Ting Wang

Orcid: 0000-0003-4927-5833

Affiliations:
  • Pennsylvania State University, University Park, PA, USA
  • Lehigh University, Bethlehem, PA, USA (former)
  • IBM Research Center, Yorktown Heights, NY, USA (former)
  • Georgia Institute of Technology, Atlanta, GA, USA (PhD)


According to our database1, Ting Wang authored at least 140 papers between 2008 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Towards understanding bogus traffic service in online social networks.
Frontiers Inf. Technol. Electron. Eng., March, 2024

AdvSQLi: Generating Adversarial SQL Injections Against Real-World WAF-as-a-Service.
IEEE Trans. Inf. Forensics Secur., 2024

HashVFL: Defending Against Data Reconstruction Attacks in Vertical Federated Learning.
IEEE Trans. Inf. Forensics Secur., 2024

Automated Fusion of Multimodal Electronic Health Records for Better Medical Predictions.
CoRR, 2024

2023
Predicting line of therapy transition via similar patient augmentation.
J. Biomed. Informatics, November, 2023

Fraud-Agents Detection in Online Microfinance: A Large-Scale Empirical Study.
IEEE Trans. Dependable Secur. Comput., 2023

Your Labels are Selling You Out: Relation Leaks in Vertical Federated Learning.
IEEE Trans. Dependable Secur. Comput., 2023

Demystifying DeFi MEV Activities in Flashbots Bundle.
IACR Cryptol. ePrint Arch., 2023

SigRec: Automatic Recovery of Function Signatures in Smart Contracts.
IACR Cryptol. ePrint Arch., 2023

On the Difficulty of Defending Contrastive Learning against Backdoor Attacks.
CoRR, 2023

Model Extraction Attacks Revisited.
CoRR, 2023

Improving the Robustness of Transformer-based Large Language Models with Dynamic Attention.
CoRR, 2023

VLAttack: Multimodal Adversarial Attacks on Vision-Language Tasks via Pre-trained Models.
CoRR, 2023

MedDiffusion: Boosting Health Risk Prediction via Diffusion-based Data Augmentation.
CoRR, 2023

ReMasker: Imputing Tabular Data with Masked Autoencoding.
CoRR, 2023

Defending Pre-trained Language Models as Few-shot Learners against Backdoor Attacks.
CoRR, 2023

AutoML in The Wild: Obstacles, Workarounds, and Expectations.
CoRR, 2023

AIRS: Explanation for Deep Reinforcement Learning based Security Applications.
Proceedings of the 32nd USENIX Security Symposium, 2023

On the Security Risks of Knowledge Graph Reasoning.
Proceedings of the 32nd USENIX Security Symposium, 2023

FreeEagle: Detecting Complex Neural Trojans in Data-Free Cases.
Proceedings of the 32nd USENIX Security Symposium, 2023

IMPRESS: Evaluating the Resilience of Imperceptible Perturbations Against Unauthorized Data Usage in Diffusion-Based Generative AI.
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023

PAT: Geometry-Aware Hard-Label Black-Box Adversarial Attacks on Text.
Proceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2023

Certified Edge Unlearning for Graph Neural Networks.
Proceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2023

The Dark Side of AutoML: Towards Architectural Backdoor Search.
Proceedings of the Eleventh International Conference on Learning Representations, 2023

Poster: SigRec - Automatic Recovery of Function Signatures in Smart Contracts.
Proceedings of the 43rd IEEE International Conference on Distributed Computing Systems, 2023

AutoML in The Wild: Obstacles, Workarounds, and Expectations.
Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems, 2023

2022
SigRec: Automatic Recovery of Function Signatures in Smart Contracts.
IEEE Trans. Software Eng., 2022

Towards Certifying the Asymmetric Robustness for Neural Networks: Quantification and Applications.
IEEE Trans. Dependable Secur. Comput., 2022

Adversarial CAPTCHAs.
IEEE Trans. Cybern., 2022

Focus : Function clone identification on cross-platform.
Int. J. Intell. Syst., 2022

DetectS ec: Evaluating the robustness of object detection models to adversarial attacks.
Int. J. Intell. Syst., 2022

All You Need Is Hashing: Defending Against Data Reconstruction Attack in Vertical Federated Learning.
CoRR, 2022

Hijack Vertical Federated Learning Models with Adversarial Embedding.
CoRR, 2022

Demystifying Self-supervised Trojan Attacks.
CoRR, 2022

Reasoning over Multi-view Knowledge Graphs.
CoRR, 2022

Towards Automatically Reverse Engineering Vehicle Diagnostic Protocols.
Proceedings of the 31st USENIX Security Symposium, 2022

On the Security Risks of AutoML.
Proceedings of the 31st USENIX Security Symposium, 2022

FOAP: Fine-Grained Open-World Android App Fingerprinting.
Proceedings of the 31st USENIX Security Symposium, 2022

Seeing is Living? Rethinking the Security of Facial Liveness Verification in the Deepfake Era.
Proceedings of the 31st USENIX Security Symposium, 2022

Label Inference Attacks Against Vertical Federated Learning.
Proceedings of the 31st USENIX Security Symposium, 2022

Back-Propagating System Dependency Impact for Attack Investigation.
Proceedings of the 31st USENIX Security Symposium, 2022

Transfer Attacks Revisited: A Large-Scale Empirical Study in Real Computer Vision Settings.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022

Uncovering Cross-Context Inconsistent Access Control Enforcement in Android.
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022

Packet-Level Open-World App Fingerprinting on Wireless Traffic.
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022

LeapAttack: Hard-Label Adversarial Attack on Text via Gradient-Based Optimization.
Proceedings of the KDD '22: The 28th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, Washington, DC, USA, August 14, 2022

NCScope: hardware-assisted analyzer for native code in Android apps.
Proceedings of the ISSTA '22: 31st ACM SIGSOFT International Symposium on Software Testing and Analysis, Virtual Event, South Korea, July 18, 2022

MedSkim: Denoised Health Risk Prediction via Skimming Medical Claims Data.
Proceedings of the IEEE International Conference on Data Mining, 2022

Towards Fair and Robust Classification.
Proceedings of the 7th IEEE European Symposium on Security and Privacy, 2022

TrojanZoo: Towards Unified, Holistic, and Practical Evaluation of Neural Backdoors.
Proceedings of the 7th IEEE European Symposium on Security and Privacy, 2022

"Is your explanation stable?": A Robustness Evaluation Framework for Feature Attribution.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022

MedAttacker: Exploring Black-Box Adversarial Attacks on Risk Prediction Models in Healthcare.
Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, 2022

AUTOMED: Automated Medical Risk Predictive Modeling on Electronic Health Records.
Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, 2022

TextHoaxer: Budgeted Hard-Label Adversarial Attacks on Text.
Proceedings of the Thirty-Sixth AAAI Conference on Artificial Intelligence, 2022

2021
Fast-RCM: Fast Tree-Based Unsupervised Rare-Class Mining.
IEEE Trans. Cybern., 2021

MedAttacker: Exploring Black-Box Adversarial Attacks on Risk Prediction Models in Healthcare.
CoRR, 2021

Towards Robust Reasoning over Knowledge Graphs.
CoRR, 2021

Graph Backdoor.
Proceedings of the 30th USENIX Security Symposium, 2021

UNIFUZZ: A Holistic and Pragmatic Metrics-Driven Platform for Evaluating Fuzzers.
Proceedings of the 30th USENIX Security Symposium, 2021

Too Good to Be Safe: Tricking Lane Detection in Autonomous Driving with Crafted Perturbations.
Proceedings of the 30th USENIX Security Symposium, 2021

Finding the Missing Piece: Permission Specification Analysis for Android NDK.
Proceedings of the 36th IEEE/ACM International Conference on Automated Software Engineering, 2021

Trojaning Language Models for Fun and Profit.
Proceedings of the IEEE European Symposium on Security and Privacy, 2021

Backdoor Pre-trained Models Can Transfer to All.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

Cert-RNN: Towards Certifying the Robustness of Recurrent Neural Networks.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

i-Algebra: Towards Interactive Interpretability of Deep Neural Networks.
Proceedings of the Thirty-Fifth AAAI Conference on Artificial Intelligence, 2021

2020
AsgLDP: Collecting and Generating Decentralized Attributed Graphs With Local Differential Privacy.
IEEE Trans. Inf. Forensics Secur., 2020

Adversarial examples detection through the sensitivity in space mappings.
IET Comput. Vis., 2020

TROJANZOO: Everything you ever wanted to know about neural backdoors (but were afraid to ask).
CoRR, 2020

Trojaning Language Models for Fun and Profit.
CoRR, 2020

Interpretable Deep Learning under Fire.
Proceedings of the 29th USENIX Security Symposium, 2020

TextShield: Robust Text Classification Based on Multimodal Embedding and Neural Machine Translation.
Proceedings of the 29th USENIX Security Symposium, 2020

AdvMind: Inferring Adversary Intent of Black-Box Attacks.
Proceedings of the KDD '20: The 26th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2020

Demystifying Diehard Android Apps.
Proceedings of the 35th IEEE/ACM International Conference on Automated Software Engineering, 2020

UI Obfuscation and Its Effects on Automated UI Analysis for Android Apps.
Proceedings of the 35th IEEE/ACM International Conference on Automated Software Engineering, 2020

De-Health: All Your Online Health Information Are Belong to Us.
Proceedings of the 36th IEEE International Conference on Data Engineering, 2020

Text Captcha Is Dead? A Large Scale Deployment and Empirical Study.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

A Tale of Evil Twins: Adversarial Inputs versus Poisoned Models.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020

SirenAttack: Generating Adversarial Audio for End-to-End Acoustic Systems.
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020

2019
De-SAG: On the De-Anonymization of Structure-Attribute Graph Data.
IEEE Trans. Dependable Secur. Comput., 2019

The Tale of Evil Twins: Adversarial Inputs versus Backdoored Models.
CoRR, 2019

De-Health: All Your Online Health Information Are Belong to Us.
CoRR, 2019

FDI: Quantifying Feature-based Data Inferability.
CoRR, 2019

Towards understanding the security of modern image captchas and underground captcha-solving services.
Big Data Min. Anal., 2019

DEEPSEC: A Uniform Platform for Security Analysis of Deep Learning Model.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019

TextBugger: Generating Adversarial Text Against Real-world Applications.
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019

CATS: Cross-Platform E-Commerce Fraud Detection.
Proceedings of the 35th IEEE International Conference on Data Engineering, 2019

A Large-Scale Empirical Study on Control Flow Identification of Smart Contracts.
Proceedings of the 2019 ACM/IEEE International Symposium on Empirical Software Engineering and Measurement, 2019

TokenScope: Automatically Detecting Inconsistent Behaviors of Cryptocurrency Tokens in Ethereum.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
Differentially Private Distributed Online Learning.
IEEE Trans. Knowl. Data Eng., 2018

Interpretable Deep Learning under Fire.
CoRR, 2018

EagleEye: Attack-Agnostic Defense against Adversarial Inputs (Technical Report).
CoRR, 2018

Differentially Private Releasing via Deep Generative Model.
CoRR, 2018

Quantifying Graph Anonymity, Utility, and De-anonymity.
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018

DeepClean: Data Cleaning via Question Asking.
Proceedings of the 5th IEEE International Conference on Data Science and Advanced Analytics, 2018

Towards Evaluating the Security of Real-World Deployed Image CAPTCHAs.
Proceedings of the 11th ACM Workshop on Artificial Intelligence and Security, 2018

Integration of Static and Dynamic Code Stylometry Analysis for Programmer De-anonymization.
Proceedings of the 11th ACM Workshop on Artificial Intelligence and Security, 2018

Model-Reuse Attacks on Deep Learning Systems.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

Towards Understanding the Dynamics of Adversarial Attacks.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
Where Classification Fails, Interpretation Rises.
CoRR, 2017

Modular Learning Component Attacks: Today's Reality, Tomorrow's Challenge.
CoRR, 2017

Private, Yet Practical, Multiparty Deep Learning.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

Pairwise Ranking Aggregation by Non-interactive Crowdsourcing with Budget Constraints.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017

Backdoor attacks against learning systems.
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017

2016
Scalable analytics to detect DNS misuse for establishing stealthy communication channels.
IBM J. Res. Dev., 2016

Scalable malware classification with multifaceted content features and threat intelligence.
IBM J. Res. Dev., 2016

Context-Aware Online Learning for Course Recommendation of MOOC Big Data.
CoRR, 2016

Hunting for invisibility: Characterizing and detecting malicious web infrastructures through server visibility analysis.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016

BotMeter: Charting DGA-Botnet Landscapes in Large Networks.
Proceedings of the 36th IEEE International Conference on Distributed Computing Systems, 2016

