Benjamin C. M. Fung

Orcid: 0000-0001-8423-2906

Affiliations:
  • McGill University
  • Concordia University


According to our database1, Benjamin C. M. Fung authored at least 141 papers between 2003 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Multidomain Object Detection Framework Using Feature Domain Knowledge Distillation.
IEEE Trans. Cybern., August, 2024

A Literature Review on Detecting, Verifying, and Mitigating Online Misinformation.
IEEE Trans. Comput. Soc. Syst., August, 2024

Better entity matching with transformers through ensembles.
Knowl. Based Syst., 2024

Survey on Explainable AI: Techniques, challenges and open issues.
Expert Syst. Appl., 2024

Dynamic Neural Control Flow Execution: An Agent-Based Deep Equilibrium Approach for Binary Vulnerability Detection.
CoRR, 2024

Carthago Delenda Est: Co-opetitive Indirect Information Diffusion Model for Influence Operations on Online Social Media.
CoRR, 2024

VulEXplaineR: XAI for Vulnerability Detection on Assembly Code.
Proceedings of the Machine Learning and Knowledge Discovery in Databases. Applied Data Science Track, 2024

AsmDocGen: Generating Functional Natural Language Descriptions for Assembly Code.
Proceedings of the 19th International Conference on Software Technologies, 2024

GAGE: Genetic Algorithm-Based Graph Explainer for Malware Analysis.
Proceedings of the 40th IEEE International Conference on Data Engineering, 2024

BETAC: Bidirectional Encoder Transformer for Assembly Code Function Name Recovery.
Proceedings of the 20th International Conference on the Design of Reliable Communication Networks, 2024

2023
Adaptive Integration of Categorical and Multi-relational Ontologies with EHR Data for Medical Concept Embedding.
ACM Trans. Intell. Syst. Technol., December, 2023

Technological Solutions to Online Toxicity: Potential and Pitfalls.
IEEE Technol. Soc. Mag., December, 2023

VulANalyzeR: Explainable Binary Vulnerability Detection with Multi-task Learning and Attentional Graph Convolution.
ACM Trans. Priv. Secur., August, 2023

Differentially Private Release of Heterogeneous Network for Managing Healthcare Data.
ACM Trans. Knowl. Discov. Data, July, 2023

Deep learning-enabled anomaly detection for IoT systems.
Internet Things, April, 2023

Pluvio: Assembly Clone Search for Out-of-domain Architectures and Libraries through Transfer Learning and Conditional Variational Information Bottleneck.
CoRR, 2023

The Age of Ransomware: A Survey on the Evolution, Taxonomy, and Research Directions.
IEEE Access, 2023

Of Stances, Themes, and Anomalies in COVID-19 Mask-Wearing Tweets.
IEEE Access, 2023

A Novel Deep Multi-head Attentive Vulnerable Line Detector.
Proceedings of the International Neural Network Society Workshop on Deep Learning Innovations and Applications, 2023

2022
Learning Inter-Modal Correspondence and Phenotypes From Multi-Modal Electronic Health Records.
IEEE Trans. Knowl. Data Eng., 2022

DyAdvDefender: An instance-based online machine learning model for perturbation-trial-based black-box adversarial defense.
Inf. Sci., 2022

Distinguishing between fake news and satire with transformers.
Expert Syst. Appl., 2022

Towards Adaptive Cybersecurity for Green IoT.
Proceedings of the IEEE International Conference on Internet of Things and Intelligence Systems, 2022

On the Effectiveness of Interpretable Feedforward Neural Network.
Proceedings of the International Joint Conference on Neural Networks, 2022

Interpretable Malware Classification based on Functional Analysis.
Proceedings of the 17th International Conference on Software Technologies, 2022

VDGraph2Vec: Vulnerability Detection in Assembly Code using Message Passing Neural Networks.
Proceedings of the 21st IEEE International Conference on Machine Learning and Applications, 2022

A Multifaceted Framework to Evaluate Evasion, Content Preservation, and Misattribution in Authorship Obfuscation Techniques.
Proceedings of the 2022 Conference on Empirical Methods in Natural Language Processing, 2022

JARV1S: Phenotype Clone Search for Rapid Zero-Day Malware Triage and Functional Decomposition for Cyber Threat Intelligence.
Proceedings of the 14th International Conference on Cyber Conflict: Keep Moving!, 2022

H4rm0ny: A Competitive Zero-Sum Two-Player Markov Game for Multi-Agent Learning on Evasive Malware Generation and Detection.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2022

