Alert button
Picture for Hsinchun Chen

Hsinchun Chen

Alert button

Evading Deep Learning-Based Malware Detectors via Obfuscation: A Deep Reinforcement Learning Approach

Add code
Bookmark button
Alert button
Feb 04, 2024
Brian Etter, James Lee Hu, Mohammedreza Ebrahimi, Weifeng Li, Xin Li, Hsinchun Chen

Viaarxiv icon

Large Language Models for Conducting Advanced Text Analytics Information Systems Research

Add code
Bookmark button
Alert button
Dec 27, 2023
Benjamin M. Ampel, Chi-Heng Yang, James Hu, Hsinchun Chen

Viaarxiv icon

Multi-view Representation Learning from Malware to Defend Against Adversarial Variants

Add code
Bookmark button
Alert button
Oct 25, 2022
James Lee Hu, Mohammadreza Ebrahimi, Weifeng Li, Xin Li, Hsinchun Chen

Figure 1 for Multi-view Representation Learning from Malware to Defend Against Adversarial Variants
Figure 2 for Multi-view Representation Learning from Malware to Defend Against Adversarial Variants
Figure 3 for Multi-view Representation Learning from Malware to Defend Against Adversarial Variants
Figure 4 for Multi-view Representation Learning from Malware to Defend Against Adversarial Variants
Viaarxiv icon

Heterogeneous Domain Adaptation with Adversarial Neural Representation Learning: Experiments on E-Commerce and Cybersecurity

Add code
Bookmark button
Alert button
May 05, 2022
Mohammadreza Ebrahimi, Yidong Chai, Hao Helen Zhang, Hsinchun Chen

Figure 1 for Heterogeneous Domain Adaptation with Adversarial Neural Representation Learning: Experiments on E-Commerce and Cybersecurity
Figure 2 for Heterogeneous Domain Adaptation with Adversarial Neural Representation Learning: Experiments on E-Commerce and Cybersecurity
Figure 3 for Heterogeneous Domain Adaptation with Adversarial Neural Representation Learning: Experiments on E-Commerce and Cybersecurity
Figure 4 for Heterogeneous Domain Adaptation with Adversarial Neural Representation Learning: Experiments on E-Commerce and Cybersecurity
Viaarxiv icon

Global Mapping of Gene/Protein Interactions in PubMed Abstracts: A Framework and an Experiment with P53 Interactions

Add code
Bookmark button
Alert button
Apr 22, 2022
Xin Li, Hsinchun Chen, Zan Huang, Hua Su, Jesse D. Martinez

Figure 1 for Global Mapping of Gene/Protein Interactions in PubMed Abstracts: A Framework and an Experiment with P53 Interactions
Figure 2 for Global Mapping of Gene/Protein Interactions in PubMed Abstracts: A Framework and an Experiment with P53 Interactions
Figure 3 for Global Mapping of Gene/Protein Interactions in PubMed Abstracts: A Framework and an Experiment with P53 Interactions
Figure 4 for Global Mapping of Gene/Protein Interactions in PubMed Abstracts: A Framework and an Experiment with P53 Interactions
Viaarxiv icon

Gene Function Prediction with Gene Interaction Networks: A Context Graph Kernel Approach

Add code
Bookmark button
Alert button
Apr 22, 2022
Xin Li, Hsinchun Chen, Jiexun Li, Zhu Zhang

Figure 1 for Gene Function Prediction with Gene Interaction Networks: A Context Graph Kernel Approach
Figure 2 for Gene Function Prediction with Gene Interaction Networks: A Context Graph Kernel Approach
Figure 3 for Gene Function Prediction with Gene Interaction Networks: A Context Graph Kernel Approach
Figure 4 for Gene Function Prediction with Gene Interaction Networks: A Context Graph Kernel Approach
Viaarxiv icon

Counteracting Dark Web Text-Based CAPTCHA with Generative Adversarial Learning for Proactive Cyber Threat Intelligence

Add code
Bookmark button
Alert button
Jan 14, 2022
Ning Zhang, Mohammadreza Ebrahimi, Weifeng Li, Hsinchun Chen

Figure 1 for Counteracting Dark Web Text-Based CAPTCHA with Generative Adversarial Learning for Proactive Cyber Threat Intelligence
Figure 2 for Counteracting Dark Web Text-Based CAPTCHA with Generative Adversarial Learning for Proactive Cyber Threat Intelligence
Figure 3 for Counteracting Dark Web Text-Based CAPTCHA with Generative Adversarial Learning for Proactive Cyber Threat Intelligence
Figure 4 for Counteracting Dark Web Text-Based CAPTCHA with Generative Adversarial Learning for Proactive Cyber Threat Intelligence
Viaarxiv icon

Single-Shot Black-Box Adversarial Attacks Against Malware Detectors: A Causal Language Model Approach

Add code
Bookmark button
Alert button
Dec 03, 2021
James Lee Hu, Mohammadreza Ebrahimi, Hsinchun Chen

Figure 1 for Single-Shot Black-Box Adversarial Attacks Against Malware Detectors: A Causal Language Model Approach
Figure 2 for Single-Shot Black-Box Adversarial Attacks Against Malware Detectors: A Causal Language Model Approach
Figure 3 for Single-Shot Black-Box Adversarial Attacks Against Malware Detectors: A Causal Language Model Approach
Figure 4 for Single-Shot Black-Box Adversarial Attacks Against Malware Detectors: A Causal Language Model Approach
Viaarxiv icon

Automated PII Extraction from Social Media for Raising Privacy Awareness: A Deep Transfer Learning Approach

Add code
Bookmark button
Alert button
Nov 11, 2021
Yizhi Liu, Fang Yu Lin, Mohammadreza Ebrahimi, Weifeng Li, Hsinchun Chen

Figure 1 for Automated PII Extraction from Social Media for Raising Privacy Awareness: A Deep Transfer Learning Approach
Figure 2 for Automated PII Extraction from Social Media for Raising Privacy Awareness: A Deep Transfer Learning Approach
Figure 3 for Automated PII Extraction from Social Media for Raising Privacy Awareness: A Deep Transfer Learning Approach
Figure 4 for Automated PII Extraction from Social Media for Raising Privacy Awareness: A Deep Transfer Learning Approach
Viaarxiv icon