BAYWATCH: Robust Beaconing Detection to Identify Infected Hosts in Large-Scale Enterprise Networks.
Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2016

Detecting Malicious Exploit Kits using Tree-based Similarity Searches.
Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, 2016

Inspiration or Preparation?: Explaining Creativity in Scientific Enterprise.
Proceedings of the 25th ACM International Conference on Information and Knowledge Management, 2016

2015
Indexing Earth Mover's Distance over Network Metrics.
IEEE Trans. Knowl. Data Eng., 2015

Rateless and pollution-attack-resilient network coding.
Proceedings of the IEEE International Symposium on Information Theory, 2015

FCCE: Highly scalable distributed Feature Collection and Correlation Engine for low latency big data analytics.
Proceedings of the 31st IEEE International Conference on Data Engineering, 2015

PARS: A Uniform and Open-source Password Analysis and Research System.
Proceedings of the 31st Annual Computer Security Applications Conference, 2015

2014
MUSE: asset risk scoring in enterprise network with mutually reinforced reputation propagation.
EURASIP J. Inf. Secur., 2014

Asset Risk Scoring in Enterprise Network with Mutually Reinforced Reputation Propagation.
Proceedings of the 35. IEEE Security and Privacy Workshops, 2014

Kaleido: Network Traffic Attribution using Multifaceted Footprinting.
Proceedings of the 2014 SIAM International Conference on Data Mining, 2014

Quantifying herding effects in crowd wisdom.
Proceedings of the 20th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2014

Stream computing for large-scale, multi-channel cyber threat analytics.
Proceedings of the 15th IEEE International Conference on Information Reuse and Integration, 2014

Reconciling malware labeling discrepancy via consensus learning.
Proceedings of the Workshops Proceedings of the 30th International Conference on Data Engineering Workshops, 2014

Outsourcing multi-version key-value stores with verifiable data freshness.
Proceedings of the IEEE 30th International Conference on Data Engineering, Chicago, 2014

Rebuilding the Tower of Babel: Towards Cross-System Malware Information Sharing.
Proceedings of the 23rd ACM International Conference on Conference on Information and Knowledge Management, 2014

Lightweight authentication of freshness in outsourced key-value stores.
Proceedings of the 30th Annual Computer Security Applications Conference, 2014

2013
CloudLEGO: scalable cross-VM-type application performance prediction.
Proceedings of the ACM Symposium on Cloud Computing, SOCC '13, 2013

2012
Microscopic Social Influence.
Proceedings of the Twelfth SIAM International Conference on Data Mining, 2012

Fine-grained access control of personal data.
Proceedings of the 17th ACM Symposium on Access Control Models and Technologies, 2012

2011
Output privacy in data mining.
ACM Trans. Database Syst., 2011

State Monitoring in Cloud Datacenters.
IEEE Trans. Knowl. Data Eng., 2011

Modeling data flow in socio-information networks: a risk estimation approach.
Proceedings of the 16th ACM Symposium on Access Control Models and Technologies, 2011

Privacy preserving indexing for eHealth information networks.
Proceedings of the 20th ACM Conference on Information and Knowledge Management, 2011

2010
Execution Assurance for Massive Computing Tasks.
IEICE Trans. Inf. Syst., 2010

XColor: Protecting general proximity privacy.
Proceedings of the 26th International Conference on Data Engineering, 2010

Monitoring continuous state violation in datacenters: Exploring the time dimension.
Proceedings of the 26th International Conference on Data Engineering, 2010

Spatio-temporal patterns in network events.
Proceedings of the 2010 ACM Conference on Emerging Networking Experiments and Technology, 2010

2009
Privacy-Aware Mobile Services over Road Networks.
Proc. VLDB Endow., 2009

Learning, indexing, and diagnosing network faults.
Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Paris, France, June 28, 2009

A General Proximity Privacy Principle.
Proceedings of the 25th International Conference on Data Engineering, 2009

2008
Supporting anonymous location queries in mobile environments with privacygrid.
Proceedings of the 17th International Conference on World Wide Web, 2008

A Temporal Data-Mining Approach for Discovering End-to-End Transaction Flows.
Proceedings of the 2008 IEEE International Conference on Web Services (ICWS 2008), 2008

Butterfly: Protecting Output Privacy in Stream Mining.
Proceedings of the 24th International Conference on Data Engineering, 2008


  Loading...