Derui (Derek) Wang
Derui (Derek) Wang
MLAI Future Science Platform & Data61, CSIRO
Verified email at - Homepage
Cited by
Cited by
Strip: A defence against trojan attacks on deep neural networks
Y Gao, C Xu, D Wang, S Chen, DC Ranasinghe, S Nepal
Proceedings of the 35th Annual Computer Security Applications Conference …, 2019
Android HIV: A study of repackaging malware for evading machine-learning detection
X Chen, C Li, D Wang, S Wen, J Zhang, S Nepal, Y Xiang, K Ren
IEEE Transactions on Information Forensics and Security 15, 987-1001, 2019
Daedalus: Breaking non-maximum suppression in object detection via adversarial examples
D Wang, C Li, S Wen, QL Han, S Nepal, X Zhang, Y Xiang
IEEE Transactions on Cybernetics, 2021
Pokémon GO in Melbourne CBD: A case study of the cyber-physical symbiotic social networks
D Wang, T Wu, S Wen, D Liu, Y Xiang, W Zhou, H Hassan, A Alelaiwi
Journal of computational science 26, 456-467, 2018
Explore the hidden treasure in protein–protein interaction networks—An iterative model for predicting protein functions
D Wang, J Hou
Journal of bioinformatics and computational biology 13 (05), 1550026, 2015
Catch me if you can: Detecting compromised users through partial observation on networks
D Wang, S Wen, Y Xiang, W Zhou, J Zhang, S Nepal
2017 IEEE 37th International Conference on Distributed Computing Systems …, 2017
Defending against Adversarial Attack towards Deep Neural Networks via Collaborative Multi-Task Training
D Wang, C Li, S Wen, S Nepal, Y Xiang
IEEE Transactions on Dependable and Secure Computing, Early Access, 2020
Who spread to whom? Inferring online social networks with user features
D Wang, W Zhou, JX Zheng, S Wen, J Zhang, Y Xiang
2018 IEEE International Conference on Communications (ICC), 1-6, 2018
Man-in-the-Middle Attacks against Machine Learning Classifiers via Malicious Generative Models
D Wang, C Li, S Wen, S Nepal, Y Xiang
IEEE Transactions on Dependable and Secure Computing, 2020
How spam features change in twitter and the impact to machine learning based detection
T Wu, D Wang, S Wen, Y Xiang
International Conference on Information Security Practice and Experience …, 2017
STC: exposing hidden compromised devices in networked sustainable green smart computing platforms by partial observation
D Wang, T Wu, S Wen, X Chen, Y Xiang, W Zhou
IEEE Transactions on Sustainable Computing 4 (2), 178-190, 2017
Secure deep neural networks in adversarial settings
DD Wang
Swinburne University of Technology, 2020
Protein function prediction based on protein–protein interaction networks.
D Wang
Deakin University, 2016
On the Neural Backdoor of Federated Generative Models in Edge Computing
D Wang, S Wen, A Jolfaei, MS Haghighi, S Nepal, Y Xiang
To appear in ACM Transactions on Internet Technology, 0
The system can't perform the operation now. Try again later.
Articles 1–14