


default search action
Shuo Wang 0012
Person information
- affiliation: Monash University, Melbourne, CSIRO, Data61, Cybersecurity CRC, Australia
- affiliation (PhD 2018): University of Melbourne, Computing and Information Systems, Australia
Other persons with the same name
- Shuo Wang — disambiguation page
- Shuo Wang 0001
— Chinese Academy of Sciences, Institute of Automation, State Key Laboratory of Management and Control for Complex Systems, Beijing, China - Shuo Wang 0002
— Hong Kong Polytechnic University, Department of Land Surveying and Geo-Informatics, Hong Kong (and 3 more) - Shuo Wang 0003
— University of Florida, Department of Electrical and Computer Engineering, Gainesville, FL, USA (and 3 more) - Shuo Wang 0004
— Beijing University of Posts and Telecommunications, Department of Information and Communications Engineering, China - Shuo Wang 0005
— University of Birmingham, School of Computer Science, UK - Shuo Wang 0006
— Beijing University of Posts and Telecommunications, State Key Laboratory of Networking and Switching Technology, China - Shuo Wang 0007 — University of Bonn, Germany
- Shuo Wang 0008
— University of Science and Technology of China, School of Information Science and Technology, Hefei, China (and 1 more) - Shuo Wang 0009 — Peking University, School of EECS, Beijing, China (and 1 more)
- Shuo Wang 0010
— Beijing, Normal University, Beijing, China - Shuo Wang 0011
— Fudan University, Digital Medical Research Center, School of Basic Medical Sciences, Shanghai Key Laboratory of MICCAI, China (and 1 more) - Shuo Wang 0013
— Tsinghua University, Department of Computer Science and Technology, State Key Laboratory of Intelligent Technology and Systems, Institute for Artificial Intelligence, Beijing, China - Shuo Wang 0014
— College of Engineering, China Agricultural University, Beijing, China - Shuo Wang 0015
— Renmin University of China, China - Shuo Wang 0016
— West Virginia University, Morgantown, WV, USA (and 1 more) - Shuo Wang 0017
— Nanjing University of Science and Technology, Nanjing, China - Shuo Wang 0018
— School of Artificial Intelligence, University of Chinese Academy of Sciences, Beijing, China - Shuo Wang 0019
— Shandong Technology and Business University, Yantai, China - Shuo Wang 0020
— Xi'an Jiaotong University, Xi'an, China - Shuo Wang 0021
— Northwest University, Xi'an, Shaanxi, China - Shuo Wang 0022
— University of Nottingham Ningbo China, Ningbo, China - Shuo Wang 0023
— Harbin Engineering University, Harbin, China - Shuo Wang 0024
— Chinese Academy of Surveying & Mapping, Beijing, China - Shuo Wang 0025
— Xidian University, Xi'an, China - Shuo Wang 0026
— Beijing Institute of Technology, Beijing, China (and 1 more) - Shuo Wang 0027
— Beijing Institute of Technology, Beijing, China - Shuo Wang 0028
— Department of Engineering Physics, Tsinghua University, Beijing, China - Shuo Wang 0029
— Yantai University, Yantai, Shandong, China - Shuo Wang 0030
— Shanghai Institute of Microsystem and Information Technology, Chinese Academy of Sciences, Shanghai, China - Shuo Wang 0031
— School of Computer Science and Technology, Beijing Jiaotong University, Beijing, China
