Follow
Wei Zong
Title
Cited by
Cited by
Year
Interactive three-dimensional visualization of network intrusion detection data for machine learning
W Zong, YW Chow, W Susilo
Future Generation Computer Systems 102, 292-306, 2020
752020
A two-stage classifier approach for network intrusion detection
W Zong, YW Chow, W Susilo
Information Security Practice and Experience: 14th International Conference …, 2018
402018
A QR code watermarking approach based on the DWT-DCT technique
YW Chow, W Susilo, J Tonien, W Zong
Information Security and Privacy: 22nd Australasian Conference, ACISP 2017 …, 2017
402017
Dimensionality reduction and visualization of network intrusion detection data
W Zong, YW Chow, W Susilo
Information Security and Privacy: 24th Australasian Conference, ACISP 2019 …, 2019
112019
A 3d approach for the visualization of network intrusion detection data
W Zong, YW Chow, W Susilo
2018 International Conference on Cyberworlds (CW), 308-315, 2018
62018
Targeted universal adversarial perturbations for automatic speech recognition
W Zong, YW Chow, W Susilo, S Rana, S Venkatesh
Information Security: 24th International Conference, ISC 2021, Virtual Event …, 2021
52021
Trojanmodel: A practical trojan attack against automatic speech recognition systems
W Zong, YW Chow, W Susilo, K Do, S Venkatesh
2023 IEEE Symposium on Security and Privacy (SP), 1667-1683, 2023
42023
Towards visualizing and detecting audio adversarial examples for automatic speech recognition
W Zong, YW Chow, W Susilo
Information Security and Privacy: 26th Australasian Conference, ACISP 2021 …, 2021
32021
Development and evaluation of an immersive VR-CFD-Based tool for dust exposure mitigation in underground tunnelling operations
T Ren, M Qiao, J Roberts, J Hines, YW Chow, W Zong, A Sugden, ...
Tunnelling and Underground Space Technology 143, 105496, 2024
22024
Detecting Audio Adversarial Examples in Automatic Speech Recognition Systems Using Decision Boundary Patterns
W Zong, YW Chow, W Susilo, J Kim, NT Le
Journal of Imaging 8 (12), 324, 2022
22022
Trojan attacks and defense for speech recognition
W Zong, YW Chow, W Susilo, J Kim
International Symposium on Mobile Internet Security, 195-210, 2021
22021
Black-box audio adversarial example generation using variational autoencoder
W Zong, YW Chow, W Susilo
Information and Communications Security: 23rd International Conference …, 2021
22021
High Quality Audio Adversarial Examples Without Using Psychoacoustics
W Zong, YW Chow, W Susilo
International Symposium on Cyberspace Safety and Security, 163-177, 2022
12022
Defense Against Multi-target Trojan Attacks
H Harikumar, S Rana, K Do, S Gupta, W Zong, W Susilo, S Venkastesh
arXiv preprint arXiv:2207.03895, 2022
12022
IPRemover: A Generative Model Inversion Attack against Deep Neural Network Fingerprinting and Watermarking
W Zong, YW Chow, W Susilo, J Baek, J Kim, S Camtepe
Proceedings of the AAAI Conference on Artificial Intelligence 38 (7), 7837-7845, 2024
2024
incorporating Trenchless Technology Research
T Ren, M Qiao, J Roberts, J Hines, YW Chow, W Zong, A Sugden, ...
Tunnelling and Underground Space Technology 143, 105496, 2024
2024
Adversarial Examples and Trojan Attacks in Automatic Speech Recognition Systems
W Zong
2023
incorporating Trenchless Technology Research
X Feng, P Zhang, X Chen, Y Zhang, B Ma, K Liu, T Xu, C Zeng
Tunnelling and Underground Space Technology 131, 104818, 2023
2023
Exploiting QR Code Error Correction for Digital Image Watermarking.
YW Chow, W Susilo, J Baek, J Kim, W Zong
J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl. 12 (2), 114-140, 2021
2021
Visual Analysis of Adversarial Examples in Machine Learning
W Zong, YW Chow, W Susilo
Cyber Security Meets Machine Learning, 85-98, 2021
2021
The system can't perform the operation now. Try again later.
Articles 1–20