Zum Hauptinhalt springen

Showing 1–20 of 20 results for author: Fung, M

Searching in archive cs. Search in all archives.
.
  1. arXiv:2404.08562  [pdf, other

    cs.CR cs.AI cs.LG

    Dynamic Neural Control Flow Execution: An Agent-Based Deep Equilibrium Approach for Binary Vulnerability Detection

    Authors: Litao Li, Steven H. H. Ding, Andrew Walenstein, Philippe Charland, Benjamin C. M. Fung

    Abstract: Software vulnerabilities are a challenge in cybersecurity. Manual security patches are often difficult and slow to be deployed, while new vulnerabilities are created. Binary code vulnerability detection is less studied and more complex compared to source code, and this has important practical implications. Deep learning has become an efficient and powerful tool in the security domain, where it pro… ▽ More

    Submitted 3 April, 2024; originally announced April 2024.

  2. arXiv:2402.08749  [pdf

    cs.CV cs.LG

    Automated detection of motion artifacts in brain MR images using deep learning and explainable artificial intelligence

    Authors: Marina Manso Jimeno, Keerthi Sravan Ravi, Maggie Fung, John Thomas Vaughan, Jr., Sairam Geethanath

    Abstract: Quality assessment, including inspecting the images for artifacts, is a critical step during MRI data acquisition to ensure data quality and downstream analysis or interpretation success. This study demonstrates a deep learning model to detect rigid motion in T1-weighted brain images. We leveraged a 2D CNN for three-class classification and tested it on publicly available retrospective and prospec… ▽ More

    Submitted 13 February, 2024; originally announced February 2024.

    Comments: 25 pages, 9 figures, 1 table. Submitted to NMR in Biomedicine

  3. arXiv:2402.01905  [pdf, other

    cs.SI cs.CY cs.MA

    Carthago Delenda Est: Co-opetitive Indirect Information Diffusion Model for Influence Operations on Online Social Media

    Authors: Jwen Fai Low, Benjamin C. M. Fung, Farkhund Iqbal, Claude Fachkha

    Abstract: For a state or non-state actor whose credibility is bankrupt, relying on bots to conduct non-attributable, non-accountable, and seemingly-grassroots-but-decentralized-in-actuality influence/information operations (info ops) on social media can help circumvent the issue of trust deficit while advancing its interests. Planning and/or defending against decentralized info ops can be aided by computati… ▽ More

    Submitted 6 February, 2024; v1 submitted 2 February, 2024; originally announced February 2024.

    Comments: 60 pages, 9 figures, 1 table

  4. arXiv:2311.03818  [pdf, other

    cs.CR

    Theoretical Patchability Quantification for IP-Level Hardware Patching Designs

    Authors: Wei-Kai Liu, Benjamin Tan, Jason M. Fung, Krishnendu Chakrabarty

    Abstract: As the complexity of System-on-Chip (SoC) designs continues to increase, ensuring thorough verification becomes a significant challenge for system integrators. The complexity of verification can result in undetected bugs. Unlike software or firmware bugs, hardware bugs are hard to fix after deployment and they require additional logic, i.e., patching logic integrated with the design in advance in… ▽ More

    Submitted 7 November, 2023; originally announced November 2023.

  5. arXiv:2307.10631  [pdf, other

    cs.SE cs.AI

    Pluvio: Assembly Clone Search for Out-of-domain Architectures and Libraries through Transfer Learning and Conditional Variational Information Bottleneck

    Authors: Zhiwei Fu, Steven H. H. Ding, Furkan Alaca, Benjamin C. M. Fung, Philippe Charland

    Abstract: The practice of code reuse is crucial in software development for a faster and more efficient development lifecycle. In reality, however, code reuse practices lack proper control, resulting in issues such as vulnerability propagation and intellectual property infringements. Assembly clone search, a critical shift-right defence mechanism, has been effective in identifying vulnerable code resulting… ▽ More

    Submitted 20 July, 2023; originally announced July 2023.

    Comments: 13 pages and 4 figures. This work has been submitted to the IEEE for possible publication. Copyright may be transferred without notice, after which this version may no longer be accessible

  6. Don't CWEAT It: Toward CWE Analysis Techniques in Early Stages of Hardware Design

    Authors: Baleegh Ahmad, Wei-Kai Liu, Luca Collini, Hammond Pearce, Jason M. Fung, Jonathan Valamehr, Mohammad Bidmeshki, Piotr Sapiecha, Steve Brown, Krishnendu Chakrabarty, Ramesh Karri, Benjamin Tan

    Abstract: To help prevent hardware security vulnerabilities from propagating to later design stages where fixes are costly, it is crucial to identify security concerns as early as possible, such as in RTL designs. In this work, we investigate the practical implications and feasibility of producing a set of security-specific scanners that operate on Verilog source files. The scanners indicate parts of code t… ▽ More

    Submitted 2 September, 2022; originally announced September 2022.

