Xinda Wang

Orcid: 0000-0003-3648-1750

Affiliations:
  • University of Texas at Dallas, Department of Computer Science, Richardson, TX, USA
  • George Mason University, VA, USA (Ph.D., 2023)


According to our database1, Xinda Wang authored at least 14 papers between 2019 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
A Hybrid System Call Profiling Approach for Container Protection.
IEEE Trans. Dependable Secur. Comput., 2024

FedCAP: Robust Federated Learning via Customized Aggregation and Personalization.
CoRR, 2024

Enhancing Pre-Trained Language Models for Vulnerability Detection via Semantic-Preserving Data Augmentation.
CoRR, 2024

Bridging the Gap: A Study of AI-based Vulnerability Management between Industry and Academia.
Proceedings of the 54th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2024

BinGo: Identifying Security Patches in Binary Code with Graph Representation Learning.
Proceedings of the 19th ACM Asia Conference on Computer and Communications Security, 2024

2023
GraphSPD: Graph-Based Security Patch Detection with Enriched Code Semantics.
Proceedings of the 44th IEEE Symposium on Security and Privacy, 2023

Exploring Security Commits in Python.
Proceedings of the IEEE International Conference on Software Maintenance and Evolution, 2023

DeepEAD: Explainable Anomaly Detection from System Logs.
Proceedings of the IEEE International Conference on Communications, 2023

2022
SysCap: Profiling and Crosschecking Syscall and Capability Configurations for Docker Images.
Proceedings of the 10th IEEE Conference on Communications and Network Security, 2022

2021
PatchRNN: A Deep Learning-Based System for Security Patch Identification.
Proceedings of the 2021 IEEE Military Communications Conference, 2021

PatchDB: A Large-Scale Security Patch Dataset.
Proceedings of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2021

2020
A Machine Learning Approach to Classify Security Patches into Vulnerability Types.
Proceedings of the 8th IEEE Conference on Communications and Network Security, 2020

An Empirical Study of Secret Security Patch in Open Source Software.
Proceedings of the Adaptive Autonomous Secure Cyber Systems., 2020

2019
Detecting "0-Day" Vulnerability: An Empirical Study of Secret Security Patch in OSS.
Proceedings of the 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2019


  Loading...