2021
Detecting High-Engaging Breaking News Rumors in Social Media.
ACM Trans. Manag. Inf. Syst., 2021

Enabling Secure Trustworthiness Assessment and Privacy Protection in Integrating Data for Trading Person-Specific Information.
IEEE Trans. Engineering Management, 2021

An Advanced Noise Reduction and Edge Enhancement Algorithm.
Sensors, 2021

Enabling Technologies for Energy Cloud.
J. Parallel Distributed Comput., 2021

Malware classification and composition analysis: A survey of recent developments.
J. Inf. Secur. Appl., 2021

Differentially private data publishing for arbitrarily partitioned data.
Inf. Sci., 2021

The Topic Confusion Task: A Novel Scenario for Authorship Attribution.
CoRR, 2021

<i>I-MAD</i>: Interpretable malware detector using Galaxy Transformer.
Comput. Secur., 2021

Automatic Fall Risk Detection Based on Imbalanced Data.
IEEE Access, 2021

Toward Tweet-Mining Framework for Extracting Terrorist Attack-Related Information and Reporting.
IEEE Access, 2021

Image Dehazing in Disproportionate Haze Distributions.
IEEE Access, 2021

TedPar: Temporally Dependent PARAFAC2 Factorization for Phenotype-based Disease Progression Modeling.
Proceedings of the 2021 SIAM International Conference on Data Mining, 2021

ER-AE: Differentially Private Text Generation for Authorship Anonymization.
Proceedings of the 2021 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, 2021

VirtualGAN: Reducing Mode Collapse in Generative Adversarial Networks Using Virtual Mapping.
Proceedings of the International Joint Conference on Neural Networks, 2021

A Novel and Dedicated Machine Learning Model for Malware Classification.
Proceedings of the 16th International Conference on Software Technologies, 2021

A Novel Neural Network-Based Malware Severity Classification System.
Proceedings of the Software Technologies - 16th International Conference, 2021

The Topic Confusion Task: A Novel Evaluation Scenario for Authorship Attribution.
Proceedings of the Findings of the Association for Computational Linguistics: EMNLP 2021, 2021

2020
Heterogeneous data release for cluster analysis with differential privacy.
Knowl. Based Syst., 2020

sf SecDM: privacy-preserving data outsourcing framework with differential privacy.
Knowl. Inf. Syst., 2020

Detecting breaking news rumors of emerging topics in social media.
Inf. Process. Manag., 2020

Embedding for Anomaly Detection on Health Insurance Claims.
Proceedings of the 7th IEEE International Conference on Data Science and Advanced Analytics, 2020

DUGRA: Dual-Graph Representation Learning for Health Information Networks.
Proceedings of the 2020 IEEE International Conference on Big Data (IEEE BigData 2020), 2020

2019
Learning Stylometric Representations for Authorship Analysis.
IEEE Trans. Cybern., 2019

Arabic Authorship Attribution: An Extensive Study on Twitter Posts.
ACM Trans. Asian Low Resour. Lang. Inf. Process., 2019

I-MAD: A Novel Interpretable Malware Detector Using Hierarchical Transformer.
CoRR, 2019

Incremental Mining of High Utility Patterns in One Phase by Absence and Legacy-Based Pruning.
IEEE Access, 2019

A Hybrid Framework for Sentiment Analysis Using Genetic Algorithm Based Feature Reduction.
IEEE Access, 2019

Wordnet-Based Criminal Networks Mining for Cybercrime Investigation.
IEEE Access, 2019

Towards a Knowledge-Based Recommender System for Linking Electronic Patient Records With Continuing Medical Education Information at the Point of Care.
IEEE Access, 2019

Asm2Vec: Boosting Static Representation Robustness for Binary Clone Search against Code Obfuscation and Compiler Optimization.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019

Medical Concept Embedding with Multiple Ontological Representations.
Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence, 2019

Learning Phenotypes and Dynamic Patient Representations via RNN Regularized Collective Non-Negative Tensor Factorization.
Proceedings of the Thirty-Third AAAI Conference on Artificial Intelligence, 2019

2018
Differentially private multidimensional data publishing.
Knowl. Inf. Syst., 2018

Improving interpretations of topic modeling in microblogs.
J. Assoc. Inf. Sci. Technol., 2018

Opportunistic mining of top-<i>n</i> high utility patterns.
Inf. Sci., 2018

SafePath: Differentially-private publishing of passenger trajectories in transportation systems.
Comput. Networks, 2018

Joint Learning of Phenotypes and Diagnosis-Medication Correspondence via Hidden Interaction Tensor Factorization.
Proceedings of the Twenty-Seventh International Joint Conference on Artificial Intelligence, 2018