  7. arXiv:2207.10284  [pdf, other

    cs.LG cs.CL eess.SP

    Multi Resolution Analysis (MRA) for Approximate Self-Attention

    Authors: Zhanpeng Zeng, Sourav Pal, Jeffery Kline, Glenn M Fung, Vikas Singh

    Abstract: Transformers have emerged as a preferred model for many tasks in natural langugage processing and vision. Recent efforts on training and deploying Transformers more efficiently have identified many strategies to approximate the self-attention matrix, a key module in a Transformer architecture. Effective ideas include various prespecified sparsity patterns, low-rank basis expansions and combination… ▽ More

    Submitted 20 July, 2022; originally announced July 2022.

    Comments: ICML2022

  8. arXiv:2111.02303  [pdf, other

    cs.LG cs.AI

    On the Effectiveness of Interpretable Feedforward Neural Network

    Authors: Miles Q. Li, Benjamin C. M. Fung, Adel Abusitta

    Abstract: Deep learning models have achieved state-of-the-art performance in many classification tasks. However, most of them cannot provide an interpretation for their classification results. Machine learning models that are interpretable are usually linear or piecewise linear and yield inferior performance. Non-linear models achieve much better classification performance, but it is hard to interpret their… ▽ More

    Submitted 3 November, 2021; originally announced November 2021.

  9. An Exhaustive Approach to Detecting Transient Execution Side Channels in RTL Designs of Processors

    Authors: Mohammad Rahmani Fadiheh, Alex Wezel, Johannes Mueller, Joerg Bormann, Sayak Ray, Jason M. Fung, Subhasish Mitra, Dominik Stoffel, Wolfgang Kunz

    Abstract: Hardware (HW) security issues have been emerging at an alarming rate in recent years. Transient execution attacks, in particular, pose a genuine threat to the security of modern computing systems. Despite recent advances, understanding the intricate implications of microarchitectural design decisions on processor security remains a great challenge and has caused a number of update cycles in the pa… ▽ More

    Submitted 22 February, 2022; v1 submitted 4 August, 2021; originally announced August 2021.

  10. arXiv:2104.08530  [pdf, other

    cs.CL

    The Topic Confusion Task: A Novel Scenario for Authorship Attribution

    Authors: Malik H. Altakrori, Jackie Chi Kit Cheung, Benjamin C. M. Fung

    Abstract: Authorship attribution is the problem of identifying the most plausible author of an anonymous text from a set of candidate authors. Researchers have investigated same-topic and cross-topic scenarios of authorship attribution, which differ according to whether new, unseen topics are used in the testing phase. However, neither scenario allows us to explain whether errors are caused by a failure to… ▽ More

    Submitted 9 September, 2021; v1 submitted 17 April, 2021; originally announced April 2021.

    Comments: 15 pages (9 + ref./appin.), 6 figures, Accepted to Findings of EMNLP 2021

  11. Learning Inter-Modal Correspondence and Phenotypes from Multi-Modal Electronic Health Records

    Authors: Kejing Yin, William K. Cheung, Benjamin C. M. Fung, Jonathan Poon

    Abstract: Non-negative tensor factorization has been shown a practical solution to automatically discover phenotypes from the electronic health records (EHR) with minimal human supervision. Such methods generally require an input tensor describing the inter-modal interactions to be pre-established; however, the correspondence between different modalities (e.g., correspondence between medications and diagnos… ▽ More

    Submitted 12 November, 2020; originally announced November 2020.

    Comments: Accepted by IEEE Transactions on Knowledge and Data Engineering (TKDE)

  12. arXiv:2007.00121  [pdf

    eess.IV cs.CV physics.med-ph

    Accelerating Prostate Diffusion Weighted MRI using Guided Denoising Convolutional Neural Network: Retrospective Feasibility Study

    Authors: Elena A. Kaye, Emily A. Aherne, Cihan Duzgol, Ida Häggström, Erich Kobler, Yousef Mazaheri, Maggie M Fung, Zhigang Zhang, Ricardo Otazo, Herbert A. Vargas, Oguz Akin

    Abstract: Purpose: To investigate feasibility of accelerating prostate diffusion-weighted imaging (DWI) by reducing the number of acquired averages and denoising the resulting image using a proposed guided denoising convolutional neural network (DnCNN). Materials and Methods: Raw data from the prostate DWI scans were retrospectively gathered (between July 2018 and July 2019) from six single-vendor MRI scann… ▽ More

    Submitted 30 June, 2020; originally announced July 2020.

    Comments: This manuscript has been accepted for publication in Radiology: Artificial Intelligence (https://pubs.rsna.org/journal/ai), which is published by the Radiological Society of North America (RSNA)

  13. arXiv:2006.06862   

    cs.LG q-bio.NC stat.AP stat.ML

    Deep Learning-based Stress Determinator for Mouse Psychiatric Analysis using Hippocampus Activity

    Authors: Donghan Liu, Benjamin C. M. Fung, Tak Pan Wong

    Abstract: Decoding neurons to extract information from transmission and employ them into other use is the goal of neuroscientists' study. Due to that the field of neuroscience is utilizing the traditional methods presently, we hence combine the state-of-the-art deep learning techniques with the theory of neuron decoding to discuss its potential of accomplishment. Besides, the stress level that is related to… ▽ More

    Submitted 27 June, 2020; v1 submitted 11 June, 2020; originally announced June 2020.

