Run Wang @ WHU-CS                                                      Home     Publications    Contact   

wangrun   Chinesename

Run Wang
Ph.D,  Associate Researcher

School of Cyber Science and Engineering
Wuhan University, China

Office:   Room B532   Office Tel:   027-68758132
Email:    wangrun@whu.edu.cn or runwang@yeah.net


      Research Topics

I am looking for highly motivated students who have background and interests in my research topics. Please drop me an email with your CV if you are interested.

About Me

News

Research Interests

     Recently, my primary research focus on Software and Systems Security, Data-driven Security, and AI Security.

Publications

* Corresponding Author
A complete list can be found in Google Scholar

    [2020]

  1. DeepSonar: Towards Effective and Robust Detection of AI-Synthesized Fake Voices
    Run Wang, Felix Juefei-Xu, Yihao Huang, Qing Guo, Xiaofei Xie, Lei Ma, Yang Liu.
    28th ACM International Conference on Multimedia (ACM MM’20), Seattle, USA. [CCF-A]
    (Oral Acceptance rate: 151/1698 = 8.8%) (Oral Presentation)

  2. Amora: Black-box Adversarial Morphing Attack
    Run Wang, Felix Juefei-Xu, Qing Guo, Yihao Huang, Xiaofei Xie, Lei Ma, Yang Liu.
    28th ACM International Conference on Multimedia (ACM MM’20), Seattle, USA. [CCF-A]
    (Oral Acceptance rate: 151/1698 = 8.8%) (Oral Presentation)

  3. FakePolisher: Making DeepFakes More Detection-Evasive by Shallow Reconstruction
    Yihao Huang, Felix Juefei-Xu, Run Wang*, Qing Guo, Lei Ma, Xiaofei Xie, Jianwen Li, Weikai Miao, Yang Liu, Geguang Pu*.
    28th ACM International Conference on Multimedia (ACM MM’20), Seattle, USA. [CCF-A]
    (Oral Acceptance rate: 151/1698 = 8.8%) (Oral Presentation)

  4. MGAttack: Toward More Query-efficient Black-box Attack by Microbial Genetic Algorithm
    Lina Wang, Kang Yang, Wenqi Wang, Run Wang*, Aoshuang Ye.
    28th ACM International Conference on Multimedia (ACM MM’20), Seattle, USA. [CCF-A]
    (Acceptance rate: 472/1698 = 27.8%)

  5. FakeSpotter: A Simple yet Robust Baseline for Spotting AI-Synthesized Fake Faces
    Run Wang, Felix Juefei-Xu, Lei Ma, Xiaofei Xie, Yihao Huang, Jian Wang and Yang Liu.
    Proceedings of the 29th International Joint Conference on Artificial Intelligence (IJCAI’20), Yokohama, Japan. [CCF-A] (Acceptance rate: 592/4717 = 12.6%)

    Media coverage: Synced Review.

  6. [2019]

  7. Capturing the Persistence of Facial Expression Features for Deepfake Video Detection
    Yiru Zhao, Wanfeng Ge, Wenxin Li, Run Wang, Lei Zhao and Jiang Ming.
    The 2019 International Conference on Information and Communications Security (ICICS’19), Beijing, China. [CCF-C] (Acceptance rate: 48/199 = 24.1%) (Accepted to appear)

  8. SmartPI: Understanding Permission Implications of Android Apps from User Reviews
    Run Wang, Zhibo Wang, Benxiao Tang, Lei Zhao, Lina Wang.
    IEEE Transactions on Mobile Computing(TMC), 19(12), 2020: 2933-2945, [CCF-A, SCI]

  9. Adversarial Examples Generation Approach for Tendency Classification on Chinese Texts (in Chinese)

    面向中文文本倾向性分类的对抗样本生成方法
    WANG Wen-Qi, WANG Run, WANG Li-Na, Tang Ben-Xiao.
    Journal of Software(软件学报), 30(8), 2019: 2415-2427. [EI]