2017
Investigating the relation between lexical smells and change- and fault-proneness: an empirical study.
Softw. Qual. J., 2017

Revealing determinant factors for early breast cancer recurrence by decision tree.
Inf. Syst. Frontiers, 2017

2016
Mining High Utility Patterns in One Phase without Generating Candidates.
IEEE Trans. Knowl. Data Eng., 2016

Privacy-preserving data mashup model for trading person-specific information.
Electron. Commer. Res. Appl., 2016

Kam1n0: MapReduce-based Assembly Clone Search for Reverse Engineering.
Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2016

Panel: The State of Data: Invited Paper from panelists.
Proceedings of the 20th International Database Engineering & Applications Symposium, 2016

A Study of Children Facial Recognition for Privacy in Smart TV.
Proceedings of the Computational Modeling of Objects Presented in Images. Fundamentals, Methods, and Applications, 2016

2015
Anonymizing Social Network Data for Maximal Frequent-Sharing Pattern Mining.
Proceedings of the Recommendation and Search in Social Networks, 2015

A Visualizable Evidence-Driven Approach for Authorship Attribution.
ACM Trans. Inf. Syst. Secur., 2015

Mining known attack patterns from security-related events.
PeerJ Comput. Sci., 2015

Product customization of tablet computers based on the information of online reviews by customers.
J. Intell. Manuf., 2015

Preface.
Fundam. Informaticae, 2015

E-mail authorship attribution using customized associative classification.
Digit. Investig., 2015

Scalable code clone search for malware analysis.
Digit. Investig., 2015

Fusion: Privacy-Preserving Distributed Protocol for High-Dimensional Data Mashup.
Proceedings of the 21st IEEE International Conference on Parallel and Distributed Systems, 2015

Parallel Eclat for Opportunistic Mining of Frequent Itemsets.
Proceedings of the Database and Expert Systems Applications, 2015

Secure Outsourced Frequent Pattern Mining by Fully Homomorphic Encryption.
Proceedings of the Big Data Analytics and Knowledge Discovery, 2015

2014
Correlated network data publication via differential privacy.
VLDB J., 2014

\(m\) -Privacy for Collaborative Data Publishing.
IEEE Trans. Knowl. Data Eng., 2014

Secure Two-Party Differentially Private Data Release for Vertically Partitioned Data.
IEEE Trans. Dependable Secur. Comput., 2014

Analyzing topics and authors in chat logs for crime investigation.
Knowl. Inf. Syst., 2014

Quantifying the costs and benefits of privacy-preserving health data publishing.
J. Biomed. Informatics, 2014

Privacy-preserving trajectory stream publishing.
Data Knowl. Eng., 2014

BinClone: Detecting Code Clones in Malware.
Proceedings of the Eighth International Conference on Software Security and Reliability, 2014

Privacy-Preserving Medical Reports Publishing for Cluster Analysis.
Proceedings of the 6th International Conference on New Technologies, Mobility and Security, 2014

D-Mash: A Framework for Privacy-Preserving Data-as-a-Service Mashups.
Proceedings of the 2014 IEEE 7th International Conference on Cloud Computing, Anchorage, AK, USA, June 27, 2014

2013
Privacy-preserving heterogeneous health data sharing.
J. Am. Medical Informatics Assoc., 2013

A unified data mining solution for authorship analysis in anonymous textual communications.
Inf. Sci., 2013

Privacy-preserving trajectory data publishing by local suppression.
Inf. Sci., 2013

Subject-based semantic document clustering for digital forensic investigations.
Data Knowl. Eng., 2013

Modeling, extraction, and transformation of semantics in computer aided engineering systems.
Adv. Eng. Informatics, 2013

Preserving privacy and frequent sharing patterns for social network data publishing.
Proceedings of the Advances in Social Networks Analysis and Mining 2013, 2013

2012
Service-Oriented Architecture for High-Dimensional Private Data Mashup.
IEEE Trans. Serv. Comput., 2012

Mining criminal networks from unstructured text documents.
Digit. Investig., 2012

Privacy Preserving Record Linkage via grams Projections
CoRR, 2012

Mining Criminal Networks from Chat Log.
Proceedings of the 2012 IEEE/WIC/ACM International Conferences on Web Intelligence, 2012

Secure Distributed Framework for Achieving ε-Differential Privacy.
Proceedings of the Privacy Enhancing Technologies - 12th International Symposium, 2012

Differentially private transit data publication: a case study on the montreal transportation system.
Proceedings of the 18th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2012

Direct Discovery of High Utility Itemsets without Candidate Generation.
Proceedings of the 12th IEEE International Conference on Data Mining, 2012

Frequent grams based embedding for privacy preserving record linkage.
Proceedings of the 21st ACM International Conference on Information and Knowledge Management, 2012

2011
Anonymity meets game theory: secure data integration with malicious participants.
VLDB J., 2011

Publishing Set-Valued Data via Differential Privacy.
Proc. VLDB Endow., 2011

Differentially Private Trajectory Data Publication
CoRR, 2011

Verification of data pattern for interactive privacy preservation model.
Proceedings of the 2011 ACM Symposium on Applied Computing (SAC), TaiChung, Taiwan, March 21, 2011

Towards discovering criminal communities from textual data.
Proceedings of the 2011 ACM Symposium on Applied Computing (SAC), TaiChung, Taiwan, March 21, 2011

Differentially private data release for data mining.
Proceedings of the 17th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2011

Service-oriented architecture for sharing private spatial-temporal data.
Proceedings of the 2011 International Conference on Cloud and Service Computing, 2011

2010
Centralized and Distributed Anonymization for High-Dimensional Healthcare Data.
ACM Trans. Knowl. Discov. Data, 2010

Mining writeprints from anonymous e-mails for forensic investigation.
Digit. Investig., 2010

Privacy-preserving data publishing: A survey of recent developments.
ACM Comput. Surv., 2010

e-mail authorship verification for forensic investigation.
Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), 2010

Anonymizing data with quasi-sensitive attribute values.
Proceedings of the 19th ACM Conference on Information and Knowledge Management, 2010

2009
Hierarchical Document Clustering.
Proceedings of the Encyclopedia of Data Warehousing and Mining, Second Edition (4 Volumes), 2009

Privacy-preserving data publishing for cluster analysis.
Data Knowl. Eng., 2009

Privacy protection for RFID data.
Proceedings of the 2009 ACM Symposium on Applied Computing (SAC), 2009

Anonymizing healthcare data: a case study on the blood transfusion service.
Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, Paris, France, June 28, 2009

Service-Oriented Architecture for Privacy-Preserving Data Mashup.
Proceedings of the IEEE International Conference on Web Services, 2009

Preserving Privacy for Location-Based Services with Continuous Queries.
Proceedings of IEEE International Conference on Communications, 2009

Privacy-preserving data mashup.
Proceedings of the EDBT 2009, 2009

Walking in the crowd: anonymizing trajectory data for pattern analysis.
Proceedings of the 18th ACM Conference on Information and Knowledge Management, 2009

Anonymizing location-based RFID data.
Proceedings of the Canadian Conference on Computer Science & Software Engineering, 2009

2008
A novel approach of mining write-prints for authorship attribution in e-mail forensics.
Digit. Investig., 2008

A framework for privacy-preserving cluster analysis.
Proceedings of the IEEE International Conference on Intelligence and Security Informatics, 2008

Publishing Sensitive Transactions for Itemset Utility.
Proceedings of the 8th IEEE International Conference on Data Mining (ICDM 2008), 2008

An Efficient Hybrid Hierarchical Document Clustering Method.
Proceedings of the Fifth International Conference on Fuzzy Systems and Knowledge Discovery, 2008

Anonymity for continuous data publishing.
Proceedings of the EDBT 2008, 2008

2007
Privacy Preserving Data Portals.
Proceedings of the Encyclopedia of Portal Technologies and Applications (2 Volumes), 2007

Anonymizing Classification Data for Privacy Preservation.
IEEE Trans. Knowl. Data Eng., 2007

Handicapping attacker's confidence: an alternative to <i>k</i> -anonymization.
Knowl. Inf. Syst., 2007

2006
Document Clustering Method Based on Frequent Co-occurring Words.
Proceedings of the 20st Pacific Asia Conference on Language, Information and Computation, 2006

Anonymizing sequential releases.
Proceedings of the Twelfth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2006

2005
Integrating Private Databases for Data Analysis.
Proceedings of the Intelligence and Security Informatics, 2005

Template-Based Privacy Preservation in Classification Problems.
Proceedings of the 5th IEEE International Conference on Data Mining (ICDM 2005), 2005

Top-Down Specialization for Information and Privacy Preservation.
Proceedings of the 21st International Conference on Data Engineering, 2005

2003
Hierarchical Document Clustering using Frequent Itemsets.
Proceedings of the Third SIAM International Conference on Data Mining, 2003


  Loading...