Follow
Yuantian Miao
Yuantian Miao
Verified email at newcastle.edu.au
Title
Cited by
Cited by
Year
Machine learning–based cyber attacks targeting on controlled information: A survey
Y Miao, C Chen, L Pan, QL Han, J Zhang, Y Xiang
ACM Computing Surveys (CSUR) 54 (7), 1-36, 2021
872021
Visualization of big data security: a case study on the KDD99 cup data set
Z Ruan, Y Miao, L Pan, N Patterson, J Zhang
Digital Communications and Networks 3 (4), 250-259, 2017
412017
Comprehensive analysis of network traffic data
Y Miao, Z Ruan, L Pan, J Zhang, Y Xiang
Concurrency and Computation: Practice and Experience 30 (5), e4181, 2018
342018
The audio auditor: user-level membership inference in Internet of Things voice services
Y Miao, X Minhui, C Chen, L Pan, J Zhang, BZH Zhao, D Kaafar, Y Xiang
Proceedings on Privacy Enhancing Technologies 2021, 209-228, 2021
262021
Big network traffic data visualization
Z Ruan, Y Miao, L Pan, Y Xiang, J Zhang
Multimedia Tools and Applications 77, 11459-11487, 2018
132018
Automated big traffic analytics for cyber security
Y Miao, Z Ruan, L Pan, Y Wang, J Zhang, Y Xiang
arXiv preprint arXiv:1804.09023, 2018
92018
The audio auditor: Participant-level membership inference in internet of things voice services
Y Miao, BZH Zhao, M Xue, C Chen, L Pan, J Zhang, D Kaafar, Y Xiang
42019
Distributed detection of zero-day network traffic flows
Y Miao, L Pan, S Rajasegarar, J Zhang, C Leckie, Y Xiang
Data Mining: 15th Australasian Conference, AusDM 2017, Melbourne, VIC …, 2018
22018
No-Label User-Level Membership Inference for ASR Model Auditing
Y Miao, C Chen, L Pan, S Liu, S Camtepe, J Zhang, Y Xiang
European Symposium on Research in Computer Security, 610-628, 2022
2022
FAAG: Fast Adversarial Audio Generation through Interactive Attack Optimisation
Y Miao, C Chen, L Pan, J Zhang, Y Xiang
arXiv preprint arXiv:2202.05416, 2022
2022
Digital Communications and Networks
Z Ruan, Y Miao, L Pan, N Patterson, J Zhang
The system can't perform the operation now. Try again later.
Articles 1–11