Ting Wang
Ting Wang
Verified email at psu.edu - Homepage
Title
Cited by
Cited by
Year
Supporting anonymous location queries in mobile environments with privacygrid
B Bamba, L Liu, P Pesti, T Wang
Proceedings of the 17th international conference on World Wide Web, 237-246, 2008
5682008
Privacy-aware mobile services over road networks
T Wang, L Liu
Proceedings of the VLDB Endowment 2 (1), 1042-1053, 2009
1872009
Location-aware publish/subscribe
G Li, Y Wang, T Wang, J Feng
Proceedings of the 19th ACM SIGKDD international conference on Knowledge …, 2013
932013
Adaptive routing for sensor networks using reinforcement learning
P Wang, T Wang
The Sixth IEEE International Conference on Computer and Information …, 2006
882006
State monitoring in cloud datacenters
S Meng, L Liu, T Wang
IEEE transactions on Knowledge and Data Engineering 23 (9), 1328-1344, 2011
622011
TextBugger: Generating Adversarial Text Against Real-world Applications
J Li, S Ji, T Du, B Li, T Wang
Proceedings of The 2019 Network and Distributed System Security Symposium, 2019
612019
Model-reuse attacks on deep learning systems
Y Ji, X Zhang, S Ji, X Luo, T Wang
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
432018
On exploiting dynamic execution patterns for workload offloading in mobile cloud applications
W Gao, Y Li, H Lu, T Wang, C Liu
2014 IEEE 22nd international conference on network protocols, 1-12, 2014
352014
Deepsec: A uniform platform for security analysis of deep learning model
X Ling, S Ji, J Zou, J Wang, C Wu, B Li, T Wang
Proceedings of The 40th IEEE Symposium on Security and Privacy, 2019
322019
Spatio-temporal patterns in network events
T Wang, M Srivatsa, D Agrawal, L Liu
Proceedings of the 6th International COnference, 1-12, 2010
302010
Differentially private releasing via deep generative model
X Zhang, S Ji, T Wang
arXiv preprint arXiv:1801.01594, 2018
292018
Quantifying herding effects in crowd wisdom
T Wang, D Wang, F Wang
Proceedings of the 20th ACM SIGKDD international conference on Knowledge …, 2014
292014
Detecting malicious exploit kits using tree-based similarity searches
T Taylor, X Hu, T Wang, J Jang, MP Stoecklin, F Monrose, R Sailer
proceedings of the Sixth ACM Conference on Data and Application Security and …, 2016
272016
Fine-grained access control of personal data
T Wang, M Srivatsa, L Liu
Proceedings of the 17th ACM symposium on Access Control Models and …, 2012
262012
Monitoring continuous state violation in datacenters: Exploring the time dimension
S Meng, T Wang, L Liu
2010 IEEE 26th International Conference on Data Engineering (ICDE 2010), 968-979, 2010
262010
Learning, indexing, and diagnosing network faults
T Wang, M Srivatsa, D Agrawal, L Liu
Proceedings of the 15th ACM SIGKDD international conference on Knowledge …, 2009
262009
Backdoor attacks against learning systems
Y Ji, X Zhang, T Wang
2017 IEEE Conference on Communications and Network Security (CNS), 1-9, 2017
252017
Microscopic social influence
T Wang, M Srivatsa, D Agrawal, L Liu
Proceedings of the 2012 SIAM International Conference on Data Mining, 129-140, 2012
252012
Differentially private distributed online learning
C Li, P Zhou, L Xiong, Q Wang, T Wang
IEEE transactions on knowledge and data engineering 30 (8), 1440-1453, 2018
242018
Pars: A uniform and open-source password analysis and research system
S Ji, S Yang, T Wang, C Liu, WH Lee, R Beyah
Proceedings of the 31st Annual Computer Security Applications Conference …, 2015
242015
The system can't perform the operation now. Try again later.
Articles 1–20