Philippe Charland

Orcid: 0000-0003-4051-9942

According to our database1, Philippe Charland authored at least 41 papers between 2006 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
A Comprehensive Analysis of Explainable AI for Malware Hunting.
ACM Comput. Surv., December, 2024

Asm2Seq: Explainable Assembly Code Functional Summary Generation for Reverse Engineering and Vulnerability Analysis.
DTRAP, 2024

Chain-of-Experts (CoE): Reverse Engineering Software Bills of Materials for JavaScript Application Bundles through Code Clone Search.
CoRR, 2024

Dynamic Neural Control Flow Execution: An Agent-Based Deep Equilibrium Approach for Binary Vulnerability Detection.
CoRR, 2024

VulEXplaineR: XAI for Vulnerability Detection on Assembly Code.
Proceedings of the Machine Learning and Knowledge Discovery in Databases. Applied Data Science Track, 2024

AsmDocGen: Generating Functional Natural Language Descriptions for Assembly Code.
Proceedings of the 19th International Conference on Software Technologies, 2024

GAGE: Genetic Algorithm-Based Graph Explainer for Malware Analysis.
Proceedings of the 40th IEEE International Conference on Data Engineering, 2024

BETAC: Bidirectional Encoder Transformer for Assembly Code Function Name Recovery.
Proceedings of the 20th International Conference on the Design of Reliable Communication Networks, 2024

ERS0: Enhancing Military Cybersecurity with AI-Driven SBOM for Firmware Vulnerability Detection and Asset Management.
Proceedings of the 16th International Conference on Cyber Conflict: Over the Horizon, 2024

Dynamic Neural Control Flow Execution: an Agent-Based Deep Equilibrium Approach for Binary Vulnerability Detection.
Proceedings of the 33rd ACM International Conference on Information and Knowledge Management, 2024

2023
VulANalyzeR: Explainable Binary Vulnerability Detection with Multi-task Learning and Attentional Graph Convolution.
ACM Trans. Priv. Secur., August, 2023

Pluvio: Assembly Clone Search for Out-of-domain Architectures and Libraries through Transfer Learning and Conditional Variational Information Bottleneck.
CoRR, 2023

GenTAL: Generative Denoising Skip-gram Transformer for Unsupervised Binary Code Similarity Detection.
Proceedings of the International Joint Conference on Neural Networks, 2023

2022
DyAdvDefender: An instance-based online machine learning model for perturbation-trial-based black-box adversarial defense.
Inf. Sci., 2022

Adversarial Variational Modality Reconstruction and Regularization for Zero-Day Malware Variants Similarity Detection.
Proceedings of the IEEE International Conference on Data Mining, 2022

JARV1S: Phenotype Clone Search for Rapid Zero-Day Malware Triage and Functional Decomposition for Cyber Threat Intelligence.
Proceedings of the 14th International Conference on Cyber Conflict: Keep Moving!, 2022

H4rm0ny: A Competitive Zero-Sum Two-Player Markov Game for Multi-Agent Learning on Evasive Malware Generation and Detection.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2022

2021
<i>I-MAD</i>: Interpretable malware detector using Galaxy Transformer.
Comput. Secur., 2021

A Novel and Dedicated Machine Learning Model for Malware Classification.
Proceedings of the 16th International Conference on Software Technologies, 2021

2019
I-MAD: A Novel Interpretable Malware Detector Using Hierarchical Transformer.
CoRR, 2019

Asm2Vec: Boosting Static Representation Robustness for Binary Clone Search against Code Obfuscation and Compiler Optimization.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019

2016
Kam1n0: MapReduce-based Assembly Clone Search for Reverse Engineering.
Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2016

2015
Scalable code clone search for malware analysis.
Digit. Investig., 2015

2014
BinClone: Detecting Code Clones in Malware.
Proceedings of the Eighth International Conference on Software Security and Reliability, 2014

Enriching SE Ontologies with Bug Quality.
Proceedings of the Semantic Web Enabled Software Engineering, 2014

2012
Shuffling and randomization for scalable source code clone detection.
Proceedings of the Proceeding of the 6th International Workshop on Software Clones, 2012

RESource: A Framework for Online Matching of Assembly with Open Source Code.
Proceedings of the Foundations and Practice of Security - 5th International Symposium, 2012

Semantic Web - The Missing Link in Global Source Code Analysis?
Proceedings of the 36th Annual IEEE Computer Software and Applications Conference, 2012

2011
Internet-scale Real-time Code Clone Search Via Multi-level Indexing.
Proceedings of the 18th Working Conference on Reverse Engineering, 2011

SeClone - A Hybrid Approach to Internet-Scale Real-Time Code Clone Search.
Proceedings of the 19th IEEE International Conference on Program Comprehension, 2011

Quality Validation through Pattern Detection - A Semantic Web Perspective.
Proceedings of the 35th Annual IEEE International Computer Software and Applications Conference, 2011

Reasoning about Global Clones: Scalable Semantic Clone Detection.
Proceedings of the 35th Annual IEEE International Computer Software and Applications Conference, 2011

2009
A Quality Perspective of Software Evolvability Using Semantic Analysis.
Proceedings of the 3rd IEEE International Conference on Semantic Computing (ICSC 2009), 2009

Beyond generated software documentation - A web 2.0 perspective.
Proceedings of the 25th IEEE International Conference on Software Maintenance (ICSM 2009), 2009

A Contextual Guidance Approach to Software Security.
Proceedings of the 33rd Annual IEEE International Computer Software and Applications Conference, 2009

2008
A survey and evaluation of tool features for understanding reverse-engineered sequence diagrams.
J. Softw. Maintenance Res. Pract., 2008

Beyond Information Silos - an Omnipresent Approach to Software Evolution.
Int. J. Semantic Comput., 2008

Story-driven approach to software evolution.
IET Softw., 2008

Mining Bug Repositories--A Quality Assessment.
Proceedings of the 2008 International Conferences on Computational Intelligence for Modelling, 2008

2007
Software Visualization - A Process Perspective.
Proceedings of the 4th IEEE International Workshop on Visualizing Software for Understanding and Analysis, 2007

2006
A Unified Ontology-Based Process Model for Software Maintenance and Comprehension.
Proceedings of the Models in Software Engineering, 2006


  Loading...