What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Ting Wang
Google Scholar
ORCID:
0000-0003-4927-5833
46
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/uss
Watch the Watchers! On the Security Risks of Robustness-Enhancing Diffusion Models.
Changjiang Li
Ren Pang
Bochuan Cao
Jinghui Chen
Fenglong Ma
Shouling Ji
Ting Wang
2024
journals/tifs
AdvSQLi: Generating Adversarial SQL Injections Against Real-World WAF-as-a-Service.
Zhenqing Qu
Xiang Ling
Ting Wang
Xiang Chen
Shouling Ji
Chunming Wu
2024
journals/tifs
HashVFL: Defending Against Data Reconstruction Attacks in Vertical Federated Learning.
Pengyu Qiu
Xuhong Zhang
Shouling Ji
Chong Fu
Xing Yang
Ting Wang
2024
conf/uss
On the Difficulty of Defending Contrastive Learning against Backdoor Attacks.
Changjiang Li
Ren Pang
Bochuan Cao
Zhaohan Xi
Jinghui Chen
Shouling Ji
Ting Wang
2024
conf/asiaccs
Model Extraction Attacks Revisited.
Jiacheng Liang
Ren Pang
Changjiang Li
Ting Wang
2024
conf/ndss
Improving the Robustness of Transformer-based Large Language Models with Dynamic Attention.
Lujia Shen
Yuwen Pu
Shouling Ji
Changjiang Li
Xuhong Zhang
Chunpeng Ge
Ting Wang
2023
conf/ccs
Demystifying DeFi MEV Activities in Flashbots Bundle.
Zihao Li
Jianfeng Li
Zheyuan He
Xiapu Luo
Ting Wang
Xiaoze Ni
Wenwu Yang
Xi Chen
Ting Chen
2023
conf/uss
FreeEagle: Detecting Complex Neural Trojans in Data-Free Cases.
Chong Fu
Xuhong Zhang
Shouling Ji
Ting Wang
Peng Lin
Yanghe Feng
Jianwei Yin
2023
conf/uss
AIRS: Explanation for Deep Reinforcement Learning based Security Applications.
Jiahao Yu
Wenbo Guo
Qi Qin
Gang Wang
Ting Wang
Xinyu Xing
2023
conf/uss
On the Security Risks of Knowledge Graph Reasoning.
Zhaohan Xi
Tianyu Du
Changjiang Li
Ren Pang
Shouling Ji
Xiapu Luo
Xusheng Xiao
Fenglong Ma
Ting Wang
2022
conf/ccs
"Is your explanation stable?": A Robustness Evaluation Framework for Feature Attribution.
Yuyou Gan
Yuhao Mao
Xuhong Zhang
Shouling Ji
Yuwen Pu
Meng Han
Jianwei Yin
Ting Wang
2022
conf/uss
Towards Automatically Reverse Engineering Vehicle Diagnostic Protocols.
Le Yu
Yangyang Liu
Pengfei Jing
Xiapu Luo
Lei Xue
Kaifa Zhao
Yajin Zhou
Ting Wang
Guofei Gu
Sen Nie
Shi Wu
2022
conf/uss
On the Security Risks of AutoML.
Ren Pang
Zhaohan Xi
Shouling Ji
Xiapu Luo
Ting Wang
2022
conf/uss
Back-Propagating System Dependency Impact for Attack Investigation.
Pengcheng Fang
Peng Gao
Changlin Liu
Erman Ayday
Kangkook Jee
Ting Wang
Yanfang (Fanny) Ye
Zhuotao Liu
Xusheng Xiao
2022
conf/uss
FOAP: Fine-Grained Open-World Android App Fingerprinting.
Jianfeng Li
Hao Zhou
Shuohan Wu
Xiapu Luo
Ting Wang
Xian Zhan
Xiaobo Ma
2022
conf/uss
Seeing is Living? Rethinking the Security of Facial Liveness Verification in the Deepfake Era.
