Biblio

Export 7 results:
Filters: Author is Tianhao Wang  [Clear All Filters]
2023
Mukherjee K, Wiedemeier J, Wang T, Wei J, Chen F, Kim M, Kantarcioglu M, Jee K.  2023.  Evading Provenance-Based ML Detectors with Adversarial System Actions. 32nd USENIX Security Symposium (USENIX Security 23). :1199--1216.
Chen M, Zhang Z, Wang T, Backes M, Zhang Y.  2023.  FACE-AUDITOR: Data Auditing in Facial Recognition Systems. 32nd USENIX Security Symposium (USENIX Security 23). :7195--7212.
Zhang B, He X, Shen Y, Wang T, Zhang Y.  2023.  A Plot is Worth a Thousand Words: Model Information Stealing Attacks via Scientific Plots. 32nd USENIX Security Symposium (USENIX Security 23). :5289--5306.
Wang H, Zhang Z, Wang T, He S, Backes M, Chen J, Zhang Y.  2023.  PrivTrace: Differentially Private Trajectory Synthesis by Adaptive Markov Models. 32nd USENIX Security Symposium (USENIX Security 23). :1649--1666.
Wang Z, Luo L, Ning Q, Zeng C, Li W, Wan X, Xie P, Feng T, Cheng K, Geng X et al..  2023.  SRNIC: A Scalable Architecture for RDMA NICs. 20th USENIX Symposium on Networked Systems Design and Implementation (NSDI 23). :1--14.
2021
Zhang Z, Wang T, Li N, Honorio J, Backes M, He S, Chen J, Zhang Y.  2021.  PrivSyn: Differentially Private Data Synthesis. 30th USENIX Security Symposium (USENIX Security 21). :929--946.
2017
Wang T, Blocki J, Li N, Jha S.  2017.  Locally Differentially Private Protocols for Frequency Estimation. 26th USENIX Security Symposium (USENIX Security 17). :729--745.