Tingmin Wu

Orcid: 0000-0003-0626-3576

According to our database1, Tingmin Wu authored at least 26 papers between 2017 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
SAFE: Advancing Large Language Models in Leveraging Semantic and Syntactic Relationships for Software Vulnerability Detection.
CoRR, 2024

Deep Learning-Based Out-of-distribution Source Code Data Identification: How Far Have We Gone?
CoRR, 2024

A Pioneering Study and An Innovative Information Theory-based Approach to Enhance The Transparency in Phishing Detection.
CoRR, 2024

How COVID-19 impacts telehealth: an empirical study of telehealth services, users and the use of metaverse.
Connect. Sci., 2024

Utilizing Large Language Models with Human Feedback Integration for Generating Dedicated Warning for Phishing Emails.
Proceedings of the 2nd ACM Workshop on Secure and Trustworthy Deep Learning Systems, 2024

2023
SAM: Multi-turn Response Selection Based on Semantic Awareness Matching.
ACM Trans. Internet Techn., 2023

How Does Visualisation Help App Practitioners Analyse Android Apps?
IEEE Trans. Dependable Secur. Comput., 2023

Copyright Protection and Accountability of Generative AI: Attack, Watermarking and Attribution.
Proceedings of the Companion Proceedings of the ACM Web Conference 2023, 2023

Dynalogue: A Transformer-Based Dialogue System with Dynamic Attention.
Proceedings of the ACM Web Conference 2023, 2023

Investigating Users' Understanding of Privacy Policies of Virtual Personal Assistant Applications.
Proceedings of the 2023 ACM Asia Conference on Computer and Communications Security, 2023

2022
Analysis of Trending Topics and Text-based Channels of Information Delivery in Cybersecurity.
ACM Trans. Internet Techn., 2022

Profiler: Profile-Based Model to Detect Phishing Emails.
CoRR, 2022

RAIDER: Reinforcement-Aided Spear Phishing Detector.
Proceedings of the Network and System Security - 16th International Conference, 2022

Profiler: Distributed Model to Detect Phishing.
Proceedings of the 42nd IEEE International Conference on Distributed Computing Systems, 2022

Email Summarization to Assist Users in Phishing Identification.
Proceedings of the ASIA CCS '22: ACM Asia Conference on Computer and Communications Security, Nagasaki, Japan, 30 May 2022, 2022

2021
RAIDER: Reinforcement-aided Spear Phishing Detector.
CoRR, 2021

2020
What risk? I don't understand. An Empirical Study on Users' Understanding of the Terms Used in Security Texts.
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020

2019
STC: Exposing Hidden Compromised Devices in Networked Sustainable Green Smart Computing Platforms by Partial Observation.
IEEE Trans. Sustain. Comput., 2019

Catering to Your Concerns: Automatic Generation of Personalised Security-Centric Descriptions for Android Apps.
ACM Trans. Cyber Phys. Syst., 2019

Every word is valuable: Studied influence of negative words that spread during election period in social media.
Concurr. Comput. Pract. Exp., 2019

2018
Pokémon GO in Melbourne CBD: A case study of the cyber-physical symbiotic social networks.
J. Comput. Sci., 2018

Catering to Your Concerns: Automatic Generation of Personalised Security-Centric Descriptions for Android Apps.
CoRR, 2018

Twitter spam detection: Survey of new approaches and comparative study.
Comput. Secur., 2018

2017
Detecting spamming activities in twitter based on deep-learning technique.
Concurr. Comput. Pract. Exp., 2017

How Spam Features Change in Twitter and the Impact to Machine Learning Based Detection.
Proceedings of the Information Security Practice and Experience, 2017

Twitter spam detection based on deep learning.
Proceedings of the Australasian Computer Science Week Multiconference, 2017


  Loading...