Publications

  1. Books
  2. Conference Papers
  3. Journal Articles
  4. Posters
  5. Patents

Publications

Books

  • Secure Voice Processing Systems against Malicious Voice Attacks
    Kun Sun, Shu Wang
    Springer Nature, 2023, ISBN: 978-3-031-44748-8.

Conference Papers

  • Compensating Removed Frequency Components: Thwarting Voice Spectrum Reduction Attacks
    Shu Wang, Kun Sun, Qi Li
    Network and Distributed System Security Symposium (NDSS), 2024
    (Acceptance Rate: 104/694 = 15.0%)
  • What IF Is Not Enough? Fixing Null Pointer Dereference With Contextual Check
    Yunlong Xing, Shu Wang, Shiyu Sun, Xu He, Kun Sun, Qi Li
    USENIX Security Symposium (USENIX Security), 2024
    (Acceptance Rate - Summer Review Cycle: 98/515 = 19.0%)
  • BinGo: Identifying Security Patches in Binary Code with Graph Representation Learning
    Xu He, Shu Wang, Pengbin Feng, Xinda Wang, Shiyu Sun, Qi Li, Kun Sun
    ACM ASIA Conference on Computer and Communications Security (AsiaCCS), 2024
    (Acceptance Rate - Cycle 1: 65/301 = 21.6%)
  • Having Difficulty Understanding Manuals? Automatically Converting User Manuals into Instructional Videos
    Songsong Liu, Shu Wang, Kun Sun
    ACM SIGCHI Symposium on Engineering Interactive Computing Systems (EICS), 2024
  • GraphSPD: Graph-Based Security Patch Detection with Enriched Code Semantics
    Shu Wang, Xinda Wang, Kun Sun, Sushil Jajodia, Haining Wang, Qi Li
    IEEE Symposium on Security and Privacy (S&P), 2023
    (Acceptance Rate: 196/1153 = 17.0%, indicates equal contributions)
  • Exploring Security Commits in Python
    Shiyu Sun, Shu Wang, Xinda Wang, Yunlong Xing, Elisa Zhang, Kun Sun
    IEEE International Conference on Software Maintenance and Evolution (ICSME), 2023
    (Acceptance Rate: 27/119 = 22.7%)
  • Enhancing Honeypot Fidelity with Real-Time User Behavior Emulation
    Songsong Liu, Shu Wang, Kun Sun
    IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2023
  • BinProv: Binary Code Provenance Identification without Disassembly
    Xu He, Shu Wang, Yunlong Xing, Pengbin Feng, Haining Wang, Qi Li, Songqing Chen, Kun Sun
    International Symposium on Research in Attacks, Intrusions and Defenses (RAID), 2022
    (Acceptance Rate: 35/139 = 25.2%)
  • Auter: Automatically Tuning Multi-layer Network Buffers in Long-Distance Shadowsocks Networks
    Xu He, Jiahao Cao, Shu Wang, Kun Sun, Lisong Xu, Qi Li
    IEEE International Conference on Computer Communications (INFOCOM), 2022
    (Acceptance Rate: 225/1129 = 19.9%)
  • PatchDB: A Large-Scale Security Patch Dataset
    Xinda Wang, Shu Wang, Pengbin Feng, Kun Sun, Sushil Jajodia
    IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2021
    (Acceptance Rate: 48/295 = 16.3%, indicates equal contributions)
  • PatchRNN: A Deep Learning-Based System for Security Patch Identification
    Xinda Wang, Shu Wang, Pengbin Feng, Kun Sun, Sushil Jajodia, Sanae Benchaaboun, Frank Geck
    IEEE/AFCEA Military Communications Conference (MILCOM), 2021
  • When the Differences in Frequency Domain are Compensated: Understanding and Defeating Modulated Replay Attacks on Automatic Speech Recognition
    Shu Wang, Jiahao Cao, Xu He, Kun Sun, Qi Li
    ACM Conference on Computer and Communications Security (CCS), 2020
    (Acceptance Rate: 121/715 = 16.9%)
  • SIEVE: Secure In-Vehicle Automatic Speech Recognition Systems
    Shu Wang, Jiahao Cao, Kun Sun, Qi Li
    International Symposium on Research in Attacks, Intrusions and Defenses (RAID), 2020
    (Acceptance Rate: 31/121 = 25.6%)
  • A Machine Learning Approach to Classify Security Patches into Vulnerability Types
    Xinda Wang, Shu Wang, Kun Sun, Archer Batcheller, Sushil Jajodia
    IEEE Conference on Communications and Network Security (CNS), 2020
    Best Paper Nominee (Acceptance Rate: 43/151 = 28.5%)
  • Vehicle Type Classification via Adaptive Feature Clustering for Traffic Surveillance Video
    Shu Wang, Feng Liu, Zongliang Gan, Ziguan Cui
    International Conference on Wireless Communications & Signal Processing (WCSP), 2016

Journal Articles

  • Enhancing Malware Analysis Sandboxes with Emulated User Behavior
    Songsong Liu, Pengbin Feng, Shu Wang, Kun Sun, Jiahao Cao
    Computers & Security, Volume 115, April 2022

Posters

  • When the Differences in Frequency Domain are Compensated: Understanding and Defeating Modulated Replay Attacks on Automatic Speech Recognition
    Shu Wang, Jiahao Cao, Xu He, Kun Sun, Qi Li
    Poster Session, ACM Conference on Computer and Communications Security (CCS), 2020
  • Safeguarding Automatic Speech Recognition Systems on Driverless Vehicles
    Shu Wang, Kun Sun
    CPS-VO Artificial Intelligence and Cybersecurity Workshop, 2019

Patents

  • U.S. Utility Patent No. 18/431,443, filed on February 2, 2024

  • U.S. Provisional Patent No. 63/515,318, filed on July 24, 2023


© 2024 Shu Wang. All rights reserved.