default search action
Shuo Wang 0012
Person information
- affiliation: Monash University, Melbourne, CSIRO, Data61, Cybersecurity CRC, Australia
- affiliation (PhD 2018): University of Melbourne, Computing and Information Systems, Australia
Other persons with the same name
- Shuo Wang — disambiguation page
- Shuo Wang 0001 — Chinese Academy of Sciences, Institute of Automation, State Key Laboratory of Management and Control for Complex Systems, Beijing, China
- Shuo Wang 0002 — Hong Kong Polytechnic University, Department of Land Surveying and Geo-Informatics, Hong Kong (and 3 more)
- Shuo Wang 0003 — University of Florida, Department of Electrical and Computer Engineering, Gainesville, FL, USA (and 3 more)
- Shuo Wang 0004 — Beijing University of Posts and Telecommunications, Department of Information and Communications Engineering, China
- Shuo Wang 0005 — University of Birmingham, School of Computer Science, UK
- Shuo Wang 0006 — Beijing University of Posts and Telecommunications, State Key Laboratory of Networking and Switching Technology, China
- Shuo Wang 0007 — University of Bonn, Germany
- Shuo Wang 0008 — University of Science and Technology of China, School of Information Science and Technology, Hefei, China (and 1 more)
- Shuo Wang 0009 — Peking University, School of EECS, Beijing, China (and 1 more)
- Shuo Wang 0010 — Beijing, Normal University, Beijing, China
- Shuo Wang 0011 — Fudan University, Digital Medical Research Center, School of Basic Medical Sciences, Shanghai Key Laboratory of MICCAI, China (and 1 more)
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j13]Erik Buchholz, Alsharif Abuadbba, Shuo Wang, Surya Nepal, Salil S. Kanhere:
SoK: Can Trajectory Generation Combine Privacy and Utility? Proc. Priv. Enhancing Technol. 2024(3): 75-93 (2024) - [j12]Huaibing Peng, Huming Qiu, Hua Ma, Shuo Wang, Anmin Fu, Said F. Al-Sarawi, Derek Abbott, Yansong Gao:
On Model Outsourcing Adaptive Attacks to Deep Learning Backdoor Defenses. IEEE Trans. Inf. Forensics Secur. 19: 2356-2369 (2024) - [c33]Haodong Lu, Dong Gong, Shuo Wang, Jason Xue, Lina Yao, Kristen Moore:
Learning with Mixture of Prototypes for Out-of-Distribution Detection. ICLR 2024 - [c32]Hongsheng Hu, Shuo Wang, Jiamin Chang, Haonan Zhong, Ruoxi Sun, Shuang Hao, Haojin Zhu, Minhui Xue:
A Duty to Forget, a Right to be Assured? Exposing Vulnerabilities in Machine Unlearning Services. NDSS 2024 - [c31]Bang Wu, He Zhang, Xiangwen Yang, Shuo Wang, Minhui Xue, Shirui Pan, Xingliang Yuan:
GraphGuard: Detecting and Counteracting Training Data Misuse in Graph Neural Networks. NDSS 2024 - [c30]Bang Wu, Xingliang Yuan, Shuo Wang, Qi Li, Minhui Xue, Shirui Pan:
Securing Graph Neural Networks in MLaaS: A Comprehensive Realization of Query-based Integrity Verification. SP 2024: 2534-2552 - [c29]Shuo Wang, Hongsheng Hu, Jiamin Chang, Benjamin Zi Hao Zhao, Minhui Xue:
LACMUS: Latent Concept Masking for General Robustness Enhancement of DNNs. SP 2024: 2977-2995 - [c28]Hongsheng Hu, Shuo Wang, Tian Dong, Minhui Xue:
