Wenbo Guo
Wenbo Guo
Information Science and technology, Pennsylvania State University
Verified email at ist.psu.edu - Homepage
Cited by
Cited by
Adversary Resistant Deep Neural Networks with an Application to Malware Detection
Q Wang, W Guo, K Zhang, AG Ororbia II, X Xing, CL Giles, X Liu
Proceedings of the 23rd ACM SIGKDD International Conference on Knowledge …, 2016
Lemna: Explaining deep learning based security applications
W Guo, D Mu, J Xu, P Su, G Wang, X Xing
proceedings of the 2018 ACM SIGSAC conference on computer and communications …, 2018
Towards Inspecting and Eliminating Trojan Backdoors in Deep Neural Networks
W Guo, L Wang, Y Xu, X Xing, M Du, D Song
Proceedings of the 22th IEEE International Conference on Data Mining. (ICDM'20), 2020
Defending against Adversarial Samples without Security through Obscurity
W Guo, Q Wang, K Zhang, AG Ororbia II, X Liu, CL Giles, S Huang, L Lin, ...
Proceedings of the 20th IEEE International Conference on Data Mining. (ICDM'18), 2018
Explaining deep learning models-a bayesian non-parametric approach
W Guo, S Huang, Y Tao, X Xing, L Lin
Advances in Neural Information Processing Systems, 2018
Towards the Detection of Inconsistencies in Public Security Vulnerability Reports
Y Dong, W Guo, Y Chen, X Xing, Y Zhang, G Wang
28th {USENIX} Security Symposium ({USENIX} Security 19), 869-885, 2019
{DEEPVSA}: Facilitating Value-set Analysis with Deep Learning for Postmortem Program Analysis
W Guo, D Mu, X Xing, M Du, D Song
28th {USENIX} Security Symposium ({USENIX} Security 19), 1787-1804, 2019
RENN: efficient reverse execution with neural-network-assisted alias analysis
D Mu, W Guo, A Cuevas, Y Chen, J Gai, X Xing, B Mao, C Song
2019 34th IEEE/ACM International Conference on Automated Software …, 2019
Active learning support vector machines with low-rank transformation
L Gong, W Guo, Y Yang
Intelligent Data Analysis 22 (4), 701-715, 2018
Spectral clustering based active learning with applications to text classification
W Guo, C Zhong, Y Yang
MATEC Web of Conferences 56, 01003, 2016
CADE: Detecting and Explaining Concept Drift Samples for Security Applications
L Yang, W Guo, Q Hao, A Ciptadi, A Ahmadzadeh, X Xing, G Wang
30th {USENIX} Security Symposium ({USENIX} Security 21), 2021
BACKDOORL: Backdoor Attack against Competitive Reinforcement Learning
L Wang, Z Javed, X Wu, W Guo, X Xing, D Song
arXiv preprint arXiv:2105.00579, 2021
Data-driven analysis of the electronic-structure factors controlling the work functions of perovskite oxides
Y Xiong, W Chen, W Guo, H Wei, I Dabo
Physical Chemistry Chemical Physics 23 (11), 6880-6887, 2021
FARE: Enabling Fine-grained Attack Categorization under Low-quality Labeled Data
J Liang, W Guo, T Luo, V Honavar, G Wang, X Xing
Proceedings of The 28th Network and Distributed System Security Symposium (NDSS), 2021
Adversarial Policy Training against Deep Reinforcement Learning
X Wu, W Guo, H Wei, X Xing
30th {USENIX} Security Symposium ({USENIX} Security 21), 2021
DANCE: Enhancing saliency maps using decoys
Y Lu, W Guo, X Xing, WS Noble
Proceedings of The 38th International Conference on Machine Learning (ICML), 2021
Decoy-enhanced Saliency Maps
YY Lu, W Guo, X Xing, W Noble
Distributed Fault Diagnosis of Plantwide Process for Fuel Cell Power System
S Li, W Guo, Y Yang
Journal of Computational and Theoretical Nanoscience 14 (4), 1876-1885, 2017
The system can't perform the operation now. Try again later.
Articles 1–18