Backdoor attacks against transfer learning with pre-trained deep learning models S Wang, S Nepal, C Rudolph, M Grobler, S Chen, T Chen IEEE Transactions on Services Computing 15 (3), 1526-1539, 2020 | 100 | 2020 |
Protecting personal trajectories of social media users through differential privacy S Wang, RO Sinnott Computers & Security 67, 142-163, 2017 | 61 | 2017 |
Privacy-protected statistics publication over social media user trajectory streams S Wang, R Sinnott, S Nepal Future Generation Computer Systems 87, 792-802, 2018 | 28 | 2018 |
Projective ranking: A transferable evasion attack method on graph neural networks H Zhang, B Wu, X Yang, C Zhou, S Wang, X Yuan, S Pan Proceedings of the 30th ACM International Conference on Information …, 2021 | 26 | 2021 |
Protecting the location privacy of mobile social media users S Wang, R Sinnott, S Nepal 2016 IEEE International Conference on Big Data (Big Data), 1143-1150, 2016 | 17 | 2016 |
PART-GAN: Privacy-preserving time-series sharing S Wang, C Rudolph, S Nepal, M Grobler, S Chen Artificial Neural Networks and Machine Learning–ICANN 2020: 29th …, 2020 | 14 | 2020 |
Demystifying uneven vulnerability of link stealing attacks against graph neural networks H Zhang, B Wu, S Wang, X Yang, M Xue, S Pan, X Yuan International Conference on Machine Learning, 41737-41752, 2023 | 13 | 2023 |
Similarity-based gray-box adversarial attack against deep face recognition H Wang, S Wang, Z Jin, Y Wang, C Chen, M Tistarelli 2021 16th IEEE international conference on automatic face and gesture …, 2021 | 13 | 2021 |
Generating semantic adversarial examples via feature manipulation S Wang, S Nepal, C Rudolph, M Grobler, S Chen, T Chen arXiv preprint arXiv:2001.02297, 2020 | 12 | 2020 |
Adversarial detection by latent style transformations S Wang, S Nepal, A Abuadbba, C Rudolph, M Grobler IEEE Transactions on Information Forensics and Security 17, 1099-1114, 2022 | 11 | 2022 |
Privacy by design in aged care monitoring devices? well, not quite yet! S Alkhatib, J Waycott, G Buchanan, M Grobler, S Wang Proceedings of the 32nd Australian Conference on Human-Computer Interaction …, 2020 | 10 | 2020 |
A Duty to Forget, a Right to be Assured? Exposing Vulnerabilities in Machine Unlearning Services H Hu, S Wang, J Chang, H Zhong, R Sun, S Hao, H Zhu, M Xue arXiv preprint arXiv:2309.08230, 2023 | 8 | 2023 |
Towards web phishing detection limitations and mitigation A Abuadbba, S Wang, M Almashor, ME Ahmed, R Gaire, S Camtepe, ... arXiv preprint arXiv:2204.00985, 2022 | 8 | 2022 |
Oiad: One-for-all image anomaly detection with disentanglement learning S Wang, T Chen, S Chen, S Nepal, C Rudolph, M Grobler 2020 International Joint Conference on Neural Networks (IJCNN), 1-8, 2020 | 8 | 2020 |
P-STM: Privacy-protected social tie mining of individual trajectories S Wang, S Nepal, R Sinnott, C Rudolph 2019 IEEE International Conference on Web Services (ICWS), 1-10, 2019 | 8 | 2019 |
P-GENT: Privacy-preserving geocoding of non-geotagged tweets S Wang, R Sinnott, S Nepal 2018 17th IEEE International Conference On Trust, Security And Privacy In …, 2018 | 8 | 2018 |
Octopus: Overcoming performance and privatization bottlenecks in distributed learning S Wang, S Nepal, K Moore, M Grobler, C Rudolph, A Abuadbba IEEE Transactions on Parallel and Distributed Systems 33 (12), 3460-3477, 2022 | 6 | 2022 |
“Who Wants to Know all this Stuff?!”: Understanding Older Adults’ Privacy Concerns in Aged Care Monitoring Devices S Alkhatib, R Kelly, J Waycott, G Buchanan, M Grobler, S Wang Interacting with Computers 33 (5), 481-498, 2021 | 6 | 2021 |
Towards defeating misclassification attacks against transfer learning B Wu, S Wang, X Yuan, C Wang, C Rudolph, X Yang arXiv: 1908.11230, 2020 | 6* | 2020 |
Privacy-protected place of activity mining on big location data S Wang, R Sinnott, S Nepal 2017 IEEE International Conference on Big Data (Big Data), 1101-1108, 2017 | 6 | 2017 |