Asm2vec: Boosting static representation robustness for binary clone search against code obfuscation and compiler optimization SHH Ding, BCM Fung, P Charland 2019 ieee symposium on security and privacy (sp), 472-489, 2019 | 431 | 2019 |
Detecting breaking news rumors of emerging topics in social media SA Alkhodair, SHH Ding, BCM Fung, J Liu Information Processing & Management 57 (2), 102018, 2020 | 242 | 2020 |
Learning stylometric representations for authorship analysis SHH Ding, BCM Fung, F Iqbal, WK Cheung IEEE transactions on cybernetics 49 (1), 107-121, 2017 | 131 | 2017 |
Kam1n0: Mapreduce-based assembly clone search for reverse engineering SHH Ding, BCM Fung, P Charland Proceedings of the 22nd ACM SIGKDD international conference on knowledge …, 2016 | 97 | 2016 |
ER-AE: Differentially private text generation for authorship anonymization H Bo, SHH Ding, B Fung, F Iqbal arXiv preprint arXiv:1907.08736, 2019 | 39 | 2019 |
I-mad: Interpretable malware detector using galaxy transformer MQ Li, BCM Fung, P Charland, SHH Ding Computers & Security 108, 102371, 2021 | 35 | 2021 |
A visualizable evidence-driven approach for authorship attribution SHH Ding, BCM Fung, M Debbabi ACM Transactions on Information and System Security (TISSEC) 17 (3), 1-30, 2015 | 34 | 2015 |
Arabic authorship attribution: An extensive study on twitter posts MH Altakrori, F Iqbal, BCM Fung, SHH Ding, A Tubaishat ACM Transactions on Asian and Low-Resource Language Information Processing …, 2018 | 30 | 2018 |
A review and analysis of attack vectors on MIL-STD-1553 communication bus K Lounis, Z Mansour, M Wrana, MA Elsayed, SHH Ding, M Zulkernine IEEE Transactions on Aerospace and Electronic Systems 58 (6), 5586-5606, 2022 | 20 | 2022 |
Detecting high-engaging breaking news rumors in social media SA Alkhodair, BCM Fung, SHH Ding, WK Cheung, SC Huang ACM Transactions on Management Information Systems (TMIS) 12 (1), 1-16, 2020 | 20 | 2020 |
D2D-MAP: A drone to drone authentication protocol using physical unclonable functions K Lounis, SHH Ding, M Zulkernine IEEE Transactions on Vehicular Technology 72 (4), 5079-5093, 2022 | 19 | 2022 |
CamoDroid: An Android application analysis environment resilient against sandbox evasion F Faghihi, M Zulkernine, S Ding Journal of Systems Architecture 125, 102452, 2022 | 16 | 2022 |
AdaptIDS: Adaptive intrusion detection for mission-critical aerospace vehicles MA Elsayed, M Wrana, Z Mansour, K Lounis, SHH Ding, M Zulkernine IEEE Transactions on Intelligent Transportation Systems 23 (12), 23459-23473, 2022 | 12 | 2022 |
I-MAD: A novel interpretable malware detector using hierarchical transformer MQ Li, B Fung, P Charland, SHH Ding arXiv preprint arXiv:1909.06865, 2019 | 11 | 2019 |
VulANalyzeR: Explainable Binary Vulnerability Detection with Multi-Task Learning and Attentional Graph Convolution L Li, SHH Ding, Y Tian, BCM Fung, P Charland, W Ou, L Song, C Chen ACM Transactions on Privacy and Security, 2023 | 9 | 2023 |
Scs-gan: Learning functionality-agnostic stylometric representations for source code authorship verification W Ou, SHH Ding, Y Tian, L Song IEEE Transactions on Software Engineering 49 (4), 1426-1442, 2022 | 8 | 2022 |
Cut It: Deauthentication attacks on protected management frames in WPA2 and WPA3 K Lounis, SHH Ding, M Zulkernine International symposium on foundations and practice of security, 235-252, 2021 | 8 | 2021 |
OD1NF1ST: True skip intrusion detection and avionics network cyber-attack simulation MM Wrana, M Elsayed, K Lounis, Z Mansour, S Ding, M Zulkernine ACM Transactions on Cyber-Physical Systems (TCPS) 6 (4), 1-27, 2022 | 7 | 2022 |
AIM: An Android Interpretable Malware Detector based on Application Class Modeling F Faghihi, M Zulkernine, S Ding Journal of Information Security and Applications, 2023 | 5 | 2023 |
SV1DUR: A real-time MIL-STD-1553 bus simulator with flight subsystems for cyber-attack modeling and assessments J Banks, R Kerr, S Ding, M Zulkernine MILCOM 2022-2022 IEEE Military Communications Conference (MILCOM), 522-528, 2022 | 5 | 2022 |