  10. General Defense Method Defeating Motion Sensor Side Channel Based on Laplace Mechanism (in Chinese)

    基于Laplace机制的普适运动传感器侧信道防御方案
    TANG Benxiao, WANG Lina, WANG Run, ZHAO Lei, CHEN Qingsong.
    Journal of Software(软件学报), 30(8), 2019: 2392-2414. [EI]

  11. An Automated Crowdturfing Attack in Chinese User Reviews (in Chinese)

    一种面向中文用户评论的自动化众包攻击方法
    WANG Li’na, GUO Xiao’dong, and WANG Run.
    Journal on Communications (通信学报), 40(6), 2019: 1-13. [EI]

  12. Software Homology Detection with Dynamic Birthmarks Based on Memory Object Access Sequences (in Chinese)

    基于内存对象访问序列动态胎记的程序同源性判别方法
    CHEN Tong, ZHAO Lei, WANG Lina, WANG Run.
    Journal of Wuhan University (Natural Science Edition) (武汉大学学报·理学版), 02, 2019: 185-194.


  13. [2018]

  14. DeepRD: LSTM-based Siamese network for Android repackaged applications detection (in Chinese)

    DeepRD: 基于Siamese LSTM网络的Android重打包应用检测方法
    WANG Run, TANG Benxiao, and WANG Li’na.
    Journal on Communications (通信学报), 39(8), 2018: 69-82. [EI]

  15. SPRD: fast application repackaging detection approach in Android based on application’s UI and program dependency graph (in Chinese)

    SPRD: 基于应用UI和程序依赖图的Android重打包应用快速检测方法
    WANG Run, WANG Li’na, TANG Benxiao, and ZHAO Lei.
    Journal on Communications (通信学报), 39(3), 2018: 159-171. [EI]

  16. DroidFAR: An Anti-Obfuscation Method for Detecting Android Repackaged Application Based on Program Semantics (in Chinese)

    DroidFAR: 一种基于程序语义的Android重打包应用抗混淆检测方法
    WANG Run, TANG Benxiao, and WANG Li’na.
    Journal of Wuhan University (Natural Science Edition) (武汉大学学报·理学版), 05, 2018: 407-414.

  17. Niffler: A Context-Aware and User-Independent Side-Channel Attack System for Password Inference
    Benxiao Tang, Zhibo Wang, Run Wang, Lei Zhao, and Lina Wang
    Wireless Communications and Mobile Computing, 2018, 2018. [CCF-C, SCI]

  18. A Defensive Method Against Android Physical Sensor-Based Side-Channel Attack Based on Differential Privacy (in Chinese)

    基于差分隐私的Android物理传感器侧信道防御方法
    Tang Benxiao, Wang Lina, Wang Run, Zhao Lei, Wang Danlei.
    Journal of Computer Research and Development (计算机研究与发展), 55(7), 2018: 1371-1392. [EI]


  19. [before 2017]

  20. deExploit: Identifying misuses of input data to diagnose memory-corruption exploits at the binary level
    Run Wang, Pei Liu, Lei Zhao, Yueqiang Cheng, and Lina Wang.
    Journal of Systems & Software (JSS), 124,2017: 153-168. [CCF-B, SCI]

  21. Reversing and Identifying Overwritten Data Structures for Memory-corruption Exploit Diagnosis
    Lei Zhao, Run Wang, Lina Wang, Yueqiang Cheng.
    The 39th Annual International Computers, Software & Applications Conference [COMPSAC’15], Taiwan, China, 2015, 2: 434-443. (CCF-C, EI)

Manuscripts/Preprints

Invited Talks

Projects

  1. NSFC 61876134, ''Research on Malicious Information Detection Approach and Its Verification and Testing for Social Network Under Adversarial Attack Environment", (2018/06--2018/12), Participant

  2. National High-tech R&D Program of China(863 Program) 2015AA016004, ''The Technology of Security Behaviors Monitoring and Detection in Cloud Computing Environments", (2016/01--2016/10), Participant

  3. HUAWEI Projects, ''The Platform of Security Testing and Threats Evaluation for Wireless Products", (2013/09--2014/09), Participant

Correspondence

Mail

Run Wang
School of Cyber Science and Engineering, Wuhan University