Ting Wang
Penn State University
H-index: 35
North America-United States
Top articles of Ting Wang
Title | Journal | Author(s) | Publication Date |
---|---|---|---|
AdvSQLi: Generating Adversarial SQL Injections against Real-world WAF-as-a-service | IEEE Transactions on Information Forensics and Security | Zhenqing Qu Xiang Ling Ting Wang Xiang Chen Shouling Ji | 2024/1/8 |
Hijack Vertical Federated Learning Models As One Party | IEEE Transactions on Dependable and Secure Computing | Pengyu Qiu Xuhong Zhang Shouling Ji Changjiang Li Yuwen Pu | 2024/1/24 |
VQAttack: Transferable Adversarial Attacks on Visual Question Answering via Pre-trained Models | arXiv preprint arXiv:2402.11083 | Ziyi Yin Muchao Ye Tianrong Zhang Jiaqi Wang Han Liu | 2024/2/16 |
Meddiffusion: Boosting health risk prediction via diffusion-based data augmentation | Yuan Zhong Suhan Cui Jiaqi Wang Xiaochen Wang Ziyi Yin | 2024 | |
UniT: A Unified Look at Certified Robust Training against Text Adversarial Perturbation | Advances in Neural Information Processing Systems | Muchao Ye Ziyi Yin Tianrong Zhang Tianyu Du Jinghui Chen | 2024/2/13 |
Improving the Robustness of Transformer-based Large Language Models with Dynamic Attention | arXiv preprint arXiv:2311.17400 | Lujia Shen Yuwen Pu Shouling Ji Changjiang Li Xuhong Zhang | 2023/11/29 |
HashVFL: Defending Against Data Reconstruction Attacks in Vertical Federated Learning | IEEE Transactions on Information Forensics and Security | Pengyu Qiu Xuhong Zhang Shouling Ji Chong Fu Xing Yang | 2024/1/19 |
On the Difficulty of Defending Contrastive Learning against Backdoor Attacks | arXiv preprint arXiv:2312.09057 | Changjiang Li Ren Pang Bochuan Cao Zhaohan Xi Jinghui Chen | 2023/12/14 |
Generative AI in the Wild: Prospects, Challenges, and Strategies | Yuan Sun Eunchae Jang Fenglong Ma Ting Wang | 2024/4/15 | |
Model Extraction Attacks Revisited | arXiv preprint arXiv:2312.05386 | Jiacheng Liang Ren Pang Changjiang Li Ting Wang | 2023/12/8 |
FreeEagle: Detecting Complex Neural Trojans in Data-Free Cases | 32nd USENIX Security Symposium (USENIX Security 23) | Chong Fu Xuhong Zhang Shouling Ji Ting Wang Peng Lin | 2023 |
Certified edge unlearning for graph neural networks | Kun Wu Jie Shen Yue Ning Ting Wang Wendy Hui Wang | 2023/8/6 | |
Demystifying defi mev activities in flashbots bundle | Zihao Li Jianfeng Li Zheyuan He Xiapu Luo Ting Wang | 2023 | |
Defending pre-trained language models as few-shot learners against backdoor attacks | Zhaohan Xi Tianyu Du Changjiang Li Ren Pang Shouling Ji | 2023/9/23 | |
On the Security Risks of Knowledge Graph Reasoning | Zhaohan Xi Tianyu Du Changjiang Li Ren Pang Shouling Ji | 2023/5/3 | |
A Change of Heart: Backdoor Attacks on Security-Centric Diffusion Models | Changjiang Li Ren Pang Bochuan Cao Jinghui Chen Ting Wang | 2023/10/13 | |
{AIRS}: Explanation for Deep Reinforcement Learning based Security Applications | Jiahao Yu Wenbo Guo Qi Qin Gang Wang Ting Wang | 2023 | |
An embarrassingly simple backdoor attack on self-supervised learning | Changjiang Li Ren Pang Zhaohan Xi Tianyu Du Shouling Ji | 2022/10/13 | |
Green federated learning over cloud-ran with limited fronthual capacity and quantized neural networks | Jiali Wang Yijie Mao Ting Wang Yuanming Shi | 2023/9/4 | |
AutoML in The Wild: Obstacles, Workarounds, and Expectations | Yuan Sun Qiurong Song Xinning Gui Fenglong Ma Ting Wang | 2023 |