Follow
Di Wu
Di Wu
Lecturer (Computing), University of Southern Queensland
Verified email at unisq.edu.au - Homepage
Title
Cited by
Cited by
Year
Poisoning attack in federated learning using generative adversarial nets
J Zhang, J Chen, D Wu, B Chen, S Yu
2019 18th IEEE international conference on trust, security and privacy in …, 2019
1782019
Recent advances in video-based human action recognition using deep learning: A review
D Wu, N Sharma, M Blumenstein
2017 International joint conference on neural networks (IJCNN), 2865-2872, 2017
1642017
Multi-task network anomaly detection using federated learning
Y Zhao, J Chen, D Wu, J Teng, S Yu
Proceedings of the 10th international symposium on information and …, 2019
1412019
A survey on latest botnet attack and defense
L Zhang, S Yu, D Wu, P Watters
2011IEEE 10th International Conference on Trust, Security and Privacy in …, 2011
1132011
PDGAN: A novel poisoning defense method in federated learning using generative adversarial network
Y Zhao, J Chen, J Zhang, D Wu, J Teng, S Yu
Algorithms and Architectures for Parallel Processing: 19th International …, 2020
702020
Robust feature-based automated multi-view human action recognition system
KP Chou, M Prasad, D Wu, N Sharma, DL Li, YF Lin, M Blumenstein, ...
IEEE Access 6, 15283-15296, 2018
682018
From distributed machine learning to federated learning: In the view of data privacy and security
S Shen, T Zhu, D Wu, W Wang, W Zhou
Concurrency and Computation: Practice and Experience 34 (16), e6002, 2022
642022
Detecting and mitigating poisoning attacks in federated learning using generative adversarial networks
Y Zhao, J Chen, J Zhang, D Wu, M Blumenstein, S Yu
Concurrency and Computation: Practice and Experience 34 (7), e5906, 2022
352022
Fooling intrusion detection systems using adversarially autoencoder
J Chen, D Wu, Y Zhao, N Sharma, M Blumenstein, S Yu
Digital Communications and Networks 7 (3), 453-460, 2021
292021
On addressing the imbalance problem: a correlated KNN approach for network traffic classification
D Wu, X Chen, C Chen, J Zhang, Y Xiang, W Zhou
Network and System Security: 8th International Conference, NSS 2014, Xi’an …, 2014
182014
Adversarial action data augmentation for similar gesture action recognition
D Wu, J Chen, N Sharma, S Pan, G Long, M Blumenstein
2019 International Joint Conference on Neural Networks (IJCNN), 1-8, 2019
172019
Network anomaly detection using federated learning and transfer learning
Y Zhao, J Chen, Q Guo, J Teng, D Wu
International Conference on Security and Privacy in Digital Economy, 219-231, 2020
162020
Defending poisoning attacks in federated learning via adversarial training method
J Zhang, D Wu, C Liu, B Chen
Frontiers in Cyber Security: Third International Conference, FCS 2020 …, 2020
142020
VPFL: A verifiable privacy-preserving federated learning scheme for edge computing systems
J Zhang, Y Liu, D Wu, S Lou, B Chen, S Yu
Digital Communications and Networks 9 (4), 981-989, 2023
82023
Defending against membership inference attacks in federated learning via adversarial example
Y Xie, B Chen, J Zhang, D Wu
2021 17th International Conference on Mobility, Sensing and Networking (MSN …, 2021
72021
Feature-dependent graph convolutional autoencoders with adversarial training methods
D Wu, R Hu, Y Zheng, J Jiang, N Sharma, M Blumenstein
2019 International Joint Conference on Neural Networks (IJCNN), 1-8, 2019
42019
Campus network intrusion detection based on federated learning
J Chen, Q Guo, Z Fu, Q Shang, H Ma, D Wu
2022 International Joint Conference on Neural Networks (IJCNN), 1-8, 2022
32022
Network anomaly detection by using a time-decay closed frequent pattern
Y Zhao, J Chen, D Wu, J Teng, N Sharma, A Sajjanhar, M Blumenstein
Information 10 (8), 262, 2019
32019
A privacy-preserving access control scheme with verifiable and outsourcing capabilities in fog-cloud computing
Z Cheng, J Zhang, H Qian, M Xiang, D Wu
Algorithms and Architectures for Parallel Processing: 19th International …, 2020
12020
Detecting stepping stones by abnormal causality probability
S Wen, D Wu, P Li, Y Xiang, W Zhou, G Wei
Security and Communication Networks 8 (10), 1831-1844, 2015
12015
The system can't perform the operation now. Try again later.
Articles 1–20