Refereed Journal Articles
@article{BFS24tweb,
author = "A. Bodaghi and B. C. M. Fung
and K.
A. Schmitt",
title = "{AugmenToxic}: Leveraging Reinforcement Learning to Optimize
{LLM} Instruction
Fine-Tuning for Data Augmentation to Enhance Toxicity Detection",
journal = "ACM Transactions on
on the Web: Special Issue on Advances in Social Media Technologies and Analysis",
volume = "",
issue = "",
pages = "",
month = "",
year = "in press",
}
@article{ALF24eswa,
author = "A. Abusitta and M. Q. Li and B. C. M. Fung",
title = "Survey on Explainable AI: Techniques, Challenges and Open Issues",
journal = "Expert Systems With Applications (ESWA)",
volume = "255",
issue = "C",
number = "124710",
pages = "1-18",
month = "December",
year = "2024",
}
@article{SMFC24csur,
author = "M. Saqib and S. Mahdavifar and B. C. M. Fung and P. Charland",
title = "A Comprehensive Analysis of Explainable AI for Malware Hunting",
journal = "ACM Computing Surveys (CSUR)",
volume = "56",
issue = "12",
number = "314",
pages = "1-40",
month = "October",
year = "2024",
}
@article{KIF24fsidiin,
author = "Z. Khalid and F. Iqbal and B. C. M. Fung",
title = "Towards a Unified XAI-based Framework for Digital Forensic Investigations",
journal = "Forensic Science International: Digital Investigation (FSIDIIN)",
volume = "50",
number = "301806",
pages = "1-9",
month = "October",
year = "2024",
}
@article{BSWF24tcss,
author = "A. Bodaghi and K.
A. Schmitt and P. Watine and B. C. M. Fung",
title = "A Literature Review on Detecting, Verifying, and Mitigating Online Misinformation",
journal = "IEEE Transactions on Computational Social Systems (TCSS)",
volume = "11",
issue = "4",
pages = "5119-5145",
month = "August",
year = "2024",
}
@article{JHLFK24cyb,
author = "D.-W. Jaw and S.-C. Huang and Z.-H. Lu and B. C. M. Fung and S.-Y. Kuo",
title = "Multi-domain Object Detection Framework using Feature Domain Knowledge Distillation",
journal = "IEEE Transactions on Cybernetics (CYB)",
volume = "54",
issue = "8",
pages = "2168-2267",
month = "August",
year = "2024",
}
@article{LFX24kbs,
author = "J. F. Low and B. C. M.
Fung and P. Xiong",
title = "Better Entity Matching with
Transformers through Ensembles",
journal = "Knowledge-Based
Systems (KBS)",
volume = "293",
number = "111678",
pages = "1-11",
month = "June",
year = "2024",
}
@article{SHF24est,
author = "Y. Sun and F. Haghighat and B. C. M. Fung",
title = "Fairness-Aware Data-Driven Based Model Predictive Controller: A Study on Thermal Energy Storage in A Residential Building",
journal = "Journal of Energy
Storge (EST)",
volume = "87",
number = "111402",
pages = "1-16",
month = "May",
year = "2024",
}
@article{BFS23tsm,
author = "A. Bodaghi and B. C. M.
Fung and K. Schmitt",
title = "Technological Solutions to Online Toxicity: Potential and Pitfalls",
journal = "IEEE Technology and Society Magazine (TSM)",
volume = "42",
issue = "4",
pages = "57-65",
month = "December"
year = "2023",
}
@article{CYCFP23tist,
author = "C. W. Cheong and K. Yin and W. K. Cheung and B. C. M. Fung and J. Poon",
title = "Adaptive Integration of Categorical and Multi-relational Ontologies with {EHR} Data for Medical Concept Embedding",
journal = "ACM Transactions on Intelligent Systems and Technology (TIST)",
volume = "14",
issue = "6",
number = "111",
pages = "1-20",
month = "November",
year = "2023",
}
@article{RHF23sustainabilty,
author = "O. Rahman and D. Hu and B. C. M. Fung",
title = "A Systematic Literature Review of Fashion, Sustainability, and Consumption Using Mixed Methods Approach",
journal = "Sustainability: Special Issue on Shaping Sustainable Consumption Behavior",
volume = "15",
issue = "16:12213",
month = "August",
year = "2023",
}
@article{LDTFCOSC23tops,
author = "L. Li and S. H. H. Ding and Y. Tian and B. C. M. Fung and P. Charland and W. Ou and L. Song and C. Chen",
title = "{VulANalyzeR}: Explainable Binary Vulnerability Detection with Multi-Task Learning and Attentional Graph Convolution",
journal = "ACM Transactions on Privacy and Security (TOPS)",
volume = "26",
issue = "3",
number = "28",
pages = "1-25",
month = "August",
year = "2023",
}
@article{LFI23access,
author = "J. F. Low and B. C. M. Fung and F. Iqbal",
title = "Of Stances, Themes, and Anomalies in COVID-19 Mask-Wearing Tweets",
journal = "IEEE Access",
volume = "11",
pages = "87009-87033",
month = "August",
year = "2023",
}
@article{LFD23inns,
author = "M. Q. Li and B. C.
M. Fung and A. Diwan",
title = "A Novel Deep
Multi-head Attentive Vulnerable Line Detector",
journal = "Procedia Computer Science",
volume = "222",
pages = "35-44",
month = "August",
year = "2023",
}
@article{RFMGMFA23access,
author = "S. Razaulla and C. Fachkha and C. Markarian and A. Gawanmeh and W. Mansoor and B. C. M. Fung and C. Assi",
title = "The Age of Ransomware: A Survey on the Evolution, Taxonomy, and Research Directions",
journal = "IEEE Access",
volume = "11",
pages = "40698-40723",
month = "April",
year = "2023",
}
@article{ACAHFA23iot,
author = "A. Abusitta and G. H. S. de Carvalho and O. Adel Wahab and T. Halabi and B. C. M. Fung and S. Al Mamoori",
title = "Deep Learning-Enabled Anomaly Detection for {IoT} Systems",
journal = "Internet of Things
(IoT)",
volume = "21",
number = "100656",
pages = "1-13",
month = "April",
year = "2023",
}
@article{KFIAH23tkdd,
author = "R. H. Khokhar and B. C. M. Fung and F. Iqbal and K. Al-Hussaeni and M. Hussain",
title = "Differentially Private Release of Heterogeneous Network for Managing Healthcare Data",
journal = "ACM Transactions on Knowledge Discovery from Data (TKDD)",
volume = "17",
issue = "6",
number = "90",
pages = "1-30",
month = "February",
year = "2023",
}
@article{SFH22benb,
author = "Y. Sun
and B. C. M. Fung and F. Haghighat",
title = "In-Processing Fairness Improvement Methods for Regression Data-Driven Building Models: Achieving Uniform Energy Prediction",
journal = "Energy and Buildings
