Fewer is More: Trojan Attacks on Parameter-Efficient Fine-Tuning
Lauren Hong, Ting Wang
ArXiv e-prints, 2023
Differentially Private Releasing via Deep Generative Models [code]
Xinyang Zhang, Shouling Ji, Ting Wang
ArXiv e-prints, 2018
On the Difficulty of Defending Contrastive Learning against Backdoor Attacks
Changjiang Li, Ren Pang, Bochuan Cao, Zhaohan Xi, Jinghui Chen, Shouling Ji, Ting Wang
USENIX Security Symposium (Security’24)
Improving the Robustness of Transformer-based Large Language Models with Dynamic Attention
Lujia Shen, Yuwen Pu, Shouling Ji, Changjiang Li, Xuhong Zhang, Chunpeng Ge, Ting Wang
Network and Distributed System Security Symposium (NDSS’24)
Model Extraction Attacks Revisited
Jiacheng Liang, Ren Pang, Changjiang Li, Ting Wang
ACM ASIA Conference on Computer and Communications Security (ASIACCS’24)
Generative AI in the Wild: Prospects, Challenges, and Strategies
Yuan Sun, Eunchae Jang, Fenglong Ma, Ting Wang
ACM CHI Conference on Human Factors in Computing Systems (CHI’24)
ReMasker: Imputing Tabular Data with Masked Autoencoding [code]
Tianyu Du, Luca Melis, Ting Wang
International Conference on Learning Representations (ICLR’24)
Backdoor Contrastive Learning via Bi-level Trigger Optimization
Weiyu Sun, Xinyu Zhang, Hao Lu, Ying-Cong Chen, Ting Wang, Jinghui Chen, Lu Lin
International Conference on Learning Representations (ICLR’24)
PromptFix: Few-shot Backdoor Removal via Adversarial Prompt Tuning
Tianrong Zhang, Zhaohan Xi, Prasenjit Mitra, Ting Wang, Jinghui Chen
Annual Conference of the North American Chapter of the Association for Computational Linguistics (NAACL’24)
VQAttack: Transferable Adversarial Attacks on Visual Question Answering via Pre-trained Models
Ziyi Yin, Muchao Ye, Tianrong Zhang, Jiaqi Wang, Han Liu, Jinghui Chen, Ting Wang, Fenglong Ma
AAAI Conference on Artificial Intelligence (AAAI’24)
Inspecting Prediction Confidence for Detecting Black-box Backdoor Attacks
Tong Wang, Yuan Yao, Feng Xu, Miao Xu, Shengwei An, Ting Wang
AAAI Conference on Artificial Intelligence (AAAI’24)
Defending Pre-trained Language Models as Few-shot Learners against Backdoor Attacks
Zhaohan Xi, Tianyu Du, Changjiang Li, Ren Pang, Shouling Ji, Jinghui Chen, Fenglong Ma, Ting Wang
Annual Conference on Neural Information Processing Systems (NeurIPS’23)
IMPRESS: Evaluating the Resilience of Imperceptible Perturbations Against Unauthorized Data Usage in Diffusion-Based Generative AI
Bochuan Cao, Changjiang Li, Ting Wang, Jinyuan Jia, Bo Li, Jinghui Chen
Annual Conference on Neural Information Processing Systems (NeurIPS’23)
UniT: A Unified Look at Certified Robust Training against Text Adversarial Perturbation
Muchao Ye, Ziyi Yin, Tianrong Zhang, Tianyu Du, Jinghui Chen, Ting Wang, Fenglong Ma
Annual Conference on Neural Information Processing Systems (NeurIPS’23)
VLATTACK: Multimodal Adversarial Attacks on Vision-Language Tasks via Pre-trained Models
Ziyi Yin, Muchao Ye, Tianrong Zhang, Tianyu Du, Jinguo Zhu, Han Liu, Jinghui Chen, Ting Wang, Fenglong Ma
