default search action
Ting Wang 0006
Person information
- affiliation: Pennsylvania State University, University Park, PA, USA
- affiliation (former): Lehigh University, Bethlehem, PA, USA
- affiliation (former): IBM Research Center, Yorktown Heights, NY, USA
- affiliation (PhD): Georgia Institute of Technology, Atlanta, GA, USA
Other persons with the same name
- Ting Wang — disambiguation page
- Ting Wang 0001 — East China Normal University, Shanghai, China (and 1 more)
- Ting Wang 0002 — Massey University, Volcanic Risk Solutions, New Zealand
- Ting Wang 0003 — University of Pittsburgh, Department of Pediatrics, PA, USA (and 1 more)
- Ting Wang 0004 — Zhejiang University of Technology, College of Computer Science, Hangzhou, China
- Ting Wang 0005 — Southwest University, Faculty of Psychology, Key Laboratory of Cognition and Personality of Ministry of Education, Chongqing, China (and 1 more)
- Ting Wang 0007 — Chinese University of Hong Kong, Institute of Space and Earth Information Science, Hong Kong (and 1 more)
- Ting Wang 0008 — Chinese University of Hong Kong, Department of Computer Science and Engineering, CUhk REliable Computing Laboratory, Hong Kong
- Ting Wang 0009 — National University of Defense Technology, College of Computer, Changsha, China
- Ting Wang 0010 — École centrale de Nantes, France
- Ting Wang 0011 — Tsinghua University, Department of Computer Science and Technology, TNList, Beijing, China (and 3 more)
- Ting Wang 0012 — Chinese Academy of Sciences, Academy of Mathematics and Systems Science, Key Laboratory of Systems and Control, Beijing, China
- Ting Wang 0013 — Nanjing Tech University, College of Electrical Engineering And Control Science, Jiangsu, China (and 2 more)
- Ting Wang 0014 — Capital University of Economics and Business, School of Management and Engineering, Beijing, China
- Ting Wang 0015 — South China University of Technology, School of Medicine, Guangzhou, China (and 2 more)
- Ting Wang 0016 — NEC Laboratories America, Princeton, NJ, USA
- Ting Wang 0017 — SAP Asia Pte Ltd, Singapore (and 1 more)
- Ting Wang 0018 — Shandong University of Science and Technology, Qingdao, China (and 2 more)
- Ting Wang 0019 — Tongji University, Shanghai, China
- Ting Wang 0020 — Emporia State University, School of Library and Information Management, KS, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j26]Ping He, Xuhong Zhang, Changting Lin, Ting Wang, Shouling Ji:
Towards understanding bogus traffic service in online social networks. Frontiers Inf. Technol. Electron. Eng. 25(3): 415-431 (2024) - [j25]Zhenqing Qu, Xiang Ling, Ting Wang, Xiang Chen, Shouling Ji, Chunming Wu:
AdvSQLi: Generating Adversarial SQL Injections Against Real-World WAF-as-a-Service. IEEE Trans. Inf. Forensics Secur. 19: 2623-2638 (2024) - [j24]Pengyu Qiu, Xuhong Zhang, Shouling Ji, Chong Fu, Xing Yang, Ting Wang:
HashVFL: Defending Against Data Reconstruction Attacks in Vertical Federated Learning. IEEE Trans. Inf. Forensics Secur. 19: 3435-3450 (2024) - [c103]Tong Wang, Yuan Yao, Feng Xu, Miao Xu, Shengwei An, Ting Wang:
Inspecting Prediction Confidence for Detecting Black-Box Backdoor Attacks. AAAI 2024: 274-282 - [c102]Ziyi Yin, Muchao Ye, Tianrong Zhang, Jiaqi Wang, Han Liu, Jinghui Chen, Ting Wang, Fenglong Ma:
VQAttack: Transferable Adversarial Attacks on Visual Question Answering via Pre-trained Models. AAAI 2024: 6755-6763 - [c101]Jiacheng Liang, Ren Pang, Changjiang Li, Ting Wang:
Model Extraction Attacks Revisited. AsiaCCS 2024 - [c100]Yuan Sun, Eunchae Jang, Fenglong Ma, Ting Wang:
Generative AI in the Wild: Prospects, Challenges, and Strategies. CHI 2024: 747:1-747:16 - [c99]Tianyu Du, Luca Melis, Ting Wang:
ReMasker: Imputing Tabular Data with Masked Autoencoding. ICLR 2024 - [c98]Lujia Shen, Yuwen Pu, Shouling Ji, Changjiang Li, Xuhong Zhang, Chunpeng Ge, Ting Wang:
Improving the Robustness of Transformer-based Large Language Models with Dynamic Attention. NDSS 2024 - [c97]Suhan Cui, Jiaqi Wang, Yuan Zhong, Han Liu, Ting Wang, Fenglong Ma:
Automated Fusion of Multimodal Electronic Health Records for Better Medical Predictions. SDM 2024: 361-369 - [c96]Yuan Zhong, Suhan Cui, Jiaqi Wang, Xiaochen Wang, Ziyi Yin, Yaqing Wang, Houping Xiao, Mengdi Huai, Ting Wang, Fenglong Ma:
MedDiffusion: Boosting Health Risk Prediction via Diffusion-based Data Augmentation. SDM 2024: 499-507 - [c95]Changjiang Li, Ren Pang, Bochuan Cao, Zhaohan Xi, Jinghui Chen, Shouling Ji, Ting Wang:
