Run Wang
Orcid: 0000-0002-2842-5137Affiliations:
- Wuhan University, School of Cyber Science and Engineering, MoE Key Laboratory of Aerospace Information Security and Trusted Computing, China
- Nanyang Technological University, Singapore (2019 - 2021)
- Wuhan University, China (PhD 2018)
According to our database1,
Run Wang
authored at least 46 papers
between 2015 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2025
IEEE Trans. Inf. Forensics Secur., 2025
Exposing the Forgery Clues of DeepFakes via Exploring the Inconsistent Expression Cues.
Int. J. Intell. Syst., 2025
Towards Reliable Verification of Unauthorized Data Usage in Personalized Text-to-Image Diffusion Models.
Proceedings of the IEEE Symposium on Security and Privacy, 2025
Transfer Learning of Real Image Features with Soft Contrastive Loss for Fake Image Detection.
Proceedings of the AAAI-25, Sponsored by the Association for the Advancement of Artificial Intelligence, February 25, 2025
Proceedings of the AAAI-25, Sponsored by the Association for the Advancement of Artificial Intelligence, February 25, 2025
2024
Text Modality Oriented Image Feature Extraction for Detecting Diffusion-based DeepFake.
CoRR, 2024
Let Real Images be as a Judger, Spotting Fake Images Synthesized with Generative Models.
CoRR, 2024
SSL-OTA: Unveiling Backdoor Threats in Self-Supervised Learning for Object Detection.
CoRR, 2024
GhostEncoder: Stealthy backdoor attacks with dynamic triggers to pre-trained encoders in self-supervised learning.
Comput. Secur., 2024
Purifying Quantization-conditioned Backdoors via Layer-wise Activation Correction with Distribution Approximation.
Proceedings of the Forty-first International Conference on Machine Learning, 2024
Proceedings of the 9th IEEE European Symposium on Security and Privacy, 2024
TraceEvader: Making DeepFakes More Untraceable via Evading the Forgery Model Attribution.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024
2023
IEEE Trans. Knowl. Data Eng., March, 2023
SSL-Auth: An Authentication Framework by Fragile Watermarking for Pre-trained Encoders in Self-supervised Learning.
CoRR, 2023
What can Discriminator do? Towards Box-free Ownership Verification of Generative Adversarial Network.
CoRR, 2023
Proceedings of the 31st ACM International Conference on Multimedia, 2023
What can Discriminator do? Towards Box-free Ownership Verification of Generative Adversarial Networks.
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023
2022
Int. J. Intell. Syst., 2022
Int. J. Comput. Vis., 2022
CoRR, 2022
Rethinking the Vulnerability of DNN Watermarking: Are Watermarks Robust against Naturalness-aware Perturbations?
Proceedings of the MM '22: The 30th ACM International Conference on Multimedia, Lisboa, Portugal, October 10, 2022
Improving Robustness Verification of Neural Networks with General Activation Functions via Branching and Optimization.
Proceedings of the International Joint Conference on Neural Networks, 2022
Proceedings of the Thirty-First International Joint Conference on Artificial Intelligence, 2022
Anti-Forgery: Towards a Stealthy and Robust DeepFake Disruption Attack via Adversarial Perceptual-aware Perturbations.
Proceedings of the Thirty-First International Joint Conference on Artificial Intelligence, 2022
2021
IEEE Access, 2021
FakeTagger: Robust Safeguards against DeepFake Dissemination via Provenance Tracking.
Proceedings of the MM '21: ACM Multimedia Conference, Virtual Event, China, October 20, 2021
Proceedings of the Information and Communications Security - 23rd International Conference, 2021
2020
IEEE Trans. Mob. Comput., 2020
FakeLocator: Robust Localization of GAN-Based Face Manipulations via Semantic Segmentation Networks with Bells and Whistles.
CoRR, 2020
MGAAttack: Toward More Query-efficient Black-box Attack by Microbial Genetic Algorithm.
Proceedings of the MM '20: The 28th ACM International Conference on Multimedia, 2020
Proceedings of the MM '20: The 28th ACM International Conference on Multimedia, 2020
Proceedings of the MM '20: The 28th ACM International Conference on Multimedia, 2020
Proceedings of the MM '20: The 28th ACM International Conference on Multimedia, 2020
Proceedings of the Twenty-Ninth International Joint Conference on Artificial Intelligence, 2020
2019
Capturing the Persistence of Facial Expression Features for Deepfake Video Detection.
Proceedings of the Information and Communications Security - 21st International Conference, 2019
2018
Niffler: A Context-Aware and User-Independent Side-Channel Attack System for Password Inference.
Wirel. Commun. Mob. Comput., 2018
2017
deExploit: Identifying misuses of input data to diagnose memory-corruption exploits at the binary level.
J. Syst. Softw., 2017
2015
Reversing and Identifying Overwritten Data Structures for Memory-Corruption Exploit Diagnosis.
Proceedings of the 39th IEEE Annual Computer Software and Applications Conference, 2015