Machine learning–based cyber attacks targeting on controlled information: A survey Y Miao, C Chen, L Pan, QL Han, J Zhang, Y Xiang ACM Computing Surveys (CSUR) 54 (7), 1-36, 2021 | 94 | 2021 |
Visualization of big data security: a case study on the KDD99 cup data set Z Ruan, Y Miao, L Pan, N Patterson, J Zhang Digital Communications and Networks 3 (4), 250-259, 2017 | 42 | 2017 |
Comprehensive analysis of network traffic data Y Miao, Z Ruan, L Pan, J Zhang, Y Xiang Concurrency and Computation: Practice and Experience 30 (5), e4181, 2018 | 36 | 2018 |
The audio auditor: user-level membership inference in Internet of Things voice services Y Miao, X Minhui, C Chen, L Pan, J Zhang, BZH Zhao, D Kaafar, Y Xiang Proceedings on Privacy Enhancing Technologies 2021, 209-228, 2021 | 27 | 2021 |
Big network traffic data visualization Z Ruan, Y Miao, L Pan, Y Xiang, J Zhang Multimedia Tools and Applications 77, 11459-11487, 2018 | 13 | 2018 |
Automated big traffic analytics for cyber security Y Miao, Z Ruan, L Pan, Y Wang, J Zhang, Y Xiang arXiv preprint arXiv:1804.09023, 2018 | 9 | 2018 |
The audio auditor: Participant-level membership inference in internet of things voice services Y Miao, BZH Zhao, M Xue, C Chen, L Pan, J Zhang, D Kaafar, Y Xiang | 4 | 2019 |
Distributed detection of zero-day network traffic flows Y Miao, L Pan, S Rajasegarar, J Zhang, C Leckie, Y Xiang Data Mining: 15th Australasian Conference, AusDM 2017, Melbourne, VIC …, 2018 | 2 | 2018 |
No-Label User-Level Membership Inference for ASR Model Auditing Y Miao, C Chen, L Pan, S Liu, S Camtepe, J Zhang, Y Xiang European Symposium on Research in Computer Security, 610-628, 2022 | | 2022 |
FAAG: Fast Adversarial Audio Generation through Interactive Attack Optimisation Y Miao, C Chen, L Pan, J Zhang, Y Xiang arXiv preprint arXiv:2202.05416, 2022 | | 2022 |
Digital Communications and Networks Z Ruan, Y Miao, L Pan, N Patterson, J Zhang | | |