    Comments: The paper need re-evaluated and reviewed, may cause some significant changes

  14. arXiv:1909.12398  [pdf, other

    cs.CV cs.LG

    Optimizing Nondecomposable Data Dependent Regularizers via Lagrangian Reparameterization offers Significant Performance and Efficiency Gains

    Authors: Sathya N. Ravi, Abhay Venkatesh, Glenn Moo Fung, Vikas Singh

    Abstract: Data dependent regularization is known to benefit a wide variety of problems in machine learning. Often, these regularizers cannot be easily decomposed into a sum over a finite number of terms, e.g., a sum over individual example-wise terms. The $F_β$ measure, Area under the ROC curve (AUCROC) and Precision at a fixed recall (P@R) are some prominent examples that are used in many applications. We… ▽ More

    Submitted 26 September, 2019; originally announced September 2019.

  15. arXiv:1909.06865  [pdf, other

    cs.LG cs.CR stat.ML

    I-MAD: Interpretable Malware Detector Using Galaxy Transformer

    Authors: Miles Q. Li, Benjamin C. M. Fung, Philippe Charland, Steven H. H. Ding

    Abstract: Malware currently presents a number of serious threats to computer users. Signature-based malware detection methods are limited in detecting new malware samples that are significantly different from known ones. Therefore, machine learning-based methods have been proposed, but there are two challenges these methods face. The first is to model the full semantics behind the assembly code of malware.… ▽ More

    Submitted 20 June, 2021; v1 submitted 15 September, 2019; originally announced September 2019.

    Comments: Published by Elsevier Computers & Security

  16. arXiv:1907.08736  [pdf, other

    cs.CR cs.CL cs.LG

    ER-AE: Differentially Private Text Generation for Authorship Anonymization

    Authors: Haohan Bo, Steven H. H. Ding, Benjamin C. M. Fung, Farkhund Iqbal

    Abstract: Most of privacy protection studies for textual data focus on removing explicit sensitive identifiers. However, personal writing style, as a strong indicator of the authorship, is often neglected. Recent studies, such as SynTF, have shown promising results on privacy-preserving text mining. However, their anonymization algorithm can only output numeric term vectors which are difficult for the recip… ▽ More

    Submitted 13 May, 2021; v1 submitted 19 July, 2019; originally announced July 2019.

  17. arXiv:1812.00197  [pdf, other

    cs.CR

    When a Patch is Not Enough - HardFails: Software-Exploitable Hardware Bugs

    Authors: Ghada Dessouky, David Gens, Patrick Haney, Garrett Persyn, Arun Kanuparthi, Hareesh Khattri, Jason M. Fung, Ahmad-Reza Sadeghi, Jeyavijayan Rajendran

    Abstract: In this paper, we take a deep dive into microarchitectural security from a hardware designer's perspective by reviewing the existing approaches to detect hardware vulnerabilities during the design phase. We show that a protection gap currently exists in practice that leaves chip designs vulnerable to software-based attacks. In particular, existing verification approaches fail to detect specific cl… ▽ More

    Submitted 1 December, 2018; originally announced December 2018.

  18. arXiv:1606.01219  [pdf, other

    cs.CL cs.CY cs.SI

    Learning Stylometric Representations for Authorship Analysis

    Authors: Steven H. H. Ding, Benjamin C. M. Fung, Farkhund Iqbal, William K. Cheung

    Abstract: Authorship analysis (AA) is the study of unveiling the hidden properties of authors from a body of exponentially exploding textual data. It extracts an author's identity and sociolinguistic characteristics based on the reflected writing styles in the text. It is an essential process for various areas, such as cybercrime investigation, psycholinguistics, political socialization, etc. However, most… ▽ More

    Submitted 3 June, 2016; originally announced June 2016.

    ACM Class: K.4.1; I.7.5; I.2.7

  19. arXiv:1208.2773  [pdf, other

    cs.DB

    Privacy Preserving Record Linkage via grams Projections

    Authors: Luca Bonomi, Li Xiong, Rui Chen, Benjamin C. M. Fung

    Abstract: Record linkage has been extensively used in various data mining applications involving sharing data. While the amount of available data is growing, the concern of disclosing sensitive information poses the problem of utility vs privacy. In this paper, we study the problem of private record linkage via secure data transformations. In contrast to the existing techniques in this area, we propose a no… ▽ More

    Submitted 13 August, 2012; originally announced August 2012.

  20. arXiv:1112.2020  [pdf, ps, other

    cs.DB

    Differentially Private Trajectory Data Publication

    Authors: Rui Chen, Benjamin C. M. Fung, Bipin C. Desai

    Abstract: With the increasing prevalence of location-aware devices, trajectory data has been generated and collected in various application domains. Trajectory data carries rich information that is useful for many data analysis tasks. Yet, improper publishing and use of trajectory data could jeopardize individual privacy. However, it has been shown that existing privacy-preserving trajectory data publishing… ▽ More

    Submitted 9 December, 2011; originally announced December 2011.