(ENB)",
volume = "277",
number = "112565",
pages = "1-13",
month = "December",
year = "2022",
}
@article{YCFP22tkde,
author = "K. Yin and W. K. Cheung and B. C. M. Fung and J. Poon",
title = "Learning Inter-Modal Correspondence and Phenotypes from Multi-Modal Electronic Health Records",
journal = "IEEE Transactions on Knowledge and Data Engineering (TKDE)",
volume = "34",
number = "9",
pages = "4328-4341",
month = "September",
year = "2022",
}
@article{SFH22aenb,
author = "Y. Sun
and B. C. M. Fung and F. Haghighat",
title = "The Generalizability of Pre-processing Techniques on the Accuracy and Fairness of Data-driven Building Models:
A Case Study",
journal = "Energy and Buildings
(ENB)",
volume = "268",
number = "112204",
pages = "1-19",
month = "August",
year = "2022",
}
@article{LFC22ins,
author = "M. Q. Li and B. C. M. Fung and
P. Charland",
title = "DyAdvDefender: An Instance-based Online Machine Learning Model for Perturbation-trial-based Black-box Adversarial Defense",
journal = "Information Sciences
(INS)",
volume = "601",
number = "",
pages = "357-373",
month = "July",
year = "2022",
}
@article{LLZWFW22jpn,
author = "A. Larosa and X. Long and T. R. Zhang
and Alice S. Wong and B. C. M. Fung and T. P. Wong"
title = "Stress
Susceptibility is Related to Changes in the Hippocampal Representation of Conspecific
Location",
journal = "Journal of Psychiatry
and Neuroscience
(JPN)",
volume = "47",
issue = "3",
pages = "S6-S7",
month = "June",
year = "2022",
}
@article{SHF22egy,
author = "Y. Sun and F. Haghighat and B. C. M. Fung",
title = "Trade-off between Accuracy and
Fairness of Data-driven Building and Indoor Environment Models: A Comparative
Study of Pre-processing Methods",
journal = "Energy (EGY)",
volume = "239",
number = "122273",
pages = "1-16",
month = "January",
year = "2022",
}
@article{LFIH22eswa,
author = "J. F. Low and B. C. M. Fung and F. Iqbal and S.-C. Huang",
title = "Distinguishing between Fake News and Satire with Transformers",
journal = "Expert Systems With Applications (ESWA)",
volume = "187",
number = "115824",
pages = "1-13",
month = "January",
year = "2022",
}
@article{YHFP21eprime,
author = "B. Yang and F. Haghighat and B. C. M. Fung and K. Panchabikesana",
title = "Season-Based Occupancy Prediction in Residential Buildings Using Machine
Learning Models",
journal = "e-Prime - Advances in Electrical Engineering, Electronics and Energy",
volume = "1",
number = "100003",
pages = "1-20",
month = "December",
year = "2021",
}
@article{LHIF21access,
author = "Y.-H. Liu
and P. C. K. Hung and F. Iqbal and B. C. M. Fung",
title = "Automatic Fall Risk Detection based on
Imbalanced Data",
journal = "IEEE Access",
volume = "9",
pages = "163594-163611",
month = "December",
year = "2021",
}
@article{LFCD21cose,
author = "M. Q. Li and B. C. M. Fung
and P. Charland and S. H. H. Ding",
title = "{I-MAD}: Interpretable
Malware Detector Using {Galaxy Transformers}",
journal = "Computers & Security
(COSE)",
volume = "108",
number = "102371",
pages = "1-15",
month = "September",
year = "2021",
}
@article{IBFAAJ21access,
author = "F. Iqbal
and R. Batool and B. C. M. Fung and S. Aleem and A. Abbasi and A. R. Javed",
title = "Toward Tweet-Mining Framework for Extracting Terrorist Attack-related Information and Reporting",
journal = "IEEE Access",
volume = "9",
pages = "115535-115547",
month = "August",
year = "2021",
}
@article{HHLPHZFCH21sensors,
author = "S.-C. Huang and Q.-V. Hoang and T.-H. Le and Y.-T. Peng and C.-C. Huang and C. Zhang and B. C. M. Fung and K.-H. Cheng and S.-W. Huang",
title = "An Advanced Noise
Reduction and Edge Enhancement Algorithm",
journal = "Sensors:
Intelligent Sensors",
volume = "21",
number = "16.5319",
pages = "1-12",
month = "August",
year = "2021",
}
@article{ALF21jisa,
author = "A.
Abusitta and M. Q. Li and B. C. M. Fung",
title = "Malware
Classification and Composition Analysis: A Survey of Recent Developments",
journal = "Journal of Information Security and Applications (JISA)",
volume = "59",
number = "102828",
pages = "1-17",
month = "June",
year = "2021",
}
@article{WFZP21ins,
author = "R. Wang and B. C. M. Fung and Y. Zhu and Q. Peng",
title = "Differentially
Private Data Publishing for Arbitrarily Partitioned Data",
journal = "Information Sciences",
volume = "553",
number = "",
pages = "247-265",
month = "April",
year = "2021",
}
@article{RFK21tfdt,
author = "O. Rahman and B. C. M. Fung and
D. Kharb",
title = "Factors Influencing Consumer Choice: A Study of Apparel and Sustainable Cues from Canadian and Indian Consumers’ Perspectives",
journal = "International Journal of Fashion Design, Technology and Education (TFDT)",
volume = "14",
number = "2",
pages = "151-161",
month = "March",
year = "2021",
}
@article{HJLLKFCN21access,
author = "S.-C. Huang
and D.-W. Jaw and W. Li and Z. Lu and S.-Y. Kuo and B. C. M. Fung and B.-H. Chen and T. Numnonda",
title = "Image Dehazing in Disproportionate Haze Distributions",
journal = "IEEE Access",
volume = "9",
pages = "44599-44609",
month = "March",
year = "2021",
}
@article{KIFB21tem,
author = "R. H. Khokhar and F. Iqbal and B. C. M. Fung and J. Bentahar",
title = "Enabling Secure Trustworthiness Assessment and Privacy Protection in Integrating Data for Trading Person-specific Information.",
journal = "IEEE Transactions on Engineering Management (TEM) Special Section: Services Computing Management for Artificial Intelligence and Machine Learning",
volume = "68",
number = "1",
pages = "149-169",
month = "February",
year = "2021",
}
@article{AFDCH20tmis,
author = "S. A. Alkhodair and B. C. M. Fung and S. H. H. Ding and W. K. Cheung and S. C. Huang",
title = "Detecting High-engaging Breaking News Rumors in Social Media",
journal = "ACM Transactions on Management Information Systems (TMIS)",
volume = "12",
number = "1",
pages = "8.1-8.16",
month = "December",
year = "2020",
}
@article{WFZ20kbs,
author = "R.
Wang
and B. C. M. Fung and Y. Zhu",
title = "Heterogeneous Data Release for Cluster Analysis with Differential Privacy",
journal = "Knowledge-Based
Systems (KBS)",
volume = "201-202",
number = "106047",
pages = "1-13",
month = "August",
year = "2020",
}
@article{SHF20enb,
author = "Y. Sun and F. Haghighat
and B. C. M. Fung",
title = "A Review of the-State-of-the-Art in Data-driven Approaches for Building Energy Prediction",
journal = "Energy and Buildings",
volume = "221",
number = "110022",
pages = "1-23",
month = "August",
year = "2020",
}
@article{DFMC20kais,
author = "G. G. Dagher and B. C. M. Fung and N. Mohammed and J. Clark",
title = "SecDM: Privacy-preserving Data Outsourcing Framework with Differential Privacy",
journal = "Knowledge and Information Systems (KAIS)",
volume = "62",
number = "5",
pages = "1923-1960",
month = "May",
year = "2020",
}
@article{RFC20sustainabilty,
author = "O. Rahman and B. C. M. Fung and Z. Chen",
title = "Young Chinese Consumers’ Choice between Product-related and Sustainable Cues - The Effects of Gender Differences and Consumer Innovativeness",
journal = "Sustainability: Special Issue on Sustainable Development and Practices: Production, Consumption and Prosumption",
volume = "12",
number = "9.3818",
pages = "1-23",
month = "May",
year = "2020",
}
@article{ADFL20ipm,
author = "S. A. Alkhodair and S. H. H. Ding and B. C. M. Fung and J. Liu",
title = "Detecting Breaking News Rumors of Emerging Topics in Social Media",
journal = "Information
Processing & Management (IP&M)",
volume = "57",
number = "2.102018",
pages = "1-13",
month = "March",
year = "2020",
}
@article{AFHY20egy,
author = "M. Ashouri and B. C. M. Fung and F. Haghighat and and H. Yoshino",
title = "Systematic Approach to Provide Building Occupants with Feedback to Reduce Energy Consumption",
journal = "Energy",
volume = "194",
number = "116813",
pages = "1-9",
month = "March",
year = "2020",
}
@article{RCFK20joti,
author = "O. Rahman and Z. Chen and B. C. M. Fung and D. Kharb",
title = "A Cross-National Study of Young Female Consumer Behaviour, Innovativeness and Apparel Evaluation: China and India",
journal = "Journal of the Textile Institute (JOTI)",
volume = "111",
number = "3",
pages = "334-344",
month = "February",
year = "2020",
}
@article{LJZFYY19access,
author = "J. Liu and X. Jiu and X. Zhang and B. C. M. Fung and X. Yang and C. Yu",
title = "Incremental Mining of High Utility Patterns in One Phase by Absence and Legacy-based Pruning",
journal = "IEEE Access",
volume = "7",
number = "1",
pages = "74168-74180",
month = "December",
year = "2019",
}
@article{IFDBM19access,
author = "F. Iqbal and B. C. M. Fung and M. Debbabi and R. Batool and A. Marrington",
title = "WordNet-based Criminal Networks Mining for Cybercrime Investigation",
journal = "IEEE Access",
volume = "7",
number = "1",
pages = "22740-22755",
month = "December",
year = "2019",
}
@article{GEPFGP19access,
author = "M. Gil and R. El Sherif and M. Pluye and B. C. M. Fung and R. Grad and P. Pluye",
title = "Towards a Knowledge-based Recommender System for Linking Electronic Patient Records with Continuing Medical Education Information at the Point of Care",
journal = "IEEE Access",
volume = "7",
number = "1",
pages = "15955-15966",
month = "December",
year = "2019",
}
@article{IMFBKAH19access,
author = "F. Iqbal and J. Maqbool and B. C. M. Fung and R. Batool and A. M. Khattak adn S. Aleem and P. C. K. Hung",
title = "A Hybrid Framework for Sentiment Analysis using Genetic Algorithm based Feature Reduction",
journal = "IEEE Access",
volume = "7",
number = "1",
pages = "14637-14652",
month = "December",
year = "2019",
}
@article{DFIC19cyb,
author = "S. H. H. Ding and B. C. M. Fung and F. Iqbal and W. K. Cheung",
title = "Learning Stylometric Representations for Authorship Analysis",
journal = "IEEE Transactions on Cybernetics (CYB)",
volume = "49",
number = "1",
pages = "107-121",
month = "January",
year = "2019",
}
@article{AHFY19enb,
author = "M. Ashouri and F. Haghighat
and B. C. M. Fung and and H. Yoshino",
title = "Development of a Ranking Procedure for Energy Performance Evaluation of Buildings based on Occupant Behavior",
journal = "Energy and Buildings",
volume = "183",
pages = "659-671",
month = "January",
year = "2019",
}
@article{AIFDT18tallip,
author = "M. H. Altakrori and F.
Iqbal and B. C. M. Fung and S. H. H. Ding and A. Tubaishat",
title = "Arabic
Authorship Attribution: An Extensive Study on Twitter Posts",
journal = "ACM Transactions on Asian and Low-Resource Language Information Processing (TALLIP)",
volume = "18",
number = "1",
articleno = "5",
pages = "5.1-5.51",
month = "November",
year = "2018",
}
@article{AFIDP18comnet,
author = "K. Al-Hussaeni and B. C. M. Fung and F. Iqbal and
G. G. Dagher and E. Park",
title = "SafePath: Differentially-Private Publishing of Passenger
Trajectories in Transportation Systems",
journal = "Computer Networks (COMNET): Special Issue on Intelligent and Connected Transportation Systems",
volume = "143",
pages = "126-139",
month = "October",
year = "2018",
}
@article{AFILH18kais,
author = "K. Al-Hussaeni and B. C. M. Fung and F. Iqbal and J. Liu and P. C. K. Hung",
title = "Differentially Private
Multidimensional Data Publishing",
journal = "Knowledge and Information Systems (KAIS)",
volume = "56",
number = "3",
pages = "717-752",
month = "September",
year = "2018",
}
@article{HKHIF18jit,
author = "P.
C. K. Hung and K. Kanev and S.-C. Huang and F. Iqbal and B. C. M. Fung",
title = "Smart TV Face Monitoring for Children Privacy",
journal = "Journal of Internet Technology (JIT): Special Issue on Behavior Data Analytics for Cybersecurity",
volume = "19",
number = "5",
pages = "1577-1583",
month = "September",
year = "2018",
}
@article{AHFLY18enb,
author = "M. Ashouri and F. Haghighat and B. C. M. Fung and A. Lazrak and H. Yoshino",
title = "Development of Building
Energy Saving Advisory: A Data Mining Approach",
journal = "Energy and Buildings",
volume = "172",
pages = "139-151",
month = "August",
year = "2018",
}
@article{LZFLI18ins,
author = "J. Liu and X. Zhang and B. C. M. Fung and J. Li and F. Iqbal",
title = "Opportunistic Mining of Top-n High Utility Patterns",
journal = "Information Sciences
(INS)",
volume = "441",
pages = "171-186",
month = "May",
year = "2018",
}
@article{BFIS18scs,
author = "T. Braun and B. C. M. Fung and
F. Iqbal and B. Shah",
title = "Security and Privacy
Challenges in Smart Cities",
journal = "Sustainable Cities and Society (SCS): Special Issue on Towards Secure, Privacy-Preserving, and Reliable Smart Cities and Society,"
volume = "39",
pages = "499-507",
month = "May",
year = "2018",
}
@article{AFRH18jasist,
author = "S. A. Alkhodair and B. C. M. Fung and O. Rahman and P. C. K. Hung",
title = "Improving Interpretations of Topic Modeling in Microblogs",
journal = "Journal of the Association for Information Science and Technology (JASIST)",
volume = "69",
number = "4",
pages = "528-540",
month = "April",
year = "2018",
}
@article{RFCCG18tfdt,
author = "O. Rahman and B. C. M. Fung
and Z. Chen and W.-L. Chang and X. Gao",
title = "A Study of Apparel Consumer Behaviour in China and Taiwan",
journal = "International Journal of Fashion Design, Technology and Education (TFDT)",
volume = "11",
number = "1",
pages = "22-33",
year = "2018",
}
@article{HIHFR18ijuce,
author = "M. Hasan
and F. Iqbal and P. C. K. Hung and B. C. M. Fung and L. Rafferty",
title = "A Security
Study for Smart Metering Systems",
journal = "International Journal of Urban and Civil Engineering (IJUCE)",
volume = "12",
number = "1",
pages = "1-11",
year = "2018",
}
@article{GFIKTML17isf,
author = "J. Guo
and B. C. M. Fung and F. Iqbal and P. J. K. Kuppen and R. A. E. M. Tollenaar and W. E. Mesker and J.-J. Lebrun",
title = "Revealing Determinant Factors for Early Breast Cancer Recurrence by Decision Tree",
journal = "Information Systems
Frontiers (ISF)",
volume = "19",
number = "6",
pages = "1233-1241",
month = "December",
year = "2017",
}
@article{RFCG17apjml,
author = "O. Rahman
and B. C. M. Fung and Z. Chen and X. Gao",
title = "A Cross-National Study of Apparel Consumers’ Preferences and the Role of Product Evaluative Cues",
journal = "Asia Pacific Journal of Marketing and Logistics (APJML)",
volume = "29",
number = "4",
pages = "796-812",
month = "September",
year = "2017",
}
@article{GKAFKAG17sqjo,
author = "L. Guerrouj and Z. Kermansaravi
and V. Arnaoudouva and B. C. M. Fung and F. Khomh and G. Antoniol and Y.-G. Guéhéneuc",
title = "Investigating the
Relation between Lexical Smells and Change- and Fault- Proneness: An
Empirical Study",
journal = "Software Quality
Journal (SQJO)",
volume = "25",
number = "3",
pages = "641-670",
month = "September",
year = "2017",
}
@article{KFIAB16ecra,
author = "R. H. Khokhar and B. C. M.
Fung and F. Iqbal and D. Alhadidi and J. Bentahar",
title = "Privacy-preserving
Data Mashup Model for Trading Person-specific Information",
journal = "Electronic Commerce
Research and Applications (ECRA)",
volume = "17",
pages = "19-37",
month = "May-June",
year = "2016",
}
@article{YHF16scs,
author = "Z.
Yu and F. Haghighat and B.
C. M. Fung",
title = "Advances and Challenges in
Building Engineering and Data Mining Applications for Energy-efficient Communities",
journal = "Sustainable Cities and Society (SCS)",
volume = "25",
pages = "33-38",
month = "August",
year = "2016",
}
@article{LWF16tkde,
author = "J. Liu and K. Wang and B.
C. M. Fung",
title = "Mining High Utility Patterns in One Phase without Generating Candidates",
journal = "IEEE Transactions on
Knowledge and Data Engineering (TKDE)",
volume = "28",
number = "5",
pages = "1245-1257",
month = "May",
year = "2016",
}
@article{RFY16jicr,
author = "O. Rahman and B. C. M. Fung and A. Yeo",
title = "Exploring the Meanings of Hijab through Online Comments in Canada",
journal = "Journal of Intercultural Communication Research (JICR)",
volume = "45",
number = "3",
pages = "214-232",
month = "April",
year = "2016",
}
@article{FFFCPD15diin,
author = "M. R. Farhadi and B. C. M. Fung and Y. B. Fung and P. Charland and S. Preda and M. Debbabi",
title = "Scalable Code Clone Search for Malware Analysis",
journal = "Digital Investigation (DIIN): Special Issue on Big Data and Intelligent Data Analysis",
volume = "15",
pages = "46-60",
month = "December",
year = "2015",
}
@article{SFK15peerjcs,
author = "N. Scarabeo
and B. C. M. Fung and R. H. Khokhar",
title = "Mining Known Attack Patterns from Security-related Events",
journal = "PeerJ Computer Science",
volume = "1",
number = "e25",
pages = "1-21",
month = "October",
year = "2015",
}
@article{SIF15diin,
author = "M.
Schmid and F. Iqbal and B. C. M. Fung",
title = "E-mail Authorship Attribution using
Customized Associative Classification",
journal = "Digital Investigation
(DIIN)",
volume = "14",
number = "1",
pages = "S116-S126",
month = "August",
year = "2015",
}
@article{DFD15tissec,
author = "S. H. H. Ding and B. C. M.
Fung and M. Debbabi",
title = "A Visualizable
Evidence-Driven Approach for Authorship Attribution",
journal = "ACM Transactions on Information and System Security (TISSEC)",
volume = "17",
number = "3",
articleno = "12",
pages = "12:1-12:30",
month = "March",
year = "2015",
}
@article{LNF15jim,
author = "S. Li and K. Nahar and B. C. M. Fung",
title = "Product Customization of Tablet Computers based on the Information of Online Reviews by Customers",
journal = "Journal of Intelligent Manufacturing (JIM)",
volume = "26",
number = "1",
pages = "97-110",
month = "February",
year = "2015",
}
@article{AFC14dke,
author = "K. Al-Hussaeni and B. C. M.
Fung and W. K. Cheung",
title = "Privacy-Preserving
Trajectory Stream Publishing",
journal = "Data \& Knowledge Engineering (DKE)",
volume = "94",
number = "A",
pages = "89-109",
month = "November",
year = "2014",
}
@article{GXF14tkde,
author = "S. Goryczka and L. Xiong and B. C. M. Fung",
title = "$m$-privacy for
collaborative data publishing",
journal = "IEEE Transactions on
Knowledge and Data Engineering (TKDE)",
volume = "26",
number = "10",
pages = "2520-2533",
month = "October",
year = "2014",
}
@article{CFYD14vldbj,
author = "R. Chen and B. C. M. Fung and P. S. Yu and B. C. Desai",
title = "Correlated Network Data Publication via Differential Privacy",
journal = "Very Large Data Bases Journal (VLDBJ)",
volume = "23",
number = "4",
pages = "653-676",
month = "August",
year = "2014",
}
@article{KCFL14jbi,
author = "R. H. Khokhar and R. Chen and B. C. M. Fung and S. M. Lui",
title = "Quantifying
the costs and benefits of privacy-preserving health data publishing",
journal = "Journal of Biomedical Informatics (JBI): Special Issue on Informatics Methods in Medical Privacy",
volume = "50",
pages = "107-121",
month = "August",
year = "2014",
}
@article{BF14kais,
author = "A.
Basher and B. C. M. Fung",
title = "Analyzing topics and
authors in chat logs for crime investigation",
journal = "Knowledge and Information Systems (KAIS)",
volume = "39",
number = "2",
pages = "351-381",
month = "May",
year = "2014",
}
@article{RFL14tfdt,
author = "O.
Rahman and B. C. M. Fung and W.-S. Liu",
title = "Using
Data Mining to Analyse Fashion Consumers' Preferences from a Cross-national
Perspective",
journal = "International Journal of Fashion Design, Technology and Education (TFDT)",
volume = "7",
number = "1",
pages = "42-49",
month = "March",
year = "2014",
}
@article{MAFD14tdsc,
author = "N. Mohammed and D. Alhadidi and B. C. M. Fung and M. Debbabi",
title = "Secure Two-Party Differentially Private Data Release for Vertically-Partitioned Data",
journal = "IEEE Transactions on Dependable and Secure Computing (TDSC)",
volume = "11",
number = "1",
pages = "59-71",
month = "January/February",
year = "2014",
}
@article{GFCA14trc,
author = "M. Ghasemzadeh and B. C. M. Fung and R. Chen and A. Awasthi",
title = "Anonymizing trajectory
data for passenger flow analysis",
journal = "Transportation Research Part C: Emerging Technologies (TRC)",
volume = "39",
pages = "63-79",
month = "February",
year = "2014",
}
@article{DF13dke,
author = "G. G. Dagher and B. C. M. Fung",
title = "Subject-based Semantic
Document Clustering for Digital Forensic Investigations",
journal = "Data \& Knowledge Engineering (DKE)",
volume = "86",
pages = "224-241",
month = "July",
year = "2013",
}
@article{YFH13buil,
author = "Z. Yu and B. C. M. Fung and F. Haghighat",
title = "Extracting knowledge from building-related data - a data mining framework",
journal = "Building Simulation (BUIL): An International Journal",
volume = "6",
number = "2",
pages = "207-222",
month = "June",
year = "2013",
}
@article{MJCFO13jamia,
author = "N. Mohammed and X. Jiang and R. Chen and B. C. M. Fung and L. Ohno-Machado",
title = "Privacy-preserving
heterogeneous health data sharing",
journal = "Journal of the American Medical Informatics Association (JAMIA)",
volume = "20",
number = "3",
pages = "462-469",
month = "May",
year = "2013",
}
@article{CFMDW13ins,
author = "R. Chen and B. C. M. Fung and N. Mohammed and B. C. Desai",
title = "Privacy-preserving trajectory data publishing by local suppression",
journal = "Information
Sciences: Special Issue on Data Mining for Information Security",
volume = "231",
pages = "83-97",
month = "May",
year = "2013",
}
@article{IBFD13ins,
author = "F. Iqbal and H. Binsalleeh and B. C. M. Fung and M. Debbabi",
title = "A unified data mining solution for authorship analysis in anonymous textual communications",
journal = "Information
Sciences: Special Issue on Data Mining for Information Security",
volume = "231",
pages = "98-112",
month = "May",
year = "2013",
}
@article{FTHXAD12tsc,
author = "B. C. M. Fung and T. Trojer and P. C. K. Hung and L. Xiong and K. Al-Hussaeni and R. Dssouli",
title = "Service-oriented
architecture for high-dimensional private data mashup",
journal = "IEEE Transactions on Services Computing (TSC)",
volume = "5",
number = "3",
pages = "373-386",
month = "July-September",
year = "2012",
}
@article{YHFZ12enb,
author = "Z. Yu and F. Haghighat and B. C. M. Fung and
L. Zhou",
title = "A novel methodology for
knowledge discovery through mining associations between building operational
data",
journal = "Energy and Buildings",
volume = "47",
number = "",
pages = "430-440",
month = "April",
year = "2012",
}
@article{AFYF12diin,
author = "R. Al-Zaidy and B. C. M. Fung
and A. M. Youssef and F. Fortin",
title = "Mining criminal networks from unstructured text documents",
journal = "Digital Investigation
(DIIN)",
volume = "8",
number = "3-4",
pages = "147-160",
month = "February",
year = "2012",
}
@article{YHFMY11egy,
author = "Z. Yu and F. Haghighat
and B. C. M. Fung and E. Morofsky and H. Yoshino",
title = "A methodology for
identifying and improving occupant behavior in residential buildings",
journal = "Energy",
volume = "36",
number = "11",
pages = "6596-6608",
month = "November",
year = "2011",
}
@article{MFD11vldbj,
author = "N. Mohammed and B. C. M. Fung and
M. Debbabi",
title = "Anonymity meets game
theory: secure data integration with malicious participants",
journal = "Very Large Data Bases Journal (VLDBJ)",
volume = "20",
number = "4",
pages = "567-588",
month = "August",
year = "2011",
}
@article{CMFDX11vldb,
author = "R. Chen and N. Mohammed
and B. C. M. Fung and B. C. Desai and L. Xiong",
title = "Publishing Set-Valued
Data via Differential Privacy",
journal = "The Proceedings of the VLDB Endowment (PVLDB)",
volume = "4",
number = "11",
pages = "1087-1098",
month = "August",
year = "2011",
}
@article{YFHYM11enb,
author = "Z. Yu and B. C. M. Fung and F. Haghighat and H. Yoshino and E. Morofsky",
title = "A systematic procedure to
study the influence of occupant behavior on building energy consumption",
journal = "Energy and Buildings",
volume = "43",
number = "6",
pages = "1409-1417",
month = "June",
year = "2011",
}
@article{MFHL10tkdd,
author = "N. Mohammed and B. C. M. Fung and
P. C. K. Hung and C. Lee",
title = "Centralized and distributed anonymization for high-dimensional
healthcare data",
journal = "ACM Transactions on Knowledge Discovery from Data (TKDD)",
volume = "4",
number = "4",
pages = "18:1--18:33",
articleno = "18",
month = "October",
year = "2010",
}
@article{IBFD10di,
author = "F. Iqbal and H.
Binsalleeh and
B. C. M. Fung and M. Debbabi",
title = "Mining writeprints
from anonymous e-mails for forensic investigation",
journal = "Digital Investigation",
volume = "7",
number = "1-2",
pages = "56-64",
month = "October",
year = "2010",
}
@article{YHFY10enb,
author = "Z. Yu and F. Haghighat and B. C. M. Fung and H. Yoshino",
title = "A decision tree method for
building energy demand modeling",
journal = "Energy and Buildings",
volume = "42",
number = "10",
pages = "1637-1646",
month = "October",
year = "2010",
}
@article{FWCY10csur,
author = "B. C. M. Fung and K. Wang
and R. Chen and P. S. Yu",
title = "Privacy-Preserving Data Publishing: A Survey
of Recent Developments",
journal = "ACM Computing Surveys",
volume = "42",
number = "4",
pages = "14:1-14:53",
articleno = "14",
month = "June",
year = "2010",
}
@article{FWWH09dke,
author = "B. C. M. Fung and K. Wang
and L. Wang and P. C. K. Hung",
title = "Privacy-Preserving Data Publishing for Cluster Analysis",
journal = "Data \& Knowledge Engineering (DKE)",
volume = "68",
number = "6",
pages = "552-575",
month = "June",
year = "2009",
}
@article{IHFD08di,
author = "F. Iqbal and R. Hadjidj and
B. C. M. Fung and M. Debbabi",
title = "A Novel Approach of Mining
Write-Prints for Authorship Attribution in E-mail Forensics",
journal = "Digital Investigation",
volume = "5",
number = "1",
pages = "S42-S51",
month = "September",
year = "2008",
}
@article{FWY07tkde,
author = "B. C. M.
Fung and Ke Wang and P. S. Yu",
title = "Anonymizing
Classification Data for Privacy Preservation",
journal = "IEEE Transactions on
Knowledge and Data Engineering (TKDE)",
volume = "19",
number = "5",
pages = "711--725",
month = "May",
year = "2007",
}
@article{WFY07kais,
author = "K. Wang and B. C. M.
Fung and P. S. Yu",
title = "Handicapping Attacker's
Confidence: An Alternative to k-Anonymization",
journal = "Knowledge and Information
Systems (KAIS)",
volume = "11",
number = "3",
pages = "345--368",
month = "April",
year = "2007",
}
Refereed Conference Papers
@inproceedings{AFAF24rasse,
author = "W. J. Alhashemi and B. C. M. Fung and A. Abusitta and C. Fachkha",
title = "{CSGraph2Vec}: Distributed Graph-Based Representation Learning for Assembly Functions",
booktitle = "Proc. of the IEEE Recent Advances in Systems Science and Engineering (RASSE),
pages = "",
address = "Taichung, Taiwan",
month = "November",
year = "2024",
publisher = "IEEE",
}
@inproceedings{LDWCF24cikm,
author = "L.
Li and S. H. H. Ding and A. Walenstein and P. Charland and B. C. M. Fung",
title = "Dynamic Neural Control Flow Execution: an Agent-Based Deep Equilibrium Approach for Binary Vulnerability Detection",
booktitle = "Proc. of the 33rd ACM International Conference on Information and Knowledge Management (CIKM),
pages = "",
address = "Boise, ID",
month = "October",
year = "2024",
publisher = "ACM",
}
@inproceedings{MSFCW24ecmlpkdd,
author = "S. Mahdavifar and M. Saqib and B. C. M. Fung and P. Charland and A. Walenstein",
title = "VulEXplaineR: XAI for Vulnerability Detection on Assembly Code",
booktitle = "Proc. of the European Conference on Machine Learning and Principles and Practice of Knowledge Discovery in Databases (ECML PKDD),
pages = "3-20",
address = "Vilnius, Lithuania",
month = "September",
year = "2024",
publisher = "Springer",
}
@inproceedings{YAFCW24icsoft,
author = "J.
Q. Yuki and M. Amouei and B. C. M. Fung and P. Charland and A. Walenstein",
title = "{AsmDocGen}: Generating Functional Natural Language Descriptions for Assembly Code",
booktitle = "Proceedings of the 19th International Conference on Software
(ICSOFT)",
pages = "35-45",
address = "Dijon, France",
month = "July",
year = "2024",
}
@inproceedings{RFGMFA24iccci,
author = "S. Razaulla and C. Fachkha and A. Gawanmeh and C. Markarian and B. C. M. Fung and C. Assi",
title = "Tracing the Ransomware Bloodline: Investigation and Detection of Drifting Virlock Variants",
booktitle = "Proc. of the 6th IEEE International Conference on Computer Communication and the Internet (ICCCI),
pages = "",
address = "Tokyo,
Japan",
month = "June",
year = "2024",
publisher = "IEEE Press",
}
@inproceedings{SFCW24icde,
author = "M. Saqib and B. C. M. Fung and P. Charland and A. Walenstein",
title = "{GAGE}: Genetic Algorithm-based
Graph Explainer for Malware Analysis",
booktitle = "Proc. of the
40th IEEE International Conference on Data Engineering (ICDE)",
pages = "2258-2270",
address = "Utrecht,
Netherlands",
month = "May",
year = "2024",
publisher = "IEEE Computer
Society",
}
@inproceedings{BCDF24cycon,
author = "M. Beninger
and P. Charland and S. H. H. Ding and B. C. M. Fung",
title = "ERS0: Enhancing Military Cybersecurity with AI-Driven SBOM for Firmware Vulnerability Detection and Asset Management",
booktitle = "Proc. of the
16th NATO International Conference on Cyber Conflict (CyCon)",
pages = "",
address = "Tallinn, Estonia",
month = "May",
year = "2024",
publisher = "",
}
@inproceedings{BSFC24drcn,
author = "G. Breyton and M. Saqib and B. C. M. Fung and P. Charland",
title = "{BETAC}: Bidirectional Encoder Transformer for Assembly Code Function Name Recovery",
booktitle = "Proc. of the
20th IEEE International Conference on the Design of Reliable Communication Networks (DRCN)",
pages = "1-8",
address = "Montreal, Canada",
month = "May",
year = "2024",
publisher = "IEEE Communications Society",
}
@inproceedings{HHF23sma,
author = "D. Hu and P. C. K. Hung and B. C. M. Fung",
title = "An Exploratory Study of Recognizing Canine Beloved Objects by Robotic Dogs",
booktitle = "Proc. of the 12th International Conference on Smart Media and Applications (SMA)",
pages = "",
address = "Taichung, Taiwan",
month = "December",
year = "2023",
publisher = "",
}
@inproceedings{ASFC22emnlp,
author = "M. H. Altakrori and T. Scialom and B. C. M. Fung and J. C. K. Cheung",
title = "A Multifaceted Framework to Evaluate Evasion, Content Preservation, and Misattribution in Authorship Obfuscation Techniques",
booktitle = "Proc. of the 2022 Conference on Empirical Methods in Natural Language Processing (EMNLP)",
pages = "2391-2403",
address = "Abu Dhabi, UAE",
month = "December",
year = "2022",
publisher = "ACL",
}
@inproceedings{DLF22icmla,
author = "A. Diwan and M. Q. Li and B. C. M. Fung",
title = "{VDGraph2Vec:} Vulnerability Detection in Assembly Code using Message Passing Neural Networks",
booktitle = "Proc. of the 21st IEEE International Conference on Machine Learning and Applications",
pages = "1039-1046",
address = "Nassau, The Bahamas",
month = "December",
year = "2022",
publisher = "IEEE",
}
@inproceedings{HBF22iotais,
author = "T. Halabi and M. Bellaiche and B. C. M. Fung",
title = "Towards Adaptive Cybersecurity for Green IoT",
booktitle = "Proc. of the IEEE International Conference on Internet of Things and Intelligence Systems (IoTaIS)",
pages = "64-69",
address = "Bali, Indonesia",
month = "November",
year = "2022",
publisher = "IEEE",
}
@inproceedings{LFA22ijcnn,
author = "M. Q. Li and B. C. M. Fung and A. Abusitta",
title = "On the Effectiveness of Interpretable Feedforward Neural Network",
booktitle = "Proc. of the International Joint Conference on Neural Networks (IJCNN)",
pages = "1-8",
address = "Padova, Italy",
month = "July",
year = "2022",
publisher = "IEEE",
}
@inproceedings{HACF22splitech,
author = "T. Halabi and A. Abusitta and G.
H. S. Carvalho and B. C. M. Fung",
title = "Incentivized Security-Aware Computation Offloading for Large-Scale Internet of Things Applications",
booktitle = "Proceedings of the 7th IEEE International Conference on Smart and Sustainable Technologies (SpliTech): International Symposium on Internet of Things",
address = "Split and Bol, Croatia",
month = "July",
year = "2022",
}
@inproceedings{MDFC22csr,
author = "C. Molloy and S. H. H. Ding and B. C. M. Fung and P. Charland",
title = "H4rm0ny: A Competitive Zero-sum Two-player Markov Game for Multi-agent Learning on Evasive Malware Generation and Detections",
booktitle = "Proceedings of the IEEE International Conference on Cyber Security and Resilience (CSR)",
address = "Virtual Conference",
pages = "22-29",
month = "July",
year = "2022",
}
@inproceedings{LF22icsoft,
author = "M. Q. Li and B. C. M. Fung and P. Charland",
title = "Interpretable Malware Classification based on Functional Analysis",
booktitle = "Proceedings of the 17th International Conference on Software",
pages = "500-507",
address = "Lisbon, Portugal",
month = "July",
year = "2022",
}
@inproceedings{SHF22cobee,
author = "Y. Sun and F. Haghighat and B. C. M. Fung",
title = "Fairness-aware Regression Models for Building Energy Prediction to Achieve Uniform Performance",
booktitle = "Proceedings of the 5th International Conference on Building Energy and Environment (COBEE)",
address = "Montreal, Canada",
month = "July",
year = "2022",
publisher = "Springer Nature",
}
@inproceedings{MCDF22cycon,
author = "C. Molloy and P. Charland and S. H. H. Ding and B. C. M. Fung",
title = "{JARV1S}: Phenotype Clone Search for Rapid Zero-Day Malware Triage and Functional Decomposition for Cyber Threat Intelligence",
booktitle = "Proceedings of the 14th NATO International Conference on Cyber Conflict (CyCon)",
pages = "385-403",
address = "Tallinn, Estonia",
month = "June",
year = "2022",
}
@inproceedings{ACF21emnlp,
author = "M. H. Altakrori and J. C. K. Cheung and B. C. M. Fung",
title = "The Topic Confusion Task: A Novel Evaluation Scenario for Authorship Attribution",
booktitle = "Proc. of the 2021 Conference on Empirical Methods in Natural Language Processing (EMNLP)",
pages = "4242-4256",
address = "Punta Cana, Dominican Republic",
month = "November",
year = "2021",
publisher = "ACL",
}
@inproceedings{LFCD21icsoft,
author = "M. Q. Li and B. C. M. Fung
and P. Charland and S. H. H. Ding",
title = "A Novel and Dedicated Machine Learning Model for Malware Classification'",
booktitle = "Proc. of the 16th International Conference on Software Technologies (ICSOFT)",
pages = "617-628",
address = "Virtual
Conference",
month = "July",
year = "2021",
publisher = "ScitePress",
}
@inproceedings{AOF21ijcnn,
author = "A. Abusitta and A. W. Omar and B. C. M. Fung",
title = "VirtualGAN: Reducing Mode Collapse in Generative Adversarial Networks Using Virtual Mapping",
booktitle = "Proc. of the International
Joint Conference on Neural Networks (IJCNN)",
pages = "1-6",
address = "Virtual
Conference",
month = "July",
year = "2021",
publisher = "IEEE",
}
@inproceedings{BDFI21naacl,
author = "H. Bo and S. H. H. Ding and B. C. M. Fung and F. Iqbal",
title = "{ER-AE}: Differentially
Private Text Generation for Authorship Anonymization",
booktitle = "Proc. of the
2021 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies (NAACL-HLT)",
pages = "3997-4007",
address = "Online",
month = "June",
year = "2021",
publisher = "ACL",
}
@inproceedings{RF21iccs,
author = "O.
Rahman and B. C. M. Fung",
title = "A Data Mining Analysis of Cross-national Study of Apparel Consumption",
booktitle = "Proc. of the International Conference on Comprehensible Science (ICCS) - Lecture Notes in Networks and Systems (LNNS)",
pages = "23-32",
address = "Eilat, Israel",
month = "June",
year = "2021",
publisher = "Springer",
}
@inproceedings{YCFP21sdm,
author = "K.
Yin and W. K. Cheung and B. C. M. Fung and J. Poon",
title = "TedPar: Temporally Dependent PARAFAC2 Factorization for Phenotype-based Disease Progression Modeling",
booktitle = "Proc. of the 21st SIAM International Conference on Data Mining (SDM)",
pages = "594-602",
address = "Alexandria, VA",
month = "May",
year = "2021",
publisher = "SIAM",
}
@inproceedings{WFH20bigdata,
author = "Q.
