Search Results for author: Yizheng Chen

Found 12 papers, 8 papers with code

Vulnerability Detection with Code Language Models: How Far Are We?

1 code implementation27 Mar 2024 Yangruibo Ding, Yanjun Fu, Omniyyah Ibrahim, Chawin Sitawarin, Xinyun Chen, Basel Alomair, David Wagner, Baishakhi Ray, Yizheng Chen

Evaluating code LMs on PrimeVul reveals that existing benchmarks significantly overestimate the performance of these models.

Vulnerability Detection

2L3: Lifting Imperfect Generated 2D Images into Accurate 3D

no code implementations29 Jan 2024 Yizheng Chen, Rengan Xie, Qi Ye, Sen yang, Zixuan Xie, Tianxiao Chen, Rong Li, Yuchi Huo

Specifically, we first leverage to decouple the shading information from the generated images to reduce the impact of inconsistent lighting; then, we introduce mono prior with view-dependent transient encoding to enhance the reconstructed normal; and finally, we design a view augmentation fusion strategy that minimizes pixel-level loss in generated sparse views and semantic loss in augmented random views, resulting in view-consistent geometry and detailed textures.

3D Object Reconstruction 3D Reconstruction +1

DiverseVul: A New Vulnerable Source Code Dataset for Deep Learning Based Vulnerability Detection

1 code implementation1 Apr 2023 Yizheng Chen, Zhoujie Ding, Lamya Alowain, Xinyun Chen, David Wagner

Combining our new dataset with previous datasets, we present an analysis of the challenges and promising research directions of using deep learning for detecting software vulnerabilities.

Feature Engineering Vulnerability Detection

Continuous Learning for Android Malware Detection

2 code implementations8 Feb 2023 Yizheng Chen, Zhoujie Ding, David Wagner

We propose a new hierarchical contrastive learning scheme, and a new sample selection technique to continuously train the Android malware classifier.

Active Learning Android Malware Detection +2

Part-Based Models Improve Adversarial Robustness

1 code implementation15 Sep 2022 Chawin Sitawarin, Kornrapat Pongmala, Yizheng Chen, Nicholas Carlini, David Wagner

We show that combining human prior knowledge with end-to-end learning can improve the robustness of deep neural networks by introducing a part-based model for object classification.

Adversarial Robustness

Learning Security Classifiers with Verified Global Robustness Properties

1 code implementation24 May 2021 Yizheng Chen, Shiqi Wang, Yue Qin, Xiaojing Liao, Suman Jana, David Wagner

Since data distribution shift is very common in security applications, e. g., often observed for malware detection, local robustness cannot guarantee that the property holds for unseen inputs at the time of deploying the classifier.

Malware Detection

Cost-Aware Robust Tree Ensembles for Security Applications

2 code implementations3 Dec 2019 Yizheng Chen, Shiqi Wang, Weifan Jiang, Asaf Cidon, Suman Jana

There are various costs for attackers to manipulate the features of security classifiers.

Spam detection

Neutaint: Efficient Dynamic Taint Analysis with Neural Networks

no code implementations8 Jul 2019 Dongdong She, Yizheng Chen, Baishakhi Ray, Suman Jana

Dynamic taint analysis (DTA) is widely used by various applications to track information flow during runtime execution.

Cryptography and Security

Enhancing Gradient-based Attacks with Symbolic Intervals

no code implementations5 Jun 2019 Shiqi Wang, Yizheng Chen, Ahmed Abdou, Suman Jana

In this paper, we present interval attacks, a new technique to find adversarial examples to evaluate the robustness of neural networks.

Open-Ended Question Answering

On Training Robust PDF Malware Classifiers

1 code implementation6 Apr 2019 Yizheng Chen, Shiqi Wang, Dongdong She, Suman Jana

A practically useful malware classifier must be robust against evasion attacks.

MixTrain: Scalable Training of Verifiably Robust Neural Networks

1 code implementation6 Nov 2018 Shiqi Wang, Yizheng Chen, Ahmed Abdou, Suman Jana

Making neural networks robust against adversarial inputs has resulted in an arms race between new defenses and attacks.

Practical Attacks Against Graph-based Clustering

no code implementations29 Aug 2017 Yizheng Chen, Yacin Nadji, Athanasios Kountouras, Fabian Monrose, Roberto Perdisci, Manos Antonakakis, Nikolaos Vasiloglou

Graph modeling allows numerous security problems to be tackled in a general way, however, little work has been done to understand their ability to withstand adversarial attacks.

Clustering Graph Clustering

Cannot find the paper you are looking for? You can Submit a new open access paper.