Interactive three-dimensional visualization of network intrusion detection data for machine learning W Zong, YW Chow, W Susilo Future Generation Computer Systems 102, 292-306, 2020 | 75 | 2020 |
A two-stage classifier approach for network intrusion detection W Zong, YW Chow, W Susilo Information Security Practice and Experience: 14th International Conference …, 2018 | 40 | 2018 |
A QR code watermarking approach based on the DWT-DCT technique YW Chow, W Susilo, J Tonien, W Zong Information Security and Privacy: 22nd Australasian Conference, ACISP 2017 …, 2017 | 40 | 2017 |
Dimensionality reduction and visualization of network intrusion detection data W Zong, YW Chow, W Susilo Information Security and Privacy: 24th Australasian Conference, ACISP 2019 …, 2019 | 11 | 2019 |
A 3d approach for the visualization of network intrusion detection data W Zong, YW Chow, W Susilo 2018 International Conference on Cyberworlds (CW), 308-315, 2018 | 6 | 2018 |
Targeted universal adversarial perturbations for automatic speech recognition W Zong, YW Chow, W Susilo, S Rana, S Venkatesh Information Security: 24th International Conference, ISC 2021, Virtual Event …, 2021 | 5 | 2021 |
Trojanmodel: A practical trojan attack against automatic speech recognition systems W Zong, YW Chow, W Susilo, K Do, S Venkatesh 2023 IEEE Symposium on Security and Privacy (SP), 1667-1683, 2023 | 4 | 2023 |
Towards visualizing and detecting audio adversarial examples for automatic speech recognition W Zong, YW Chow, W Susilo Information Security and Privacy: 26th Australasian Conference, ACISP 2021 …, 2021 | 3 | 2021 |
Development and evaluation of an immersive VR-CFD-Based tool for dust exposure mitigation in underground tunnelling operations T Ren, M Qiao, J Roberts, J Hines, YW Chow, W Zong, A Sugden, ... Tunnelling and Underground Space Technology 143, 105496, 2024 | 2 | 2024 |
Detecting Audio Adversarial Examples in Automatic Speech Recognition Systems Using Decision Boundary Patterns W Zong, YW Chow, W Susilo, J Kim, NT Le Journal of Imaging 8 (12), 324, 2022 | 2 | 2022 |
Trojan attacks and defense for speech recognition W Zong, YW Chow, W Susilo, J Kim International Symposium on Mobile Internet Security, 195-210, 2021 | 2 | 2021 |
Black-box audio adversarial example generation using variational autoencoder W Zong, YW Chow, W Susilo Information and Communications Security: 23rd International Conference …, 2021 | 2 | 2021 |
High Quality Audio Adversarial Examples Without Using Psychoacoustics W Zong, YW Chow, W Susilo International Symposium on Cyberspace Safety and Security, 163-177, 2022 | 1 | 2022 |
Defense Against Multi-target Trojan Attacks H Harikumar, S Rana, K Do, S Gupta, W Zong, W Susilo, S Venkastesh arXiv preprint arXiv:2207.03895, 2022 | 1 | 2022 |
IPRemover: A Generative Model Inversion Attack against Deep Neural Network Fingerprinting and Watermarking W Zong, YW Chow, W Susilo, J Baek, J Kim, S Camtepe Proceedings of the AAAI Conference on Artificial Intelligence 38 (7), 7837-7845, 2024 | | 2024 |
incorporating Trenchless Technology Research T Ren, M Qiao, J Roberts, J Hines, YW Chow, W Zong, A Sugden, ... Tunnelling and Underground Space Technology 143, 105496, 2024 | | 2024 |
Adversarial Examples and Trojan Attacks in Automatic Speech Recognition Systems W Zong | | 2023 |
incorporating Trenchless Technology Research X Feng, P Zhang, X Chen, Y Zhang, B Ma, K Liu, T Xu, C Zeng Tunnelling and Underground Space Technology 131, 104818, 2023 | | 2023 |
Exploiting QR Code Error Correction for Digital Image Watermarking. YW Chow, W Susilo, J Baek, J Kim, W Zong J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 12 (2), 114-140, 2021 | | 2021 |
Visual Analysis of Adversarial Examples in Machine Learning W Zong, YW Chow, W Susilo Cyber Security Meets Machine Learning, 85-98, 2021 | | 2021 |