Learn What You Want to Unlearn: Unlearning Inversion Attacks against Machine Unlearning. SP 2024: 3257-3275 - [c27]Shuo Wang, Hongsheng Hu, Jiamin Chang, Benjamin Zi Hao Zhao, Qi Alfred Chen, Minhui Xue:
DNN-GP: Diagnosing and Mitigating Model's Faults Using Latent Concepts. USENIX Security Symposium 2024 - [c26]Nan Wu, Xin Yuan, Shuo Wang, Hongsheng Hu, Minhui Xue:
Cardinality Counting in "Alcatraz": A Privacy-aware Federated Learning Approach. WWW 2024: 3076-3084 - [i24]Haodong Lu, Dong Gong, Shuo Wang, Jason Xue, Lina Yao, Kristen Moore:
Learning with Mixture of Prototypes for Out-of-Distribution Detection. CoRR abs/2402.02653 (2024) - [i23]Erik Buchholz, Alsharif Abuadbba, Shuo Wang, Surya Nepal, Salil S. Kanhere:
SoK: Can Trajectory Generation Combine Privacy and Utility? CoRR abs/2403.07218 (2024) - [i22]Hongsheng Hu, Shuo Wang, Tian Dong, Minhui Xue:
Learn What You Want to Unlearn: Unlearning Inversion Attacks against Machine Unlearning. CoRR abs/2404.03233 (2024) - [i21]Alsharif Abuadbba, Nicholas Rhodes, Kristen Moore, Bushra Sabir, Shuo Wang, Yansong Gao:
DeepiSign-G: Generic Watermark to Stamp Hidden DNN Parameters for Self-contained Tracking. CoRR abs/2407.01260 (2024) - [i20]Hanrui Wang, Shuo Wang, Cunjian Chen, Massimo Tistarelli, Zhe Jin:
A Multi-task Adversarial Attack Against Face Authentication. CoRR abs/2408.08205 (2024) - [i19]Hanrui Wang, Ruoxi Sun, Cunjian Chen, Minhui Xue, Lay-Ki Soon, Shuo Wang, Zhe Jin:
Iterative Window Mean Filter: Thwarting Diffusion-based Adversarial Purification. CoRR abs/2408.10673 (2024) - 2023
- [j11]Hui Li, Yan Yan, Shuo Wang, Juan Liu, Yunpeng Cui:
Text classification on heterogeneous information network via enhanced GCN and knowledge. Neural Comput. Appl. 35(20): 14911-14927 (2023) - [j10]Bang Wu, Shuo Wang, Xingliang Yuan, Cong Wang, Carsten Rudolph, Xiangwen Yang:
Defeating Misclassification Attacks Against Transfer Learning. IEEE Trans. Dependable Secur. Comput. 20(2): 886-901 (2023) - [c25]Seonhye Park, Alsharif Abuadbba, Shuo Wang, Kristen Moore, Yansong Gao, Hyoungshick Kim, Surya Nepal:
DeepTaster: Adversarial Perturbation-Based Fingerprinting to Identify Proprietary Dataset Use in Deep Neural Networks. ACSAC 2023: 535-549 - [c24]Mahathir Almashor, M. Ejaz Ahmed, Benjamin Pick, Jason Xue, Sharif Abuadbba, Raj Gaire, Shuo Wang, Seyit Camtepe, Surya Nepal:
Unraveling Threat Intelligence Through the Lens of Malicious URL Campaigns. AINTEC 2023: 78-86 - [c23]He Zhang, Bang Wu, Shuo Wang, Xiangwen Yang, Minhui Xue, Shirui Pan, Xingliang Yuan:
Demystifying Uneven Vulnerability of Link Stealing Attacks against Graph Neural Networks. ICML 2023: 41737-41752 - [c22]Shuo Wang, Mahathir Almashor, Alsharif Abuadbba, Ruoxi Sun, Minhui Xue, Calvin Wang, Raj Gaire, Surya Nepal, Seyit Camtepe:
DOITRUST: Dissecting On-chain Compromised Internet Domains via Graph Learning. NDSS 2023 - [c21]Ruoxi Sun, Minhui Xue, Gareth Tyson, Tian Dong, Shaofeng Li, Shuo Wang, Haojin Zhu, Seyit Camtepe, Surya Nepal:
Mate! Are You Really Aware? An Explainability-Guided Testing Framework for Robustness of Malware Detectors. ESEC/SIGSOFT FSE 2023: 1573-1585 - [c20]Shuo Wang, Sharif Abuadbba, Sidharth Agarwal, Kristen Moore, Ruoxi Sun, Minhui Xue, Surya Nepal, Seyit Camtepe, Salil S. Kanhere:
PublicCheck: Public Integrity Verification for Services of Run-time Deep Models. SP 2023: 1348-1365 - [c19]Ruoxi Sun, Minhui Xue, Gareth Tyson, Shuo Wang, Seyit Camtepe, Surya Nepal:
Not Seen, Not Heard in the Digital World! Measuring Privacy Practices in Children's Apps. WWW 2023: 2166-2177 - [d2]Ruoxi Sun, Minhui Xue, Gareth Tyson, Tian Dong, Shaofeng Li, Shuo Wang, Haojin Zhu, Seyit Camtepe, Surya Nepal:
An Explainability-Guided Testing Framework for Robustness of Malware Detectors. Version 1. Zenodo, 2023 [all versions] - [d1]Ruoxi Sun, Minhui Xue, Gareth Tyson, Tian Dong, Shaofeng Li, Shuo Wang, Haojin Zhu, Seyit Camtepe, Surya Nepal:
An Explainability-Guided Testing Framework for Robustness of Malware Detectors. Version 2. Zenodo, 2023 [all versions] - [i18]Ruoxi Sun, Minhui Xue, Gareth Tyson, Shuo Wang, Seyit Camtepe, Surya Nepal:
Not Seen, Not Heard in the Digital World! Measuring Privacy Practices in Children's Apps. CoRR abs/2303.09008 (2023) - [i17]Hongsheng Hu, Shuo Wang, Jiamin Chang, Haonan Zhong, Ruoxi Sun, Shuang Hao, Haojin Zhu, Minhui Xue:
A Duty to Forget, a Right to be Assured? Exposing Vulnerabilities in Machine Unlearning Services. CoRR abs/2309.08230 (2023) - [i16]Bang Wu, He Zhang, Xiangwen Yang, Shuo Wang, Minhui Xue, Shirui Pan, Xingliang Yuan:
GraphGuard: Detecting and Counteracting Training Data Misuse in Graph Neural Networks. CoRR abs/2312.07861 (2023) - [i15]Bang Wu, Xingliang Yuan, Shuo Wang, Qi Li, Minhui Xue, Shirui Pan:
Securing Graph Neural Networks in MLaaS: A Comprehensive Realization of Query-based Integrity Verification. CoRR abs/2312.07870 (2023) - 2022
- [j9]Shuo Wang, Surya Nepal, Alsharif Abuadbba, Carsten Rudolph, Marthie Grobler:
Adversarial Detection by Latent Style Transformations. IEEE Trans. Inf. Forensics Secur. 17: 1099-1114 (2022) - [j8]Shuo Wang, Surya Nepal, Kristen Moore, Marthie Grobler, Carsten Rudolph, Alsharif Abuadbba:
OCTOPUS: Overcoming Performance and Privatization Bottlenecks in Distributed Learning. IEEE Trans. Parallel Distributed Syst. 33(12): 3460-3477 (2022) - [j7]Shuo Wang, Surya Nepal, Carsten Rudolph, Marthie Grobler, Shangyu Chen, Tianle Chen:
Backdoor Attacks Against Transfer Learning With Pre-Trained Deep Learning Models. IEEE Trans. Serv. Comput. 15(3): 1526-1539 (2022) - [j6]Shuo Wang, Surya Nepal, Carsten Rudolph, Marthie Grobler, Shangyu Chen, Tianle Chen, Zike An:
Defending Adversarial Attacks via Semantic Feature Manipulation. IEEE Trans. Serv. Comput. 15(6): 3184-3197 (2022) - [c18]Erik Buchholz, Alsharif Abuadbba, Shuo Wang, Surya Nepal, Salil Subhash Kanhere:
Reconstruction Attack on Differential Private Trajectory Protection Mechanisms. ACSAC 2022: 279-292 - [c17]Adrian Kristanto, Shuo Wang, Carsten Rudolph:
Latent Space-Based Backdoor Attacks Against Deep Neural Networks. IJCNN 2022: 1-10 - [c16]Shuo Wang, Jinyuan Qin, Carsten Rudolph, Surya Nepal, Marthie Grobler:
R-Net: Robustness Enhanced Financial Time-Series Prediction with Differential Privacy. IJCNN 2022: 1-9 - [i14]Hanrui Wang, Shuo Wang, Zhe Jin, Yandan Wang, Cunjian Chen, Massimo Tistarelli:
Similarity-based Gray-box Adversarial Attack Against Deep Face Recognition. CoRR abs/2201.04011 (2022) - [i13]Shuo Wang, Sharif Abuadbba, Sidharth Agarwal, Kristen Moore, Surya Nepal, Salil S. Kanhere:
Integrity Fingerprinting of DNN with Double Black-box Design and Verification. CoRR abs/2203.10902 (2022) - [i12]Alsharif Abuadbba, Shuo Wang, Mahathir Almashor, Muhammad Ejaz Ahmed, Raj Gaire, Seyit Camtepe, Surya Nepal:
Towards Web Phishing Detection Limitations and Mitigation. CoRR abs/2204.00985 (2022) - [i11]Mahathir Almashor, M. Ejaz Ahmed, Benjamin Pick, Sharif Abuadbba, Jason Xue, Raj Gaire, Shuo Wang, Seyit Camtepe, Surya Nepal:
Unraveling Threat Intelligence Through the Lens of Malicious URL Campaigns. CoRR abs/2208.12449 (2022) - [i10]Erik Buchholz, Alsharif Abuadbba, Shuo Wang, Surya Nepal, Salil S. Kanhere:
Reconstruction Attack on Differential Private Trajectory Protection Mechanisms. CoRR abs/2210.09375 (2022) - [i9]Seonhye Park, Alsharif Abuadbba, Shuo Wang, Kristen Moore, Yansong Gao, Hyoungshick Kim, Surya Nepal:
Tracking Dataset IP Use in Deep Neural Networks. CoRR abs/2211.13535 (2022) - 2021
- [j5]Sami Alkhatib, Ryan Kelly, Jenny Waycott, George Buchanan, Marthie Grobler, Shuo Wang:
"Who Wants to Know all this Stuff?!": Understanding Older Adults' Privacy Concerns in Aged Care Monitoring Devices. Interact. Comput. 33(5): 481-498 (2021) - [c15]He Zhang, Bang Wu, Xiangwen Yang, Chuan Zhou, Shuo Wang, Xingliang Yuan, Shirui Pan:
Projective Ranking: A Transferable Evasion Attack Method on Graph Neural Networks. CIKM 2021: 3617-3621 - [c14]Hanrui Wang, Shuo Wang, Zhe Jin, Yandan Wang, Cunjian Chen, Massimo Tistarelli:
Similarity-based Gray-box Adversarial Attack Against Deep Face Recognition. FG 2021: 1-8 - [i8]Shuo Wang, Surya Nepal, Kristen Moore, Marthie Grobler, Carsten Rudolph, Alsharif Abuadbba:
OCTOPUS: Overcoming Performance andPrivatization Bottlenecks in Distributed Learning. CoRR abs/2105.00602 (2021) - [i7]Shuo Wang, Lingjuan Lyu, Surya Nepal, Carsten Rudolph, Marthie Grobler, Kristen Moore:
Robust Training Using Natural Transformation. CoRR abs/2105.04070 (2021) - 2020
- [j4]Hui Li, Yunpeng Cui, Shuo Wang, Juan Liu, Jinyuan Qin, Yilin Yang:
Multivariate Financial Time-Series Prediction With Certified Robustness. IEEE Access 8: 109133-109143 (2020) - [c13]Shuo Wang, Carsten Rudolph, Surya Nepal, Marthie Grobler, Shangyu Chen:
PART-GAN: Privacy-Preserving Time-Series Sharing. ICANN (1) 2020: 578-593 - [c12]Shuo Wang, Tianle Chen, Shangyu Chen, Surya Nepal, Carsten Rudolph, Marthie Grobler:
OIAD: One-for-all Image Anomaly Detection with Disentanglement Learning. IJCNN 2020: 1-8 - [c11]Sami Alkhatib, Jenny Waycott, George Buchanan, Marthie Grobler, Shuo Wang:
Privacy by Design in Aged Care Monitoring Devices? Well, Not Quite Yet! OZCHI 2020: 492-505 - [c10]Shuo Wang, Lingjuan Lyu, Tianle Chen, Shangyu Chen, Surya Nepal, Carsten Rudolph, Marthie Grobler:
Privacy-Preserving Data Generation and Sharing Using Identification Sanitizer. WISE (2) 2020: 185-200 - [i6]Shuo Wang, Shangyu Chen, Tianle Chen, Surya Nepal, Carsten Rudolph, Marthie Grobler:
Generating Semantic Adversarial Examples via Feature Manipulation. CoRR abs/2001.02297 (2020) - [i5]Shuo Wang, Surya Nepal, Carsten Rudolph, Marthie Grobler, Shangyu Chen, Tianle Chen:
Backdoor Attacks against Transfer Learning with Pre-trained Deep Learning Models. CoRR abs/2001.03274 (2020) - [i4]Shuo Wang, Tianle Chen, Shangyu Chen, Carsten Rudolph, Surya Nepal, Marthie Grobler:
OIAD: One-for-all Image Anomaly Detection with Disentanglement Learning. CoRR abs/2001.06640 (2020) - [i3]Shuo Wang, Tianle Chen, Surya Nepal, Carsten Rudolph, Marthie Grobler, Shangyu Chen:
Defending Adversarial Attacks via Semantic Feature Manipulation. CoRR abs/2002.02007 (2020) - [i2]Shuo Wang, Surya Nepal, Marthie Grobler, Carsten Rudolph, Tianle Chen, Shangyu Chen:
Adversarial Defense by Latent Style Transformations. CoRR abs/2006.09701 (2020)
2010 – 2019
- 2019
- [c9]Shangyu Chen, Shuo Wang, Richard O. Sinnott:
Parametric Canonical Correlation Analysis. CloudCom 2019: 347-353 - [c8]Shuo Wang, Surya Nepal, Richard O. Sinnott, Carsten Rudolph:
P-STM: Privacy-Protected Social Tie Mining of Individual Trajectories. ICWS 2019: 1-10 - [i1]Bang Wu, Xiangwen Yang, Shuo Wang, Xingliang Yuan, Cong Wang, Carsten Rudolph:
Defending Against Misclassification Attacks in Transfer Learning. CoRR abs/1908.11230 (2019) - 2018
- [j3]Shuo Wang, Richard O. Sinnott, Surya Nepal:
Privacy-protected statistics publication over social media user trajectory streams. Future Gener. Comput. Syst. 87: 792-802 (2018) - [c7]Shuo Wang, Richard O. Sinnott, Surya Nepal:
A Privacy-Preserving Semantic Annotation Framework Using Online Social Media. ICWS 2018: 353-372 - [c6]Shuo Wang, Richard O. Sinnott, Surya Nepal:
PAIRS: Privacy-Aware Identification and Recommendation of Spatio-Friends. TrustCom/BigDataSE 2018: 920-931 - [c5]Shuo Wang, Richard O. Sinnott, Surya Nepal:
P-GENT: Privacy-Preserving Geocoding of Non-Geotagged Tweets. TrustCom/BigDataSE 2018: 972-983 - 2017
- [j2]Shuo Wang, Richard O. Sinnott:
Protecting personal trajectories of social media users through differential privacy. Comput. Secur. 67: 142-163 (2017) - [c4]Shuo Wang, Richard O. Sinnott, Surya Nepal:
Privacy-protected place of activity mining on big location data. IEEE BigData 2017: 1101-1108 - [c3]Shuo Wang, Richard O. Sinnott, Surya Nepal:
Sensitive gazetteer discovery and protection for mobile social media users. IEEE BigData 2017: 1109-1116 - 2016
- [j1]Shuo Wang, Richard O. Sinnott:
Supporting geospatial privacy-preserving data mining of social media. Soc. Netw. Anal. Min. 6(1): 109:1-109:15 (2016) - [c2]Shuo Wang, Richard O. Sinnott, Surya Nepal:
Protecting the location privacy of mobile social media users. IEEE BigData 2016: 1143-1150 - [c1]Shuo Wang, Richard O. Sinnott, Surya Nepal:
Privacy-protected social media user trajectories calibration. eScience 2016: 293-302
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-19 20:47 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint