Ting Wang
Orcid: 0000-0003-4927-5833Affiliations:
- Pennsylvania State University, University Park, PA, USA
- Lehigh University, Bethlehem, PA, USA (former)
- IBM Research Center, Yorktown Heights, NY, USA (former)
- Georgia Institute of Technology, Atlanta, GA, USA (PhD)
According to our database1,
Ting Wang
authored at least 153 papers
between 2008 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on alpslab.ai
-
on orcid.org
-
on ist.psu.edu
-
on dl.acm.org
On csauthors.net:
Bibliography
2024
Frontiers Inf. Technol. Electron. Eng., March, 2024
IEEE Trans. Inf. Forensics Secur., 2024
HashVFL: Defending Against Data Reconstruction Attacks in Vertical Federated Learning.
IEEE Trans. Inf. Forensics Secur., 2024
IEEE Trans. Dependable Secur. Comput., 2024
CoRR, 2024
Rethinking the Vulnerabilities of Face Recognition Systems:From a Practical Perspective.
CoRR, 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
Proceedings of the 2024 SIAM International Conference on Data Mining, 2024
Automated Fusion of Multimodal Electronic Health Records for Better Medical Predictions.
Proceedings of the 2024 SIAM International Conference on Data Mining, 2024
Improving the Robustness of Transformer-based Large Language Models with Dynamic Attention.
Proceedings of the 31st Annual Network and Distributed System Security Symposium, 2024
Proceedings of the Twelfth International Conference on Learning Representations, 2024
BIPEFT: Budget-Guided Iterative Search for Parameter Efficient Fine-Tuning of Large Pretrained Language Models.
Proceedings of the Findings of the Association for Computational Linguistics: EMNLP 2024, 2024
Proceedings of the CHI Conference on Human Factors in Computing Systems, 2024
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024
VQAttack: Transferable Adversarial Attacks on Visual Question Answering via Pre-trained Models.
Proceedings of the Thirty-Eighth AAAI Conference on Artificial Intelligence, 2024
2023
J. Biomed. Informatics, November, 2023
IEEE Trans. Dependable Secur. Comput., 2023
IEEE Trans. Dependable Secur. Comput., 2023
IACR Cryptol. ePrint Arch., 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
UniT: A Unified Look at Certified Robust Training against Text Adversarial Perturbation.
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023
IMPRESS: Evaluating the Resilience of Imperceptible Perturbations Against Unauthorized Data Usage in Diffusion-Based Generative AI.
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023
VLATTACK: Multimodal Adversarial Attacks on Vision-Language Tasks via Pre-trained Models.
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023
Proceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2023
Proceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2023
Proceedings of the Eleventh International Conference on Learning Representations, 2023
Proceedings of the 43rd IEEE International Conference on Distributed Computing Systems, 2023
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023
Proceedings of the 2023 CHI Conference on Human Factors in Computing Systems, 2023
2022
IEEE Trans. Software Eng., 2022
Towards Certifying the Asymmetric Robustness for Neural Networks: Quantification and Applications.
IEEE Trans. Dependable Secur. Comput., 2022
DetectS ec: Evaluating the robustness of object detection models to adversarial attacks.
Int. J. Intell. Syst., 2022
All You Need Is Hashing: Defending Against Data Reconstruction Attack in Vertical Federated Learning.
CoRR, 2022
Confidence Matters: Inspecting Backdoors in Deep Neural Networks via Distribution Transfer.
CoRR, 2022
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the 31st USENIX Security Symposium, 2022
Seeing is Living? Rethinking the Security of Facial Liveness Verification in the Deepfake Era.
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the 31st USENIX Security Symposium, 2022
Proceedings of the 31st USENIX Security Symposium, 2022
Transfer Attacks Revisited: A Large-Scale Empirical Study in Real Computer Vision Settings.
Proceedings of the 43rd IEEE Symposium on Security and Privacy, 2022
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022
Proceedings of the KDD '22: The 28th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, Washington, DC, USA, August 14, 2022
Proceedings of the ISSTA '22: 31st ACM SIGSOFT International Symposium on Software Testing and Analysis, Virtual Event, South Korea, July 18, 2022
Proceedings of the IEEE International Conference on Data Mining, 2022
Proceedings of the 7th IEEE European Symposium on Security and Privacy, 2022
Proceedings of the 7th IEEE European Symposium on Security and Privacy, 2022
Proceedings of the Computer Vision - ECCV 2022, 2022
"Is your explanation stable?": A Robustness Evaluation Framework for Feature Attribution.
Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, 2022
MedAttacker: Exploring Black-Box Adversarial Attacks on Risk Prediction Models in Healthcare.
Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, 2022
Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, 2022
Proceedings of the Thirty-Sixth AAAI Conference on Artificial Intelligence, 2022
2021
MedAttacker: Exploring Black-Box Adversarial Attacks on Risk Prediction Models in Healthcare.
CoRR, 2021
Proceedings of the 30th USENIX Security Symposium, 2021
Too Good to Be Safe: Tricking Lane Detection in Autonomous Driving with Crafted Perturbations.
Proceedings of the 30th USENIX Security Symposium, 2021
Proceedings of the 36th IEEE/ACM International Conference on Automated Software Engineering, 2021
Proceedings of the IEEE European Symposium on Security and Privacy, 2021
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
Proceedings of the CCS '21: 2021 ACM SIGSAC Conference on Computer and Communications Security, Virtual Event, Republic of Korea, November 15, 2021
Proceedings of the Thirty-Fifth AAAI Conference on Artificial Intelligence, 2021
2020
AsgLDP: Collecting and Generating Decentralized Attributed Graphs With Local Differential Privacy.
