Follow
Ting Wang
Ting Wang
Verified email at psu.edu - Homepage
Title
Cited by
Cited by
Year
Supporting anonymous location queries in mobile environments with privacygrid
B Bamba, L Liu, P Pesti, T Wang
Proceedings of the 17th international conference on World Wide Web, 237-246, 2008
6372008
TextBugger: Generating Adversarial Text Against Real-world Applications
J Li, S Ji, T Du, B Li, T Wang
Proceedings of The 2019 Network and Distributed System Security Symposium, 2019
4252019
Privacy-aware mobile services over road networks
T Wang, L Liu
Proceedings of the VLDB Endowment 2 (1), 1042-1053, 2009
2222009
Model-reuse attacks on deep learning systems
Y Ji, X Zhang, S Ji, X Luo, T Wang
25th ACM Conference on Computer and Communications Security (CCS '18), 349-363, 2018
1362018
Adaptive routing for sensor networks using reinforcement learning
P Wang, T Wang
The Sixth IEEE International Conference on Computer and Information …, 2006
1272006
Interpretable deep learning under fire
X Zhang, N Wang, H Shen, S Ji, X Luo, T Wang
39th USENIX Security Symposium (USENIX Security '20), 2020
1242020
Differentially private releasing via deep generative model (technical report)
X Zhang, S Ji, T Wang
arXiv preprint arXiv:1801.01594, 2018
1212018
Deepsec: A uniform platform for security analysis of deep learning model
X Ling, S Ji, J Zou, J Wang, C Wu, B Li, T Wang
Proceedings of The 40th IEEE Symposium on Security and Privacy, 2019
1192019
Sirenattack: Generating adversarial audio for end-to-end acoustic systems
T Du, S Ji, J Li, Q Gu, T Wang, R Beyah
15th ACM ASIA Conference on Computer and Communications Security (AsiaCCS '20), 2020
832020
Tokenscope: Automatically detecting inconsistent behaviors of cryptocurrency tokens in ethereum
T Chen, Y Zhang, Z Li, X Luo, T Wang, R Cao, X Xiao, X Zhang
26th ACM Conference on Computer and Communications Security (CCS '19), 1503-1520, 2019
832019
Graph backdoor
Z Xi, R Pang, S Ji, T Wang
30th USENIX Security Symposium (USENIX Security '21), 2021
792021
Differentially private distributed online learning
C Li, P Zhou, L Xiong, Q Wang, T Wang
IEEE Transactions on Knowledge and Data Engineering 30 (8), 1440-1453, 2018
732018
State monitoring in cloud datacenters
S Meng, L Liu, T Wang
IEEE transactions on Knowledge and Data Engineering 23 (9), 1328-1344, 2011
692011
A Tale of Evil Twins: Adversarial Inputs versus Poisoned Models
R Pang, X Zhang, S Ji, Y Vorobeychik, X Luo, T Wang
27th ACM Conference on Computer and Communications Security (CCS '20), 2020
682020
Backdoor attacks against learning systems
Y Ji, X Zhang, T Wang
2017 IEEE Conference on Communications and Network Security (CNS), 1-9, 2017
582017
Trojaning Language Models for Fun and Profit
X Zhang, Z Zhang, T Wang
6th IEEE European Symposium on Security and Privacy (EuroS&P '21), 2021
572021
Private, yet practical, multiparty deep learning
X Zhang, S Ji, H Wang, T Wang
2017 IEEE 37th International Conference on Distributed Computing Systems …, 2017
532017
Unifuzz: A holistic and pragmatic metrics-driven platform for evaluating fuzzers
Y Li, S Ji, Y Chen, S Liang, WH Lee, Y Chen, C Lyu, C Wu, R Beyah, ...
30th USENIX Security Symposium (USENIX Security '21), 2021
472021
On exploiting dynamic execution patterns for workload offloading in mobile cloud applications
W Gao, Y Li, H Lu, T Wang, C Liu
2014 IEEE 22nd international conference on network protocols, 1-12, 2014
442014
Adversarial captchas
C Shi, X Xu, S Ji, K Bu, J Chen, R Beyah, T Wang
IEEE transactions on cybernetics 52 (7), 6095-6108, 2021
422021
The system can't perform the operation now. Try again later.
Articles 1–20