What a lovely hat
Is it made out of
tin foil
?
DBLP data
CryptoDB
Cryptobib
Wenbo Guo
Google Scholar
ORCID:
0000-0002-6890-4503
15
publications in security and cryptology related venues
Year
Venue
Title
2025
conf/uss
Mind the Inconspicuous: Revealing the Hidden Weakness in Aligned LLMs' Refusal Boundaries.
Jiahao Yu
Haozheng Luo
Jerry Yao-Chieh Hu
Yan Chen
Wenbo Guo
Han Liu
Xinyu Xing
2024
conf/ccs
FORAY: Towards Effective Attack Synthesis against Deep Logical Vulnerabilities in DeFi Protocols.
Hongbo Wen
Hanzhi Liu
Jiaxin Song
Yanju Chen
Wenbo Guo
Yu Feng
2024
conf/uss
GuideEnricher: Protecting the Anonymity of Ethereum Mixing Service Users with Deep Reinforcement Learning.
Ravindu De Silva
Wenbo Guo
Nicola Ruaro
Ilya Grishchenko
Christopher Kruegel
Giovanni Vigna
2024
conf/ndss
TextGuard: Provable Defense against Backdoor Attacks on Text Classification.
Hengzhi Pei
Jinyuan Jia
Wenbo Guo
Bo Li
Dawn Song
2023
conf/ccs
In Search of netUnicorn: A Data-Collection Platform to Develop Generalizable ML Models for Network Security Problems.
Roman Beltiukov
Wenbo Guo
Arpit Gupta
Walter Willinger
2023
conf/uss
PATROL: Provable Defense against Adversarial Policy in Two-player Games.
Wenbo Guo
Xian Wu
Lun Wang
Xinyu Xing
Dawn Song
2023
conf/uss
Unique Identification of 50, 000+ Virtual Reality Users from Head & Hand Motion Data.
Vivek Nair
Wenbo Guo
Justus Mattern
Rui Wang
James F. O'Brien
Louis B. Rosenberg
Dawn Song
2023
conf/uss
AIRS: Explanation for Deep Reinforcement Learning based Security Applications.
Jiahao Yu
Wenbo Guo
Qi Qin
Gang Wang
Ting Wang
Xinyu Xing
2023
conf/sp
From Grim Reality to Practical Solution: Malware Classification in Real-World Noise.
Xian Wu
Wenbo Guo
Jia Yan
Baris Coskun
Xinyu Xing
2021
conf/uss
CADE: Detecting and Explaining Concept Drift Samples for Security Applications.
Limin Yang
Wenbo Guo
Qingying Hao
Arridhana Ciptadi
Ali Ahmadzadeh
Xinyu Xing
Gang Wang
2021
conf/uss
Adversarial Policy Training against Deep Reinforcement Learning.
Xian Wu
Wenbo Guo
Hua Wei
Xinyu Xing
2021
conf/ndss
FARE: Enabling Fine-grained Attack Categorization under Low-quality Labeled Data.
Junjie Liang
Wenbo Guo
Tongbo Luo
Vasant G. Honavar
Gang Wang
Xinyu Xing
2019
conf/uss
DEEPVSA: Facilitating Value-set Analysis with Deep Learning for Postmortem Program Analysis.
Wenbo Guo
Dongliang Mu
Xinyu Xing
Min Du
Dawn Song
2019
conf/uss
Towards the Detection of Inconsistencies in Public Security Vulnerability Reports.
Ying Dong
Wenbo Guo
Yueqi Chen
Xinyu Xing
Yuqing Zhang
Gang Wang
2018
conf/ccs
LEMNA: Explaining Deep Learning based Security Applications.
Wenbo Guo
Dongliang Mu
Jun Xu
Purui Su
Gang Wang
Xinyu Xing
Coauthors
Ali Ahmadzadeh
(1)
Arpit Gupta
(1)
Arridhana Ciptadi
(1)
Baris Coskun
(1)
Bo Li
(1)
Christopher Kruegel
(1)
Dawn Song
(4)
Dongliang Mu
(2)
Gang Wang
(5)
Giovanni Vigna
(1)
Han Liu
(1)
Hanzhi Liu
(1)
Haozheng Luo
(1)
Hengzhi Pei
(1)
Hongbo Wen
(1)
Hua Wei
(1)
Ilya Grishchenko
(1)
James F. O'Brien
(1)
Jerry Yao-Chieh Hu
(1)
Jia Yan
(1)
Jiahao Yu
(2)
Jiaxin Song
(1)
Jinyuan Jia
(1)
Jun Xu
(1)
Junjie Liang
(1)
Justus Mattern
(1)
Limin Yang
(1)
Louis B. Rosenberg
(1)
Lun Wang
(1)
Min Du
(1)
Nicola Ruaro
(1)
Purui Su
(1)
Qi Qin
(1)
Qingying Hao
(1)
Ravindu De Silva
(1)
Roman Beltiukov
(1)
Rui Wang
(1)
Ting Wang
(1)
Tongbo Luo
(1)
Vasant G. Honavar
(1)
Vivek Nair
(1)
Walter Willinger
(1)
Wenbo Guo
(15)
Xian Wu
(3)
Xinyu Xing
(10)
Yan Chen
(1)
Yanju Chen
(1)
Ying Dong
(1)
Yu Feng
(1)
Yueqi Chen
(1)
Yuqing Zhang
(1)
Filters
Crypto
Eurocrypt
Asiacrypt
Public Key Cryptography
Theory of Cryptography
Journal of Cryptology
Transactions on Symmetric Cryptology
Transactions on Cryptographic Hardware and Embedded Computing
Communications in Cryptology
Fast Software Encryption
Cryptographic Hardware and Embedded Computing Conference
Usenix Security
IEEE Security and Privacy
ACM CCS
Network and Distributed System Security
Financial cryptography
Cryptographer's Track at RSA Conference (CT-RSA)
ESORICS
IEEE Transactions on Information Forensics and Security
Computers & Security
Journal of Information Security and Applications
IEEE Conference on Blockchains and Cryptocurrency (ICBC)
Asia CCS
European Security & privacy
Symposium on Useful Privacy and Security
Privacy Enhancing Technologies
Security and Privacy in Communication Networks
Cryptology and Network Security
Annual Computer Security Applications Conference
Dependable Systems and Networks
IEEE Computer Security Foundations Workshop
IEEE Conference and Communications and Network Security
International Conference on Applied Cryptography and Network Security
Selected Areas in Cryptology
International Conference on Information Security and Cryptology (ICISC)
International Conference on Information and Communication (ICICS)
IFIP International Information Security Conference (SEC)
Conference on Security and Privacy in Wireless and Mobile Networks (WISEC)
IEEE International Symposium on Hardware Oriented Security and Trust
New Security Paradigms Workshop
Information Hiding and Multimedia Security Workshop
Australasian Conference on Information Security and Privacy
AfricaCrypt
LatinCrypt
International Conference on Cyber Security and Resilience
Asia Joint Conference on information Security
International Conference on information Security Applications
ACM Asia Public-Key Cryptography Workshop
International Workshop on Lightweight Cryptography for Security and Privacy
Workshop on Fault Detection and Tolerance in Cryptography
International Conference on Blockchain Technology and Emerging Technologies
Provable Security
Cloud Computing Security Workshop (CCSW)
International Workshop on Security (IWSEC)
International Conference on Information System Security (ICISS)
Select all
Unselect all
Years:
to