IEEE Trans. Inf. Forensics Secur., 2020
IET Comput. Vis., 2020
TROJANZOO: Everything you ever wanted to know about neural backdoors (but were afraid to ask).
CoRR, 2020
Proceedings of the 29th USENIX Security Symposium, 2020
TextShield: Robust Text Classification Based on Multimodal Embedding and Neural Machine Translation.
Proceedings of the 29th USENIX Security Symposium, 2020
Proceedings of the KDD '20: The 26th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2020
Proceedings of the 35th IEEE/ACM International Conference on Automated Software Engineering, 2020
Proceedings of the 35th IEEE/ACM International Conference on Automated Software Engineering, 2020
Proceedings of the 36th IEEE International Conference on Data Engineering, 2020
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020
2019
IEEE Trans. Dependable Secur. Comput., 2019
Towards understanding the security of modern image captchas and underground captcha-solving services.
Big Data Min. Anal., 2019
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019
Proceedings of the 26th Annual Network and Distributed System Security Symposium, 2019
Proceedings of the 35th IEEE International Conference on Data Engineering, 2019
Proceedings of the 2019 ACM/IEEE International Symposium on Empirical Software Engineering and Measurement, 2019
TokenScope: Automatically Detecting Inconsistent Behaviors of Cryptocurrency Tokens in Ethereum.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019
2018
IEEE Trans. Knowl. Data Eng., 2018
CoRR, 2018
Proceedings of the 2018 IEEE Conference on Computer Communications, 2018
Proceedings of the 5th IEEE International Conference on Data Science and Advanced Analytics, 2018
Proceedings of the 11th ACM Workshop on Artificial Intelligence and Security, 2018
Integration of Static and Dynamic Code Stylometry Analysis for Programmer De-anonymization.
Proceedings of the 11th ACM Workshop on Artificial Intelligence and Security, 2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
2017
CoRR, 2017
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017
Pairwise Ranking Aggregation by Non-interactive Crowdsourcing with Budget Constraints.
Proceedings of the 37th IEEE International Conference on Distributed Computing Systems, 2017
Proceedings of the 2017 IEEE Conference on Communications and Network Security, 2017
2016
Scalable analytics to detect DNS misuse for establishing stealthy communication channels.
IBM J. Res. Dev., 2016
Scalable malware classification with multifaceted content features and threat intelligence.
IBM J. Res. Dev., 2016
Hunting for invisibility: Characterizing and detecting malicious web infrastructures through server visibility analysis.
Proceedings of the 35th Annual IEEE International Conference on Computer Communications, 2016
Proceedings of the 36th IEEE International Conference on Distributed Computing Systems, 2016
BAYWATCH: Robust Beaconing Detection to Identify Infected Hosts in Large-Scale Enterprise Networks.
Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2016
Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, 2016
Proceedings of the 25th ACM International Conference on Information and Knowledge Management, 2016
2015
IEEE Trans. Knowl. Data Eng., 2015
Proceedings of the IEEE International Symposium on Information Theory, 2015
FCCE: Highly scalable distributed Feature Collection and Correlation Engine for low latency big data analytics.
Proceedings of the 31st IEEE International Conference on Data Engineering, 2015
Proceedings of the 31st Annual Computer Security Applications Conference, 2015
2014
MUSE: asset risk scoring in enterprise network with mutually reinforced reputation propagation.
EURASIP J. Inf. Secur., 2014
Asset Risk Scoring in Enterprise Network with Mutually Reinforced Reputation Propagation.
Proceedings of the 35. IEEE Security and Privacy Workshops, 2014
Proceedings of the 2014 SIAM International Conference on Data Mining, 2014
Proceedings of the 20th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2014
Proceedings of the 15th IEEE International Conference on Information Reuse and Integration, 2014
On Exploiting Dynamic Execution Patterns for Workload Offloading in Mobile Cloud Applications.
Proceedings of the 22nd IEEE International Conference on Network Protocols, 2014
Proceedings of the Workshops Proceedings of the 30th International Conference on Data Engineering Workshops, 2014
Proceedings of the IEEE 30th International Conference on Data Engineering, Chicago, 2014
Proceedings of the 23rd ACM International Conference on Conference on Information and Knowledge Management, 2014
Proceedings of the 30th Annual Computer Security Applications Conference, 2014
2013
Proceedings of the ACM Symposium on Cloud Computing, SOCC '13, 2013
2012
Proceedings of the Twelfth SIAM International Conference on Data Mining, 2012
Proceedings of the 17th ACM Symposium on Access Control Models and Technologies, 2012
2011
Proceedings of the 16th ACM Symposium on Access Control Models and Technologies, 2011
Proceedings of the 20th ACM Conference on Information and Knowledge Management, 2011
2010
Proceedings of the 26th International Conference on Data Engineering, 2010
Proceedings of the 26th International Conference on Data Engineering, 2010
Proceedings of the 2010 ACM Conference on Emerging Networking Experiments and Technology, 2010
2009
Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Paris, France, June 28, 2009
Proceedings of the 25th International Conference on Data Engineering, 2009
2008
Proceedings of the 17th International Conference on World Wide Web, 2008
Proceedings of the 2008 IEEE International Conference on Web Services (ICWS 2008), 2008
Proceedings of the 24th International Conference on Data Engineering, 2008