Wang and B. C. M. Fung and
P. C. K. Hung",
title = "DUGRA: Dual-Graph Representation Learning for Health Information Networks",
booktitle = "Proc. of the 2020 IEEE International Conference on
Big Data (Big Data)",
pages = "4961-4970",
address = "Virtual
Conference",
month = "December",
year = "2020",
publisher = "IEEE",
}
@inproceedings{LFC20dsaa,
author = "J. Lu and B. C. M. Fung and
W. K. Cheung",
title = "Embedding for Anomaly Detection on Health Insurance Claims",
booktitle = "Proc. of the
7th IEEE International Conference on Data Science and Advanced Analytics (DSAA)",
pages = "459-468",
address = "Sydney,
Australia",
month = "October",
year = "2020",
publisher = "IEEE",
}
@inproceedings{SCYCFP19ijcai,
author = "L. Song and C. W. Cheong and K. Yin and W. K. Cheung and B. C. M. Fung and J. Poon",
title = "Medical Concept Embedding with Multiple Ontological Representations",
booktitle = "Proc. of the
28th International Joint Conference on Artificial Intelligence (IJCAI)",
pages = "4613-4619",
address = "Macao,
China",
month = "August",
year = "2019",
publisher = "",
}
@inproceedings{DFC19sp,
author = "S. H. H. Ding and B. C. M. Fung and
P. Charland",
title = "{Asm2Vec}:
Boosting Static Representation Robustness for Binary Clone Search
against Code Obfuscation and Compiler Optimization",
booktitle = "Proc. of the
40th International Symposium on Security and Privacy (S\&P)",
pages = "38-55",
address = "San
Francisco, CA",
month = "May",
year = "2019",
publisher = "IEEE Computer
Society",
}
@inproceedings{YQCFP19aaai,
author = "K. Yin and D. Qian and W. K. Cheung and B. C. M. Fung and J. Poon",
title = "Learning
Phenotypes and Dynamic Patient Representations via RNN Regularized
Collective Non-negative Tensor Factorization",
booktitle = "Proc. of the
33rd AAAI Conference on Artificial Intelligence (AAAI)",
pages = "",
address = "Honolulu,
HI",
month = "January",
year = "2019",
publisher = "",
}
@inproceedings{YCLFP18ijcai,
author = "K. Yin
and W. K. Cheung and Y. Liu and B. C. M. Fung and J. Poon",
title = "Joint Learning of Phenotypes and Diagnosis-Medication Correspondence via Hidden Interaction Tensor Factorization",
booktitle = "Proc. of the 27th International Joint Conference on Artificial Intelligence (IJCAI)",
pages = "3627-3633",
address = "Stockholm, Sweden",
month = "July",
year = "2018",
publisher = "",
}
@inproceedings{HKIMRPHF16compIMAGE,
author = "P. C. K. Hung
and K. Kanev and F. Iqbal and D. Mettrick and L. Rafferty and G.-P. Pan and S.-C. Huang and B. C. M. Fung",
title = "A Study of Children Facial Recognition for Privacy in Smart TV",
booktitle = "Proc. of the International Symposium on Computational Modeling of Objects Represented in Images (CompIMAGE),
LNCS 10149",
pages = "229-240",
address = "Niagara Falls,
NY",
month = "September",
year = "2016",
publisher = "Springer",
}
@inproceedings{DFC16kdd,
author = "S. H. H. Ding and B. C.
M. Fung and P. Charland",
title = "Kam1n0: MapReduce-based Assembly Clone Search for Reverse Engineering",
booktitle = "Proc. of the
22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (SIGKDD)",
pages = "461-470",
address = "San Francisco,
CA",
month = "August",
year = "2016",
publisher = "ACM Press",
}
@inproceedings{BDDFOU16ideas,
author = "M. Bonenfant
and B. C. Deasi and D. Desai and B. C. M. Fung and M. T. Özsu and J. D. Ullman",
title = "Panel: The State of Data",
booktitle = "Proc. of the
20th International Database Engineering & Applications Symposium (IDEAS)",
pages = "2-11",
address = "Montreal, Canada",
month = "July",
year = "2016",
publisher = "ACM Press",
}
@inproceedings{DFAF15icpads,
author = "G. G. Dagher and F. Iqbal and M. Arafati and B. C. M. Fung",
title = "Fusion: Privacy-preserving Distributed Protocol for High-Dimensional Data Mashup",
booktitle = "Proc. of the 21st IEEE International Conference on Parallel and Distributed Systems (ICPADS)",
pages = "760-769",
address = "Melbourne, Australia",
month = "December",
year = "2015",
publisher = "IEEE Computer
Society",
}
@inproceedings{LLXF15dawak,
author = "J. Liu and J. Li and S. Xu and B. C. M. Fung",
title = "Secure Outsourced Frequent Pattern Mining by Fully Homomorphic Encryption",
booktitle = "Proc. of the 17th International Conference on Big Data Analytics and Knowledge Discovery (DaWak),
volume = "LNCS 9263",
pages = "70-81",
address = "València, Spain",
month = "September",
year = "2015",
publisher = "Springer",
}
@inproceedings{LWZFCY15dexa,
author = "J. Liu
and Y. Wu and Q. Zhou and B. C. M. Fung and F. Chen and B. Yu",
title = "Parallel Eclat for Opportunistic Mining of Frequent Itemsets",
booktitle = "Proc. of the 26th International Conference on Database and Expert Systems Applications (DEXA),
volume = "LNCS 9261",
pages = "401-405",
address = "València, Spain",
month = "September",
year = "2015",
publisher = "Springer",
}
@inproceedings{ADFH14cloud,
author = "M. Arafati
and G. G. Dagher and B. C. M. Fung and P. C. K. Hung",
title = "{D-Mash}: A Framework for
Privacy-Preserving Data-as-a-Service Mashups",
booktitle = "Proc. of
the 8th IEEE International Conference on Cloud Computing (CLOUD)",
pages = "495-505",
address = "Anchorage,
AK",
month = "June",
year = "2014",
publisher = "IEEE Computer
Society",
}
@inproceedings{FFCD14sere,
author = "M. R. Farhadi and B. C. M.
Fung and P. Charland and M. Debbabi",
title = "{BinClone}: Detecting
Code Clones in Malware ",
booktitle = "Proc. of
the 8th IEEE International Conference on Software Security and Reliability
(SERE)",
pages = "78-87",
address = "San Francisco, CA",
month = "June",
year = "2014",
publisher = "IEEE Reliability
Society",
}
@inproceedings{HFI14ntms,
author = "A. K.
Hmood and B. C. M. Fung and F. Iqbal",
title = "Privacy-Preserving
Medical Reports
Publishing for Cluster
Analysis",
booktitle = "Proc. of
the 6th IFIP International Conference on New Technologies, Mobility and Security (NTMS)",
pages = "1-8",
address = "Dubai,
UAE",
month = "March",
year = "2014",
publisher = "IEEE Computer
Society",
}
@inproceedings{FJL13asonam,
author = "B.
C. M. Fung and Y. Jin and J. Li",
title = "Preserving
Privacy and Frequent Sharing Patterns for
Social Network Data Publishing",
booktitle = "Proc. of
the 5th IEEE/ACM International Conference on Social Networks Analysis and
Mining (ASONAM)",
pages = "479-485",
address = "Niagara Falls, Canada",
month = "August",
year = "2013",
publisher = "IEEE Computer
Society",
}
@inproceedings{LWF12icdm,
author = "J. Liu and K. Wang and B.
C. M. Fung",
title = "Direct
Discovery of High Utility Itemsets without Candidate Generation",
booktitle = "Proc. of the
12th IEEE
International Conference on Data Mining (ICDM)",
pages = "984-989",
address = "Brussels,
Belgium",
month = "December",
year = "2012",
publisher = "IEEE Computer
Society",
}
@inproceedings{IFD12wi,
author = "F. Iqbal and B. C.
M. Fung and M. Debbabi",
title = "Mining Criminal
Networks from Chat Logs",
booktitle = "Proc. of the IEEE/WIC/ACM International Conferences on Web Intelligence and Intelligent Agent Technology (WI-IAT)",
pages = "332-337",
address = "Macau",
month = "December",
year = "2012",
publisher = "IEEE Computer
Society",
}
@inproceedings{BXCF12cikm,
author = "L. Bonomi and L. Xiong
and R. Chen and B. C.
