Tao Wei
Orcid: 0009-0000-4027-0310Affiliations:
- Ant Group, Hangzhou, China
- Baidu Inc., Beijing, China
- Peking University, Beijing, China
- University of California, Berkeley, CA, USA
According to our database1,
Tao Wei
authored at least 78 papers
between 2006 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
On csauthors.net:
Bibliography
2025
VeFIA: An Efficient Inference Auditing Framework for Vertical Federated Collaborative Software.
CoRR, July, 2025
Losing is for Cherishing: Data Valuation Based on Machine Unlearning and Shapley Value.
CoRR, May, 2025
CoRR, February, 2025
IEEE Trans. Dependable Secur. Comput., 2025
IACR Trans. Cryptogr. Hardw. Embed. Syst., 2025
IACR Cryptol. ePrint Arch., 2025
IACR Cryptol. ePrint Arch., 2025
RACONTEUR: A Knowledgeable, Insightful, and Portable LLM-Powered Shell Command Explainer.
Proceedings of the 32nd Annual Network and Distributed System Security Symposium, 2025
Proceedings of the 32nd Annual Network and Distributed System Security Symposium, 2025
2024
IACR Cryptol. ePrint Arch., 2024
IACR Cryptol. ePrint Arch., 2024
Proceedings of the International Symposium on Secure and Private Execution Environment Design, 2024
UnsafeCop: Towards Memory Safety for Real-World Unsafe Rust Code with Practical Bounded Model Checking.
Proceedings of the Formal Methods - 26th International Symposium, 2024
ProFake: Detecting Deepfakes in the Wild against Quality Degradation with Progressive Quality-adaptive Learning.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
<i>Coral: </i> Maliciously Secure Computation Framework for Packed and Mixed Circuits.
Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security, 2024
2023
IEEE Trans. Inf. Forensics Secur., 2023
IEEE Trans. Dependable Secur. Comput., 2023
IACR Cryptol. ePrint Arch., 2023
CoRR, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
ODDFuzz: Discovering Java Deserialization Vulnerabilities via Structure-Aware Directed Greybox Fuzzing.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023
Counterfactual-based Saliency Map: Towards Visual Contrastive Explanations for Neural Networks.
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023
2022
DetectS ec: Evaluating the robustness of object detection models to adversarial attacks.
Int. J. Intell. Syst., 2022
Fairness-aware Adversarial Perturbation Towards Bias Mitigation for Deployed Deep Models.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022
2021
Proceedings of the 28th Annual Network and Distributed System Security Symposium, 2021
Privilege-Escalation Vulnerability Discovery for Large-scale RPC Services: Principle, Design, and Deployment.
Proceedings of the ASIA CCS '21: ACM Asia Conference on Computer and Communications Security, 2021
2020
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020
ZeroWall: Detecting Zero-Day Web Attacks through Encoder-Decoder Recurrent Neural Networks.
Proceedings of the 39th IEEE Conference on Computer Communications, 2020
Fooling Detection Alone is Not Enough: Adversarial Attack against Multiple Object Tracking.
Proceedings of the 8th International Conference on Learning Representations, 2020
Proceedings of the ASPLOS '20: Architectural Support for Programming Languages and Operating Systems, 2020
2019
Field experience with obfuscating million-user iOS apps in large enterprise mobile development.
Softw. Pract. Exp., 2019
EURASIP J. Wirel. Commun. Netw., 2019
Cloud-based Image Classification Service Is Not Robust To Simple Transformations: A Forgotten Battlefield.
CoRR, 2019
Fooling Detection Alone is Not Enough: First Adversarial Attack against Multiple Object Tracking.
CoRR, 2019
Enhancing Cross-task Transferability of Adversarial Examples with Dispersion Reduction.
CoRR, 2019
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
ABSTRACT: Cloud-based Image Classification Service is Not Robust to Affine Transformation: A Forgotten Battlefield.
Proceedings of the 2019 ACM SIGSAC Conference on Cloud Computing Security Workshop, 2019
2018
Protecting million-user iOS apps with obfuscation: motivations, pitfalls, and experience.
Proceedings of the 40th International Conference on Software Engineering: Software Engineering in Practice, 2018
Software protection on the go: a large-scale empirical study on mobile app obfuscation.
Proceedings of the 40th International Conference on Software Engineering, 2018
FeatNet: Large-scale Fraud Device Detection by Network Representation Learning with Rich Features.
Proceedings of the 11th ACM Workshop on Artificial Intelligence and Security, 2018
2017
Sci. China Inf. Sci., 2017
Phishing-Alarm: Robust and Efficient Phishing Detection via Page Component Similarity.
IEEE Access, 2017
Proceedings of the Wireless Algorithms, Systems, and Applications, 2017
Proceedings of the 26th USENIX Security Symposium, 2017
Proceedings of the 2017 International Conference on Identification, 2017
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
2016
TaintART: A Practical Multi-level Information-Flow Tracking System for Android RunTime.
Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security, 2016
2015
Comput. Commun., 2015
Proceedings of the 24th USENIX Security Symposium, 2015
Proceedings of the 10th ACM Symposium on Information, 2015
2014
Proceedings of the ACM SIGCOMM 2014 Conference, 2014
Proceedings of the Information Security Practice and Experience, 2014
Proceedings of the 23rd International Conference on Computer Communication and Networks, 2014
Proceedings of the 11th IEEE Consumer Communications and Networking Conference, 2014
2013
Proceedings of the 2013 IEEE Symposium on Security and Privacy, 2013
Proceedings of the 2013 IEEE Symposium on Security and Privacy, 2013
Proceedings of the 2013 5th International Conference on Intelligent Networking and Collaborative Systems, 2013
Proceedings of the Information and Communications Security - 15th International Conference, 2013
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013
2012
Proceedings of the 11th annual ACM Workshop on Privacy in the Electronic Society, 2012
Proceedings of the IEEE Symposium on Security and Privacy, 2012
Proceedings of the 12th IEEE International Conference on Peer-to-Peer Computing, 2012
ET-DMD: An Error-Tolerant Scheme to Detect Malicious File Deletion on Distributed Storage.
Proceedings of the 2012 Fourth International Conference on Intelligent Networking and Collaborative Systems, 2012
2011
ACM Trans. Inf. Syst. Secur., 2011
Using type analysis in compiler to mitigate integer-overflow-to-buffer-overflow threat.
J. Comput. Secur., 2011
2010
TaintScope: A Checksum-Aware Directed Fuzzing Tool for Automatic Software Vulnerability Detection.
Proceedings of the 31st IEEE Symposium on Security and Privacy, 2010
IntPatch: Automatically Fix Integer-Overflow-to-Buffer-Overflow Vulnerability at Compile-Time.
Proceedings of the Computer Security, 2010
Proceedings of the 17th ACM Conference on Computer and Communications Security, 2010
Proceedings of the Twenty-Sixth Annual Computer Security Applications Conference, 2010
2009
IntScope: Automatically Detecting Integer Overflow Vulnerability in X86 Binary Using Symbolic Execution.
Proceedings of the Network and Distributed System Security Symposium, 2009
2007
Proceedings of the Static Analysis, 14th International Symposium, 2007
Proceedings of the 31st Annual International Computer Software and Applications Conference, 2007
2006
Proceedings of the Computational Science and Its Applications, 2006