Picture for Shouhuai Xu

Shouhuai Xu

PAD: Towards Principled Adversarial Malware Detection Against Evasion Attacks

Add code
Feb 22, 2023
Figure 1 for PAD: Towards Principled Adversarial Malware Detection Against Evasion Attacks
Figure 2 for PAD: Towards Principled Adversarial Malware Detection Against Evasion Attacks
Figure 3 for PAD: Towards Principled Adversarial Malware Detection Against Evasion Attacks
Figure 4 for PAD: Towards Principled Adversarial Malware Detection Against Evasion Attacks
Viaarxiv icon

RoPGen: Towards Robust Code Authorship Attribution via Automatic Coding Style Transformation

Add code
Feb 12, 2022
Figure 1 for RoPGen: Towards Robust Code Authorship Attribution via Automatic Coding Style Transformation
Figure 2 for RoPGen: Towards Robust Code Authorship Attribution via Automatic Coding Style Transformation
Figure 3 for RoPGen: Towards Robust Code Authorship Attribution via Automatic Coding Style Transformation
Figure 4 for RoPGen: Towards Robust Code Authorship Attribution via Automatic Coding Style Transformation
Viaarxiv icon

Can We Leverage Predictive Uncertainty to Detect Dataset Shift and Adversarial Examples in Android Malware Detection?

Add code
Sep 20, 2021
Figure 1 for Can We Leverage Predictive Uncertainty to Detect Dataset Shift and Adversarial Examples in Android Malware Detection?
Figure 2 for Can We Leverage Predictive Uncertainty to Detect Dataset Shift and Adversarial Examples in Android Malware Detection?
Figure 3 for Can We Leverage Predictive Uncertainty to Detect Dataset Shift and Adversarial Examples in Android Malware Detection?
Figure 4 for Can We Leverage Predictive Uncertainty to Detect Dataset Shift and Adversarial Examples in Android Malware Detection?
Viaarxiv icon

Towards Making Deep Learning-based Vulnerability Detectors Robust

Add code
Aug 04, 2021
Figure 1 for Towards Making Deep Learning-based Vulnerability Detectors Robust
Figure 2 for Towards Making Deep Learning-based Vulnerability Detectors Robust
Figure 3 for Towards Making Deep Learning-based Vulnerability Detectors Robust
Figure 4 for Towards Making Deep Learning-based Vulnerability Detectors Robust
Viaarxiv icon

SoK: Arms Race in Adversarial Malware Detection

Add code
Jun 15, 2020
Figure 1 for SoK: Arms Race in Adversarial Malware Detection
Figure 2 for SoK: Arms Race in Adversarial Malware Detection
Figure 3 for SoK: Arms Race in Adversarial Malware Detection
Figure 4 for SoK: Arms Race in Adversarial Malware Detection
Viaarxiv icon

Enhancing Deep Neural Networks Against Adversarial Malware Examples

Add code
Apr 15, 2020
Figure 1 for Enhancing Deep Neural Networks Against Adversarial Malware Examples
Figure 2 for Enhancing Deep Neural Networks Against Adversarial Malware Examples
Figure 3 for Enhancing Deep Neural Networks Against Adversarial Malware Examples
Figure 4 for Enhancing Deep Neural Networks Against Adversarial Malware Examples
Viaarxiv icon

$μ$VulDeePecker: A Deep Learning-Based System for Multiclass Vulnerability Detection

Add code
Jan 08, 2020
Figure 1 for $μ$VulDeePecker: A Deep Learning-Based System for Multiclass Vulnerability Detection
Figure 2 for $μ$VulDeePecker: A Deep Learning-Based System for Multiclass Vulnerability Detection
Figure 3 for $μ$VulDeePecker: A Deep Learning-Based System for Multiclass Vulnerability Detection
Figure 4 for $μ$VulDeePecker: A Deep Learning-Based System for Multiclass Vulnerability Detection
Viaarxiv icon

Election with Bribed Voter Uncertainty: Hardness and Approximation Algorithm

Add code
Nov 07, 2018
Figure 1 for Election with Bribed Voter Uncertainty: Hardness and Approximation Algorithm
Viaarxiv icon

Statistical Estimation of Malware Detection Metrics in the Absence of Ground Truth

Add code
Sep 24, 2018
Figure 1 for Statistical Estimation of Malware Detection Metrics in the Absence of Ground Truth
Figure 2 for Statistical Estimation of Malware Detection Metrics in the Absence of Ground Truth
Figure 3 for Statistical Estimation of Malware Detection Metrics in the Absence of Ground Truth
Figure 4 for Statistical Estimation of Malware Detection Metrics in the Absence of Ground Truth
Viaarxiv icon

SySeVR: A Framework for Using Deep Learning to Detect Software Vulnerabilities

Add code
Sep 21, 2018
Figure 1 for SySeVR: A Framework for Using Deep Learning to Detect Software Vulnerabilities
Figure 2 for SySeVR: A Framework for Using Deep Learning to Detect Software Vulnerabilities
Figure 3 for SySeVR: A Framework for Using Deep Learning to Detect Software Vulnerabilities
Figure 4 for SySeVR: A Framework for Using Deep Learning to Detect Software Vulnerabilities
Viaarxiv icon