Annual Conference on Neural Information Processing Systems (NeurIPS’23)
An Embarrassingly Simple Backdoor Attack on Self-supervised Learning
Changjiang Li, Ren Pang, Zhaohan Xi, Tianyu Du, Shouling Ji, Yuan Yao, Ting Wang
International Conference on Computer Vision (ICCV’23)
The Dark Side of AutoML: Towards Architectural Backdoor Search
Ren Pang, Changjiang Li, Zhaohan Xi, Shouling Ji, Ting Wang
International Conference on Learning Representations (ICLR’23)
AutoML in the Wild: Obstacles, Workarounds, and Expectations
Yuan Sun, Qiurong Song, Xinning Gui, Fenglong Ma, Ting Wang
ACM CHI Conference on Human Factors in Computing Systems (CHI’23)
🏅Honorable Mention Award
On the Security Risks of Knowledge Graph Reasoning
Zhaohan Xi, ‘Tianyu Du, Changjiang Li, Ren Pang, Shouling Ji, Xiapu Luo, Xusheng Xiao, Fenglong Ma, Ting Wang
USENIX Security Symposium (USENIX’23)
FreeEagle: Detecting Complex Neural Trojans in Data-Free Cases
Chong Fu, Xuhong Zhang, Shouling Ji, Ting Wang, Peng Lin, Yanghe Feng, Jianwei Yin
USENIX Security Symposium (USENIX’23)
AIRS: Explanation for Deep Reinforcement Learning based Security Applications
Jiahao Yu, Wenbo Guo, Qi Qin, Gang Wang, Ting Wang, Xinyu Xing
USENIX Security Symposium (USENIX’23)
Certified Edge Unlearning for Graph Neural Networks
Kun Wu, Jie Shen, Yue Ning, Ting Wang, Wendy Hui Wang
ACM SIGKDD Conference on Knowledge Discovery and Data Mining (KDD’23)
PAT: Geometry-Aware Hard-Label Black-Box Adversarial Attacks on Text
Muchao Ye, Jinghui Chen, Chenglin Miao, Han Liu, Ting Wang, Fenglong Ma
ACM SIGKDD Conference on Knowledge Discovery and Data Mining (KDD’23)
Demystifying DeFi MEV Activities in Flashbots Bundle
Zihao Li, Jianfeng Li, Zheyuan He, Xiapu Luo, Ting Wang, Xiaoze Ni, Wenwu Yang, Xi Chen, Ting Chen
ACM Conference on Computer and Communications Security (CCS’23)
On the Security Risks of AutoML
Ren Pang, Zhaohan Xi, Shouling Ji, Xiapu Luo, Ting Wang
The 31st USENIX Security Symposium (USENIX)
Seeing is Living? Rethinking the Security of Facial Liveness Verification in the Deepfake Era
Changjiang Li, Li Wang, Shouling Ji, Xuhong Zhang, Zhaohan Xi, Shanqing Guo, Ting Wang
The 31st USENIX Security Symposium (USENIX)
Label Inference Attacks Against Vertical Federated Learning
Chong Fu, Xuhong Zhang, Shouling Ji, Jinyin Chen, Jingzheng Wu, Shanqing Guo, Jun Zhou, Alex X. Liu, Ting Wang
The 31st USENIX Security Symposium (USENIX)
Towards Automatically Reverse Engineering Vehicle Diagnostic Protocols
Le Yu, Yangyang Liu, Pengfei Jing, Xiapu Luo, Lei Xue, Kaifa Zhao, Yajin Zhou, Ting Wang, Guofei Gu, Sen Nie, Shi Wu
The 31st USENIX Security Symposium (USENIX)
Back-Propagating System Dependency Impact for Attack Investigation
Peng Gao, Changlin Liu, Erman Ayday, Kangkook Jee, Ting Wang, Yanfang (Fanny) Ye, Zhuotao Liu, Xusheng Xiao
The 31st USENIX Security Symposium (USENIX)
FOAP: Fine-Grained Open-World Android App Fingerprinting
Jianfeng Li, Hao Zhou, Shuohan Wu, Xiapu Luo, Ting Wang, Xian Zhan, Xiaobo Ma
The 31st USENIX Security Symposium (USENIX)
