Fingerprint
Dive into the research topics where Hui Wang is active. These topic labels come from the works of this person. Together they form a unique fingerprint.
- 1 Similar Profiles
Collaborations and top research areas from the last five years
Recent external collaboration on country/territory level. Dive into details by clicking on the dots or
-
Rectifying Privacy and Efficacy Measurements in Machine Unlearning: A New Inference Attack Perspective
Naderloui, N., Yan, S., Wang, B., Fu, J., Wang, W. H., Liu, W. & Hong, Y., 2025, Proceedings of the 34th USENIX Security Symposium. USENIX Association, p. 5545-5564 20 p. (Proceedings of the 34th USENIX Security Symposium).Stevens Institute of Technology
Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › peer-review
-
Safeguarding Graph Neural Networks against Topology Inference Attacks
Fu, J., Hong, Y., Chen, Z. & Wang, W. H., Nov 22 2025, CCS 2025 - Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security. Association for Computing Machinery, Inc, p. 2144-2158 15 p. (CCS 2025 - Proceedings of the 2025 ACM SIGSAC Conference on Computer and Communications Security).Stevens Institute of Technology
Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › peer-review
Open Access -
Verification of Incomplete Graph Unlearning through Adversarial Perturbations
Wu, K. & Wang, W. H., Aug 3 2025, KDD 2025 - Proceedings of the 31st ACM SIGKDD Conference on Knowledge Discovery and Data Mining. Association for Computing Machinery, p. 3204-3215 12 p. (Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining; vol. 2).Stevens Institute of Technology
Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › peer-review
Open Access -
Discriminative Forests Improve Generative Diversity for Generative Adversarial Networks
Chen, J., Li, J., Song, C., Li, B., Chen, Q., Gao, H., Wang, W. H., Xu, Z. & Shi, X., Mar 25 2024, In: Proceedings of the AAAI Conference on Artificial Intelligence. 38, 10, p. 11338-11345 8 p.Stevens Institute of Technology
Research output: Contribution to journal › Conference article › peer-review
Open Access -
Interaction-level Membership Inference Attack against Recommender Systems with Long-tailed Distribution
Zhong, D., Wang, X., Xu, Z., Xu, J. & Wang, W. H., Oct 21 2024, CIKM 2024 - Proceedings of the 33rd ACM International Conference on Information and Knowledge Management. Association for Computing Machinery, p. 3433-3442 10 p. (International Conference on Information and Knowledge Management, Proceedings).Stevens Institute of Technology
Research output: Chapter in Book/Report/Conference proceeding › Conference contribution › peer-review