Alert button
Picture for Shouhuai Xu

Shouhuai Xu

Alert button

PAD: Towards Principled Adversarial Malware Detection Against Evasion Attacks

Add code
Bookmark button
Alert button
Feb 22, 2023
Deqiang Li, Shicheng Cui, Yun Li, Jia Xu, Fu Xiao, Shouhuai Xu

Figure 1 for PAD: Towards Principled Adversarial Malware Detection Against Evasion Attacks
Figure 2 for PAD: Towards Principled Adversarial Malware Detection Against Evasion Attacks
Figure 3 for PAD: Towards Principled Adversarial Malware Detection Against Evasion Attacks
Figure 4 for PAD: Towards Principled Adversarial Malware Detection Against Evasion Attacks
Viaarxiv icon

RoPGen: Towards Robust Code Authorship Attribution via Automatic Coding Style Transformation

Add code
Bookmark button
Alert button
Feb 12, 2022
Zhen Li, Guenevere, Chen, Chen Chen, Yayi Zou, Shouhuai Xu

Figure 1 for RoPGen: Towards Robust Code Authorship Attribution via Automatic Coding Style Transformation
Figure 2 for RoPGen: Towards Robust Code Authorship Attribution via Automatic Coding Style Transformation
Figure 3 for RoPGen: Towards Robust Code Authorship Attribution via Automatic Coding Style Transformation
Figure 4 for RoPGen: Towards Robust Code Authorship Attribution via Automatic Coding Style Transformation
Viaarxiv icon

Can We Leverage Predictive Uncertainty to Detect Dataset Shift and Adversarial Examples in Android Malware Detection?

Add code
Bookmark button
Alert button
Sep 20, 2021
Deqiang Li, Tian Qiu, Shuo Chen, Qianmu Li, Shouhuai Xu

Figure 1 for Can We Leverage Predictive Uncertainty to Detect Dataset Shift and Adversarial Examples in Android Malware Detection?
Figure 2 for Can We Leverage Predictive Uncertainty to Detect Dataset Shift and Adversarial Examples in Android Malware Detection?
Figure 3 for Can We Leverage Predictive Uncertainty to Detect Dataset Shift and Adversarial Examples in Android Malware Detection?
Figure 4 for Can We Leverage Predictive Uncertainty to Detect Dataset Shift and Adversarial Examples in Android Malware Detection?
Viaarxiv icon

Towards Making Deep Learning-based Vulnerability Detectors Robust

Add code
Bookmark button
Alert button
Aug 04, 2021
Zhen Li, Jing Tang, Deqing Zou, Qian Chen, Shouhuai Xu, Chao Zhang, Yichen Li, Hai Jin

Figure 1 for Towards Making Deep Learning-based Vulnerability Detectors Robust
Figure 2 for Towards Making Deep Learning-based Vulnerability Detectors Robust
Figure 3 for Towards Making Deep Learning-based Vulnerability Detectors Robust
Figure 4 for Towards Making Deep Learning-based Vulnerability Detectors Robust
Viaarxiv icon

SoK: Arms Race in Adversarial Malware Detection

Add code
Bookmark button
Alert button
Jun 15, 2020
Deqiang Li, Qianmu Li, Yanfang Ye, Shouhuai Xu

Figure 1 for SoK: Arms Race in Adversarial Malware Detection
Figure 2 for SoK: Arms Race in Adversarial Malware Detection
Figure 3 for SoK: Arms Race in Adversarial Malware Detection
Figure 4 for SoK: Arms Race in Adversarial Malware Detection
Viaarxiv icon

Enhancing Deep Neural Networks Against Adversarial Malware Examples

Add code
Bookmark button
Alert button
Apr 15, 2020
Deqiang Li, Qianmu Li, Yanfang Ye, Shouhuai Xu

Figure 1 for Enhancing Deep Neural Networks Against Adversarial Malware Examples
Figure 2 for Enhancing Deep Neural Networks Against Adversarial Malware Examples
Figure 3 for Enhancing Deep Neural Networks Against Adversarial Malware Examples
Figure 4 for Enhancing Deep Neural Networks Against Adversarial Malware Examples
Viaarxiv icon

$μ$VulDeePecker: A Deep Learning-Based System for Multiclass Vulnerability Detection

Add code
Bookmark button
Alert button
Jan 08, 2020
Deqing Zou, Sujuan Wang, Shouhuai Xu, Zhen Li, Hai Jin

Figure 1 for $μ$VulDeePecker: A Deep Learning-Based System for Multiclass Vulnerability Detection
Figure 2 for $μ$VulDeePecker: A Deep Learning-Based System for Multiclass Vulnerability Detection
Figure 3 for $μ$VulDeePecker: A Deep Learning-Based System for Multiclass Vulnerability Detection
Figure 4 for $μ$VulDeePecker: A Deep Learning-Based System for Multiclass Vulnerability Detection
Viaarxiv icon

Election with Bribed Voter Uncertainty: Hardness and Approximation Algorithm

Add code
Bookmark button
Alert button
Nov 07, 2018
Lin Chen, Lei Xu, Shouhuai Xu, Zhimin Gao, Weidong Shi

Figure 1 for Election with Bribed Voter Uncertainty: Hardness and Approximation Algorithm
Viaarxiv icon

Statistical Estimation of Malware Detection Metrics in the Absence of Ground Truth

Add code
Bookmark button
Alert button
Sep 24, 2018
Pang Du, Zheyuan Sun, Huashan Chen, Jin-Hee Cho, Shouhuai Xu

Figure 1 for Statistical Estimation of Malware Detection Metrics in the Absence of Ground Truth
Figure 2 for Statistical Estimation of Malware Detection Metrics in the Absence of Ground Truth
Figure 3 for Statistical Estimation of Malware Detection Metrics in the Absence of Ground Truth
Figure 4 for Statistical Estimation of Malware Detection Metrics in the Absence of Ground Truth
Viaarxiv icon

SySeVR: A Framework for Using Deep Learning to Detect Software Vulnerabilities

Add code
Bookmark button
Alert button
Sep 21, 2018
Zhen Li, Deqing Zou, Shouhuai Xu, Hai Jin, Yawei Zhu, Zhaoxuan Chen

Figure 1 for SySeVR: A Framework for Using Deep Learning to Detect Software Vulnerabilities
Figure 2 for SySeVR: A Framework for Using Deep Learning to Detect Software Vulnerabilities
Figure 3 for SySeVR: A Framework for Using Deep Learning to Detect Software Vulnerabilities
Figure 4 for SySeVR: A Framework for Using Deep Learning to Detect Software Vulnerabilities
Viaarxiv icon