“Is Your Explanation Stable?”: A Robustness Evaluation Framework for Feature Attribution
Yuyou Gan, Yuhao Mao, Xuhong Zhang, Shouling Ji, Yuwen Pu, Meng Han, Jianwei Yin, Ting Wang
The 29th ACM Conference on Computer and Communications Security (CCS)
Transfer Attacks Revisited: A Large-Scale Empirical Study in Real Computer Vision Settings
Yuhao Mao, Chong Fu, Saizhuo Wang, Shouling Ji, Xuhong Zhang, Zhenguang Liu, Jun Zhou, Alex X. Liu, Raheem Beyah, Ting Wang
The 43rd IEEE Symposium on Security and Privacy (S&P)
An Invisible Black-box Backdoor Attack through Frequency Domain
Tong Wang, Yuan Yao, Feng Xu, Shengwei An, Hanghang Tong, Ting Wang
The 17th European Conference on Computer Vision (ECCV)
TrojanZoo: Towards Unified, Holistic, and Practical Evaluation of Neural Backdoors [code]
Ren Pang, Zheng Zhang, Xiangshan Gao, Zhaohan Xi, Shouling Ji, Peng Cheng, Xiapu Luo, Ting Wang
The 7th IEEE European Symposium on Security and Privacy (EuroS&P)
Towards Fair and Robust Classifiers
Haipei Sun, Kun Wu, Ting Wang, Wendy Hui Wang
The 7th IEEE European Symposium on Security and Privacy (EuroS&P)
LeapAttack: Hard-Label Adversarial Attack on Text via Gradient-Based Optimization
Muchao Ye, Jinghui Chen, Chenglin Miao, Ting Wang, Fenglong Ma
The 28th ACM SIGKDD Conference on Knowledge Discovery and Data Mining (KDD)
MedSkim: Denoised Health Risk Prediction via Skimming Medical Claims Data
Suhan Cui, Junyu Luo, Muchao Ye, Jiaqi Wang, Ting Wang, Fenglong Ma
The 22nd IEEE International Conference on Data Mining (ICDM)
TextHoaxer: Budgeted Hard-Label Adversarial Attacks on Text
Muchao Ye, Chenglin Miao, Ting Wang, Fenglong Ma
The 36th AAAI Conference on Artificial Intelligence (AAAI)
Uncovering Cross-Context Inconsistent Access Control Enforcement in Android
Hao Zhou, Haoyu Wang, Xiapu Luo, Ting Chen, Yajin Zhou, Ting Wang
The 2022 Network and Distributed System Security Symposium (NDSS)
Packet-Level Open-World App Fingerprinting on Wireless Traffic
Jianfeng Li, Shuohan Wu, Hao Zhou, Xiapu Luo, Ting Wang, Yangyang Liu, Xiaobo Ma
The 2022 Network and Distributed System Security Symposium (NDSS)
NCScope: Hardware-Assisted Analyzer for Native Code in Android Apps
Hao Zhou, Shuohan Wu, Xiapu Luo, Ting Wang, Yajin Zhou, Chao Zhang, Haipeng Cai
The 2022 International Symposium on Software Testing and Analysis (ISSTA)
🏅ACM SIGSOFT Distinguished Paper Award
Fraud-agents Detection in Online Microfinance: A Large-scale Empirical Study
Yiming Wu, Zhiyuan Xie, Shouling Ji, Zhenguang Liu, Xuhong Zhang, Changting Lin, Shuiguang Deng, Jun Zhou, Ting Wang, Raheem A Beyah
IEEE Transactions on Dependable and Secure Computing (TDSC)
Graph Backdoor
Zhaohan Xi, Ren Pang, Shouling Ji, Ting Wang
The 30th USENIX Security Symposium (USENIX)
Too Good to Be Safe: Tricking Lane Detection in Autonomous Driving with Crafted Perturbations
Pengfei Jing, Qiyi Tang, Yuefeng Du, Lei Xue, Xiapu Luo, Ting Wang, Sen Nie, Shi Wu
The 30th USENIX Security Symposium (USENIX)
UNIFUZZ: A Holistic and Pragmatic Metrics-Driven Platform for Evaluating Fuzzers
Yuwei Li, Shouling Ji, Yuan Chen, Sizhuang Liang, Wei-Han Lee, Yueyao Chen, Chenyang Lyu, Chunming Wu, Raheem Beyah, Peng Cheng, Kangjie Lu, Ting Wang
The 30th USENIX Security Symposium (USENIX)
Cert-RNN: Towards Certifying the Robustness of Recurrent Neural Networks
Tianyu Du, Shouling Ji, Lujia Shen, Yao Zhang, Jinfeng Li, Jie Shi, Chengfang Fang, Jianwei Yin, Raheem Beyah, Ting Wang
The 28th ACM Conference on Computer and Communications Security (CCS)
Backdoor Pre-trained Models Can Transfer to All
Lujia Shen, Shouling Ji, Xuhong Zhang, Jinfeng Li, Jing Chen, Jie Shi, Chengfang Fang, Jianwei Yin, Ting Wang
The 28th ACM Conference on Computer and Communications Security (CCS)
Trojaning Language Models for Fun and Profit
Xinyang Zhang, Zheng Zhang, Shouling Ji, Ting Wang
The 6th IEEE European Symposium on Security and Privacy (EuroS&P)
i-Algebra: Towards Interactive Interpretability of Deep Neural Networks
Xinyang Zhang, Ren Pang, Shouling Ji, Fenglong Ma, Ting Wang
The 35th AAAI Conference on Artificial Intelligence (AAAI)
Finding the Missing Piece: Permission Specification Analysis for Android NDK
Hao Zhou, Haoyu Wang, Shuohan Wu, Xiapu Luo, Yajin Zhou, Ting Chen, Ting Wang
The 36th IEEE/ACM International Conference on Automated Software Engineering (ASE)
Towards Certifying the Asymmetric Robustness for Neural Networks: Quantification and Applications
Changjiang Li, Shouling Ji, Haiqin Weng, Bo Li, Jie Shi, Raheem Beyah, Shanqing Guo, Zonghui Wang, Ting Wang
IEEE Transactions on Dependable and Secure Computing (TDSC)
Adversarial CAPTCHAs
Chenghui Shi, Xiaogang Xu, Shouling Ji, Kai Bu, Jianhai Chen, Raheem Beyah, Ting Wang
IEEE Transactions on Cybernetics (CYB)
SigRec: Automatic Recovery of Function Signatures in Smart Contracts
Ting Chen, Zihao Li, Xiapu Luo, XiaoFeng Wang, Ting Wang, Zheyuan He, Kezhao Fang, Yufei Zhang, Hang Zhu, Hongwei Li, Yan Cheng, Xiaosong Zhang
IEEE Transactions on Software Engineering (TSE)
AdvMind: Inferring Adversary Intent of Black-Box Attacks
Ren Pang, Xinyang Zhang, Shouling Ji, Xiapu Luo, Ting Wang
The 26th SIGKDD Conference on Knowledge Discovery and Data Mining (KDD)
A Tale of Evil Twins: Adversarial Inputs versus Poisoned Models
Ren Pang, Hua Shen, Xinyang Zhang, Shouling Ji, Yevgeniy Vorobeychik, Xiapu Luo, Alex Liu, Ting Wang
The 27th ACM Conference on Computer and Communications Security (CCS)
Text Captcha Is Dead? A Large Scale Deployment and Empirical Study
Chenghui Shi, Shouling Ji, Qianjun Liu, Changchang Liu, Yuefeng Chen, Yuan He, Zhe Liu, Raheem Beyah,
Ting Wang
The 27th ACM Conference on Computer and Communications Security (CCS)
TextShield: Robust Text Classification Based on Multimodal Embedding and Neural Machine Translation
Jinfeng Li, Tianyu Du, Shouling Ji, Rong Zhang, Quan Lu, Min Yang, Ting Wang
The 29th USENIX Security Symposium (USENIX)
Interpretable Deep Learning under Fire
Xinyang Zhang, Ningfei Wang, Hua Shen, Shouling Ji, Xiapu Luo, Ting
Wang
The 29th USENIX Security Symposium (USENIX)
SirenAttack: Generating Adversarial Audio for End-to-End Acoustic Systems
Tianyu Du, Shouling Ji, Jinfeng Li, Qinchen Gu, Ting Wang, Raheem Beyah
The 15th ACM ASIA Conference on Computer and Communications Security (ASIACCS)
UI Obfuscation and Its Effects on Automated UI Analysis for Android Apps
Hao Zhou, Ting Chen, Haoyu Wang, Le Yu, Xiapu Luo, Ting Wang, Wei Zhang
The 35th IEEE/ACM International Conference on Automated Software Engineering (ASE)
Demystifying Diehard Android Apps
Hao Zhou, Haoyu Wang, Yajin Zhou, Xiapu Luo, Yutian Tang, Lei Xue, Ting Wang
The 35th IEEE/ACM International Conference on Automated Software Engineering (ASE)
De-Health: All Your Online Health Information Are Belong to Us
Shouling Ji, Qinchen Gu, Haiqin Weng, Qianjun Liu, Pan Zhou, Jing Chen, Zhao Li, Raheem Beyah, Ting Wang
The 36th IEEE International Conference on Data Engineering (ICDE)
AsgLDP: Collecting and Generating Decentralized Attributed Graphs with Local Differential Privacy
Chengkun Wei, Shouling Ji, Changchang Liu, Wenzhi Chen, Ting Wang
IEEE Transactions on Information Forensics & Security (TIFS)
TokenScope: Automatically Discovering Inconsistent Cryptocurrency Tokens
Ting Chen, Yufei Zhang, Zihao Li, Xiapu Luo, Ting Wang, Rong Cao, Xiuzhuo Xiao, Xiaosong Zhang
The 26th ACM Conference on Computer and Communications Security (CCS)
TextBugger: Generating Adversarial Text Against Real-world Applications
Jinfeng Li, Shouling Ji, Tianyu Du, Bo Li, Ting Wang
The 2019 Network and Distributed System Security Symposium (NDSS)
DeepSec: A Uniform Platform for Security Analysis of Deep Learning Models [code]
Xiang Ling, Shouling Ji, Jiaxu Zou, Jiannan Wang, Chunming Wu, Bo Li, Ting Wang
The 40th IEEE Symposium on Security and Privacy (S&P)
CATS: Cross-Platform E-commerce Fraud Detection
Haiqin Weng, Shouling Ji, Fuzheng Duan, Zhao Li, Jianhai Chen, Qinming He, Ting Wang
The 35th IEEE International Conference on Data Engineering (ICDE)
A Large-Scale Empirical Study on Control Flow Identification of Smart Contracts
Ting Chen, Zihao Li, Yufei Zhang, Xiapu Luo, Ting Wang, Teng Hu, Xiuzhuo Xiao, Dong Wang, Jin Huang, Xiaosong Zhang
The 2019 ACM/IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM)
🏅Best Paper Runner-up Award
Fast-RCM: Fast Tree based Unsupersived Rare Class Mining
Haiqin Weng, Shouling Ji, Changchang Liu, Ting Wang, Qinming He
IEEE Transactions on Cybernetics (CYB)
Model-Reuse Attacks on Deep Learning Systems
Yujie Ji, Xinyang Zhang, Shouling Ji, Xiapu Luo, Ting Wang
The 25th ACM Conference on Computer and Communications Security (CCS)
Integration of Static and Dynamic Code Stylometry Analysis for Programmer De-anonymization
Ningfei Wang, Shouling Ji, Ting Wang
The 11th ACM Workshop on Artificial Intelligence and Security (AISec)
🏅Best Paper Award
Towards Evaluating the Security of Image CAPTCHA in The Wild
Binbin Zhao, Haiqin Weng, Shouling Ji, Jianhai Chen, Ting Wang, Qinming He, Raheem Beyah
The 11th ACM Workshop on Artificial Intelligence and Security (AISec)
Differentially Private Distributed Online Learning
Chencheng Li, Pan Zhou, Li Xiong, Qian Wang, Ting Wang
IEEE Transactions on Knowledge and Data Engineering (TKDE)
Quantifying Graph Anonymity, Utility, and De-anonymity
Shouling Ji, Tianyu Du, Zhen Hong, Ting Wang, Raheem Beyah
2018 IEEE International Conference on Computer Communications (INFOCOM)
Backdoor Attacks against Learning Systems
Yujie Ji, Xinyang Zhang, Ting Wang
The 5th IEEE Conference on Communications and Network Security (CNS)
🏅Best Paper Award
Private, yet Practical, Multiparty Deep Learning
Xinyang Zhang, Shouling Ji, Hui Wang, Ting Wang
The 37th IEEE International Conference on Distributed Computing Systems (ICDCS)
De-SAG: De-anonymizing Structure-Attribute Graph Data
Shouling Ji, Shukun Yang, Ting Wang, Prateek Mittal, Raheem Beyah
IEEE Transactions on Dependable and Secure Computing (TDSC),
BotMeter: Charting Botnet Landscapes in Large Networks
Ting Wang, Xin Hu, Jiyong Jang, Shouling Ji, Marc Stoecklin, Teryl Taylor
The 36th IEEE International Conference on Distributed Computing Systems (ICDCS)
Baywatch: Robust Beaconing Detection to Identify Infected Hosts in Large-Scale Enterprise Networks
Xin Hu, Jiyong Jang, Marc Stoecklin, Ting Wang, Douglas Schales, Dhilung Kirat, Josyula Rao
The 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN)
Detecting Malicious Exploit Kits using Tree-based Similarity Searches
Teryl Taylor, Xin Hu, Ting Wang, Jiyong Jang, Marc Stoecklin, Fabian Monrose, Reiner Sailer
The 6th ACM Conference on Data and Application Security and Privacy (CODASPY)
Hunting for Invisibility: Characterizing and Detecting Malicious Web Infrastructures through Server Visibility Analysis
Jialong Zhang, Xin Hu, Jiyong Jang, Ting Wang, Guofei Gu, Marc Stoecklin
2016 IEEE International Conference on Computer Communications (INFOCOM)
Preparedness or Serendipity? Explaining Creativity in Scientific Enterprise
Xinyang Zhang, Dashun Wang, Ting Wang
The 25th ACM International Conference on Information and Knowledge Management (CIKM)
PARS: A Uniform and Open-source Password Analysis and Research System
Shouling Ji, Shukun Yang, Ting Wang, Changchang Liu, Wei-han Lee, Raheem Beyah
The 31st Annual Computer Science Applications Conference (ACSAC)
Rateless and Pollution-Attack-Resilient Network Coding
Wentao Huang, Ting Wang, Xin Hu, Jiyong Jang, Theodoros Salonidis
The 2015 IEEE International Symposium on Information Theory (ISIT)
FCCE: Highly Scalable Distributed Feature Collection and Correlation Engine for Low Latency Big Data Analytics
Douglas Schales, Xin Hu, Jiyong Jang, Reiner Sailer, Marc Stoecklin, Ting Wang
The 31st IEEE International Conference on Data Engineering (ICDE)
Indexing Earth Mover’s Distance over Network Metrics
Ting Wang, Shicong Meng, Jiang Bian
IEEE Transactions on Knowledge and Data Engineering (TKDE)
Rebuilding the Tower of Babel: Towards Cross-System Malware Information Sharing
Ting Wang, Shicong Meng, Wei Gao, Xin Hu
The 23rd ACM International Conference on Information and Knowledge Management (CIKM)
Lightweight Authentication of Freshness in Outsourced Key-Value Store
Yuzhe Tang, Ting Wang, Ling Liu, Xin Hu, Jiyong Jang
The 30th Annual Computer Security Applications Conference (ACSAC)
Quantifying Herding Effects in Crowd Wisdom
Ting Wang, Dashun Wang, Fei Wang
The 20th ACM SIGKDD Conference on Knowledge Discovery and Data Mining (KDD)
On Exploiting Dynamic Execution Patterns for Workload Offloading in Mobile Cloud Applications
Wei Gao, Yong Li, Haoyang Lu, Ting Wang, Cong Liu
The 22nd IEEE International Conference on Network Protocols (ICNP)
Kaleido: Network Traffic Attribution using Multifaceted Footprinting
Ting Wang, Fei Wang, Douglas Schales, Reiner Sailer
The 2014 SIAM International Conference on Data Mining (SDM)
Microscopic Social Influence
Ting Wang, Mudhakar Srivatsa, Dakshi Agrawal, Ling Liu
The 2012 SIAM International Conference on Data Mining (SDM)
State Monitoring in Cloud Datacenters
Shicong Meng, Ling Liu, Ting Wang
IEEE Transactions on Knowledge and Data Engineering (TKDE)
Output Privacy in Data Mining
Ting Wang, Ling Liu
ACM Transactions on Database Systems (TODS)
Privacy-Preserving Indexing for eHealth Information Networks
Yuzhe Tang, Ting Wang, Ling Liu, Shicong Meng, Balaji Palanisamy
The 20th ACM International Conference on Information and Knowledge Management (CIKM)
Modeling Data Flow in Socio-Information Networks: A Risk Estimation Approach
Ting Wang, Mudhakar Srivatsa, Dakshi Agrawal, Ling Liu
The 16th ACM Symposium on Access Control Models and Technologies (SACMAT)
Spatio-Temporal Patterns in Network Events
Ting Wang, Mudhakar Srivatsa, Dakshi Agrawal, Ling Liu
The 6th ACM International Conference on Emerging Networking Experiments and Technologies (CoNEXT)
🏅Best Paper Award Finalist
Monitoring Continuous State Violation in Datacenters: Exploring the Time Dimension
Shicong Meng, Ting Wang, Ling Liu
The 26th IEEE International Conference on Data Engineering (ICDE)
XColor: Protecting General Proximity Privacy
Ting Wang, Ling Liu
The 26th IEEE International Conference on Data Engineering (ICDE)
Learning, Indexing, and Detecting Network Faults
Ting Wang, Mudhakar Srivatsa, Dakshi Agrawal, Ling Liu
The 15th ACM SIGKDD Conference on Knowledge Discovery and Data Mining (KDD)
🏅Integrated as key technology in IBM big data products
Privacy-Aware Mobile Services over Road Networks
Ting Wang, Ling Liu
Proceedings of the VLDB Endowment (PVLDB)
A General Proximity Privacy Principle
Ting Wang, Shicong Meng, Bhuvan Bamba, Ling Liu, Calton Pu
The 25th IEEE International Conference on Data Engineering (ICDE)
Butterfly: Protecting Output Privacy in Stream Mining
Ting Wang, Ling Liu
The 24th IEEE International Conference on Data Engineering (ICDE)
Supporting Anonymous Location Queries in Mobile Environments with PrivacyGrid
Bhuvan Bamba, Ling Liu, Peter Pesti, Ting Wang
The 17th International World Wide Web Conference (WWW)
SeMap: A Generic Mapping Construction System
Ting Wang, Rachel Pottinger
The 11th International Conference on Extending Database Technology (EDBT)
Powered by Jekyll and Minimal Light theme.