What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Sheng Wen
Google Scholar
ORCID:
0000-0003-0655-666X
15
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/tifs
Hardening LLM Fine-Tuning: From Differentially Private Data Selection to Trustworthy Model Quantization.
Zehang Deng
Ruoxi Sun
Jason Xue
Wanlun Ma
Sheng Wen
Surya Nepal
Yang Xiang
2025
journals/tifs
TrapNet: Model Inversion Defense via Trapdoor.
Wanlun Ma
Derui Wang
Yiliao Song
Minhui Xue
Sheng Wen
Zhengdao Li
Yang Xiang
2025
conf/sp
Codebreaker: Dynamic Extraction Attacks on Code Language Models.
Changzhou Han
Zehang Deng
Wanlun Ma
Xiaogang Zhu
Minhui Xue
Tianqing Zhu
Sheng Wen
Yang Xiang
2024
journals/tifs
Fuzzing Android Native System Libraries via Dynamic Data Dependency Graph.
Xiaogang Zhu
Siyu Zhang
Chaoran Li
Sheng Wen
Yang Xiang
2024
conf/ndss
ShapFuzz: Efficient Fuzzing via Shapley-Guided Byte Selection.
Kunpeng Zhang
Xiaogang Zhu
Xi Xiao
Minhui Xue
Chao Zhang
Sheng Wen
2023
conf/uss
Detecting Union Type Confusion in Component Object Model.
Yuxing Zhang
Xiaogang Zhu
Daojing He
Minhui Xue
Shouling Ji
Mohammad Sayad Haghighi
Sheng Wen
Zhiniang Peng
2023
conf/sp
StyleFool: Fooling Video Classification Systems via Style Transfer.
Yuxin Cao
Xi Xiao
Ruoxi Sun
Derui Wang
Minhui Xue
Sheng Wen
2023
conf/ndss
The "Beatrix" Resurrections: Robust Backdoor Detection via Gram Matrices.
Wanlun Ma
Derui Wang
Ruoxi Sun
Minhui Xue
Sheng Wen
Yang Xiang
2021
conf/ccs
Snipuzz: Black-box Fuzzing of IoT Firmware via Message Snippet Inference.
Xiaotao Feng
Ruoxi Sun
Xiaogang Zhu
Minhui Xue
Sheng Wen
Dongxi Liu
Surya Nepal
Yang Xiang
2020
journals/tifs
Android HIV: A Study of Repackaging Malware for Evading Machine-Learning Detection.
Xiao Chen
Chaoran Li
Derui Wang
Sheng Wen
Jun Zhang
Surya Nepal
Yang Xiang
Kui Ren
2020
conf/ccs
What risk? I don't understand. An Empirical Study on Users' Understanding of the Terms Used in Security Texts.
Tingmin Wu
Rongjunchen Zhang
Wanlun Ma
Sheng Wen
Xin Xia
Cécile Paris
Surya Nepal
Yang Xiang
2019
conf/ccs
A Feature-Oriented Corpus for Understanding, Evaluating and Improving Fuzz Testing.
Xiaogang Zhu
Xiaotao Feng
Tengyun Jiao
Sheng Wen
Yang Xiang
Seyit Camtepe
Jingling Xue
2018
journals/compsec
Twitter spam detection: Survey of new approaches and comparative study.
Tingmin Wu
Sheng Wen
Yang Xiang
Wanlei Zhou
2016
journals/tifs
On the Race of Worms and Patches: Modeling the Spread of Information in Wireless Sensor Networks.
Mohammad Sayad Haghighi
Sheng Wen
Yang Xiang
Barry G. Quinn
Wanlei Zhou
2015
journals/tifs
K-Center: An Approach on the Multi-Source Identification of Information Diffusion.
Jiao Jiao Jiang
Sheng Wen
Shui Yu
Yang Xiang
Wanlei Zhou
Coauthors
Barry G. Quinn
(1)
Cécile Paris
(1)
Changzhou Han
(1)
Chao Zhang
(1)
Chaoran Li
(2)
Daojing He
(1)
Derui Wang
(4)
Dongxi Liu
(1)
Jason Xue
(1)
Jiao Jiao Jiang
(1)
Jingling Xue
(1)
Jun Zhang
(1)
Kui Ren
(1)
Kunpeng Zhang
(1)
Minhui Xue
(7)
Mohammad Sayad Haghighi
(2)
Rongjunchen Zhang
(1)
Ruoxi Sun
(4)
Seyit Camtepe
(1)
Sheng Wen
(15)
Shouling Ji
(1)
Shui Yu
(1)
Siyu Zhang
(1)
Surya Nepal
(4)
Tengyun Jiao
(1)
Tianqing Zhu
(1)
Tingmin Wu
(2)
Wanlei Zhou
(3)
Wanlun Ma
(5)
Xi Xiao
(2)
Xiao Chen
(1)
Xiaogang Zhu
(6)
Xiaotao Feng
(2)
Xin Xia
(1)
Yang Xiang
(12)
Yiliao Song
(1)
Yuxin Cao
(1)
Yuxing Zhang
(1)
Zehang Deng
(2)
Zhengdao Li
(1)
Zhiniang Peng
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to