Dinghao Wu
Orcid: 0000-0002-0741-5511Affiliations:
- Penn State University, USA
According to our database1,
Dinghao Wu
authored at least 123 papers
between 2003 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Adversary for Social Good: Leveraging Adversarial Attacks to Protect Personal Attribute Privacy.
ACM Trans. Knowl. Discov. Data, February, 2024
IEEE Trans. Inf. Forensics Secur., 2024
Proceedings of the 33rd USENIX Security Symposium, 2024
DOS-GNN: Dual-Feature Aggregations with Over-Sampling for Class-Imbalanced Fraud Detection On Graphs.
Proceedings of the International Joint Conference on Neural Networks, 2024
Proceedings of the Forty-first International Conference on Machine Learning, 2024
H<sup>2</sup>GNN: Graph Neural Networks with Homophilic and Heterophilic Feature Aggregations.
Proceedings of the Database Systems for Advanced Applications, 2024
Proceedings of the 62nd Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers), 2024
2023
Proc. ACM Program. Lang., October, 2023
On the Safety of Open-Sourced Large Language Models: Does Alignment Really Prevent Them From Being Misused?
CoRR, 2023
Knowledge Distillation on Cross-Modal Adversarial Reprogramming for Data-Limited Attribute Inference.
Proceedings of the Companion Proceedings of the ACM Web Conference 2023, 2023
Proceedings of the 32nd USENIX Security Symposium, 2023
Hierarchical Graph Neural Network for Patient Treatment Preference Prediction with External Knowledge.
Proceedings of the Advances in Knowledge Discovery and Data Mining, 2023
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023
Proceedings of the 56th Annual IEEE/ACM International Symposium on Microarchitecture, 2023
Proceedings of the 18th International Conference on Software Technologies, 2023
Proceedings of the International Conference on Machine Learning, 2023
FusionRetro: Molecule Representation Fusion via In-Context Learning for Retrosynthetic Planning.
Proceedings of the International Conference on Machine Learning, 2023
Proceedings of the IEEE International Conference on Data Mining, 2023
LibSteal: Model Extraction Attack Towards Deep Learning Compilers by Reversing DNN Binary Library.
Proceedings of the 18th International Conference on Evaluation of Novel Approaches to Software Engineering, 2023
2022
IEEE Trans. Software Eng., 2022
IEEE Trans. Inf. Forensics Secur., 2022
IEEE Trans. Cloud Comput., 2022
CoRR, 2022
Proceedings of the SIGIR '22: The 45th International ACM SIGIR Conference on Research and Development in Information Retrieval, Madrid, Spain, July 11, 2022
Adversary for Social Good: Leveraging Attribute-Obfuscating Attack to Protect User Privacy on Social Networks.
Proceedings of the Security and Privacy in Communication Networks, 2022
Adversarially Reprogramming Pretrained Neural Networks for Data-limited and Cost-efficient Malware Detection.
Proceedings of the 2022 SIAM International Conference on Data Mining, 2022
Proceedings of the International Conference on Machine Learning, 2022
Proceedings of the Information and Communications Security - 24th International Conference, 2022
Proceedings of the Thirty-Sixth AAAI Conference on Artificial Intelligence, 2022
2021
Zooming Into the Darknet: Characterizing Internet Background Radiation and its Structural Changes.
CoRR, 2021
IEEE Access, 2021
One Engine to Fuzz 'em All: Generic Language Processor Testing with Semantic Validation.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021
Turning Attacks into Protection: Social Media Privacy Protection Using Adversarial Attacks.
Proceedings of the 2021 SIAM International Conference on Data Mining, 2021
Proceedings of the IEEE International Conference on Networking, Architecture and Storage, 2021
Proceedings of the ISSTA '21: 30th ACM SIGSOFT International Symposium on Software Testing and Analysis, 2021
Proceedings of the International Joint Conference on Neural Networks, 2021
Proceedings of the 43rd IEEE/ACM International Conference on Software Engineering: Companion Proceedings, 2021
Proceedings of the 43rd IEEE/ACM International Conference on Software Engineering, 2021
Shedding light into the darknet: scanning characterization and detection of temporal changes.
Proceedings of the CoNEXT '21: The 17th International Conference on emerging Networking EXperiments and Technologies, Virtual Event, Munich, Germany, December 7, 2021
2020
IEEE Trans. Software Eng., 2020
Plagiarism Detection of Multi-threaded Programs Using Frequent Behavioral Pattern Mining.
Int. J. Softw. Eng. Knowl. Eng., 2020
IEEE Access, 2020
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020
Proceedings of the Machine Learning and Knowledge Discovery in Databases, 2020
Not All Coverage Measurements Are Equal: Fuzzing by Coverage Accounting for Input Prioritization.
Proceedings of the 27th Annual Network and Distributed System Security Symposium, 2020
Quantitative Assessment on the Limitations of Code Randomization for Legacy Binaries.
Proceedings of the IEEE European Symposium on Security and Privacy, 2020
SQUIRREL: Testing Database Management Systems with Language Validity and Coverage Feedback.
Proceedings of the CCS '20: 2020 ACM SIGSAC Conference on Computer and Communications Security, 2020
2019
IEEE Trans. Inf. Forensics Secur., 2019
Field experience with obfuscating million-user iOS apps in large enterprise mobile development.
Softw. Pract. Exp., 2019
EAI Endorsed Trans. Security Safety, 2019
Identifying Cache-Based Side Channels through Secret-Augmented Abstract Interpretation.
Proceedings of the 28th USENIX Security Symposium, 2019
Proceedings of the 41st International Conference on Software Engineering: Software Engineering Education and Training, 2019
Proceedings of the 19th IEEE International Symposium on High Assurance Systems Engineering, 2019
MetaHunt: Towards Taming Malware Mutation via Studying the Evolution of Metamorphic Virus.
Proceedings of the 3rd ACM Workshop on Software Protection, 2019
Proceedings of the Thirty-Third AAAI Conference on Artificial Intelligence, 2019
2018
Proceedings of the 29th IEEE International Symposium on Software Reliability Engineering, 2018
Protecting million-user iOS apps with obfuscation: motivations, pitfalls, and experience.
Proceedings of the 40th International Conference on Software Engineering: Software Engineering in Practice, 2018
Software protection on the go: a large-scale empirical study on mobile app obfuscation.
Proceedings of the 40th International Conference on Software Engineering, 2018
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018
2017
MalwareHunt: semantics-based malware diffing speedup by normalized basic block memoization.
J. Comput. Virol. Hacking Tech., 2017
Impeding behavior-based malware analysis via replacement attacks to malware specifications.
J. Comput. Virol. Hacking Tech., 2017
Semantics-Based Obfuscation-Resilient Binary Code Similarity Comparison with Applications to Software and Algorithm Plagiarism Detection.
IEEE Trans. Software Eng., 2017
Proceedings of the 26th USENIX Security Symposium, 2017
BinSim: Trace-based Semantic Binary Diffing via System Call Sliced Segment Equivalence Checking.
Proceedings of the 26th USENIX Security Symposium, 2017
Cryptographic Function Detection in Obfuscated Binaries via Bit-Precise Symbolic Loop Mapping.
Proceedings of the 2017 IEEE Symposium on Security and Privacy, 2017
Proceedings of the Security and Privacy in Communication Networks, 2017
Proceedings of the Security and Privacy in Communication Networks, 2017
Proceedings of the Security and Privacy in Communication Networks, 2017
Proceedings of the 32nd IEEE/ACM International Conference on Automated Software Engineering, 2017
Proceedings of the International Conference on Software Security and Assurance, 2017
Proceedings of the 2017 IEEE International Conference on Software Maintenance and Evolution, 2017
Proceedings of the 2017 IEEE International Conference on Software Maintenance and Evolution, 2017
Proceedings of the 39th International Conference on Software Engineering, 2017
Proceedings of the 39th International Conference on Software Engineering, 2017
Proceedings of the 2017 Workshop on Forming an Ecosystem Around Software Transformation, 2017
FEAST 2017: The Second Workshop on Forming an Ecosystem Around Software Transformation.
Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, 2017
2016
Deviation-Based Obfuscation-Resilient Program Equivalence Checking With Application to Software Plagiarism Detection.
IEEE Trans. Reliab., 2016
Int. J. People Oriented Program., 2016
Proceedings of the IEEE 23rd International Conference on Software Analysis, 2016
Proceedings of the 16th IEEE International Working Conference on Source Code Analysis and Manipulation, 2016
Proceedings of the 2016 IEEE International Conference on Software Quality, 2016
Proceedings of the 31st IEEE/ACM International Conference on Automated Software Engineering, 2016
Proceedings of the Information Security - 19th International Conference, 2016
Moving Target Defense Against Network Reconnaissance with Software Defined Networking.
Proceedings of the Information Security - 19th International Conference, 2016
Feature-Based Software Customization: Preliminary Analysis, Formalization, and Methods.
Proceedings of the 17th IEEE International Symposium on High Assurance Systems Engineering, 2016
Proceedings of the IEEE European Symposium on Security and Privacy, 2016
Proceedings of the 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2016
Proceedings of the 40th IEEE Annual Computer Software and Applications Conference, 2016
Program-object Level Data Flow Analysis with Applications to Data Leakage and Contamination Forensics.
Proceedings of the Sixth ACM on Conference on Data and Application Security and Privacy, 2016
2015
Program Characterization Using Runtime Values and Its Application to Software Plagiarism Detection.
IEEE Trans. Software Eng., 2015
J. Inf. Technol. Constr., 2015
Proceedings of the 24th USENIX Security Symposium, 2015
Proceedings of the 24th USENIX Security Symposium, 2015
Memoized Semantics-Based Binary Diffing with Application to Malware Lineage Inference.
Proceedings of the ICT Systems Security and Privacy Protection, 2015
A Preliminary Analysis and Case Study of Feature-Based Software Customization (Extended Abstract).
Proceedings of the 2015 IEEE International Conference on Software Quality, 2015
Proceedings of the 45th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2015
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015
Towards Discovering and Understanding Unexpected Hazards in Tailoring Antivirus Software for Android.
Proceedings of the 10th ACM Symposium on Information, 2015
Proceedings of the Applied Cryptography and Network Security, 2015
2014
Proceedings of the 7th ACM Conference on Security & Privacy in Wireless and Mobile Networks, 2014
Semantics-based obfuscation-resilient binary code similarity comparison with applications to software plagiarism detection.
Proceedings of the 22nd ACM SIGSOFT International Symposium on Foundations of Software Engineering, (FSE-22), Hong Kong, China, November 16, 2014
Proceedings of the International Conference on Security and Privacy in Communication Networks, 2014
Proceedings of the ACM/IEEE International Conference on Automated Software Engineering, 2014
Proceedings of the 25th IEEE International Symposium on Software Reliability Engineering, 2014
Proceedings of the Secure Cloud Computing, 2014
Proceedings of the Innovative Practices in Teaching Information Sciences and Technology, 2014
2013
Secur. Commun. Networks, 2013
Proceedings of the Trust and Trustworthy Computing - 6th International Conference, 2013
2012
Kruiser: Semi-synchronized Non-blocking Concurrent Kernel Heap Buffer Overflow Monitoring.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012
Proceedings of the International Symposium on Software Testing and Analysis, 2012
Proceedings of the 12th IEEE/ACM International Symposium on Cluster, 2012
2011
Get Online Support, Feel Better - Sentiment Analysis and Dynamics in an Online Cancer Survivor Community.
Proceedings of the PASSAT/SocialCom 2011, Privacy, 2011
Proceedings of the Security and Privacy in Communication Networks, 2011
Proceedings of the 32nd ACM SIGPLAN Conference on Programming Language Design and Implementation, 2011
Proceedings of the 8th Proceedings of the International Conference on Information Systems for Crisis Response and Management, 2011
Value-based program characterization and its application to software plagiarism detection.
Proceedings of the 33rd International Conference on Software Engineering, 2011
2004
Proceedings of the Verification, 2004
Proceedings of the ACM SIGPLAN 2004 Conference on Programming Language Design and Implementation 2004, 2004
2003
Proceedings of the 5th International ACM SIGPLAN Conference on Principles and Practice of Declarative Programming, 2003
Proceedings of the ACM SIGPLAN 2003 Conference on Programming Language Design and Implementation 2003, 2003