On the Difficulty of Defending Contrastive Learning against Backdoor Attacks. USENIX Security Symposium 2024 - [i55]Zhenqing Qu, Xiang Ling, Ting Wang, Xiang Chen, Shouling Ji, Chunming Wu:
AdvSQLi: Generating Adversarial SQL Injections against Real-world WAF-as-a-service. CoRR abs/2401.02615 (2024) - [i54]Suhan Cui, Jiaqi Wang, Yuan Zhong, Han Liu, Ting Wang, Fenglong Ma:
Automated Fusion of Multimodal Electronic Health Records for Better Medical Predictions. CoRR abs/2401.11252 (2024) - [i53]Ziyi Yin, Muchao Ye, Tianrong Zhang, Jiaqi Wang, Han Liu, Jinghui Chen, Ting Wang, Fenglong Ma:
VQAttack: Transferable Adversarial Attacks on Visual Question Answering via Pre-trained Models. CoRR abs/2402.11083 (2024) - [i52]Yuan Sun, Eunchae Jang, Fenglong Ma, Ting Wang:
Generative AI in the Wild: Prospects, Challenges, and Strategies. CoRR abs/2404.04101 (2024) - [i51]Jiahao Chen, Zhiqiang Shen, Yuwen Pu, Chunyi Zhou, Changjiang Li, Ting Wang, Shouling Ji:
Rethinking the Vulnerabilities of Face Recognition Systems:From a Practical Perspective. CoRR abs/2405.12786 (2024) - [i50]Tianrong Zhang, Zhaohan Xi, Ting Wang, Prasenjit Mitra, Jinghui Chen:
PromptFix: Few-shot Backdoor Removal via Adversarial Prompt Tuning. CoRR abs/2406.04478 (2024) - [i49]Changjiang Li, Ren Pang, Bochuan Cao, Jinghui Chen, Fenglong Ma, Shouling Ji, Ting Wang:
Watch the Watcher! Backdoor Attacks on Security-Enhancing Diffusion Models. CoRR abs/2406.09669 (2024) - 2023
- [j23]Suhan Cui, Guanhao Wei, Li Zhou, Emily Zhao, Ting Wang, Fenglong Ma:
Predicting line of therapy transition via similar patient augmentation. J. Biomed. Informatics 147: 104511 (2023) - [j22]Yiming Wu, Zhiyuan Xie, Shouling Ji, Zhenguang Liu, Xuhong Zhang, Changting Lin, Shuiguang Deng, Jun Zhou, Ting Wang, Raheem Beyah:
Fraud-Agents Detection in Online Microfinance: A Large-Scale Empirical Study. IEEE Trans. Dependable Secur. Comput. 20(2): 1169-1185 (2023) - [j21]Pengyu Qiu, Xuhong Zhang, Shouling Ji, Tianyu Du, Yuwen Pu, Jun Zhou, Ting Wang:
Your Labels are Selling You Out: Relation Leaks in Vertical Federated Learning. IEEE Trans. Dependable Secur. Comput. 20(5): 3653-3668 (2023) - [c94]Zihao Li, Jianfeng Li, Zheyuan He, Xiapu Luo, Ting Wang, Xiaoze Ni, Wenwu Yang, Xi Chen, Ting Chen:
Demystifying DeFi MEV Activities in Flashbots Bundle. CCS 2023: 165-179 - [c93]Yuan Sun, Qiurong Song, Xinning Gui, Fenglong Ma, Ting Wang:
AutoML in The Wild: Obstacles, Workarounds, and Expectations. CHI 2023: 247:1-247:15 - [c92]Changjiang Li, Ren Pang, Zhaohan Xi, Tianyu Du, Shouling Ji, Yuan Yao, Ting Wang:
An Embarrassingly Simple Backdoor Attack on Self-supervised Learning. ICCV 2023: 4344-4355 - [c91]Ting Chen, Zihao Li, Xiapu Luo, Xiaofeng Wang, Ting Wang, Zheyuan He, Kezhao Fang, Yufei Zhang, Hang Zhu, Hongwei Li, Yan Cheng, Xiaosong Zhang:
Poster: SigRec - Automatic Recovery of Function Signatures in Smart Contracts. ICDCS 2023: 1065-1066 - [c90]Ren Pang, Changjiang Li, Zhaohan Xi, Shouling Ji, Ting Wang:
The Dark Side of AutoML: Towards Architectural Backdoor Search. ICLR 2023 - [c89]Kun Wu, Jie Shen, Yue Ning, Ting Wang, Wendy Hui Wang:
Certified Edge Unlearning for Graph Neural Networks. KDD 2023: 2606-2617 - [c88]Muchao Ye, Jinghui Chen, Chenglin Miao, Han Liu, Ting Wang, Fenglong Ma:
PAT: Geometry-Aware Hard-Label Black-Box Adversarial Attacks on Text. KDD 2023: 3093-3104 - [c87]Ziyi Yin, Muchao Ye, Tianrong Zhang, Tianyu Du, Jinguo Zhu, Han Liu, Jinghui Chen, Ting Wang, Fenglong Ma:
VLATTACK: Multimodal Adversarial Attacks on Vision-Language Tasks via Pre-trained Models. NeurIPS 2023 - [c86]Bochuan Cao, Changjiang Li, Ting Wang, Jinyuan Jia, Bo Li, Jinghui Chen:
IMPRESS: Evaluating the Resilience of Imperceptible Perturbations Against Unauthorized Data Usage in Diffusion-Based Generative AI. NeurIPS 2023 - [c85]Zhaohan Xi, Tianyu Du, Changjiang Li, Ren Pang, Shouling Ji, Jinghui Chen, Fenglong Ma, Ting Wang:
Defending Pre-trained Language Models as Few-shot Learners against Backdoor Attacks. NeurIPS 2023 - [c84]Muchao Ye, Ziyi Yin, Tianrong Zhang, Tianyu Du, Jinghui Chen, Ting Wang, Fenglong Ma:
UniT: A Unified Look at Certified Robust Training against Text Adversarial Perturbation. NeurIPS 2023 - [c83]Zhaohan Xi, Tianyu Du, Changjiang Li, Ren Pang, Shouling Ji, Xiapu Luo, Xusheng Xiao, Fenglong Ma, Ting Wang:
On the Security Risks of Knowledge Graph Reasoning. USENIX Security Symposium 2023: 3259-3276 - [c82]Chong Fu, Xuhong Zhang, Shouling Ji, Ting Wang, Peng Lin, Yanghe Feng, Jianwei Yin:
FreeEagle: Detecting Complex Neural Trojans in Data-Free Cases. USENIX Security Symposium 2023: 6399-6416 - [c81]Jiahao Yu, Wenbo Guo, Qi Qin, Gang Wang, Ting Wang, Xinyu Xing:
AIRS: Explanation for Deep Reinforcement Learning based Security Applications. USENIX Security Symposium 2023: 7375-7392 - [i48]Yuan Sun, Qiurong Song, Xinning Gui, Fenglong Ma, Ting Wang:
AutoML in The Wild: Obstacles, Workarounds, and Expectations. CoRR abs/2302.10827 (2023) - [i47]Chong Fu, Xuhong Zhang, Shouling Ji, Ting Wang, Peng Lin, Yanghe Feng, Jianwei Yin:
FreeEagle: Detecting Complex Neural Trojans in Data-Free Cases. CoRR abs/2302.14500 (2023) - [i46]Zhaohan Xi, Tianyu Du, Changjiang Li, Ren Pang, Shouling Ji, Xiapu Luo, Xusheng Xiao, Fenglong Ma, Ting Wang:
On the Security Risks of Knowledge Graph Reasoning. CoRR abs/2305.02383 (2023) - [i45]Ting Chen, Zihao Li, Xiapu Luo, Xiaofeng Wang, Ting Wang, Zheyuan He, Kezhao Fang, Yufei Zhang, Hang Zhu, Hongwei Li, Yan Cheng, Xiaosong Zhang:
SigRec: Automatic Recovery of Function Signatures in Smart Contracts. CoRR abs/2305.07067 (2023) - [i44]Zhaohan Xi, Tianyu Du, Changjiang Li, Ren Pang, Shouling Ji, Jinghui Chen, Fenglong Ma, Ting Wang:
Defending Pre-trained Language Models as Few-shot Learners against Backdoor Attacks. CoRR abs/2309.13256 (2023) - [i43]Tianyu Du, Luca Melis, Ting Wang:
ReMasker: Imputing Tabular Data with Masked Autoencoding. CoRR abs/2309.13793 (2023) - [i42]Yuan Zhong, Suhan Cui, Jiaqi Wang, Xiaochen Wang, Ziyi Yin, Yaqing Wang, Houping Xiao, Mengdi Huai, Ting Wang, Fenglong Ma:
MedDiffusion: Boosting Health Risk Prediction via Diffusion-based Data Augmentation. CoRR abs/2310.02520 (2023) - [i41]Ziyi Yin, Muchao Ye, Tianrong Zhang, Tianyu Du, Jinguo Zhu, Han Liu, Jinghui Chen, Ting Wang, Fenglong Ma:
VLAttack: Multimodal Adversarial Attacks on Vision-Language Tasks via Pre-trained Models. CoRR abs/2310.04655 (2023) - [i40]Bochuan Cao, Changjiang Li, Ting Wang, Jinyuan Jia, Bo Li, Jinghui Chen:
IMPRESS: Evaluating the Resilience of Imperceptible Perturbations Against Unauthorized Data Usage in Diffusion-Based Generative AI. CoRR abs/2310.19248 (2023) - [i39]Lujia Shen, Yuwen Pu, Shouling Ji, Changjiang Li, Xuhong Zhang, Chunpeng Ge, Ting Wang:
Improving the Robustness of Transformer-based Large Language Models with Dynamic Attention. CoRR abs/2311.17400 (2023) - [i38]Zihao Li, Jianfeng Li, Zheyuan He, Xiapu Luo, Ting Wang, Xiaoze Ni, Wenwu Yang, Xi Chen, Ting Chen:
Demystifying DeFi MEV Activities in Flashbots Bundle. CoRR abs/2312.01091 (2023) - [i37]Jiacheng Liang, Ren Pang, Changjiang Li, Ting Wang:
Model Extraction Attacks Revisited. CoRR abs/2312.05386 (2023) - [i36]Changjiang Li, Ren Pang, Bochuan Cao, Zhaohan Xi, Jinghui Chen, Shouling Ji, Ting Wang:
On the Difficulty of Defending Contrastive Learning against Backdoor Attacks. CoRR abs/2312.09057 (2023) - [i35]Ting Chen, Zihao Li, Xiapu Luo, Xiaofeng Wang, Ting Wang, Zheyuan He, Kezhao Fang, Yufei Zhang, Hang Zhu, Hongwei Li, Yan Cheng, Xiaosong Zhang:
SigRec: Automatic Recovery of Function Signatures in Smart Contracts. IACR Cryptol. ePrint Arch. 2023: 672 (2023) - [i34]Zihao Li, Jianfeng Li, Zheyuan He, Xiapu Luo, Ting Wang, Xiaoze Ni, Wenwu Yang, Xi Chen, Ting Chen:
Demystifying DeFi MEV Activities in Flashbots Bundle. IACR Cryptol. ePrint Arch. 2023: 1855 (2023) - 2022
- [j20]Lirong Fu, Shouling Ji, Changchang Liu, Peiyu Liu, Fuzheng Duan, Zonghui Wang, Whenzhi Chen, Ting Wang:
Focus : Function clone identification on cross-platform. Int. J. Intell. Syst. 37(8): 5082-5112 (2022) - [j19]Tianyu Du, Shouling Ji, Bo Wang, Sirui He, Jinfeng Li, Bo Li, Tao Wei, Yunhan Jia, Raheem Beyah, Ting Wang:
DetectS ec: Evaluating the robustness of object detection models to adversarial attacks. Int. J. Intell. Syst. 37(9): 6463-6492 (2022) - [j18]Chenghui Shi, Xiaogang Xu, Shouling Ji, Kai Bu, Jianhai Chen, Raheem Beyah, Ting Wang:
Adversarial CAPTCHAs. IEEE Trans. Cybern. 52(7): 6095-6108 (2022) - [j17]Changjiang Li, Shouling Ji, Haiqin Weng, Bo Li, Jie Shi, Raheem Beyah, Shanqing Guo, Zonghui Wang, Ting Wang:
Towards Certifying the Asymmetric Robustness for Neural Networks: Quantification and Applications. IEEE Trans. Dependable Secur. Comput. 19(6): 3987-4001 (2022) - [j16]Ting Chen, Zihao Li, Xiapu Luo, Xiaofeng Wang, Ting Wang, Zheyuan He, Kezhao Fang, Yufei Zhang, Hang Zhu, Hongwei Li, Yan Cheng, Xiaosong Zhang:
SigRec: Automatic Recovery of Function Signatures in Smart Contracts. IEEE Trans. Software Eng. 48(8): 3066-3086 (2022) - [c80]Muchao Ye, Chenglin Miao, Ting Wang, Fenglong Ma:
TextHoaxer: Budgeted Hard-Label Adversarial Attacks on Text. AAAI 2022: 3877-3884 - [c79]Suhan Cui, Jiaqi Wang, Xinning Gui, Ting Wang, Fenglong Ma:
AUTOMED: Automated Medical Risk Predictive Modeling on Electronic Health Records. BIBM 2022: 948-953 - [c78]Muchao Ye, Junyu Luo, Guanjie Zheng, Cao Xiao, Houping Xiao, Ting Wang, Fenglong Ma:
MedAttacker: Exploring Black-Box Adversarial Attacks on Risk Prediction Models in Healthcare. BIBM 2022: 1777-1780 - [c77]Yuyou Gan, Yuhao Mao, Xuhong Zhang, Shouling Ji, Yuwen Pu, Meng Han, Jianwei Yin, Ting Wang:
"Is your explanation stable?": A Robustness Evaluation Framework for Feature Attribution. CCS 2022: 1157-1171 - [c76]Tong Wang, Yuan Yao, Feng Xu, Shengwei An, Hanghang Tong, Ting Wang:
An Invisible Black-Box Backdoor Attack Through Frequency Domain. ECCV (13) 2022: 396-413 - [c75]Haipei Sun, Kun Wu, Ting Wang, Wendy Hui Wang:
Towards Fair and Robust Classification. EuroS&P 2022: 356-376 - [c74]Ren Pang, Zheng Zhang, Xiangshan Gao, Zhaohan Xi, Shouling Ji, Peng Cheng, Xiapu Luo, Ting Wang:
TrojanZoo: Towards Unified, Holistic, and Practical Evaluation of Neural Backdoors. EuroS&P 2022: 684-702 - [c73]Suhan Cui, Junyu Luo, Muchao Ye, Jiaqi Wang, Ting Wang, Fenglong Ma:
MedSkim: Denoised Health Risk Prediction via Skimming Medical Claims Data. ICDM 2022: 81-90 - [c72]Hao Zhou, Shuohan Wu, Xiapu Luo, Ting Wang, Yajin Zhou, Chao Zhang, Haipeng Cai:
NCScope: hardware-assisted analyzer for native code in Android apps. ISSTA 2022: 629-641 - [c71]Muchao Ye, Jinghui Chen, Chenglin Miao, Ting Wang, Fenglong Ma:
LeapAttack: Hard-Label Adversarial Attack on Text via Gradient-Based Optimization. KDD 2022: 2307-2315 - [c70]Jianfeng Li, Shuohan Wu, Hao Zhou, Xiapu Luo, Ting Wang, Yangyang Liu, Xiaobo Ma:
Packet-Level Open-World App Fingerprinting on Wireless Traffic. NDSS 2022 - [c69]Hao Zhou, Haoyu Wang, Xiapu Luo, Ting Chen, Yajin Zhou, Ting Wang:
Uncovering Cross-Context Inconsistent Access Control Enforcement in Android. NDSS 2022 - [c68]Yuhao Mao, Chong Fu, Saizhuo Wang, Shouling Ji, Xuhong Zhang, Zhenguang Liu, Jun Zhou, Alex X. Liu, Raheem Beyah, Ting Wang:
Transfer Attacks Revisited: A Large-Scale Empirical Study in Real Computer Vision Settings. SP 2022: 1423-1439 - [c67]Chong Fu, Xuhong Zhang, Shouling Ji, Jinyin Chen, Jingzheng Wu, Shanqing Guo, Jun Zhou, Alex X. Liu, Ting Wang:
Label Inference Attacks Against Vertical Federated Learning. USENIX Security Symposium 2022: 1397-1414 - [c66]Jianfeng Li, Hao Zhou, Shuohan Wu, Xiapu Luo, Ting Wang, Xian Zhan, Xiaobo Ma:
FOAP: Fine-Grained Open-World Android App Fingerprinting. USENIX Security Symposium 2022: 1579-1596 - [c65]Le Yu, Yangyang Liu, Pengfei Jing, Xiapu Luo, Lei Xue, Kaifa Zhao, Yajin Zhou, Ting Wang, Guofei Gu, Sen Nie, Shi Wu:
Towards Automatically Reverse Engineering Vehicle Diagnostic Protocols. USENIX Security Symposium 2022: 1939-1956 - [c64]Pengcheng Fang, Peng Gao, Changlin Liu, Erman Ayday, Kangkook Jee, Ting Wang, Yanfang (Fanny) Ye, Zhuotao Liu, Xusheng Xiao:
Back-Propagating System Dependency Impact for Attack Investigation. USENIX Security Symposium 2022: 2461-2478 - [c63]Changjiang Li, Li Wang, Shouling Ji, Xuhong Zhang, Zhaohan Xi, Shanqing Guo, Ting Wang:
Seeing is Living? Rethinking the Security of Facial Liveness Verification in the Deepfake Era. USENIX Security Symposium 2022: 2673-2690 - [c62]Ren Pang, Zhaohan Xi, Shouling Ji, Xiapu Luo, Ting Wang:
On the Security Risks of AutoML. USENIX Security Symposium 2022: 3953-3970 - [i33]Changjiang Li, Li Wang, Shouling Ji, Xuhong Zhang, Zhaohan Xi, Shanqing Guo, Ting Wang:
Seeing is Living? Rethinking the Security of Facial Liveness Verification in the Deepfake Era. CoRR abs/2202.10673 (2022) - [i32]Yuhao Mao, Chong Fu, Saizhuo Wang, Shouling Ji, Xuhong Zhang, Zhenguang Liu, Jun Zhou, Alex X. Liu, Raheem Beyah, Ting Wang:
Transfer Attacks Revisited: A Large-Scale Empirical Study in Real Computer Vision Settings. CoRR abs/2204.04063 (2022) - [i31]Tong Wang, Yuan Yao, Feng Xu, Miao Xu, Shengwei An, Ting Wang:
Confidence Matters: Inspecting Backdoors in Deep Neural Networks via Distribution Transfer. CoRR abs/2208.06592 (2022) - [i30]Yuyou Gan, Yuhao Mao, Xuhong Zhang, Shouling Ji, Yuwen Pu, Meng Han, Jianwei Yin, Ting Wang:
"Is your explanation stable?": A Robustness Evaluation Framework for Feature Attribution. CoRR abs/2209.01782 (2022) - [i29]Zhaohan Xi, Ren Pang, Changjiang Li, Tianyu Du, Shouling Ji, Fenglong Ma, Ting Wang:
Reasoning over Multi-view Knowledge Graphs. CoRR abs/2209.13702 (2022) - [i28]Changjiang Li, Ren Pang, Zhaohan Xi, Tianyu Du, Shouling Ji, Yuan Yao, Ting Wang:
Demystifying Self-supervised Trojan Attacks. CoRR abs/2210.07346 (2022) - [i27]Ren Pang, Changjiang Li, Zhaohan Xi, Shouling Ji, Ting Wang:
The Dark Side of AutoML: Towards Architectural Backdoor Search. CoRR abs/2210.12179 (2022) - [i26]Pengyu Qiu, Xuhong Zhang, Shouling Ji, Changjiang Li, Yuwen Pu, Xing Yang, Ting Wang:
Hijack Vertical Federated Learning Models with Adversarial Embedding. CoRR abs/2212.00322 (2022) - [i25]Pengyu Qiu, Xuhong Zhang, Shouling Ji, Yuwen Pu, Ting Wang:
All You Need Is Hashing: Defending Against Data Reconstruction Attack in Vertical Federated Learning. CoRR abs/2212.00325 (2022) - 2021
- [j15]Haiqin Weng, Shouling Ji, Changchang Liu, Ting Wang, Qinming He, Jianhai Chen:
Fast-RCM: Fast Tree-Based Unsupervised Rare-Class Mining. IEEE Trans. Cybern. 51(10): 5198-5211 (2021) - [c61]Xinyang Zhang, Ren Pang, Shouling Ji, Fenglong Ma, Ting Wang:
i-Algebra: Towards Interactive Interpretability of Deep Neural Networks. AAAI 2021: 11691-11698 - [c60]Tianyu Du, Shouling Ji, Lujia Shen, Yao Zhang, Jinfeng Li, Jie Shi, Chengfang Fang, Jianwei Yin, Raheem Beyah, Ting Wang:
Cert-RNN: Towards Certifying the Robustness of Recurrent Neural Networks. CCS 2021: 516-534 - [c59]Lujia Shen, Shouling Ji, Xuhong Zhang, Jinfeng Li, Jing Chen, Jie Shi, Chengfang Fang, Jianwei Yin, Ting Wang:
Backdoor Pre-trained Models Can Transfer to All. CCS 2021: 3141-3158 - [c58]Xinyang Zhang, Zheng Zhang, Shouling Ji, Ting Wang:
Trojaning Language Models for Fun and Profit. EuroS&P 2021: 179-197 - [c57]Hao Zhou, Haoyu Wang, Shuohan Wu, Xiapu Luo, Yajin Zhou, Ting Chen, Ting Wang:
Finding the Missing Piece: Permission Specification Analysis for Android NDK. ASE 2021: 505-516 - [c56]Zhaohan Xi, Ren Pang, Shouling Ji, Ting Wang:
Graph Backdoor. USENIX Security Symposium 2021: 1523-1540 - [c55]Yuwei Li, Shouling Ji, Yuan Chen, Sizhuang Liang, Wei-Han Lee, Yueyao Chen, Chenyang Lyu, Chunming Wu, Raheem Beyah, Peng Cheng, Kangjie Lu, Ting Wang:
UNIFUZZ: A Holistic and Pragmatic Metrics-Driven Platform for Evaluating Fuzzers. USENIX Security Symposium 2021: 2777-2794 - [c54]Pengfei Jing, Qiyi Tang, Yuefeng Du, Lei Xue, Xiapu Luo, Ting Wang, Sen Nie, Shi Wu:
Too Good to Be Safe: Tricking Lane Detection in Autonomous Driving with Crafted Perturbations. USENIX Security Symposium 2021: 3237-3254 - [i24]Xinyang Zhang, Ren Pang, Shouling Ji, Fenglong Ma, Ting Wang:
i-Algebra: Towards Interactive Interpretability of Deep Neural Networks. CoRR abs/2101.09301 (2021) - [i23]Ren Pang, Zhaohan Xi, Shouling Ji, Xiapu Luo, Ting Wang:
On the Security Risks of AutoML. CoRR abs/2110.06018 (2021) - [i22]Zhaohan Xi, Ren Pang, Changjiang Li, Shouling Ji, Xiapu Luo, Xusheng Xiao, Ting Wang:
Towards Robust Reasoning over Knowledge Graphs. CoRR abs/2110.14693 (2021) - [i21]Lujia Shen, Shouling Ji, Xuhong Zhang, Jinfeng Li, Jing Chen, Jie Shi, Chengfang Fang, Jianwei Yin, Ting Wang:
Backdoor Pre-trained Models Can Transfer to All. CoRR abs/2111.00197 (2021) - [i20]Tong Wang, Yuan Yao, Feng Xu, Shengwei An, Hanghang Tong, Ting Wang:
Backdoor Attack through Frequency Domain. CoRR abs/2111.10991 (2021) - [i19]Muchao Ye, Junyu Luo, Guanjie Zheng, Cao Xiao, Ting Wang, Fenglong Ma:
MedAttacker: Exploring Black-Box Adversarial Attacks on Risk Prediction Models in Healthcare. CoRR abs/2112.06063 (2021) - 2020
- [j14]Xurong Li, Shouling Ji, Juntao Ji, Zhenyu Ren, Chunming Wu, Bo Li, Ting Wang:
Adversarial examples detection through the sensitivity in space mappings. IET Comput. Vis. 14(5): 201-213 (2020) - [j13]Chengkun Wei, Shouling Ji, Changchang Liu, Wenzhi Chen, Ting Wang:
AsgLDP: Collecting and Generating Decentralized Attributed Graphs With Local Differential Privacy. IEEE Trans. Inf. Forensics Secur. 15: 3239-3254 (2020) - [c53]Ren Pang, Hua Shen, Xinyang Zhang, Shouling Ji, Yevgeniy Vorobeychik, Xiapu Luo, Alex X. Liu, Ting Wang:
A Tale of Evil Twins: Adversarial Inputs versus Poisoned Models. CCS 2020: 85-99 - [c52]Tianyu Du, Shouling Ji, Jinfeng Li, Qinchen Gu, Ting Wang, Raheem Beyah:
SirenAttack: Generating Adversarial Audio for End-to-End Acoustic Systems. AsiaCCS 2020: 357-369 - [c51]Chenghui Shi, Shouling Ji, Qianjun Liu, Changchang Liu, Yuefeng Chen, Yuan He, Zhe Liu, Raheem Beyah, Ting Wang:
Text Captcha Is Dead? A Large Scale Deployment and Empirical Study. CCS 2020: 1391-1406 - [c50]Shouling Ji, Qinchen Gu, Haiqin Weng, Qianjun Liu, Pan Zhou, Jing Chen, Zhao Li, Raheem Beyah, Ting Wang:
De-Health: All Your Online Health Information Are Belong to Us. ICDE 2020: 1609-1620 - [c49]Hao Zhou, Haoyu Wang, Yajin Zhou, Xiapu Luo, Yutian Tang, Lei Xue, Ting Wang:
Demystifying Diehard Android Apps. ASE 2020: 187-198 - [c48]Hao Zhou, Ting Chen, Haoyu Wang, Le Yu, Xiapu Luo, Ting Wang, Wei Zhang:
UI Obfuscation and Its Effects on Automated UI Analysis for Android Apps. ASE 2020: 199-210 - [c47]Ren Pang, Xinyang Zhang, Shouling Ji, Xiapu Luo, Ting Wang:
AdvMind: Inferring Adversary Intent of Black-Box Attacks. KDD 2020: 1899-1907 - [c46]Jinfeng Li, Tianyu Du, Shouling Ji, Rong Zhang, Quan Lu, Min Yang, Ting Wang:
TextShield: Robust Text Classification Based on Multimodal Embedding and Neural Machine Translation. USENIX Security Symposium 2020: 1381-1398 - [c45]Xinyang Zhang, Ningfei Wang, Hua Shen, Shouling Ji, Xiapu Luo, Ting Wang:
Interpretable Deep Learning under Fire. USENIX Security Symposium 2020: 1659-1676 - [i18]Ren Pang, Xinyang Zhang, Shouling Ji, Xiapu Luo, Ting Wang:
AdvMind: Inferring Adversary Intent of Black-Box Attacks. CoRR abs/2006.09539 (2020) - [i17]Zhaohan Xi, Ren Pang, Shouling Ji, Ting Wang:
Graph Backdoor. CoRR abs/2006.11890 (2020) - [i16]Xinyang Zhang, Zheng Zhang, Ting Wang:
Trojaning Language Models for Fun and Profit. CoRR abs/2008.00312 (2020) - [i15]Yuwei Li, Shouling Ji, Yuan Chen, Sizhuang Liang, Wei-Han Lee, Yueyao Chen, Chenyang Lyu, Chunming Wu, Raheem Beyah, Peng Cheng, Kangjie Lu, Ting Wang:
UNIFUZZ: A Holistic and Pragmatic Metrics-Driven Platform for Evaluating Fuzzers. CoRR abs/2010.01785 (2020) - [i14]Ren Pang, Zheng Zhang, Xiangshan Gao, Zhaohan Xi, Shouling Ji, Peng Cheng, Ting Wang:
TROJANZOO: Everything you ever wanted to know about neural backdoors (but were afraid to ask). CoRR abs/2012.09302 (2020)
2010 – 2019
- 2019
- [j12]Haiqin Weng, Binbin Zhao, Shouling Ji, Jianhai Chen, Ting Wang, Qinming He, Raheem Beyah:
Towards understanding the security of modern image captchas and underground captcha-solving services. Big Data Min. Anal. 2(2): 118-144 (2019) - [j11]Shouling Ji, Ting Wang, Jianhai Chen, Weiqing Li, Prateek Mittal, Raheem Beyah:
De-SAG: On the De-Anonymization of Structure-Attribute Graph Data. IEEE Trans. Dependable Secur. Comput. 16(4): 594-607 (2019) - [c44]Ting Chen, Yufei Zhang, Zihao Li, Xiapu Luo, Ting Wang, Rong Cao, Xiuzhuo Xiao, Xiaosong Zhang:
TokenScope: Automatically Detecting Inconsistent Behaviors of Cryptocurrency Tokens in Ethereum. CCS 2019: 1503-1520 - [c43]Ting Chen, Zihao Li, Yufei Zhang, Xiapu Luo, Ting Wang, Teng Hu, Xiuzhuo Xiao, Dong Wang, Jin Huang, Xiaosong Zhang:
A Large-Scale Empirical Study on Control Flow Identification of Smart Contracts. ESEM 2019: 1-11 - [c42]Haiqin Weng, Shouling Ji, Fuzheng Duan, Zhao Li, Jianhai Chen, Qinming He, Ting Wang:
CATS: Cross-Platform E-Commerce Fraud Detection. ICDE 2019: 1874-1885 - [c41]Jinfeng Li, Shouling Ji, Tianyu Du, Bo Li, Ting Wang:
TextBugger: Generating Adversarial Text Against Real-world Applications. NDSS 2019 - [c40]Xiang Ling, Shouling Ji, Jiaxu Zou, Jiannan Wang, Chunming Wu, Bo Li, Ting Wang:
DEEPSEC: A Uniform Platform for Security Analysis of Deep Learning Model. IEEE Symposium on Security and Privacy 2019: 673-690 - [i13]Chenghui Shi, Xiaogang Xu, Shouling Ji, Kai Bu, Jianhai Chen, Raheem A. Beyah, Ting Wang:
Adversarial CAPTCHAs. CoRR abs/1901.01107 (2019) - [i12]Shouling Ji, Haiqin Weng, Yiming Wu, Pan Zhou, Qinming He, Raheem Beyah, Ting Wang:
FDI: Quantifying Feature-based Data Inferability. CoRR abs/1902.00714 (2019) - [i11]Shouling Ji, Qinchen Gu, Haiqin Weng, Qianjun Liu, Pan Zhou, Qinming He, Raheem Beyah, Ting Wang:
De-Health: All Your Online Health Information Are Belong to Us. CoRR abs/1902.00717 (2019) - [i10]Ren Pang, Xinyang Zhang, Shouling Ji, Yevgeniy Vorobeychik, Xiapu Luo, Ting Wang:
The Tale of Evil Twins: Adversarial Inputs versus Backdoored Models. CoRR abs/1911.01559 (2019) - 2018
- [j10]Chencheng Li, Pan Zhou, Li Xiong, Qian Wang, Ting Wang:
Differentially Private Distributed Online Learning. IEEE Trans. Knowl. Data Eng. 30(8): 1440-1453 (2018) - [c39]Ningfei Wang, Shouling Ji, Ting Wang:
Integration of Static and Dynamic Code Stylometry Analysis for Programmer De-anonymization. AISec@CCS 2018: 74-84 - [c38]Binbin Zhao, Haiqin Weng, Shouling Ji, Jianhai Chen, Ting Wang, Qinming He, Reheem Beyah:
Towards Evaluating the Security of Real-World Deployed Image CAPTCHAs. AISec@CCS 2018: 85-96 - [c37]Yujie Ji, Xinyang Zhang, Shouling Ji, Xiapu Luo, Ting Wang:
Model-Reuse Attacks on Deep Learning Systems. CCS 2018: 349-363 - [c36]Yujie Ji, Ting Wang:
Towards Understanding the Dynamics of Adversarial Attacks. CCS 2018: 2228-2230 - [c35]Xinyang Zhang, Yujie Ji, Chanh Nguyen, Ting Wang:
DeepClean: Data Cleaning via Question Asking. DSAA 2018: 283-292 - [c34]Shouling Ji, Tianyu Du, Zhen Hong, Ting Wang, Raheem A. Beyah:
Quantifying Graph Anonymity, Utility, and De-anonymity. INFOCOM 2018: 1736-1744 - [i9]Xinyang Zhang, Shouling Ji, Ting Wang:
Differentially Private Releasing via Deep Generative Model. CoRR abs/1801.01594 (2018) - [i8]Yujie Ji, Xinyang Zhang, Ting Wang:
EagleEye: Attack-Agnostic Defense against Adversarial Inputs (Technical Report). CoRR abs/1808.00123 (2018) - [i7]Yujie Ji, Xinyang Zhang, Shouling Ji, Xiapu Luo, Ting Wang:
Model-Reuse Attacks on Deep Learning Systems. CoRR abs/1812.00483 (2018) - [i6]Xinyang Zhang, Ningfei Wang, Shouling Ji, Hua Shen, Ting Wang:
Interpretable Deep Learning under Fire. CoRR abs/1812.00891 (2018) - [i5]Jinfeng Li, Shouling Ji, Tianyu Du, Bo Li, Ting Wang:
TextBugger: Generating Adversarial Text Against Real-world Applications. CoRR abs/1812.05271 (2018) - 2017
- [c33]Yujie Ji, Xinyang Zhang, Ting Wang:
Backdoor attacks against learning systems. CNS 2017: 1-9 - [c32]Xinyang Zhang, Shouling Ji, Hui Wang, Ting Wang:
Private, Yet Practical, Multiparty Deep Learning. ICDCS 2017: 1442-1452 - [c31]Changjiang Cai, Haipei Sun, Boxiang Dong, Bo Zhang, Ting Wang, Hui Wang:
Pairwise Ranking Aggregation by Non-interactive Crowdsourcing with Budget Constraints. ICDCS 2017: 2567-2568 - [i4]Xinyang Zhang, Yujie Ji, Ting Wang:
Modular Learning Component Attacks: Today's Reality, Tomorrow's Challenge. CoRR abs/1708.07807 (2017) - [i3]Chanh Nguyen, Georgi Georgiev, Yujie Ji, Ting Wang:
Where Classification Fails, Interpretation Rises. CoRR abs/1712.00558 (2017) - 2016
- [j9]Douglas Lee Schales, Jiyong Jang, Ting Wang, Xin Hu, Dhilung Kirat, B. Wuest, Marc Ph. Stoecklin:
Scalable analytics to detect DNS misuse for establishing stealthy communication channels. IBM J. Res. Dev. 60(4): 3 (2016) - [j8]Xin Hu, Jiyong Jang, Ting Wang, Zubair Ashraf, Marc Ph. Stoecklin, Dhilung Kirat:
Scalable malware classification with multifaceted content features and threat intelligence. IBM J. Res. Dev. 60(4): 6 (2016) - [c30]Xinyang Zhang, Dashun Wang, Ting Wang:
Inspiration or Preparation?: Explaining Creativity in Scientific Enterprise. CIKM 2016: 741-750 - [c29]Teryl Taylor, Xin Hu, Ting Wang, Jiyong Jang, Marc Ph. Stoecklin, Fabian Monrose, Reiner Sailer:
Detecting Malicious Exploit Kits using Tree-based Similarity Searches. CODASPY 2016: 255-266 - [c28]Xin Hu, Jiyong Jang, Marc Ph. Stoecklin, Ting Wang, Douglas Lee Schales, Dhilung Kirat, Josyula R. Rao:
BAYWATCH: Robust Beaconing Detection to Identify Infected Hosts in Large-Scale Enterprise Networks. DSN 2016: 479-490 - [c27]Ting Wang, Xin Hu, Jiyong Jang, Shouling Ji, Marc Ph. Stoecklin, Teryl Taylor:
BotMeter: Charting DGA-Botnet Landscapes in Large Networks. ICDCS 2016: 334-343 - [c26]Jialong Zhang, Xin Hu, Jiyong Jang, Ting Wang, Guofei Gu, Marc Ph. Stoecklin:
Hunting for invisibility: Characterizing and detecting malicious web infrastructures through server visibility analysis. INFOCOM 2016: 1-9 - [i2]Yifan Hou, Pan Zhou, Ting Wang, Li Yu, Yuchong Hu, Dapeng Wu:
Context-Aware Online Learning for Course Recommendation of MOOC Big Data. CoRR abs/1610.03147 (2016) - [i1]Xinyang Zhang, Dashun Wang, Ting Wang:
Inspiration or Preparation? Explaining Creativity in Scientific Enterprise. CoRR abs/1612.01450 (2016) - 2015
- [j7]Ting Wang, Shicong Meng, Jiang Bian:
Indexing Earth Mover's Distance over Network Metrics. IEEE Trans. Knowl. Data Eng. 27(6): 1588-1601 (2015) - [c25]Shouling Ji, Shukun Yang, Ting Wang, Changchang Liu, Wei-Han Lee, Raheem A. Beyah:
PARS: A Uniform and Open-source Password Analysis and Research System. ACSAC 2015: 321-330 - [c24]Douglas Lee Schales, Xin Hu, Jiyong Jang, Reiner Sailer, Marc Ph. Stoecklin, Ting Wang:
FCCE: Highly scalable distributed Feature Collection and Correlation Engine for low latency big data analytics. ICDE 2015: 1316-1327 - [c23]Wentao Huang, Ting Wang, Xin Hu, Jiyong Jang, Theodoros Salonidis:
Rateless and pollution-attack-resilient network coding. ISIT 2015: 2623-2627 - 2014
- [j6]Ting Wang, Dashun Wang:
Why Amazon's Ratings Might Mislead You: The Story of Herding Effects. Big Data 2(4): 196-204 (2014) - [j5]Xin Hu, Ting Wang, Marc Ph. Stoecklin, Douglas Lee Schales, Jiyong Jang, Reiner Sailer:
MUSE: asset risk scoring in enterprise network with mutually reinforced reputation propagation. EURASIP J. Inf. Secur. 2014: 17 (2014) - [c22]Yuzhe Richard Tang, Ting Wang, Ling Liu, Xin Hu, Jiyong Jang:
Lightweight authentication of freshness in outsourced key-value stores. ACSAC 2014: 176-185 - [c21]Ting Wang, Shicong Meng, Wei Gao, Xin Hu:
Rebuilding the Tower of Babel: Towards Cross-System Malware Information Sharing. CIKM 2014: 1239-1248 - [c20]Ting Wang, Xin Hu, Shicong Meng, Reiner Sailer:
Reconciling malware labeling discrepancy via consensus learning. ICDE Workshops 2014: 84-89 - [c19]Yuzhe Richard Tang, Ling Liu, Ting Wang, Xin Hu, Reiner Sailer, Peter R. Pietzuch:
Outsourcing multi-version key-value stores with verifiable data freshness. ICDE 2014: 1214-1217 - [c18]Wei Gao, Yong Li, Haoyang Lu, Ting Wang, Cong Liu:
On Exploiting Dynamic Execution Patterns for Workload Offloading in Mobile Cloud Applications. ICNP 2014: 1-12 - [c17]Douglas Lee Schales, Mihai Christodorescu, Xin Hu, Jiyong Jang, Josyula R. Rao, Reiner Sailer, Marc Ph. Stoecklin, Wietse Z. Venema, Ting Wang:
Stream computing for large-scale, multi-channel cyber threat analytics. IRI 2014: 8-15 - [c16]Ting Wang, Dashun Wang, Fei Wang:
Quantifying herding effects in crowd wisdom. KDD 2014: 1087-1096 - [c15]Ting Wang, Fei Wang, Reiner Sailer, Douglas Lee Schales:
Kaleido: Network Traffic Attribution using Multifaceted Footprinting. SDM 2014: 695-703 - [c14]Xin Hu, Ting Wang, Marc Ph. Stoecklin, Douglas Lee Schales, Jiyong Jang, Reiner Sailer:
Asset Risk Scoring in Enterprise Network with Mutually Reinforced Reputation Propagation. IEEE Symposium on Security and Privacy Workshops 2014: 61-64 - 2013
- [c13]Shicong Meng, Arun Iyengar, Ling Liu, Ting Wang, Jian Tan, Ignacio Silva-Lepe, Isabelle Rouvellou:
CloudLEGO: scalable cross-VM-type application performance prediction. SoCC 2013: 40:1 - 2012
- [c12]Ting Wang, Mudhakar Srivatsa, Ling Liu:
Fine-grained access control of personal data. SACMAT 2012: 145-156 - [c11]Ting Wang, Mudhakar Srivatsa, Dakshi Agrawal, Ling Liu:
Microscopic Social Influence. SDM 2012: 129-140 - 2011
- [j4]Shicong Meng, Ling Liu, Ting Wang:
State Monitoring in Cloud Datacenters. IEEE Trans. Knowl. Data Eng. 23(9): 1328-1344 (2011) - [j3]Ting Wang, Ling Liu:
Output privacy in data mining. ACM Trans. Database Syst. 36(1): 1:1-1:34 (2011) - [c10]Yuzhe Richard Tang, Ting Wang, Ling Liu, Shicong Meng, Balaji Palanisamy:
Privacy preserving indexing for eHealth information networks. CIKM 2011: 905-914 - [c9]Ting Wang, Mudhakar Srivatsa, Dakshi Agrawal, Ling Liu:
Modeling data flow in socio-information networks: a risk estimation approach. SACMAT 2011: 113-122 - 2010
- [j2]Ting Wang, Ling Liu:
Execution Assurance for Massive Computing Tasks. IEICE Trans. Inf. Syst. 93-D(6): 1343-1351 (2010) - [c8]Ting Wang, Mudhakar Srivatsa, Dakshi Agrawal, Ling Liu:
Spatio-temporal patterns in network events. CoNEXT 2010: 3 - [c7]Ting Wang, Ling Liu:
XColor: Protecting general proximity privacy. ICDE 2010: 960-963 - [c6]Shicong Meng, Ting Wang, Ling Liu:
Monitoring continuous state violation in datacenters: Exploring the time dimension. ICDE 2010: 968-979
2000 – 2009
- 2009
- [j1]Ting Wang, Ling Liu:
Privacy-Aware Mobile Services over Road Networks. Proc. VLDB Endow. 2(1): 1042-1053 (2009) - [c5]Ting Wang, Shicong Meng, Bhuvan Bamba, Ling Liu, Calton Pu:
A General Proximity Privacy Principle. ICDE 2009: 1279-1282 - [c4]Ting Wang, Mudhakar Srivatsa, Dakshi Agrawal, Ling Liu:
Learning, indexing, and diagnosing network faults. KDD 2009: 857-866 - 2008
- [c3]Ting Wang, Ling Liu:
Butterfly: Protecting Output Privacy in Stream Mining. ICDE 2008: 1170-1179 - [c2]Ting Wang, Chang-Shing Perng, Tao Tao, Chunqiang Tang, Edward So, Chun Zhang, Rong N. Chang, Ling Liu:
A Temporal Data-Mining Approach for Discovering End-to-End Transaction Flows. ICWS 2008: 37-44 - [c1]Bhuvan Bamba, Ling Liu, Péter Pesti, Ting Wang:
Supporting anonymous location queries in mobile environments with privacygrid. WWW 2008: 237-246
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-05 20:59 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint