Run Wang
Run Wang
Nanyang Technological University, Singapore
Verified email at whu.edu.cn
Title
Cited by
Cited by
Year
FakeSpotter: A simple yet robust baseline for spotting AI-synthesized fake faces
R Wang, F Juefei-Xu, L Ma, X Xie, Y Huang, J Wang, Y Liu
International Joint Conference on Artificial Intelligence (IJCAI), 3444-3451, 2020
32*2020
Towards a Robust Deep Neural Network in Texts: A Survey
W Wang, L Wang, R Wang, Z Wang, A Ye
arXiv preprint arXiv:1902.07285, 2019
22*2019
Amora: Black-box adversarial morphing attack
R Wang, F Juefei-Xu, Q Guo, Y Huang, X Xie, L Ma, Y Liu
Proceedings of the 28th ACM International Conference on Multimedia, 1376-1385, 2020
132020
FakeLocator: Robust Localization of GAN-Based Face Manipulations
Y Huang, F Juefei-Xu, R Wang, Q Guo, X Xie, L Ma, J Li, W Miao, Y Liu, ...
arXiv preprint arXiv:2001.09598, 2020
92020
Fakepolisher: Making deepfakes more detection-evasive by shallow reconstruction
Y Huang, F Juefei-Xu, R Wang, Q Guo, L Ma, X Xie, J Li, W Miao, Y Liu, ...
Proceedings of the 28th ACM International Conference on Multimedia, 1217-1226, 2020
72020
DeepSonar: Towards Effective and Robust Detection of AI-Synthesized Fake Voices
R Wang, F Juefei-Xu, Y Huang, Q Guo, X Xie, L Ma, Y Liu
Proceedings of the 28th ACM International Conference on Multimedia, 1207–1216, 2020
62020
Niffler: A context-aware and user-independent side-channel attack system for password inference
B Tang, Z Wang, R Wang, L Zhao, L Wang
Wireless Communications and Mobile Computing 2018, 2018
52018
deExploit: Identifying misuses of input data to diagnose memory-corruption exploits at the binary level
R Wang, P Liu, L Zhao, Y Cheng, L Wang
Journal of Systems and Software 124, 153-168, 2017
52017
Adversarial examples generation approach for tendency classification on Chinese texts
WQ Wang, R Wang, LN Wang, BX Tang
Ruan Jian Xue Bao/J. Softw. 30 (8), 2415-2427, 2019
32019
DeepTag: Robust Image Tagging for DeepFake Provenance
R Wang, F Juefei-Xu, Q Guo, Y Huang, L Ma, Y Liu, L Wang
arXiv preprint arXiv:2009.09869, 2020
2*2020
SmartPI: Understanding Permission Implications of Android Apps from User Reviews
R Wang, Z Wang, B Tang, L Zhao, L Wang
IEEE Transactions on Mobile Computing, 2019
22019
A Defensive Method Against Android Physical Sensor-Based Side-Channel Attack Based on Differential Privacy
T Benxiao, W Lina, W Run, Z Lei, W Danlei
Journal of Computer Research and Development 55 (7), 1371, 2018
22018
DeepRD: 基于 Siamese LSTM 网络的 Android 重打包应用检测方法
汪润, 唐奔宵, 王丽娜
通信学报 39 (8), 69-82, 2018
12018
SPRD: 基于应用 UI 和程序依赖图的 Android 重打包应用快速检测方法
汪润, 王丽娜, 唐奔宵, 赵磊
通信学报 39 (3), 159-171, 2018
12018
Reversing and identifying overwritten data structures for memory-corruption exploit diagnosis
L Zhao, R Wang, L Wang, Y Cheng
2015 IEEE 39th Annual Computer Software and Applications Conference 2, 434-443, 2015
12015
MGAAttack: Toward More Query-efficient Black-box Attack by Microbial Genetic Algorithm
L Wang, K Yang, W Wang, R Wang, A Ye
Proceedings of the 28th ACM International Conference on Multimedia, 2229-2236, 2020
2020
Capturing the Persistence of Facial Expression Features for Deepfake Video Detection
Y Zhao, W Ge, W Li, R Wang, L Zhao, J Ming
International Conference on Information and Communications Security, 630-645, 2019
2019
基于内存对象访问序列动态胎记的程序同源性判别方法
陈铜, 赵磊, 王丽娜, 汪润
武汉大学学报 (理学版) 65 (2), 185-194, 2019
2019
面向中文用户评论的自动化众包攻击方法
王丽娜, 郭晓东, 汪润
通信学报 40 (6), 1-13, 2019
2019
基于 Laplace 机制的普适运动传感器侧信道防御方案
唐奔宵, 王丽娜, 汪润, 赵磊, 陈青松
软件学报 30 (8), 2392-2414, 2019
2019
The system can't perform the operation now. Try again later.
Articles 1–20