What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Derui Wang
Google Scholar
ORCID:
0000-0003-1388-7715
14
publications in security and cryptology related venues
Year
Venue
Title
2025
journals/tifs
Anonymous and Efficient (t, n)-Threshold Ownership Transfer for Cloud EMRs Auditing.
Yamei Wang
Yuexin Zhang
Ayong Ye
Jian Shen
Derui Wang
Yang Xiang
2025
journals/tifs
QUEEN: Query Unlearning Against Model Extraction.
Huajie Chen
Tianqing Zhu
Lefeng Zhang
Bo Liu
Derui Wang
Wanlei Zhou
Minhui Xue
2025
journals/tifs
TrapNet: Model Inversion Defense via Trapdoor.
Wanlun Ma
Derui Wang
Yiliao Song
Minhui Xue
Sheng Wen
Zhengdao Li
Yang Xiang
2025
conf/ndss
Provably Unlearnable Data Examples.
Derui Wang
Minhui Xue
Bo Li
Seyit Camtepe
Liming Zhu
2025
conf/ndss
Reinforcement Unlearning.
Dayong Ye
Tianqing Zhu
Congcong Zhu
Derui Wang
Kun Gao
Zewei Shi
Sheng Shen
Wanlei Zhou
Minhui Xue
2025
conf/uss
SafeSpeech: Robust and Universal Voice Protection Against Malicious Speech Synthesis.
Zhisheng Zhang
Derui Wang
Qianyi Yang
Pengyang Huang
Junhan Pu
Yuxin Cao
Kai Ye
Jie Hao
Yixian Yang
2025
conf/uss
CAMP in the Odyssey: Provably Robust Reinforcement Learning with Certified Radius Maximization.
Derui Wang
Kristen Moore
Diksha Goel
Minjune Kim
Gang Li
Yang Li
Robin Doss
Minhui Xue
Bo Li
Seyit Camtepe
Liming Zhu
2025
conf/uss
Whispering Under the Eaves: Protecting User Privacy Against Commercial and LLM-powered Automatic Speech Recognition Systems.
Weifei Jin
Yuxin Cao
Junjie Su
Derui Wang
Yedi Zhang
Minhui Xue
Jie Hao
Jin Song Dong
Yixian Yang
2024
conf/sp
LocalStyleFool: Regional Video Style Transfer Attack Using Segment Anything Model.
Yuxin Cao
Jinghao Li
Xi Xiao
Derui Wang
Minhui Xue
Hao Ge
Wei Liu
Guangwu Hu
2024
conf/esorics
Optimizing Cyber Defense in Dynamic Active Directories Through Reinforcement Learning.
Diksha Goel
Kristen Moore
Mingyu Guo
Derui Wang
Minjune Kim
Seyit Camtepe
2023
conf/sp
StyleFool: Fooling Video Classification Systems via Style Transfer.
Yuxin Cao
Xi Xiao
Ruoxi Sun
Derui Wang
Minhui Xue
Sheng Wen
2023
conf/ndss
The "Beatrix" Resurrections: Robust Backdoor Detection via Gram Matrices.
Wanlun Ma
Derui Wang
Ruoxi Sun
Minhui Xue
Sheng Wen
Yang Xiang
2020
journals/tifs
Android HIV: A Study of Repackaging Malware for Evading Machine-Learning Detection.
Xiao Chen
Chaoran Li
Derui Wang
Sheng Wen
Jun Zhang
Surya Nepal
Yang Xiang
Kui Ren
2019
conf/acsac
STRIP: a defence against trojan attacks on deep neural networks.
Yansong Gao
Chang Xu
Derui Wang
Shiping Chen
Damith Chinthana Ranasinghe
Surya Nepal
Coauthors
Ayong Ye
(1)
Bo Li
(2)
Bo Liu
(1)
Chang Xu
(1)
Chaoran Li
(1)
Congcong Zhu
(1)
Damith Chinthana Ranasinghe
(1)
Dayong Ye
(1)
Derui Wang
(14)
Diksha Goel
(2)
Gang Li
(1)
Guangwu Hu
(1)
Hao Ge
(1)
Huajie Chen
(1)
Jian Shen
(1)
Jie Hao
(2)
Jin Song Dong
(1)
Jinghao Li
(1)
Jun Zhang
(1)
Junhan Pu
(1)
Junjie Su
(1)
Kai Ye
(1)
Kristen Moore
(2)
Kui Ren
(1)
Kun Gao
(1)
Lefeng Zhang
(1)
Liming Zhu
(2)
Mingyu Guo
(1)
Minhui Xue
(9)
Minjune Kim
(2)
Pengyang Huang
(1)
Qianyi Yang
(1)
Robin Doss
(1)
Ruoxi Sun
(2)
Seyit Camtepe
(3)
Sheng Shen
(1)
Sheng Wen
(4)
Shiping Chen
(1)
Surya Nepal
(2)
Tianqing Zhu
(2)
Wanlei Zhou
(2)
Wanlun Ma
(2)
Wei Liu
(1)
Weifei Jin
(1)
Xi Xiao
(2)
Xiao Chen
(1)
Yamei Wang
(1)
Yang Li
(1)
Yang Xiang
(4)
Yansong Gao
(1)
Yedi Zhang
(1)
Yiliao Song
(1)
Yixian Yang
(2)
Yuexin Zhang
(1)
Yuxin Cao
(4)
Zewei Shi
(1)
Zhengdao Li
(1)
Zhisheng Zhang
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to