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
[j17]Xinlei He, Guowen Xu, Xingshuo Han, Qian Wang, Lingchen Zhao, Chao Shen, Chenhao Lin, Zhengyu Zhao, Qian Li, Le Yang, Shouling Ji, Shaofeng Li, Haojin Zhu, Zhibo Wang
, Rui Zheng, Tianqing Zhu, Qi Li
, Chaoxiang He, Qifan Wang, Hongsheng Hu, Shuo Wang, Shi-Feng Sun, Hongwei Yao, Qinyu Zhang, Kai Chen, Yue Zhao, Hongwei Li, Xinyi Huang, Dengguo Feng:
Artificial intelligence security and privacy: a survey. Sci. China Inf. Sci. 68(8) (2025)
[j16]Hanrui Wang
, Ruoxi Sun
, Cunjian Chen
, Minhui Xue
, Lay-Ki Soon, Shuo Wang, Zhe Jin
:
Iterative Window Mean Filter: Thwarting Diffusion-Based Adversarial Purification. IEEE Trans. Dependable Secur. Comput. 22(2): 1827-1844 (2025)
[c40]Kwok-Yan Lam
, Xiaoning Liu
, Derui Wang
, Bo Li
, Wenyuan Xu
, Jieshan Chen
, Minhui Xue
, Xingliang Yuan
, Guangdong Bai
, Shuo Wang
:
LAMPS '25: ACM CCS Workshop on Large AI Systems and Models with Privacy and Security Analysis. CCS 2025: 4914-4915
[c39]Shixin Li, Chaoxiang He, Xiaojing Ma, Bin Benjamin Zhu, Shuo Wang, Hongsheng Hu, Dongmei Zhang
, Linchen Yu:
Enhancing Adversarial Transferability with Checkpoints of a Single Model's Training. CVPR 2025: 20685-20694
[c38]Yansong Gao, Huaibing Peng, Hua Ma, Zhi Zhang, Shuo Wang, Rayne Holland, Anmin Fu, Minhui Xue, Derek Abbott:
Try to Poison My Deep Learning Data? Nowhere to Hide Your Trajectory Spectrum! NDSS 2025
[c37]Bingguang Lu, Hongsheng Hu, Yuantian Miao, Shaleeza Sohail, Chaoxiang He, Shuo Wang, Xiao Chen:
BadFU: Backdoor Federated Learning through Adversarial Machine Unlearning. RAID 2025: 773-788
[e2]Kwok-Yan Lam, Xiaoning Liu, Derui Wang, Ruoxi Sun, Bo Li, Wenyuan Xu, Jieshan Chen, Jason Xue, Shuo Wang, Guangdong Bai, Xingliang Yuan:
Proceedings of the 2025 Workshop on Large AI Systems and Models with Privacy and Security Analysis, LAMPS 2025, TaipeiTaiwan, October 13-17, 2025. ACM 2025, ISBN 979-8-4007-1896-0 [contents]
[i30]Wei Kang, Nan Wang, Jang Seung, Shuo Wang, Alsharif Abuadbba:
EPhishCADE: A Privacy-Aware Multi-Dimensional Framework for Email Phishing Campaign Detection. CoRR abs/2502.20621 (2025)
[i29]Yansong Gao, Huaibing Peng, Hua Ma, Zhiyang Dai, Shuo Wang, Hongsheng Hu, Anmin Fu, Minhui Xue:
From Pixels to Trajectory: Universal Adversarial Example Detection via Temporal Imprints. CoRR abs/2503.04853 (2025)
[i28]Hanrui Wang, Shuo Wang, Chun-Shien Lu, Isao Echizen:
Diffusion-Driven Universal Model Inversion Attack for Face Recognition. CoRR abs/2504.18015 (2025)
[i27]Bingguang Lu, Hongsheng Hu, Yuantian Miao, Shaleeza Sohail, Chaoxiang He, Shuo Wang, Xiao Chen:
BadFU: Backdoor Federated Learning through Adversarial Machine Unlearning. CoRR abs/2508.15541 (2025)
[i26]Sheng Hang, Chaoxiang He, Hongsheng Hu, Hanqing Hu, Bin Benjamin Zhu, Shifeng Sun, Dawu Gu, Shuo Wang:
Malicious Image Analysis via Vision-Language Segmentation Fusion: Detection, Element, and Location in One-shot. CoRR abs/2512.04599 (2025)- 2024
[j15]Erik Buchholz
, Alsharif Abuadbba
, Shuo Wang, Surya Nepal
, Salil S. Kanhere:
SoK: Can Trajectory Generation Combine Privacy and Utility? Proc. Priv. Enhancing Technol. 2024(3): 75-93 (2024)
[j14]Huaibing Peng
, Huming Qiu
, Hua Ma, Shuo Wang, Anmin Fu
, Said F. Al-Sarawi
, Derek Abbott
, Yansong Gao
:
On Model Outsourcing Adaptive Attacks to Deep Learning Backdoor Defenses. IEEE Trans. Inf. Forensics Secur. 19: 2356-2369 (2024)
[j13]Shuo Wang
, Shangyu Chen, Tianle Chen, Surya Nepal
, Carsten Rudolph
, Marthie Grobler
:
Generating Semantic Adversarial Examples via Feature Manipulation in Latent Space. IEEE Trans. Neural Networks Learn. Syst. 35(12): 17070-17084 (2024)
[j12]Hanrui Wang
, Shuo Wang
, Cunjian Chen
, Massimo Tistarelli
, Zhe Jin
:
A Multi-Task Adversarial Attack against Face Authentication. ACM Trans. Multim. Comput. Commun. Appl. 20(11): 332:1-332:24 (2024)
[c36]Bo Li
, Wenyuan Xu
, Jieshan Chen
, Yang Zhang
, Minhui Xue
, Shuo Wang
, Guangdong Bai
, Xingliang Yuan
:
LAMPS '24: ACM CCS Workshop on Large AI Systems and Models with Privacy and Safety Analysis. CCS 2024: 4888-4889
[c35]Haodong Lu, Dong Gong, Shuo Wang, Jason Xue, Lina Yao, Kristen Moore:
Learning with Mixture of Prototypes for Out-of-Distribution Detection. ICLR 2024
[c34]Hongying Zhang
, Gaolei Li
, Shenghong Li
, Hongfu Liu
, Shuo Wang
, Jianhua Li
:
How to Efficiently Manage Critical Infrastructure Vulnerabilities? Toward Large Code-graph Models. LAMPS@CCS 2024: 25-34
[c33]Hongsheng Hu, Shuo Wang, Jiamin Chang, Haonan Zhong, Ruoxi Sun, Shuang Hao, Haojin Zhu, Minhui Xue:
A Duty to Forget, a Right to be Assured? Exposing Vulnerabilities in Machine Unlearning Services. NDSS 2024
[c32]Bang Wu, He Zhang, Xiangwen Yang, Shuo Wang, Minhui Xue, Shirui Pan, Xingliang Yuan:
GraphGuard: Detecting and Counteracting Training Data Misuse in Graph Neural Networks. NDSS 2024
[c31]Bang Wu, Xingliang Yuan, Shuo Wang, Qi Li, Minhui Xue, Shirui Pan
:
Securing Graph Neural Networks in MLaaS: A Comprehensive Realization of Query-based Integrity Verification. SP 2024: 2534-2552
[c30]Shuo Wang, Hongsheng Hu, Jiamin Chang, Benjamin Zi Hao Zhao, Minhui Xue:
LACMUS: Latent Concept Masking for General Robustness Enhancement of DNNs. SP 2024: 2977-2995
[c29]Hongsheng Hu, Shuo Wang, Tian Dong, Minhui Xue:
Learn What You Want to Unlearn: Unlearning Inversion Attacks against Machine Unlearning. SP 2024: 3257-3275
[c28]Shuo Wang, Hongsheng Hu, Jiamin Chang, Benjamin Zi Hao Zhao, Qi Alfred Chen, Minhui Xue:
DNN-GP: Diagnosing and Mitigating Model's Faults Using Latent Concepts. USENIX Security Symposium 2024
[c27]Nan Wu
, Xin Yuan
, Shuo Wang
, Hongsheng Hu
, Minhui Xue
:
Cardinality Counting in "Alcatraz": A Privacy-aware Federated Learning Approach. WWW 2024: 3076-3084
[i25]Haodong Lu
, Dong Gong, Shuo Wang, Jason Xue, Lina Yao, Kristen Moore:
Learning with Mixture of Prototypes for Out-of-Distribution Detection. CoRR abs/2402.02653 (2024)
[i24]Erik Buchholz, Alsharif Abuadbba, Shuo Wang, Surya Nepal, Salil S. Kanhere:
SoK: Can Trajectory Generation Combine Privacy and Utility? CoRR abs/2403.07218 (2024)
[i23]Hongsheng Hu
, Shuo Wang, Tian Dong, Minhui Xue:
Learn What You Want to Unlearn: Unlearning Inversion Attacks against Machine Unlearning. CoRR abs/2404.03233 (2024)
[i22]Alsharif Abuadbba, Nicholas Rhodes, Kristen Moore, Bushra Sabir, Shuo Wang, Yansong Gao:
DeepiSign-G: Generic Watermark to Stamp Hidden DNN Parameters for Self-contained Tracking. CoRR abs/2407.01260 (2024)
[i21]Hanrui Wang, Shuo Wang, Cunjian Chen, Massimo Tistarelli, Zhe Jin:
A Multi-task Adversarial Attack Against Face Authentication. CoRR abs/2408.08205 (2024)
[i20]Hanrui Wang, Ruoxi Sun, Cunjian Chen, Minhui Xue, Lay-Ki Soon, Shuo Wang, Zhe Jin:
Iterative Window Mean Filter: Thwarting Diffusion-based Adversarial Purification. CoRR abs/2408.10673 (2024)
[i19]Fengchao Chen, Tingmin Wu, Van Nguyen, Shuo Wang, Hongsheng Hu, Alsharif Abuadbba, Carsten Rudolph:
Adapting to Cyber Threats: A Phishing Evolution Network (PEN) Framework for Phishing Generation and Analyzing Evolution Patterns using Large Language Models. CoRR abs/2411.11389 (2024)- 2023
[j11]Hui Li, Yan Yan, Shuo Wang
, Juan Liu, Yunpeng Cui:
Text classification on heterogeneous information network via enhanced GCN and knowledge. Neural Comput. Appl. 35(20): 14911-14927 (2023)
[j10]Bang Wu
, Shuo Wang
, Xingliang Yuan
, Cong Wang
, Carsten Rudolph
, Xiangwen Yang:
Defeating Misclassification Attacks Against Transfer Learning. IEEE Trans. Dependable Secur. Comput. 20(2): 886-901 (2023)
[c26]Seonhye Park
, Alsharif Abuadbba
, Shuo Wang
, Kristen Moore
, Yansong Gao
, Hyoungshick Kim
, Surya Nepal
:
DeepTaster: Adversarial Perturbation-Based Fingerprinting to Identify Proprietary Dataset Use in Deep Neural Networks. ACSAC 2023: 535-549
[c25]Mahathir Almashor
, M. Ejaz Ahmed
, Benjamin Pick
, Jason Xue, Sharif Abuadbba
, Raj Gaire
, Shuo Wang
, Seyit Camtepe
, Surya Nepal
:
Unraveling Threat Intelligence Through the Lens of Malicious URL Campaigns. AINTEC 2023: 78-86
[c24]He Zhang, Bang Wu, Shuo Wang, Xiangwen Yang, Minhui Xue, Shirui Pan, Xingliang Yuan:
Demystifying Uneven Vulnerability of Link Stealing Attacks against Graph Neural Networks. ICML 2023: 41737-41752
[c23]Shuo Wang, Mahathir Almashor, Alsharif Abuadbba, Ruoxi Sun, Minhui Xue, Calvin Wang, Raj Gaire, Surya Nepal, Seyit Camtepe:
DOITRUST: Dissecting On-chain Compromised Internet Domains via Graph Learning. NDSS 2023
[c22]Ruoxi Sun
, Minhui Xue
, Gareth Tyson
, Tian Dong
, Shaofeng Li
, Shuo Wang
, Haojin Zhu
, Seyit Camtepe
, Surya Nepal
:
Mate! Are You Really Aware? An Explainability-Guided Testing Framework for Robustness of Malware Detectors. ESEC/SIGSOFT FSE 2023: 1573-1585
[c21]Shuo Wang, Sharif Abuadbba, Sidharth Agarwal, Kristen Moore
, Ruoxi Sun, Minhui Xue, Surya Nepal, Seyit Camtepe, Salil S. Kanhere:
PublicCheck: Public Integrity Verification for Services of Run-time Deep Models. SP 2023: 1348-1365
[c20]Ruoxi Sun
, Minhui Xue, Gareth Tyson
, Shuo Wang
, Seyit Camtepe
, Surya Nepal
:
Not Seen, Not Heard in the Digital World! Measuring Privacy Practices in Children's Apps. WWW 2023: 2166-2177
[e1]Bo Li, Wenyuan Xu, Jieshan Chen, Yang Zhang, Jason Xue, Shuo Wang, Guangdong Bai, Xingliang Yuan:
Proceedings of the 1st ACM Workshop on Large AI Systems and Models with Privacy and Safety Analysis, LAMPS 2024, Salt Lake City, UT, USA, October 14-18, 2024. ACM 2023, ISBN 979-8-4007-1209-8 [contents]
[d2]Ruoxi Sun
, Minhui Xue
, Gareth Tyson
, Tian Dong, Shaofeng Li
, Shuo Wang
, Haojin Zhu
, Seyit Camtepe
, Surya Nepal
:
An Explainability-Guided Testing Framework for Robustness of Malware Detectors. Version 1. Zenodo, 2023 [all versions]
[d1]Ruoxi Sun
, Minhui Xue
, Gareth Tyson
, Tian Dong, Shaofeng Li
, Shuo Wang
, Haojin Zhu
, Seyit Camtepe
, Surya Nepal
:
An Explainability-Guided Testing Framework for Robustness of Malware Detectors. Version 2. Zenodo, 2023 [all versions]
[i18]Ruoxi Sun, Minhui Xue, Gareth Tyson, Shuo Wang, Seyit Camtepe, Surya Nepal:
Not Seen, Not Heard in the Digital World! Measuring Privacy Practices in Children's Apps. CoRR abs/2303.09008 (2023)
[i17]Hongsheng Hu
, Shuo Wang, Jiamin Chang, Haonan Zhong, Ruoxi Sun, Shuang Hao, Haojin Zhu, Minhui Xue:
A Duty to Forget, a Right to be Assured? Exposing Vulnerabilities in Machine Unlearning Services. CoRR abs/2309.08230 (2023)
[i16]Bang Wu, He Zhang
, Xiangwen Yang, Shuo Wang, Minhui Xue, Shirui Pan, Xingliang Yuan:
GraphGuard: Detecting and Counteracting Training Data Misuse in Graph Neural Networks. CoRR abs/2312.07861 (2023)
[i15]Bang Wu, Xingliang Yuan, Shuo Wang, Qi Li, Minhui Xue, Shirui Pan:
Securing Graph Neural Networks in MLaaS: A Comprehensive Realization of Query-based Integrity Verification. CoRR abs/2312.07870 (2023)- 2022
[j9]Shuo Wang
, Surya Nepal
, Alsharif Abuadbba, Carsten Rudolph
, Marthie Grobler
:
Adversarial Detection by Latent Style Transformations. IEEE Trans. Inf. Forensics Secur. 17: 1099-1114 (2022)
[j8]Shuo Wang
, Surya Nepal
, Kristen Moore
, Marthie Grobler
, Carsten Rudolph
, Alsharif Abuadbba:
OCTOPUS: Overcoming Performance and Privatization Bottlenecks in Distributed Learning. IEEE Trans. Parallel Distributed Syst. 33(12): 3460-3477 (2022)
[j7]Shuo Wang
, Surya Nepal
, Carsten Rudolph
, Marthie Grobler
, Shangyu Chen, Tianle Chen:
Backdoor Attacks Against Transfer Learning With Pre-Trained Deep Learning Models. IEEE Trans. Serv. Comput. 15(3): 1526-1539 (2022)
[j6]Shuo Wang
, Surya Nepal
, Carsten Rudolph
, Marthie Grobler
, Shangyu Chen, Tianle Chen, Zike An:
Defending Adversarial Attacks via Semantic Feature Manipulation. IEEE Trans. Serv. Comput. 15(6): 3184-3197 (2022)
[c19]Erik Buchholz
, Alsharif Abuadbba
, Shuo Wang
, Surya Nepal
, Salil Subhash Kanhere
:
Reconstruction Attack on Differential Private Trajectory Protection Mechanisms. ACSAC 2022: 279-292
[c18]Adrian Kristanto, Shuo Wang, Carsten Rudolph:
Latent Space-Based Backdoor Attacks Against Deep Neural Networks. IJCNN 2022: 1-10
[c17]Shuo Wang, Jinyuan Qin, Carsten Rudolph, Surya Nepal, Marthie Grobler:
R-Net: Robustness Enhanced Financial Time-Series Prediction with Differential Privacy. IJCNN 2022: 1-9
[i14]Hanrui Wang, Shuo Wang, Zhe Jin, Yandan Wang, Cunjian Chen, Massimo Tistarelli:
Similarity-based Gray-box Adversarial Attack Against Deep Face Recognition. CoRR abs/2201.04011 (2022)
[i13]Shuo Wang, Sharif Abuadbba, Sidharth Agarwal, Kristen Moore, Surya Nepal, Salil S. Kanhere:
Integrity Fingerprinting of DNN with Double Black-box Design and Verification. CoRR abs/2203.10902 (2022)
[i12]Alsharif Abuadbba, Shuo Wang, Mahathir Almashor, Muhammad Ejaz Ahmed, Raj Gaire, Seyit Camtepe, Surya Nepal:
Towards Web Phishing Detection Limitations and Mitigation. CoRR abs/2204.00985 (2022)
[i11]Mahathir Almashor, M. Ejaz Ahmed, Benjamin Pick, Sharif Abuadbba, Jason Xue, Raj Gaire, Shuo Wang, Seyit Camtepe, Surya Nepal:
Unraveling Threat Intelligence Through the Lens of Malicious URL Campaigns. CoRR abs/2208.12449 (2022)
[i10]Erik Buchholz, Alsharif Abuadbba, Shuo Wang, Surya Nepal, Salil S. Kanhere:
Reconstruction Attack on Differential Private Trajectory Protection Mechanisms. CoRR abs/2210.09375 (2022)
[i9]Seonhye Park, Alsharif Abuadbba, Shuo Wang, Kristen Moore, Yansong Gao, Hyoungshick Kim, Surya Nepal:
Tracking Dataset IP Use in Deep Neural Networks. CoRR abs/2211.13535 (2022)- 2021
[j5]Sami Alkhatib, Ryan Kelly
, Jenny Waycott, George Buchanan, Marthie Grobler
, Shuo Wang:
"Who Wants to Know all this Stuff?!": Understanding Older Adults' Privacy Concerns in Aged Care Monitoring Devices. Interact. Comput. 33(5): 481-498 (2021)
[c16]He Zhang
, Bang Wu
, Xiangwen Yang, Chuan Zhou, Shuo Wang, Xingliang Yuan, Shirui Pan
:
Projective Ranking: A Transferable Evasion Attack Method on Graph Neural Networks. CIKM 2021: 3617-3621
[c15]Hanrui Wang, Shuo Wang, Zhe Jin, Yandan Wang, Cunjian Chen
, Massimo Tistarelli:
Similarity-based Gray-box Adversarial Attack Against Deep Face Recognition. FG 2021: 1-8
[i8]Shuo Wang, Surya Nepal, Kristen Moore, Marthie Grobler, Carsten Rudolph, Alsharif Abuadbba:
OCTOPUS: Overcoming Performance andPrivatization Bottlenecks in Distributed Learning. CoRR abs/2105.00602 (2021)
[i7]Shuo Wang, Lingjuan Lyu, Surya Nepal, Carsten Rudolph, Marthie Grobler, Kristen Moore:
Robust Training Using Natural Transformation. CoRR abs/2105.04070 (2021)- 2020
[j4]Hui Li, Yunpeng Cui, Shuo Wang
, Juan Liu, Jinyuan Qin, Yilin Yang:
Multivariate Financial Time-Series Prediction With Certified Robustness. IEEE Access 8: 109133-109143 (2020)
[c14]Shuo Wang, Carsten Rudolph, Surya Nepal, Marthie Grobler, Shangyu Chen:
PART-GAN: Privacy-Preserving Time-Series Sharing. ICANN (1) 2020: 578-593
[c13]Shuo Wang, Tianle Chen, Shangyu Chen, Surya Nepal, Carsten Rudolph, Marthie Grobler:
OIAD: One-for-all Image Anomaly Detection with Disentanglement Learning. IJCNN 2020: 1-8
[c12]Sami Alkhatib, Jenny Waycott, George Buchanan, Marthie Grobler, Shuo Wang:
Privacy by Design in Aged Care Monitoring Devices? Well, Not Quite Yet! OZCHI 2020: 492-505
[c11]Shuo Wang, Lingjuan Lyu, Tianle Chen, Shangyu Chen, Surya Nepal, Carsten Rudolph, Marthie Grobler:
Privacy-Preserving Data Generation and Sharing Using Identification Sanitizer. WISE (2) 2020: 185-200
[i6]Shuo Wang, Shangyu Chen, Tianle Chen, Surya Nepal, Carsten Rudolph, Marthie Grobler:
Generating Semantic Adversarial Examples via Feature Manipulation. CoRR abs/2001.02297 (2020)
[i5]Shuo Wang, Surya Nepal, Carsten Rudolph, Marthie Grobler, Shangyu Chen, Tianle Chen:
Backdoor Attacks against Transfer Learning with Pre-trained Deep Learning Models. CoRR abs/2001.03274 (2020)
[i4]Shuo Wang, Tianle Chen, Shangyu Chen, Carsten Rudolph, Surya Nepal, Marthie Grobler:
OIAD: One-for-all Image Anomaly Detection with Disentanglement Learning. CoRR abs/2001.06640 (2020)
[i3]Shuo Wang, Tianle Chen, Surya Nepal, Carsten Rudolph, Marthie Grobler, Shangyu Chen:
Defending Adversarial Attacks via Semantic Feature Manipulation. CoRR abs/2002.02007 (2020)
[i2]Shuo Wang, Surya Nepal, Marthie Grobler, Carsten Rudolph, Tianle Chen, Shangyu Chen:
Adversarial Defense by Latent Style Transformations. CoRR abs/2006.09701 (2020)
2010 – 2019
- 2019
[c10]Shangyu Chen, Shuo Wang, Richard O. Sinnott:
Parametric Canonical Correlation Analysis. CloudCom 2019: 347-353
[c9]Shuo Wang, Surya Nepal
, Richard O. Sinnott, Carsten Rudolph
:
P-STM: Privacy-Protected Social Tie Mining of Individual Trajectories. ICWS 2019: 1-10
[i1]Bang Wu, Xiangwen Yang, Shuo Wang, Xingliang Yuan, Cong Wang, Carsten Rudolph:
Defending Against Misclassification Attacks in Transfer Learning. CoRR abs/1908.11230 (2019)- 2018
[b1]Shuo Wang:
Exploration and protection of location privacy in online social networks. University of Melbourne, Parkville, Victoria, Australia, 2018
[j3]Shuo Wang, Richard O. Sinnott, Surya Nepal
:
Privacy-protected statistics publication over social media user trajectory streams. Future Gener. Comput. Syst. 87: 792-802 (2018)
[c8]Shuo Wang, Richard O. Sinnott, Surya Nepal:
A Privacy-Preserving Semantic Annotation Framework Using Online Social Media. ICWS 2018: 353-372
[c7]Shuo Wang, Richard O. Sinnott, Surya Nepal
:
PAIRS: Privacy-Aware Identification and Recommendation of Spatio-Friends. TrustCom/BigDataSE 2018: 920-931
[c6]Shuo Wang, Richard O. Sinnott, Surya Nepal:
P-GENT: Privacy-Preserving Geocoding of Non-Geotagged Tweets. TrustCom/BigDataSE 2018: 972-983- 2017
[j2]Shuo Wang, Richard O. Sinnott
:
Protecting personal trajectories of social media users through differential privacy. Comput. Secur. 67: 142-163 (2017)
[c5]Shuo Wang, Richard O. Sinnott, Surya Nepal
:
Privacy-protected place of activity mining on big location data. IEEE BigData 2017: 1101-1108
[c4]Shuo Wang, Richard O. Sinnott, Surya Nepal
:
Sensitive gazetteer discovery and protection for mobile social media users. IEEE BigData 2017: 1109-1116- 2016
[j1]Shuo Wang, Richard O. Sinnott
:
Supporting geospatial privacy-preserving data mining of social media. Soc. Netw. Anal. Min. 6(1): 109:1-109:15 (2016)
[c3]Shuo Wang, Richard O. Sinnott
, Surya Nepal
:
Protecting the location privacy of mobile social media users. IEEE BigData 2016: 1143-1150
[c2]Shuo Wang, Richard O. Sinnott
, Surya Nepal
:
Privacy-protected social media user trajectories calibration. eScience 2016: 293-302
2000 – 2009
- 2006
[c1]Shuo Wang, Xiaocao Xiong, Yan Xu, Chao Wang, Weiwei Zhang, Xiaofeng Dai, Dongmei Zhang
:
Face-tracking as an augmented input in video games: enhancing presence, role-playing and control. CHI 2006: 1097-1106
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from
to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the
of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from
,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from
and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from
.
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2026-03-15 23:08 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID






