Simon S. Woo
Orcid: 0000-0002-8983-1542
According to our database1,
Simon S. Woo
authored at least 155 papers
between 2008 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
EAE-GAN: Emotion-Aware Emoji Generative Adversarial Network for Computational Modeling Diverse and Fine-Grained Human Emotions.
IEEE Trans. Comput. Soc. Syst., June, 2024
Design and evaluation of highly accurate smart contract code vulnerability detection framework.
Data Min. Knowl. Discov., May, 2024
Hardening Interpretable Deep Learning Systems: Investigating Adversarial Threats and Defenses.
IEEE Trans. Dependable Secur. Comput., 2024
Pattern Recognit. Lett., 2024
GDFlow: Anomaly Detection with NCDE-based Normalizing Flow for Advanced Driver Assistance System.
CoRR, 2024
Blind-Match: Efficient Homomorphic Encryption-Based 1:N Matching for Privacy-Preserving Biometric Identification.
CoRR, 2024
CoRR, 2024
Proceedings of the Companion Proceedings of the ACM on Web Conference 2024, 2024
Proceedings of the IEEE/CVF Winter Conference on Applications of Computer Vision, 2024
The Impact of Model Variations on the Robustness of Deep Learning Models in Adversarial Settings.
Proceedings of the Silicon Valley Cybersecurity Conference, 2024
Proceedings of the 39th ACM/SIGAPP Symposium on Applied Computing, 2024
Action Attention GRU: A Data-Driven Approach for Enhancing Purchase Predictions in Digital Marketing.
Proceedings of the 39th ACM/SIGAPP Symposium on Applied Computing, 2024
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2024
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2024
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2024
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2024
Proceedings of the 30th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2024
DynaPP: A Dynamic Resolution Model with Patch Packing for Fast Online Video Detection.
Proceedings of the International Joint Conference on Neural Networks, 2024
Proceedings of the Thirty-Third International Joint Conference on Artificial Intelligence, 2024
Proceedings of the Thirty-Third International Joint Conference on Artificial Intelligence, 2024
Source-Free Online Domain Adaptive Semantic Segmentation of Satellite Images Under Image Degradation.
Proceedings of the IEEE International Conference on Acoustics, 2024
Proceedings of the Computer Vision - ECCV 2024, 2024
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2024
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2024
<i>Blind-Match: </i> Efficient Homomorphic Encryption-Based 1: N Matching for Privacy-Preserving Biometric Identification.
Proceedings of the 33rd ACM International Conference on Information and Knowledge Management, 2024
Deep Journey Hierarchical Attention Networks for Conversion Predictions in Digital Marketing.
Proceedings of the 33rd ACM International Conference on Information and Knowledge Management, 2024
Preserving Old Memories in Vivid Detail: Human-Interactive Photo Restoration Framework.
Proceedings of the 33rd ACM International Conference on Information and Knowledge Management, 2024
Proceedings of the 33rd ACM International Conference on Information and Knowledge Management, 2024
Layer Attack Unlearning: Fast and Accurate Machine Unlearning via Layer Level Attack and Knowledge Distillation.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024
All but One: Surgical Concept Erasing with Model Preservation in Text-to-Image Diffusion Models.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024
Blind-Touch: Homomorphic Encryption-Based Distributed Neural Network Inference for Privacy-Preserving Fingerprint Authentication.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024
2023
Computer, May, 2023
Pattern Recognit. Lett., January, 2023
IEEE Trans. Dependable Secur. Comput., 2023
Unveiling Vulnerabilities in Interpretable Deep Learning Systems with Query-Efficient Black-box Attacks.
CoRR, 2023
Microbial Genetic Algorithm-based Black-box Attack against Interpretable Deep Learning Systems.
CoRR, 2023
OTJR: Optimal Transport Meets Optimal Jacobian Regularization for Adversarial Robustness.
CoRR, 2023
IEEE Access, 2023
Proceedings of the 2nd Workshop on Security Implications of Deepfakes and Cheapfakes, 2023
Proceedings of the 2nd Workshop on Security Implications of Deepfakes and Cheapfakes, 2023
Proceedings of the IEEE/CVF Winter Conference on Applications of Computer Vision, 2023
Rotated-DETR: an End-to-End Transformer-based Oriented Object Detector for Aerial Images.
Proceedings of the 38th ACM/SIGAPP Symposium on Applied Computing, 2023
Proceedings of the 38th ACM/SIGAPP Symposium on Applied Computing, 2023
MGCMA: Multi-scale Generator with Channel-wise Mask Attention to generate Synthetic Contrast-enhanced Chest Computed Tomography.
Proceedings of the 38th ACM/SIGAPP Symposium on Applied Computing, 2023
Proceedings of the Thirty-Second International Joint Conference on Artificial Intelligence, 2023
Hand Bone X-rays Segmentation and Congregation for Age Assessment using Deep Learning.
Proceedings of the International Conference on Information Networking, 2023
Proceedings of the IEEE International Conference on Image Processing, 2023
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023
Proceedings of the 32nd ACM International Conference on Information and Knowledge Management, 2023
Proceedings of the 32nd ACM International Conference on Information and Knowledge Management, 2023
Proceedings of the 32nd ACM International Conference on Information and Knowledge Management, 2023
SAFE: Sequential Attentive Face Embedding with Contrastive Learning for Deepfake Video Detection.
Proceedings of the 32nd ACM International Conference on Information and Knowledge Management, 2023
Proceedings of the 32nd ACM International Conference on Information and Knowledge Management, 2023
2022
ORVAE: One-Class Residual Variational Autoencoder for Voice Activity Detection in Noisy Environment.
Neural Process. Lett., 2022
Interpretations Cannot Be Trusted: Stealthy and Effective Adversarial Perturbations against Interpretable Deep Learning.
CoRR, 2022
PasswordTensor: Analyzing and explaining password strength using tensor decomposition.
Comput. Secur., 2022
A Survey of Deep Learning-Based Object Detection Methods and Datasets for Overhead Imagery.
IEEE Access, 2022
Am I a Real or Fake Celebrity? Evaluating Face Recognition and Verification APIs under Deepfake Impersonation Attack.
Proceedings of the WWW '22: The ACM Web Conference 2022, Virtual Event, Lyon, France, April 25, 2022
BZNet: Unsupervised Multi-scale Branch Zooming Network for Detecting Low-quality Deepfake Videos.
Proceedings of the WWW '22: The ACM Web Conference 2022, Virtual Event, Lyon, France, April 25, 2022
Proceedings of the WDC@AsiaCCS '22: Proceedings of the 1st Workshop on Security Implications of Deepfakes and Cheapfakes, 2022
Proceedings of the WDC@AsiaCCS '22: Proceedings of the 1st Workshop on Security Implications of Deepfakes and Cheapfakes, 2022
Proceedings of the WDC@AsiaCCS '22: Proceedings of the 1st Workshop on Security Implications of Deepfakes and Cheapfakes, 2022
Proceedings of the WDC@AsiaCCS '22: Proceedings of the 1st Workshop on Security Implications of Deepfakes and Cheapfakes, 2022
Proceedings of the WDC@AsiaCCS '22: Proceedings of the 1st Workshop on Security Implications of Deepfakes and Cheapfakes, 2022
Residual size is not enough for anomaly detection: improving detection performance using residual similarity in multivariate time series.
Proceedings of the SAC '22: The 37th ACM/SIGAPP Symposium on Applied Computing, Virtual Event, April 25, 2022
Proceedings of the SAC '22: The 37th ACM/SIGAPP Symposium on Applied Computing, Virtual Event, April 25, 2022
Learning Sparse Latent Graph Representations for Anomaly Detection in Multivariate Time Series.
Proceedings of the KDD '22: The 28th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, Washington, DC, USA, August 14, 2022
Proceedings of the 26th International Conference on Pattern Recognition, 2022
Proceedings of the Computer Vision - ECCV 2022, 2022
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops, 2022
Towards an Awareness of Time Series Anomaly Detection Models' Adversarial Vulnerability.
Proceedings of the 31st ACM International Conference on Information & Knowledge Management, 2022
Proceedings of the 31st ACM International Conference on Information & Knowledge Management, 2022
Proceedings of the 31st ACM International Conference on Information & Knowledge Management, 2022
Proceedings of the 31st ACM International Conference on Information & Knowledge Management, 2022
STL-DP: Differentially Private Time Series Exploring Decomposition and Compression Methods.
Proceedings of the CIKM 2022 Workshops co-located with 31st ACM International Conference on Information and Knowledge Management (CIKM 2022), 2022
Proceedings of the 31st ACM International Conference on Information & Knowledge Management, 2022
Proceedings of the 18th IEEE International Conference on Advanced Video and Signal Based Surveillance, 2022
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022
Proceedings of the Computer Vision - ACCV 2022, 2022
ADD: Frequency Attention and Multi-View Based Knowledge Distillation to Detect Low-Quality Compressed Deepfake Images.
Proceedings of the Thirty-Sixth AAAI Conference on Artificial Intelligence, 2022
2021
DA-FDFtNet: Dual Attention Fake Detection Fine-tuning Network to Detect Various AI-Generated Fake Images.
CoRR, 2021
CoRR, 2021
ADD: Frequency Attention and Multi-View based Knowledge Distillation to Detect Low-Quality Compressed Deepfake Images.
CoRR, 2021
Am I a Real or Fake Celebrity? Measuring Commercial Face Recognition Web APIs under Deepfake Impersonation Attack.
CoRR, 2021
Neural network laundering: Removing black-box backdoor watermarks from deep neural networks.
Comput. Secur., 2021
Detecting handcrafted facial image manipulations and GAN-generated facial images using Shallow-FakeFaceNet.
Appl. Soft Comput., 2021
One Detector to Rule Them All: Towards a General Deepfake Attack Detection Framework.
Proceedings of the WWW '21: The Web Conference 2021, 2021
TAR: Generalized Forensic Framework to Detect Deepfakes Using Weakly Supervised Learning.
Proceedings of the ICT Systems Security and Privacy Protection, 2021
Revitalizing Self-Organizing Map: Anomaly Detection Using Forecasting Error Patterns.
Proceedings of the ICT Systems Security and Privacy Protection, 2021
Proceedings of the SAC '21: The 36th ACM/SIGAPP Symposium on Applied Computing, 2021
Proceedings of the Neural Information Processing Systems Track on Datasets and Benchmarks 1, 2021
Proceedings of the Neural Information Processing Systems Track on Datasets and Benchmarks 1, 2021
CoReD: Generalizing Fake Media Detection with Continual Representation using Distillation.
Proceedings of the MM '21: ACM Multimedia Conference, Virtual Event, China, October 20, 2021
Evaluation of an Audio-Video Multimodal Deepfake Dataset using Unimodal and Multimodal Detectors.
Proceedings of the ADGD '21: Proceedings of the 1st Workshop on Synthetic Multimedia, 2021
IVDR: Imitation learning with Variational inference and Distributional Reinforcement learning to find Optimal Driving Strategy.
Proceedings of the 20th IEEE International Conference on Machine Learning and Applications, 2021
Sarod: Efficient End-To-End Object Detection On SAR Images With Reinforcement Learning.
Proceedings of the 2021 IEEE International Conference on Image Processing, 2021
FReTAL: Generalizing Deepfake Detection Using Knowledge Distillation and Representation Learning.
Proceedings of the IEEE Conference on Computer Vision and Pattern Recognition Workshops, 2021
Proceedings of the CIKM '21: The 30th ACM International Conference on Information and Knowledge Management, Virtual Event, Queensland, Australia, November 1, 2021
DLPNet: Dynamic Loss Parameter Network using Reinforcement Learning for Aerial Imagery Detection.
Proceedings of the AIPR 2021: 4th International Conference on Artificial Intelligence and Pattern Recognition, Xiamen, China, September 24, 2021
2020
Can We Create a Cross-Domain Federated Identity for the Industrial Internet of Things without Google?
IEEE Internet Things Mag., 2020
Neural Network Laundering: Removing Black-Box Backdoor Watermarks from Deep Neural Networks.
CoRR, 2020
Comput. Secur., 2020
Real Time Localized Air Quality Monitoring and Prediction Through Mobile and Fixed IoT Sensing Network.
IEEE Access, 2020
I've Got Your Packages: Harvesting Customers' Delivery Order Information using Package Tracking Number Enumeration Attacks.
Proceedings of the WWW '20: The Web Conference 2020, Taipei, Taiwan, April 20-24, 2020, 2020
Proceedings of the WWW '20: The Web Conference 2020, Taipei, Taiwan, April 20-24, 2020, 2020
Proceedings of the ICT Systems Security and Privacy Protection, 2020
CANTransfer: transfer learning based intrusion detection on a controller area network using convolutional LSTM network.
Proceedings of the SAC '20: The 35th ACM/SIGAPP Symposium on Applied Computing, online event, [Brno, Czech Republic], March 30, 2020
Proceedings of the Machine Learning and Knowledge Discovery in Databases: Applied Data Science Track, 2020
Reconstructing the Past: Applying Deep Learning to Reconstruct Pottery from Thousands Shards.
Proceedings of the Machine Learning and Knowledge Discovery in Databases. Applied Data Science and Demo Track, 2020
Proceedings of the 37th International Conference on Machine Learning, 2020
Proceedings of the Financial Cryptography and Data Security, 2020
Proceedings of the 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2020
Who is Delivering My Food?: Detecting Food Delivery Abusers using Variational Reward Inference Networks.
Proceedings of the CIKM '20: The 29th ACM International Conference on Information and Knowledge Management, 2020
ITAD: Integrative Tensor-based Anomaly Detection System for Reducing False Positives of Satellite Systems.
Proceedings of the CIKM '20: The 29th ACM International Conference on Information and Knowledge Management, 2020
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020
Proceedings of the Information Security and Privacy - 25th Australasian Conference, 2020
Proceedings of the Computer Vision - ACCV 2020 - 15th Asian Conference on Computer Vision, Kyoto, Japan, November 30, 2020
2019
You Walk, We Authenticate: Lightweight Seamless Authentication Based on Gait in Wearable IoT Systems.
IEEE Access, 2019
What is in Your Password? Analyzing Memorable and Secure Passwords using a Tensor Decomposition.
Proceedings of the World Wide Web Conference, 2019
Proceedings of the 34th ACM/SIGAPP Symposium on Applied Computing, 2019
Proceedings of the 17th Annual International Conference on Mobile Systems, 2019
Detecting Anomalies in Space using Multivariate Convolutional LSTM with Mixtures of Probabilistic PCA.
Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining, 2019
FakeTalkerDetect: Effective and Practical Realistic Neural Talking Head Detection with a Highly Unbalanced Dataset.
Proceedings of the 2019 IEEE/CVF International Conference on Computer Vision Workshops, 2019
Proceedings of the 5th IEEE International Conference on Collaboration and Internet Computing, 2019
Deep Learning for Blast Furnaces: Skip-Dense Layers Deep Learning Model to Predict the Remaining Time to Close Tap-holes for Blast Furnaces.
Proceedings of the 28th ACM International Conference on Information and Knowledge Management, 2019
Understanding Users' Risk Perceptions about Personal Health Records Shared on Social Networking Services.
Proceedings of the 2019 ACM Asia Conference on Computer and Communications Security, 2019
Nickel to Lego: Using Foolgle</> to Create Adversarial Examples to Fool Google Cloud Speech-to-Text API.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
Proceedings of the 2019 IEEE International Conference on Big Data (IEEE BigData), 2019
2018
When George Clooney Is Not George Clooney: Using GenAttack to Deceive Amazon's and Naver's Celebrity Recognition APIs.
Proceedings of the ICT Systems Security and Privacy Protection, 2018
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2018
Proceedings of the Information and Operational Technology Security Systems, 2018
Proceedings of the 2018 CHI Conference on Human Factors in Computing Systems, 2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
Proceedings of the 2nd International Workshop on Multimedia Privacy and Security, 2018
POSTER: I Can't Hear This Because I Am Human: A Novel Design of Audio CAPTCHA System.
Proceedings of the 2018 on Asia Conference on Computer and Communications Security, 2018
2016
Proceedings of the Information Security Applications - 17th International Workshop, 2016
Proceedings of the INLG 2016, 2016
Proceedings of the 32nd Annual Conference on Computer Security Applications, 2016
2014
Proceedings of the 23rd International World Wide Web Conference, 2014
2011
Proceedings of the Global Communications Conference, 2011
2009
Efficient File Sharing by Multicast - P2P Protocol using Network Coding and Rank Based Peer Selection.
Proceedings of the 69th IEEE Vehicular Technology Conference, 2009
2008
Proceedings of the 42nd Annual Conference on Information Sciences and Systems, 2008