Changjiang Li
Li Wang
Shouling Ji
Xuhong Zhang
Zhaohan Xi
Shanqing Guo
Ting Wang
2022
conf/uss
Label Inference Attacks Against Vertical Federated Learning.
Chong Fu
Xuhong Zhang
Shouling Ji
Jinyin Chen
Jingzheng Wu
Shanqing Guo
Jun Zhou
Alex X. Liu
Ting Wang
2022
conf/sp
Transfer Attacks Revisited: A Large-Scale Empirical Study in Real Computer Vision Settings.
Yuhao Mao
Chong Fu
Saizhuo Wang
Shouling Ji
Xuhong Zhang
Zhenguang Liu
Jun Zhou
Alex X. Liu
Raheem Beyah
Ting Wang
2022
conf/eurosp
TrojanZoo: Towards Unified, Holistic, and Practical Evaluation of Neural Backdoors.
Ren Pang
Zheng Zhang
Xiangshan Gao
Zhaohan Xi
Shouling Ji
Peng Cheng
Xiapu Luo
Ting Wang
2022
conf/eurosp
Towards Fair and Robust Classification.
Haipei Sun
Kun Wu
Ting Wang
Wendy Hui Wang
2022
conf/ndss
Packet-Level Open-World App Fingerprinting on Wireless Traffic.
Jianfeng Li
Shuohan Wu
Hao Zhou
Xiapu Luo
Ting Wang
Yangyang Liu
Xiaobo Ma
2022
conf/ndss
Uncovering Cross-Context Inconsistent Access Control Enforcement in Android.
Hao Zhou
Haoyu Wang
Xiapu Luo
Ting Chen
Yajin Zhou
Ting Wang
2021
conf/ccs
Backdoor Pre-trained Models Can Transfer to All.
Lujia Shen
Shouling Ji
Xuhong Zhang
Jinfeng Li
Jing Chen
Jie Shi
Chengfang Fang
Jianwei Yin
Ting Wang
2021
conf/ccs
Cert-RNN: Towards Certifying the Robustness of Recurrent Neural Networks.
Tianyu Du
Shouling Ji
Lujia Shen
Yao Zhang
Jinfeng Li
Jie Shi
Chengfang Fang
Jianwei Yin
Raheem Beyah
Ting Wang
2021
conf/uss
UNIFUZZ: A Holistic and Pragmatic Metrics-Driven Platform for Evaluating Fuzzers.
Yuwei Li
Shouling Ji
Yuan Chen
Sizhuang Liang
Wei-Han Lee
Yueyao Chen
Chenyang Lyu
Chunming Wu
Raheem Beyah
Peng Cheng
Kangjie Lu
Ting Wang
2021
conf/uss
Too Good to Be Safe: Tricking Lane Detection in Autonomous Driving with Crafted Perturbations.
Pengfei Jing
Qiyi Tang
Yuefeng Du
Lei Xue
Xiapu Luo
Ting Wang
Sen Nie
Shi Wu
2021
conf/uss
Graph Backdoor.
Zhaohan Xi
Ren Pang
Shouling Ji
Ting Wang
2021
conf/eurosp
Trojaning Language Models for Fun and Profit.
Xinyang Zhang
Zheng Zhang
Shouling Ji
Ting Wang
2020
journals/tifs
AsgLDP: Collecting and Generating Decentralized Attributed Graphs With Local Differential Privacy.
Chengkun Wei
Shouling Ji
Changchang Liu
Wenzhi Chen
Ting Wang
2020
conf/ccs
Text Captcha Is Dead? A Large Scale Deployment and Empirical Study.
Chenghui Shi
Shouling Ji
Qianjun Liu
Changchang Liu
Yuefeng Chen
Yuan He
Zhe Liu
Raheem Beyah
Ting Wang
2020
conf/ccs
SirenAttack: Generating Adversarial Audio for End-to-End Acoustic Systems.
Tianyu Du
Shouling Ji
Jinfeng Li
Qinchen Gu
Ting Wang
Raheem Beyah
2020
conf/ccs
A Tale of Evil Twins: Adversarial Inputs versus Poisoned Models.
Ren Pang
Hua Shen
Xinyang Zhang
Shouling Ji
Yevgeniy Vorobeychik
Xiapu Luo
Alex X. Liu
Ting Wang
2020
conf/uss
TextShield: Robust Text Classification Based on Multimodal Embedding and Neural Machine Translation.
Jinfeng Li
Tianyu Du
Shouling Ji
Rong Zhang
Quan Lu
Min Yang
Ting Wang
2020
conf/uss
Interpretable Deep Learning under Fire.
Xinyang Zhang
Ningfei Wang
Hua Shen
Shouling Ji
Xiapu Luo
Ting Wang
2019
conf/ccs
TokenScope: Automatically Detecting Inconsistent Behaviors of Cryptocurrency Tokens in Ethereum.
Ting Chen
Yufei Zhang
Zihao Li
Xiapu Luo
Ting Wang
Rong Cao
Xiuzhuo Xiao
Xiaosong Zhang
2019
conf/sp
DEEPSEC: A Uniform Platform for Security Analysis of Deep Learning Model.
Xiang Ling
Shouling Ji
Jiaxu Zou
Jiannan Wang
Chunming Wu
Bo Li
Ting Wang
2019
conf/ndss
TextBugger: Generating Adversarial Text Against Real-world Applications.
Jinfeng Li
Shouling Ji
Tianyu Du
Bo Li
Ting Wang
2018
conf/ccs
Integration of Static and Dynamic Code Stylometry Analysis for Programmer De-anonymization.
Ningfei Wang
Shouling Ji
Ting Wang
2018
conf/ccs
Towards Understanding the Dynamics of Adversarial Attacks.
Yujie Ji
Ting Wang
2018
conf/ccs
Model-Reuse Attacks on Deep Learning Systems.
Yujie Ji
Xinyang Zhang
Shouling Ji
Xiapu Luo
Ting Wang
2018
conf/ccs
Towards Evaluating the Security of Real-World Deployed Image CAPTCHAs.
Binbin Zhao
Haiqin Weng
Shouling Ji
Jianhai Chen
Ting Wang
Qinming He
Reheem Beyah
2017
conf/cns
Backdoor attacks against learning systems.
Yujie Ji
Xinyang Zhang
Ting Wang
2016
conf/dsn
BAYWATCH: Robust Beaconing Detection to Identify Infected Hosts in Large-Scale Enterprise Networks.
Xin Hu
Jiyong Jang
Marc Ph. Stoecklin
Ting Wang
Douglas Lee Schales
Dhilung Kirat
Josyula R. Rao
2015
conf/acsac
PARS: A Uniform and Open-source Password Analysis and Research System.
Shouling Ji
Shukun Yang
Ting Wang
Changchang Liu
Wei-Han Lee
Raheem A. Beyah
2014
conf/sp
Asset Risk Scoring in Enterprise Network with Mutually Reinforced Reputation Propagation.
Xin Hu
Ting Wang
Marc Ph. Stoecklin
Douglas Lee Schales
Jiyong Jang
Reiner Sailer
2014
conf/acsac
Lightweight authentication of freshness in outsourced key-value stores.
Yuzhe Richard Tang
Ting Wang
Ling Liu
Xin Hu
Jiyong Jang
Coauthors
Alex X. Liu
(3)
Binbin Zhao
(1)
Bo Li
(2)
Bochuan Cao
(2)
Changchang Liu
(3)
Changjiang Li
(6)
Changlin Liu
(1)
Chengfang Fang
(2)
Chenghui Shi
(1)
Chengkun Wei
(1)
Chenyang Lyu
(1)
Chong Fu
(4)
Chunming Wu
(3)
Chunpeng Ge
(1)
Dhilung Kirat
(1)
Douglas Lee Schales
(2)
Erman Ayday
(1)
Fenglong Ma
(2)
Gang Wang
(1)
Guofei Gu
(1)
Haipei Sun
(1)
Haiqin Weng
(1)
Hao Zhou
(3)
Haoyu Wang
(1)
Hua Shen
(2)
Jiacheng Liang
(1)
Jiahao Yu
(1)
Jianfeng Li
(3)
Jianhai Chen
(1)
Jiannan Wang
(1)
Jianwei Yin
(4)
Jiaxu Zou
(1)
Jie Shi
(2)
Jinfeng Li
(5)
Jing Chen
(1)
Jinghui Chen
(2)
Jingzheng Wu
(1)
Jinyin Chen
(1)
Jiyong Jang
(3)
Josyula R. Rao
(1)
Jun Zhou
(2)
Kaifa Zhao
(1)
Kangjie Lu
(1)
Kangkook Jee
(1)
Kun Wu
(1)
Le Yu
(1)
Lei Xue
(2)
Li Wang
(1)
Ling Liu
(1)
Lujia Shen
(3)
Marc Ph. Stoecklin
(2)
Meng Han
(1)
Min Yang
(1)
Ningfei Wang
(2)
Peng Cheng
(2)
Peng Gao
(1)
Peng Lin
(1)
Pengcheng Fang
(1)
Pengfei Jing
(2)
Pengyu Qiu
(1)
Qi Qin
(1)
Qianjun Liu
(1)
Qinchen Gu
(1)
Qinming He
(1)
Qiyi Tang
(1)
Quan Lu
(1)
Raheem A. Beyah
(1)
Raheem Beyah
(5)
Reheem Beyah
(1)
Reiner Sailer
(1)
Ren Pang
(8)
Rong Cao
(1)
Rong Zhang
(1)
Saizhuo Wang
(1)
Sen Nie
(2)
Shanqing Guo
(2)
Shi Wu
(2)
Shouling Ji
(30)
Shukun Yang
(1)
Shuohan Wu
(2)
Sizhuang Liang
(1)
Tianyu Du
(5)
Ting Chen
(3)
Ting Wang
(46)
Wei-Han Lee
(2)
Wenbo Guo
(1)
Wendy Hui Wang
(1)
Wenwu Yang
(1)
Wenzhi Chen
(1)
Xi Chen
(1)
Xian Zhan
(1)
Xiang Chen
(1)
Xiang Ling
(2)
Xiangshan Gao
(1)
Xiaobo Ma
(2)
Xiaosong Zhang
(1)
Xiaoze Ni
(1)
Xiapu Luo
(13)
Xin Hu
(3)
Xing Yang
(1)
Xinyang Zhang
(5)
Xinyu Xing
(1)
Xiuzhuo Xiao
(1)
Xuhong Zhang
(8)
Xusheng Xiao
(2)
Yajin Zhou
(2)
Yanfang (Fanny) Ye
(1)
Yanghe Feng
(1)
Yangyang Liu
(2)
Yao Zhang
(1)
Yevgeniy Vorobeychik
(1)
Yuan Chen
(1)
Yuan He
(1)
Yuefeng Chen
(1)
Yuefeng Du
(1)
Yueyao Chen
(1)
Yufei Zhang
(1)
Yuhao Mao
(2)
Yujie Ji
(3)
Yuwei Li
(1)
Yuwen Pu
(2)
Yuyou Gan
(1)
Yuzhe Richard Tang
(1)
Zhaohan Xi
(6)
Zhe Liu
(1)
Zheng Zhang
(2)
Zhenguang Liu
(1)
Zhenqing Qu
(1)
Zheyuan He
(1)
Zhuotao Liu
(1)
Zihao Li
(2)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to