Follow
Steven H. H. Ding
Steven H. H. Ding
Data Mining and Security Lab, McGill University
Verified email at mail.mcgill.ca - Homepage
Title
Cited by
Cited by
Year
Asm2vec: Boosting static representation robustness for binary clone search against code obfuscation and compiler optimization
SHH Ding, BCM Fung, P Charland
2019 ieee symposium on security and privacy (sp), 472-489, 2019
4312019
Detecting breaking news rumors of emerging topics in social media
SA Alkhodair, SHH Ding, BCM Fung, J Liu
Information Processing & Management 57 (2), 102018, 2020
2422020
Learning stylometric representations for authorship analysis
SHH Ding, BCM Fung, F Iqbal, WK Cheung
IEEE transactions on cybernetics 49 (1), 107-121, 2017
1312017
Kam1n0: Mapreduce-based assembly clone search for reverse engineering
SHH Ding, BCM Fung, P Charland
Proceedings of the 22nd ACM SIGKDD international conference on knowledge …, 2016
972016
ER-AE: Differentially private text generation for authorship anonymization
H Bo, SHH Ding, B Fung, F Iqbal
arXiv preprint arXiv:1907.08736, 2019
392019
I-mad: Interpretable malware detector using galaxy transformer
MQ Li, BCM Fung, P Charland, SHH Ding
Computers & Security 108, 102371, 2021
352021
A visualizable evidence-driven approach for authorship attribution
SHH Ding, BCM Fung, M Debbabi
ACM Transactions on Information and System Security (TISSEC) 17 (3), 1-30, 2015
342015
Arabic authorship attribution: An extensive study on twitter posts
MH Altakrori, F Iqbal, BCM Fung, SHH Ding, A Tubaishat
ACM Transactions on Asian and Low-Resource Language Information Processing …, 2018
302018
A review and analysis of attack vectors on MIL-STD-1553 communication bus
K Lounis, Z Mansour, M Wrana, MA Elsayed, SHH Ding, M Zulkernine
IEEE Transactions on Aerospace and Electronic Systems 58 (6), 5586-5606, 2022
202022
Detecting high-engaging breaking news rumors in social media
SA Alkhodair, BCM Fung, SHH Ding, WK Cheung, SC Huang
ACM Transactions on Management Information Systems (TMIS) 12 (1), 1-16, 2020
202020
D2D-MAP: A drone to drone authentication protocol using physical unclonable functions
K Lounis, SHH Ding, M Zulkernine
IEEE Transactions on Vehicular Technology 72 (4), 5079-5093, 2022
192022
CamoDroid: An Android application analysis environment resilient against sandbox evasion
F Faghihi, M Zulkernine, S Ding
Journal of Systems Architecture 125, 102452, 2022
162022
AdaptIDS: Adaptive intrusion detection for mission-critical aerospace vehicles
MA Elsayed, M Wrana, Z Mansour, K Lounis, SHH Ding, M Zulkernine
IEEE Transactions on Intelligent Transportation Systems 23 (12), 23459-23473, 2022
122022
I-MAD: A novel interpretable malware detector using hierarchical transformer
MQ Li, B Fung, P Charland, SHH Ding
arXiv preprint arXiv:1909.06865, 2019
112019
VulANalyzeR: Explainable Binary Vulnerability Detection with Multi-Task Learning and Attentional Graph Convolution
L Li, SHH Ding, Y Tian, BCM Fung, P Charland, W Ou, L Song, C Chen
ACM Transactions on Privacy and Security, 2023
92023
Scs-gan: Learning functionality-agnostic stylometric representations for source code authorship verification
W Ou, SHH Ding, Y Tian, L Song
IEEE Transactions on Software Engineering 49 (4), 1426-1442, 2022
82022
Cut It: Deauthentication attacks on protected management frames in WPA2 and WPA3
K Lounis, SHH Ding, M Zulkernine
International symposium on foundations and practice of security, 235-252, 2021
82021
OD1NF1ST: True skip intrusion detection and avionics network cyber-attack simulation
MM Wrana, M Elsayed, K Lounis, Z Mansour, S Ding, M Zulkernine
ACM Transactions on Cyber-Physical Systems (TCPS) 6 (4), 1-27, 2022
72022
AIM: An Android Interpretable Malware Detector based on Application Class Modeling  
F Faghihi, M Zulkernine, S Ding
Journal of Information Security and Applications, 2023
52023
SV1DUR: A real-time MIL-STD-1553 bus simulator with flight subsystems for cyber-attack modeling and assessments
J Banks, R Kerr, S Ding, M Zulkernine
MILCOM 2022-2022 IEEE Military Communications Conference (MILCOM), 522-528, 2022
52022
The system can't perform the operation now. Try again later.
Articles 1–20