Steven H. H. Ding

Orcid: 0000-0003-4513-200X

According to our database1, Steven H. H. Ding authored at least 45 papers between 2015 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
An empirical study on developers' shared conversations with ChatGPT in GitHub pull requests and issues.
Empir. Softw. Eng., November, 2024

VeriBin: A Malware Authorship Verification Approach for APT Tracking through Explainable and Functionality-Debiasing Adversarial Representation Learning.
ACM Trans. Priv. Secur., August, 2024

Asm2Seq: Explainable Assembly Code Functional Summary Generation for Reverse Engineering and Vulnerability Analysis.
DTRAP, 2024

Chain-of-Experts (CoE): Reverse Engineering Software Bills of Materials for JavaScript Application Bundles through Code Clone Search.
CoRR, 2024

Dynamic Neural Control Flow Execution: An Agent-Based Deep Equilibrium Approach for Binary Vulnerability Detection.
CoRR, 2024

Automating SBOM Generation with Zero-Shot Semantic Similarity.
CoRR, 2024

A First Look at Self-Admitted Miscommunications in GitHub Issues.
Proceedings of the 39th IEEE/ACM International Conference on Automated Software Engineering Workshops, 2024

Accelerating Autonomous Cyber Operations: A Symbolic Logic Planner Guided Reinforcement Learning Approach.
Proceedings of the International Conference on Computing, Networking and Communications, 2024

Ch4os: Discretized Generative Adversarial Network for Functionality-Preserving Evasive Modification on Malware.
Proceedings of the Artificial Neural Networks and Machine Learning - ICANN 2024, 2024

ERS0: Enhancing Military Cybersecurity with AI-Driven SBOM for Firmware Vulnerability Detection and Asset Management.
Proceedings of the 16th International Conference on Cyber Conflict: Over the Horizon, 2024

Dynamic Neural Control Flow Execution: an Agent-Based Deep Equilibrium Approach for Binary Vulnerability Detection.
Proceedings of the 33rd ACM International Conference on Information and Knowledge Management, 2024

2023
TDRLM: Stylometric learning for authorship verification by Topic-Debiasing.
Expert Syst. Appl., December, 2023

VulANalyzeR: Explainable Binary Vulnerability Detection with Multi-task Learning and Attentional Graph Convolution.
ACM Trans. Priv. Secur., August, 2023

AIM: An Android Interpretable Malware detector based on application class modeling.
J. Inf. Secur. Appl., June, 2023

D2D-MAP: A Drone to Drone Authentication Protocol Using Physical Unclonable Functions.
IEEE Trans. Veh. Technol., April, 2023

SCS-Gan: Learning Functionality-Agnostic Stylometric Representations for Source Code Authorship Verification.
IEEE Trans. Software Eng., April, 2023

Pluvio: Assembly Clone Search for Out-of-domain Architectures and Libraries through Transfer Learning and Conditional Variational Information Bottleneck.
CoRR, 2023

Understanding the Time to First Response in GitHub Pull Requests.
Proceedings of the 20th IEEE/ACM International Conference on Mining Software Repositories, 2023

GenTAL: Generative Denoising Skip-gram Transformer for Unsupervised Binary Code Similarity Detection.
Proceedings of the International Joint Conference on Neural Networks, 2023

Unmasking of Maskware: Detection and Prevention of Next-Generation Mobile Crypto-Ransomware.
Proceedings of the Foundations and Practice of Security - 16th International Symposium, 2023

Milo: Attacking Deep Pre-trained Model for Programming Languages Tasks with Anti-analysis Code Obfuscation.
Proceedings of the 47th IEEE Annual Computers, Software, and Applications Conference, 2023

MaGnn: Binary-Source Code Matching by Modality-Sharing Graph Convolution for Binary Provenance Analysis.
Proceedings of the 47th IEEE Annual Computers, Software, and Applications Conference, 2023

Variational Autoencoder with Temporal Condition for Effective Shape-based Calcium Imaging Neuron Registration.
Proceedings of the IEEE International Conference on Bioinformatics and Biomedicine, 2023

2022
AdaptIDS: Adaptive Intrusion Detection for Mission-Critical Aerospace Vehicles.
IEEE Trans. Intell. Transp. Syst., 2022

OD1NF1ST: True Skip Intrusion Detection and Avionics Network Cyber-attack Simulation.
ACM Trans. Cyber Phys. Syst., 2022

A Review and Analysis of Attack Vectors on MIL-STD-1553 Communication Bus.
IEEE Trans. Aerosp. Electron. Syst., 2022

CamoDroid: An Android application analysis environment resilient against sandbox evasion.
J. Syst. Archit., 2022

TASR: Adversarial learning of topic-agnostic stylometric representations for informed crisis response through social media.
Inf. Process. Manag., 2022

SV1DUR: A Real-Time MIL-STD-1553 Bus Simulator with Flight Subsystems for Cyber-Attack Modeling and Assessments.
Proceedings of the IEEE Military Communications Conference, 2022

Adversarial Variational Modality Reconstruction and Regularization for Zero-Day Malware Variants Similarity Detection.
Proceedings of the IEEE International Conference on Data Mining, 2022

JARV1S: Phenotype Clone Search for Rapid Zero-Day Malware Triage and Functional Decomposition for Cyber Threat Intelligence.
Proceedings of the 14th International Conference on Cyber Conflict: Keep Moving!, 2022

H4rm0ny: A Competitive Zero-Sum Two-Player Markov Game for Multi-Agent Learning on Evasive Malware Generation and Detection.
Proceedings of the IEEE International Conference on Cyber Security and Resilience, 2022

2021
Detecting High-Engaging Breaking News Rumors in Social Media.
ACM Trans. Manag. Inf. Syst., 2021

<i>I-MAD</i>: Interpretable malware detector using Galaxy Transformer.
Comput. Secur., 2021

ER-AE: Differentially Private Text Generation for Authorship Anonymization.
Proceedings of the 2021 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies, 2021

A Novel and Dedicated Machine Learning Model for Malware Classification.
Proceedings of the 16th International Conference on Software Technologies, 2021

Cut It: Deauthentication Attacks on Protected Management Frames in WPA2 and WPA3.
Proceedings of the Foundations and Practice of Security - 14th International Symposium, 2021

2020
Detecting breaking news rumors of emerging topics in social media.
Inf. Process. Manag., 2020

2019
Learning Stylometric Representations for Authorship Analysis.
IEEE Trans. Cybern., 2019

Arabic Authorship Attribution: An Extensive Study on Twitter Posts.
ACM Trans. Asian Low Resour. Lang. Inf. Process., 2019

I-MAD: A Novel Interpretable Malware Detector Using Hierarchical Transformer.
CoRR, 2019

Asm2Vec: Boosting Static Representation Robustness for Binary Clone Search against Code Obfuscation and Compiler Optimization.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019

2018
The Haply Development Platform: A Modular and Open-Sourced Entry Level Haptic Toolset.
Proceedings of the Extended Abstracts of the 2018 CHI Conference on Human Factors in Computing Systems, 2018

2016
Kam1n0: MapReduce-based Assembly Clone Search for Reverse Engineering.
Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, 2016

2015
A Visualizable Evidence-Driven Approach for Authorship Attribution.
ACM Trans. Inf. Syst. Secur., 2015


  Loading...