Steven H. H. Ding

Orcid: 0000-0003-4513-200X

According to our database1, Steven H. H. Ding authored at least 31 papers between 2015 and 2023.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2023
TDRLM: Stylometric learning for authorship verification by Topic-Debiasing.
Expert Syst. Appl., December, 2023

VulANalyzeR: Explainable Binary Vulnerability Detection with Multi-task Learning and Attentional Graph Convolution.
ACM Trans. Priv. Secur., August, 2023

AIM: An Android Interpretable Malware detector based on application class modeling.
J. Inf. Secur. Appl., June, 2023

D2D-MAP: A Drone to Drone Authentication Protocol Using Physical Unclonable Functions.
IEEE Trans. Veh. Technol., April, 2023

SCS-Gan: Learning Functionality-Agnostic Stylometric Representations for Source Code Authorship Verification.
IEEE Trans. Software Eng., April, 2023

Pluvio: Assembly Clone Search for Out-of-domain Architectures and Libraries through Transfer Learning and Conditional Variational Information Bottleneck.
CoRR, 2023

GenTAL: Generative Denoising Skip-gram Transformer for Unsupervised Binary Code Similarity Detection.
Proceedings of the International Joint Conference on Neural Networks, 2023

Milo: Attacking Deep Pre-trained Model for Programming Languages Tasks with Anti-analysis Code Obfuscation.
Proceedings of the 47th IEEE Annual Computers, Software, and Applications Conference, 2023

MaGnn: Binary-Source Code Matching by Modality-Sharing Graph Convolution for Binary Provenance Analysis.
Proceedings of the 47th IEEE Annual Computers, Software, and Applications Conference, 2023

Variational Autoencoder with Temporal Condition for Effective Shape-based Calcium Imaging Neuron Registration.
Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, 2023

2022
AdaptIDS: Adaptive Intrusion Detection for Mission-Critical Aerospace Vehicles.
IEEE Trans. Intell. Transp. Syst., 2022

OD1NF1ST: True Skip Intrusion Detection and Avionics Network Cyber-attack Simulation.
ACM Trans. Cyber Phys. Syst., 2022

A Review and Analysis of Attack Vectors on MIL-STD-1553 Communication Bus.
IEEE Trans. Aerosp. Electron. Syst., 2022

CamoDroid: An Android application analysis environment resilient against sandbox evasion.
J. Syst. Archit., 2022

TASR: Adversarial learning of topic-agnostic stylometric representations for informed crisis response through social media.
Inf. Process. Manag., 2022

SV1DUR: A Real-Time MIL-STD-1553 Bus Simulator with Flight Subsystems for Cyber-Attack Modeling and Assessments.
Proceedings of the IEEE Military Communications Conference, 2022

Adversarial Variational Modality Reconstruction and Regularization for Zero-Day Malware Variants Similarity Detection.
Proceedings of the IEEE International Conference on Data Mining, 2022

JARV1S: Phenotype Clone Search for Rapid Zero-Day Malware Triage and Functional Decomposition for Cyber Threat Intelligence.
Proceedings of the 14th International Conference on Cyber Conflict: Keep Moving!, 2022

H4rm0ny: A Competitive Zero-Sum Two-Player Markov Game for Multi-Agent Learning on Evasive Malware Generation and Detection.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2022

2021
Detecting High-Engaging Breaking News Rumors in Social Media.
ACM Trans. Manag. Inf. Syst., 2021

<i>I-MAD</i>: Interpretable malware detector using Galaxy Transformer.
Comput. Secur., 2021

ER-AE: Differentially Private Text Generation for Authorship Anonymization.
Proceedings of the 2021 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, 2021

A Novel and Dedicated Machine Learning Model for Malware Classification.
Proceedings of the 16th International Conference on Software Technologies, 2021

Cut It: Deauthentication Attacks on Protected Management Frames in WPA2 and WPA3.
Proceedings of the Foundations and Practice of Security - 14th International Symposium, 2021

2020
Detecting breaking news rumors of emerging topics in social media.
Inf. Process. Manag., 2020

2019
Learning Stylometric Representations for Authorship Analysis.
IEEE Trans. Cybern., 2019

Arabic Authorship Attribution: An Extensive Study on Twitter Posts.
ACM Trans. Asian Low Resour. Lang. Inf. Process., 2019

I-MAD: A Novel Interpretable Malware Detector Using Hierarchical Transformer.
CoRR, 2019

Asm2Vec: Boosting Static Representation Robustness for Binary Clone Search against Code Obfuscation and Compiler Optimization.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019

2016
Kam1n0: MapReduce-based Assembly Clone Search for Reverse Engineering.
Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2016

2015
A Visualizable Evidence-Driven Approach for Authorship Attribution.
ACM Trans. Inf. Syst. Secur., 2015


  Loading...