Zum Hauptinhalt springen

Showing 1–12 of 12 results for author: Fung, B C M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2404.08562  [pdf, other

    cs.CR cs.AI cs.LG

    Dynamic Neural Control Flow Execution: An Agent-Based Deep Equilibrium Approach for Binary Vulnerability Detection

    Authors: Litao Li, Steven H. H. Ding, Andrew Walenstein, Philippe Charland, Benjamin C. M. Fung

    Abstract: Software vulnerabilities are a challenge in cybersecurity. Manual security patches are often difficult and slow to be deployed, while new vulnerabilities are created. Binary code vulnerability detection is less studied and more complex compared to source code, and this has important practical implications. Deep learning has become an efficient and powerful tool in the security domain, where it pro… ▽ More

    Submitted 3 April, 2024; originally announced April 2024.

  2. arXiv:2402.01905  [pdf, other

    cs.SI cs.CY cs.MA

    Carthago Delenda Est: Co-opetitive Indirect Information Diffusion Model for Influence Operations on Online Social Media

    Authors: Jwen Fai Low, Benjamin C. M. Fung, Farkhund Iqbal, Claude Fachkha

    Abstract: For a state or non-state actor whose credibility is bankrupt, relying on bots to conduct non-attributable, non-accountable, and seemingly-grassroots-but-decentralized-in-actuality influence/information operations (info ops) on social media can help circumvent the issue of trust deficit while advancing its interests. Planning and/or defending against decentralized info ops can be aided by computati… ▽ More

    Submitted 6 February, 2024; v1 submitted 2 February, 2024; originally announced February 2024.

    Comments: 60 pages, 9 figures, 1 table

  3. arXiv:2307.10631  [pdf, other

    cs.SE cs.AI

    Pluvio: Assembly Clone Search for Out-of-domain Architectures and Libraries through Transfer Learning and Conditional Variational Information Bottleneck

    Authors: Zhiwei Fu, Steven H. H. Ding, Furkan Alaca, Benjamin C. M. Fung, Philippe Charland

    Abstract: The practice of code reuse is crucial in software development for a faster and more efficient development lifecycle. In reality, however, code reuse practices lack proper control, resulting in issues such as vulnerability propagation and intellectual property infringements. Assembly clone search, a critical shift-right defence mechanism, has been effective in identifying vulnerable code resulting… ▽ More

    Submitted 20 July, 2023; originally announced July 2023.

    Comments: 13 pages and 4 figures. This work has been submitted to the IEEE for possible publication. Copyright may be transferred without notice, after which this version may no longer be accessible

  4. arXiv:2111.02303  [pdf, other

    cs.LG cs.AI

    On the Effectiveness of Interpretable Feedforward Neural Network

    Authors: Miles Q. Li, Benjamin C. M. Fung, Adel Abusitta

    Abstract: Deep learning models have achieved state-of-the-art performance in many classification tasks. However, most of them cannot provide an interpretation for their classification results. Machine learning models that are interpretable are usually linear or piecewise linear and yield inferior performance. Non-linear models achieve much better classification performance, but it is hard to interpret their… ▽ More

    Submitted 3 November, 2021; originally announced November 2021.

  5. arXiv:2104.08530  [pdf, other

    cs.CL

    The Topic Confusion Task: A Novel Scenario for Authorship Attribution

    Authors: Malik H. Altakrori, Jackie Chi Kit Cheung, Benjamin C. M. Fung

    Abstract: Authorship attribution is the problem of identifying the most plausible author of an anonymous text from a set of candidate authors. Researchers have investigated same-topic and cross-topic scenarios of authorship attribution, which differ according to whether new, unseen topics are used in the testing phase. However, neither scenario allows us to explain whether errors are caused by a failure to… ▽ More

    Submitted 9 September, 2021; v1 submitted 17 April, 2021; originally announced April 2021.

    Comments: 15 pages (9 + ref./appin.), 6 figures, Accepted to Findings of EMNLP 2021

  6. Learning Inter-Modal Correspondence and Phenotypes from Multi-Modal Electronic Health Records

    Authors: Kejing Yin, William K. Cheung, Benjamin C. M. Fung, Jonathan Poon

    Abstract: Non-negative tensor factorization has been shown a practical solution to automatically discover phenotypes from the electronic health records (EHR) with minimal human supervision. Such methods generally require an input tensor describing the inter-modal interactions to be pre-established; however, the correspondence between different modalities (e.g., correspondence between medications and diagnos… ▽ More

    Submitted 12 November, 2020; originally announced November 2020.

    Comments: Accepted by IEEE Transactions on Knowledge and Data Engineering (TKDE)

  7. arXiv:2006.06862   

    cs.LG q-bio.NC stat.AP stat.ML

    Deep Learning-based Stress Determinator for Mouse Psychiatric Analysis using Hippocampus Activity

    Authors: Donghan Liu, Benjamin C. M. Fung, Tak Pan Wong

    Abstract: Decoding neurons to extract information from transmission and employ them into other use is the goal of neuroscientists' study. Due to that the field of neuroscience is utilizing the traditional methods presently, we hence combine the state-of-the-art deep learning techniques with the theory of neuron decoding to discuss its potential of accomplishment. Besides, the stress level that is related to… ▽ More

    Submitted 27 June, 2020; v1 submitted 11 June, 2020; originally announced June 2020.

    Comments: The paper need re-evaluated and reviewed, may cause some significant changes

  8. arXiv:1909.06865  [pdf, other

    cs.LG cs.CR stat.ML

    I-MAD: Interpretable Malware Detector Using Galaxy Transformer

    Authors: Miles Q. Li, Benjamin C. M. Fung, Philippe Charland, Steven H. H. Ding

    Abstract: Malware currently presents a number of serious threats to computer users. Signature-based malware detection methods are limited in detecting new malware samples that are significantly different from known ones. Therefore, machine learning-based methods have been proposed, but there are two challenges these methods face. The first is to model the full semantics behind the assembly code of malware.… ▽ More

    Submitted 20 June, 2021; v1 submitted 15 September, 2019; originally announced September 2019.

    Comments: Published by Elsevier Computers & Security

  9. arXiv:1907.08736  [pdf, other

    cs.CR cs.CL cs.LG

    ER-AE: Differentially Private Text Generation for Authorship Anonymization

    Authors: Haohan Bo, Steven H. H. Ding, Benjamin C. M. Fung, Farkhund Iqbal

    Abstract: Most of privacy protection studies for textual data focus on removing explicit sensitive identifiers. However, personal writing style, as a strong indicator of the authorship, is often neglected. Recent studies, such as SynTF, have shown promising results on privacy-preserving text mining. However, their anonymization algorithm can only output numeric term vectors which are difficult for the recip… ▽ More

    Submitted 13 May, 2021; v1 submitted 19 July, 2019; originally announced July 2019.

  10. arXiv:1606.01219  [pdf, other

    cs.CL cs.CY cs.SI

    Learning Stylometric Representations for Authorship Analysis

    Authors: Steven H. H. Ding, Benjamin C. M. Fung, Farkhund Iqbal, William K. Cheung

    Abstract: Authorship analysis (AA) is the study of unveiling the hidden properties of authors from a body of exponentially exploding textual data. It extracts an author's identity and sociolinguistic characteristics based on the reflected writing styles in the text. It is an essential process for various areas, such as cybercrime investigation, psycholinguistics, political socialization, etc. However, most… ▽ More

    Submitted 3 June, 2016; originally announced June 2016.

    ACM Class: K.4.1; I.7.5; I.2.7

  11. arXiv:1208.2773  [pdf, other

    cs.DB

    Privacy Preserving Record Linkage via grams Projections

    Authors: Luca Bonomi, Li Xiong, Rui Chen, Benjamin C. M. Fung

    Abstract: Record linkage has been extensively used in various data mining applications involving sharing data. While the amount of available data is growing, the concern of disclosing sensitive information poses the problem of utility vs privacy. In this paper, we study the problem of private record linkage via secure data transformations. In contrast to the existing techniques in this area, we propose a no… ▽ More

    Submitted 13 August, 2012; originally announced August 2012.

  12. arXiv:1112.2020  [pdf, ps, other

    cs.DB

    Differentially Private Trajectory Data Publication

    Authors: Rui Chen, Benjamin C. M. Fung, Bipin C. Desai

    Abstract: With the increasing prevalence of location-aware devices, trajectory data has been generated and collected in various application domains. Trajectory data carries rich information that is useful for many data analysis tasks. Yet, improper publishing and use of trajectory data could jeopardize individual privacy. However, it has been shown that existing privacy-preserving trajectory data publishing… ▽ More

    Submitted 9 December, 2011; originally announced December 2011.