Ruoxi Sun

Orcid: 0000-0001-5404-8550

Affiliations:
  • Data61, CSIRO, Adelaide, Australia


According to our database1, Ruoxi Sun authored at least 35 papers between 2020 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Edge Unlearning is Not "on Edge"! An Adaptive Exact Unlearning System on Resource-Constrained Devices.
CoRR, 2024

Iterative Window Mean Filter: Thwarting Diffusion-based Adversarial Purification.
CoRR, 2024

On Security Weaknesses and Vulnerabilities in Deep Learning Systems.
CoRR, 2024

Leakage-Resilient and Carbon-Neutral Aggregation Featuring the Federated AI-enabled Critical Infrastructure.
CoRR, 2024

Privacy-Preserving and Fairness-Aware Federated Learning for Critical Infrastructure Protection and Resilience.
Proceedings of the ACM on Web Conference 2024, 2024

The Invisible Game on the Internet: A Case Study of Decoding Deceptive Patterns.
Proceedings of the Companion Proceedings of the ACM on Web Conference 2024, 2024

PPVR: A Privacy-Preserving Approach for User Behaviors in VR.
Proceedings of the IEEE Conference on Virtual Reality and 3D User Interfaces Abstracts and Workshops, 2024

Bounded and Unbiased Composite Differential Privacy.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

CORELOCKER: Neuron-level Usage Control.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

A Duty to Forget, a Right to be Assured? Exposing Vulnerabilities in Machine Unlearning Services.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024

2023
Data Hiding With Deep Learning: A Survey Unifying Digital Watermarking and Steganography.
IEEE Trans. Comput. Soc. Syst., December, 2023

An Explainability-Guided Testing Framework for Robustness of Malware Detectors.
Dataset, August, 2023

An Explainability-Guided Testing Framework for Robustness of Malware Detectors.
Dataset, August, 2023

Not Seen, Not Heard in the Digital World! Measuring Privacy Practices in Children's Apps.
Proceedings of the ACM Web Conference 2023, 2023

RAI4IoE: Responsible AI for Enabling the Internet of Energy.
Proceedings of the 5th IEEE International Conference on Trust, 2023

PublicCheck: Public Integrity Verification for Services of Run-time Deep Models.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

StyleFool: Fooling Video Classification Systems via Style Transfer.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

Mate! Are You Really Aware? An Explainability-Guided Testing Framework for Robustness of Malware Detectors.
Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2023

DOITRUST: Dissecting On-chain Compromised Internet Domains via Graph Learning.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023

The "Beatrix" Resurrections: Robust Backdoor Detection via Gram Matrices.
Proceedings of the 30th Annual Network and Distributed System Security Symposium, 2023

2022
M^4I: Multi-modal Models Membership Inference.
CoRR, 2022

Cross-language Android permission specification.
Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2022

M$^4$I: Multi-modal Models Membership Inference.
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022

Path Transitions Tell More: Optimizing Fuzzing Schedules via Runtime Program States.
Proceedings of the 44th IEEE/ACM 44th International Conference on Software Engineering, 2022

Visualization and Attack Prevention for a Sensor-Based Agricultural Monitoring System.
Proceedings of the ACSW 2022: Australasian Computer Science Week 2022, Brisbane, Australia, February 14, 2022

Dissecting Malware in the Wild.
Proceedings of the ACSW 2022: Australasian Computer Science Week 2022, Brisbane, Australia, February 14, 2022

Statically Detecting Adversarial Malware through Randomised Chaining.
Proceedings of the ACSW 2022: Australasian Computer Science Week 2022, Brisbane, Australia, February 14, 2022

2021
Exposing Weaknesses of Malware Detectors with Explainability-Guided Evasion Attacks.
CoRR, 2021

NatiDroid: Cross-Language Android Permission Specification.
CoRR, 2021

An Empirical Assessment of Global COVID-19 Contact Tracing Applications.
Proceedings of the 43rd IEEE/ACM International Conference on Software Engineering, 2021

Snipuzz: Black-box Fuzzing of IoT Firmware via Message Snippet Inference.
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021

2020
Vetting Security and Privacy of Global COVID-19 Contact Tracing Applications.
CoRR, 2020

VenueTrace: a privacy-by-design COVID-19 digital contact tracing solution: poster abstract.
Proceedings of the SenSys '20: The 18th ACM Conference on Embedded Networked Sensor Systems, 2020

An Automated Assessment of Android Clipboards.
Proceedings of the 35th IEEE/ACM International Conference on Automated Software Engineering, 2020

Quality Assessment of Online Automated Privacy Policy Generators: An Empirical Study.
Proceedings of the EASE '20: Evaluation and Assessment in Software Engineering, 2020


  Loading...