International Conference on Multimedia, 2023

What can Discriminator do? Towards Box-free Ownership Verification of Generative Adversarial Networks.
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023

2022
Better constraints of imperceptibility, better adversarial examples in the text.
Int. J. Intell. Syst., 2022

Countering Malicious DeepFakes: Survey, Battleground, and Horizon.
Int. J. Comput. Vis., 2022

Free Fine-tuning: A Plug-and-Play Watermarking Scheme for Deep Neural Networks.
CoRR, 2022

Rethinking the Vulnerability of DNN Watermarking: Are Watermarks Robust against Naturalness-aware Perturbations?
Proceedings of the MM '22: The 30th ACM International Conference on Multimedia, Lisboa, Portugal, October 10, 2022

Improving Robustness Verification of Neural Networks with General Activation Functions via Branching and Optimization.
Proceedings of the International Joint Conference on Neural Networks, 2022

MetaFinger: Fingerprinting the Deep Neural Networks with Meta-training.
Proceedings of the Thirty-First International Joint Conference on Artificial Intelligence, 2022

Anti-Forgery: Towards a Stealthy and Robust DeepFake Disruption Attack via Adversarial Perceptual-aware Perturbations.
Proceedings of the Thirty-First International Joint Conference on Artificial Intelligence, 2022

2021
A Stealthy and Robust Fingerprinting Scheme for Generative Models.
CoRR, 2021

An End-to-End Rumor Detection Model Based on Feature Aggregation.
Complex., 2021

TextFirewall: Omni-Defending Against Adversarial Texts in Sentiment Classification.
IEEE Access, 2021

FakeTagger: Robust Safeguards against DeepFake Dissemination via Provenance Tracking.
Proceedings of the MM '21: ACM Multimedia Conference, Virtual Event, China, October 20, 2021

Exposing DeepFakes via Localizing the Manipulated Artifacts.
Proceedings of the Information and Communications Security - 23rd International Conference, 2021

2020
SmartPI: Understanding Permission Implications of Android Apps from User Reviews.
IEEE Trans. Mob. Comput., 2020

FakeLocator: Robust Localization of GAN-Based Face Manipulations via Semantic Segmentation Networks with Bells and Whistles.
CoRR, 2020

MGAAttack: Toward More Query-efficient Black-box Attack by Microbial Genetic Algorithm.
Proceedings of the MM '20: The 28th ACM International Conference on Multimedia, 2020

DeepSonar: Towards Effective and Robust Detection of AI-Synthesized Fake Voices.
Proceedings of the MM '20: The 28th ACM International Conference on Multimedia, 2020

Amora: Black-box Adversarial Morphing Attack.
Proceedings of the MM '20: The 28th ACM International Conference on Multimedia, 2020

FakePolisher: Making DeepFakes More Detection-Evasive by Shallow Reconstruction.
Proceedings of the MM '20: The 28th ACM International Conference on Multimedia, 2020

FakeSpotter: A Simple yet Robust Baseline for Spotting AI-Synthesized Fake Faces.
Proceedings of the Twenty-Ninth International Joint Conference on Artificial Intelligence, 2020

2019
Amora: Black-box Adversarial Morphing Attack.
CoRR, 2019

FakeSpotter: A Simple Baseline for Spotting AI-Synthesized Fake Faces.
CoRR, 2019

A survey on Adversarial Attacks and Defenses in Text.
CoRR, 2019

Capturing the Persistence of Facial Expression Features for Deepfake Video Detection.
Proceedings of the Information and Communications Security - 21st International Conference, 2019

2018
Niffler: A Context-Aware and User-Independent Side-Channel Attack System for Password Inference.
Wirel. Commun. Mob. Comput., 2018

2017
deExploit: Identifying misuses of input data to diagnose memory-corruption exploits at the binary level.
J. Syst. Softw., 2017

2015
Reversing and Identifying Overwritten Data Structures for Memory-Corruption Exploit Diagnosis.
Proceedings of the 39th IEEE Annual Computer Software and Applications Conference, 2015


  Loading...