Steven H. H. Ding
Orcid: 0000-0003-4513-200X
According to our database1,
Steven H. H. Ding
authored at least 45 papers
between 2015 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
An empirical study on developers' shared conversations with ChatGPT in GitHub pull requests and issues.
Empir. Softw. Eng., November, 2024
VeriBin: A Malware Authorship Verification Approach for APT Tracking through Explainable and Functionality-Debiasing Adversarial Representation Learning.
ACM Trans. Priv. Secur., August, 2024
Asm2Seq: Explainable Assembly Code Functional Summary Generation for Reverse Engineering and Vulnerability Analysis.
DTRAP, 2024
Chain-of-Experts (CoE): Reverse Engineering Software Bills of Materials for JavaScript Application Bundles through Code Clone Search.
CoRR, 2024
Dynamic Neural Control Flow Execution: An Agent-Based Deep Equilibrium Approach for Binary Vulnerability Detection.
CoRR, 2024
Proceedings of the 39th IEEE/ACM International Conference on Automated Software Engineering Workshops, 2024
Accelerating Autonomous Cyber Operations: A Symbolic Logic Planner Guided Reinforcement Learning Approach.
Proceedings of the International Conference on Computing, Networking and Communications, 2024
Ch4os: Discretized Generative Adversarial Network for Functionality-Preserving Evasive Modification on Malware.
Proceedings of the Artificial Neural Networks and Machine Learning - ICANN 2024, 2024
ERS0: Enhancing Military Cybersecurity with AI-Driven SBOM for Firmware Vulnerability Detection and Asset Management.
Proceedings of the 16th International Conference on Cyber Conflict: Over the Horizon, 2024
Dynamic Neural Control Flow Execution: an Agent-Based Deep Equilibrium Approach for Binary Vulnerability Detection.
Proceedings of the 33rd ACM International Conference on Information and Knowledge Management, 2024
2023
Expert Syst. Appl., December, 2023
VulANalyzeR: Explainable Binary Vulnerability Detection with Multi-task Learning and Attentional Graph Convolution.
ACM Trans. Priv. Secur., August, 2023
J. Inf. Secur. Appl., June, 2023
D2D-MAP: A Drone to Drone Authentication Protocol Using Physical Unclonable Functions.
IEEE Trans. Veh. Technol., April, 2023
SCS-Gan: Learning Functionality-Agnostic Stylometric Representations for Source Code Authorship Verification.
IEEE Trans. Software Eng., April, 2023
Pluvio: Assembly Clone Search for Out-of-domain Architectures and Libraries through Transfer Learning and Conditional Variational Information Bottleneck.
CoRR, 2023
Proceedings of the 20th IEEE/ACM International Conference on Mining Software Repositories, 2023
GenTAL: Generative Denoising Skip-gram Transformer for Unsupervised Binary Code Similarity Detection.
Proceedings of the International Joint Conference on Neural Networks, 2023
Unmasking of Maskware: Detection and Prevention of Next-Generation Mobile Crypto-Ransomware.
Proceedings of the Foundations and Practice of Security - 16th International Symposium, 2023
Milo: Attacking Deep Pre-trained Model for Programming Languages Tasks with Anti-analysis Code Obfuscation.
Proceedings of the 47th IEEE Annual Computers, Software, and Applications Conference, 2023
MaGnn: Binary-Source Code Matching by Modality-Sharing Graph Convolution for Binary Provenance Analysis.
Proceedings of the 47th IEEE Annual Computers, Software, and Applications Conference, 2023
Variational Autoencoder with Temporal Condition for Effective Shape-based Calcium Imaging Neuron Registration.
Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, 2023
2022
IEEE Trans. Intell. Transp. Syst., 2022
OD1NF1ST: True Skip Intrusion Detection and Avionics Network Cyber-attack Simulation.
ACM Trans. Cyber Phys. Syst., 2022
IEEE Trans. Aerosp. Electron. Syst., 2022
CamoDroid: An Android application analysis environment resilient against sandbox evasion.
J. Syst. Archit., 2022
TASR: Adversarial learning of topic-agnostic stylometric representations for informed crisis response through social media.
Inf. Process. Manag., 2022
SV1DUR: A Real-Time MIL-STD-1553 Bus Simulator with Flight Subsystems for Cyber-Attack Modeling and Assessments.
Proceedings of the IEEE Military Communications Conference, 2022
Adversarial Variational Modality Reconstruction and Regularization for Zero-Day Malware Variants Similarity Detection.
Proceedings of the IEEE International Conference on Data Mining, 2022
JARV1S: Phenotype Clone Search for Rapid Zero-Day Malware Triage and Functional Decomposition for Cyber Threat Intelligence.
Proceedings of the 14th International Conference on Cyber Conflict: Keep Moving!, 2022
H4rm0ny: A Competitive Zero-Sum Two-Player Markov Game for Multi-Agent Learning on Evasive Malware Generation and Detection.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2022
2021
ACM Trans. Manag. Inf. Syst., 2021
Comput. Secur., 2021
Proceedings of the 2021 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, 2021
Proceedings of the 16th International Conference on Software Technologies, 2021
Proceedings of the Foundations and Practice of Security - 14th International Symposium, 2021
2020
Inf. Process. Manag., 2020
2019
IEEE Trans. Cybern., 2019
ACM Trans. Asian Low Resour. Lang. Inf. Process., 2019
CoRR, 2019
Asm2Vec: Boosting Static Representation Robustness for Binary Clone Search against Code Obfuscation and Compiler Optimization.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019
2018
The Haply Development Platform: A Modular and Open-Sourced Entry Level Haptic Toolset.
Proceedings of the Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems, 2018
2016
Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2016
2015
ACM Trans. Inf. Syst. Secur., 2015