Shuo Wang

Orcid: 0000-0001-8938-2364

Affiliations:
  • Monash University, Melbourne, CSIRO, Data61, Cybersecurity CRC, Australia
  • University of Melbourne, Computing and Information Systems, Australia (PhD 2018)


According to our database1, Shuo Wang authored at least 39 papers between 2016 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
SoK: Can Trajectory Generation Combine Privacy and Utility?
CoRR, 2024

Learning with Mixture of Prototypes for Out-of-Distribution Detection.
CoRR, 2024

2023
An Explainability-Guided Testing Framework for Robustness of Malware Detectors.
Dataset, August, 2023

An Explainability-Guided Testing Framework for Robustness of Malware Detectors.
Dataset, August, 2023

Text classification on heterogeneous information network via enhanced GCN and knowledge.
Neural Comput. Appl., July, 2023

Defeating Misclassification Attacks Against Transfer Learning.
IEEE Trans. Dependable Secur. Comput., 2023

Not Seen, Not Heard in the Digital World! Measuring Privacy Practices in Children's Apps.
Proceedings of the ACM Web Conference 2023, 2023

PublicCheck: Public Integrity Verification for Services of Run-time Deep Models.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

Mate! Are You Really Aware? An Explainability-Guided Testing Framework for Robustness of Malware Detectors.
Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2023

DOITRUST: Dissecting On-chain Compromised Internet Domains via Graph Learning.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023

Unraveling Threat Intelligence Through the Lens of Malicious URL Campaigns.
Proceedings of the 18th Asian Internet Engineering Conference, 2023

DeepTaster: Adversarial Perturbation-Based Fingerprinting to Identify Proprietary Dataset Use in Deep Neural Networks.
Proceedings of the Annual Computer Security Applications Conference, 2023

2022
Defending Adversarial Attacks via Semantic Feature Manipulation.
IEEE Trans. Serv. Comput., 2022

Backdoor Attacks Against Transfer Learning With Pre-Trained Deep Learning Models.
IEEE Trans. Serv. Comput., 2022

OCTOPUS: Overcoming Performance and Privatization Bottlenecks in Distributed Learning.
IEEE Trans. Parallel Distributed Syst., 2022

Adversarial Detection by Latent Style Transformations.
IEEE Trans. Inf. Forensics Secur., 2022

Tracking Dataset IP Use in Deep Neural Networks.
CoRR, 2022

Towards Web Phishing Detection Limitations and Mitigation.
CoRR, 2022

Integrity Fingerprinting of DNN with Double Black-box Design and Verification.
CoRR, 2022

R-Net: Robustness Enhanced Financial Time-Series Prediction with Differential Privacy.
Proceedings of the International Joint Conference on Neural Networks, 2022

Reconstruction Attack on Differential Private Trajectory Protection Mechanisms.
Proceedings of the Annual Computer Security Applications Conference, 2022

2021
Robust Training Using Natural Transformation.
CoRR, 2021

OCTOPUS: Overcoming Performance andPrivatization Bottlenecks in Distributed Learning.
CoRR, 2021

2020
Adversarial Defense by Latent Style Transformations.
CoRR, 2020

Defending Adversarial Attacks via Semantic Feature Manipulation.
CoRR, 2020

Generating Semantic Adversarial Examples via Feature Manipulation.
CoRR, 2020

Multivariate Financial Time-Series Prediction With Certified Robustness.
IEEE Access, 2020

Privacy-Preserving Data Generation and Sharing Using Identification Sanitizer.
Proceedings of the Web Information Systems Engineering - WISE 2020, 2020

OIAD: One-for-all Image Anomaly Detection with Disentanglement Learning.
Proceedings of the 2020 International Joint Conference on Neural Networks, 2020

PART-GAN: Privacy-Preserving Time-Series Sharing.
Proceedings of the Artificial Neural Networks and Machine Learning - ICANN 2020, 2020

2019
P-STM: Privacy-Protected Social Tie Mining of Individual Trajectories.
Proceedings of the 2019 IEEE International Conference on Web Services, 2019

2018
Privacy-protected statistics publication over social media user trajectory streams.
Future Gener. Comput. Syst., 2018

P-GENT: Privacy-Preserving Geocoding of Non-Geotagged Tweets.
Proceedings of the 17th IEEE International Conference On Trust, 2018

PAIRS: Privacy-Aware Identification and Recommendation of Spatio-Friends.
Proceedings of the 17th IEEE International Conference On Trust, 2018

A Privacy-Preserving Semantic Annotation Framework Using Online Social Media.
Proceedings of the Web Services - ICWS 2018, 2018

2017
Sensitive gazetteer discovery and protection for mobile social media users.
Proceedings of the 2017 IEEE International Conference on Big Data (IEEE BigData 2017), 2017

Privacy-protected place of activity mining on big location data.
Proceedings of the 2017 IEEE International Conference on Big Data (IEEE BigData 2017), 2017

2016
Privacy-protected social media user trajectories calibration.
Proceedings of the 12th IEEE International Conference on e-Science, 2016

Protecting the location privacy of mobile social media users.
Proceedings of the 2016 IEEE International Conference on Big Data (IEEE BigData 2016), 2016


  Loading...