M. Fung",
title = "Frequent
grams based Embedding for Privacy Preserving Record Linkage",
booktitle = "Proc.
of the 21st ACM Conference on Information and Knowledge
Management (CIKM)",
pages = "1597-1601",
address = "Maui, HI",
month = "October",
year = "2012",
publisher = "ACM Press",
}
@inproceedings{CFF12ist,
author = "P.
Charland and B.
C. M. Fung and M. R. Farhadi",
title = "Clone
Search for Malicious Code Correlation",
booktitle = "Proc. of the NATO RTO Symposium on Information Assurance and Cyber Defense (IST-111)",
pages = "1.1-1.12",
address = "Koblenz, Germany",
month = "September",
year = "2012",
}
@inproceedings{CFDS12kdd,
author = "R. Chen and B. C. M. Fung and B. C. Desai and N. M. Sossou",
title = "Differentially
Private Transit Data Publication: A Case Study on the Montreal
Transportation System",
booktitle = "Proc. of the 18th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (SIGKDD)",
pages = "213-221",
address = "Beijing,
China",
month = "August",
year = "2012",
publisher = "ACM Press",
}
@inproceedings{AMFD12pets,
author = "D. Alhadidi and N. Mohammed
and B. C. M. Fung and M. Debbabi",
title = "Secure
Distributed Framework for Achieving ε-Differential Privacy",
booktitle = "Proc.
of the 12th Privacy Enhancing Technologies Symposium (PETS)",
volume = "LNCS 7384",
pages = "120-139",
address = "Vigo,
Spain",
month = "July",
year = "2012",
publisher = "Springer-Verlag",
}
@inproceedings{AF11csc,
author = "H. AbuSharkh and B. C. M. Fung",
title = "Service-Oriented Architecture for Sharing Private Spatial-Temporal Data",
booktitle = "Proc. of the IEEE International Conference on Cloud and Service Computing (CSC)",
pages = "40-47",
address = "Hong Kong",
month = "December",
year = "2011",
publisher = "IEEE
Computer Society",
}
@inproceedings{GXF11collaboratecom,
author = "S. Goryczka and L. Xiong and B. C. M. Fung",
title = "$m$-privacy for collaborative data publishing",
booktitle = "Proc. of the 7th IEEE International Conference on Collaborative Computing (CollaborateCom)",
pages = "",
address = "Orlando, FL",
month = "October",
year = "2011",
publisher = "",
}
@inproceedings{MCFY11kdd,
author = "N.
Mohammed and R. Chen and B. C. M. Fung and P. S. Yu",
title = "Differentially Private
Data Release for Data Mining",
booktitle = "Proc. of the
17th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (SIGKDD)",
pages = "493-501",
address = "San Diego, CA",
month = "August",
year = "2011",
publisher = "ACM Press",
}
@inproceedings{CF11rfid,
author = "R. Chen and B. C. M. Fung",
title = "A Unified RFID Data
Anonymization Platform",
booktitle = "Proc. of the
5th International Conference on RFID",
pages = "95-96",
address = "Orlando, FL",
month = "April",
year = "2011",
publisher = "IEEE Communications
Society",
}
@inproceedings{AFY11sac,
author = "R. Al-Zaidy and B. C. M. Fung and A. M. Youssef",
title = "Towards Discovering Criminal Communities
from Textual Data",
booktitle = "Proc. of the
26th ACM SIGAPP Symposium on Applied Computing (SAC)",
pages = "172-177",
address = "TaiChung, Taiwan",
month = "March",
year = "2011",
publisher = "ACM Press",
}
@inproceedings{RNDF11sac,
author = "S. Ray and M. F. Nizam
and S. Das and B. C. M. Fung",
title = "Verification of data pattern for interactive privacy preservation model",
booktitle = "Proc. of the
26th ACM SIGAPP Symposium on Applied Computing (SAC)",
pages = "1716-1723",
address = "TaiChung, Taiwan",
month = "March",
year = "2011",
publisher = "ACM Press",
}
@inproceedings{SXF10cikm,
author = "P. Shi and L. Xiong and B. C.
M. Fung",
title = "Anonymizing
Data with Quasi-Sensitive Attribute Values",
booktitle = "Proc.
of the 19th ACM Conference on Information and Knowledge
Management (CIKM)",
pages = "1389-1392",
address = "Toronto, Canada",
month = "October",
year = "2010",
publisher = "ACM Press",
}
@inproceedings{IKFD10sac,
author = "F. Iqbal and L. A.
Khan and B. C. M. Fung and M. Debbabi",
title = "E-mail Authorship
Verification for Forensic Investigation",
booktitle = "Proc. of the
25th ACM SIGAPP Symposium on Applied Computing (SAC)",
pages = "1591-1598",
address = "Sierre, Switzerland",
month = "March",
year = "2010",
publisher = "ACM Press",
}
@inproceedings{BMSAF09iit,
author = "H. Binsalleeh and N.
Mohammed and P. S. Sandhu and F. Aljumah and B. C. M. Fung",
title = "Using {RFID} tags to improve
pilgrimage management",
booktitle = "Proc. of the 6th IEEE
International Conference on Innovations in Information Technology
(Innovations)",
pages = "1-5",
address = "Al Ain, United Arab
Emirates",
month = "December",
year = "2009",
publisher = "IEEE Communications
Society",
}
@inproceedings{MFD09cikm,
author = "N. Mohammed and B. C.
M. Fung and M. Debbabi",
title = "Walking
in the Crowd: Anonymizing Trajectory Data for Pattern Analysis",
booktitle = "Proc.
of the 18th ACM Conference on Information and Knowledge
Management (CIKM)",
pages = "1441-1444",
address = "Hong Kong",
month = "November",
year = "2009",
publisher = "ACM Press",
}
@inproceedings{TFH09icws,
author = "T. Trojer and B. C. M.
Fung and P. C. K. Hung",
title = "Service-Oriented
Architecture for Privacy-Preserving Data Mashup",
booktitle = "Proc. of the
7th IEEE International Conference on Web Services (ICWS)",
pages = "767-774",
address = "Los Angeles, CA",
month = "July",
year = "2009",
publisher = "IEEE Computer
Society Press",
}
@inproceedings{MFHL09kdd,
author = "N. Mohammed and B. C.
M. Fung and P. C. K. Hung and C. Lee",
title = "Anonymizing Healthcare
Data: A Case Study on the Blood Transfusion Service",
booktitle = "Proc. of the
15th ACM SIGKDD International Conference on Knowledge
Discovery and Data Mining (SIGKDD)",
pages = "1285-1294",
address = "Paris, France",
month = "June",
year = "2009",
publisher = "ACM Press",
}
@inproceedings{WWF09icc,
author = "Y. Wang and L. Wang and B. C. M.
Fung",
title = "Preserving
Privacy for Location-Based Services with Continuous Queries",
booktitle = "Proc. of the
12th International Conference on Communications (ICC)",
pages = "1-5",
address = "Dresden, Germany",
month = "June",
year = "2009",
publisher = "IEEE Press",
}
@inproceedings{SSSF09c3s2e,
author = "J. Singh
and Q. Shi and H. Sandhu
and B. C. M. Fung",
title = "Anonymizing
location-based data",
booktitle = "Proc. of the
2009 C3S2E",
pages = "27-33",
address = "Montreal, Canada",
month = "May",
year = "2009",
publisher = "ACM Press",
}
@inproceedings{FAC09rfid,
author = "B. C. M.
Fung and K. Al-Hussaeni and M. Cao",
title = "Preserving {RFID} Data
Privacy",
booktitle = "Proc. of the
2009 International Conference on RFID",
address = "Orlando, FL",
pages = "200-207",
month = "April",
year = "2009",
publisher = "IEEE Communications
Society",
}
@inproceedings{MFWH09edbt,
author = "N. Mohammed and B. C. M.
Fung and K. Wang and P. C. K. Hung",
title = "Privacy-Preserving
Data Mashup",
booktitle = "Proc. of the
12th International Conference on Extending Database
Technology (EDBT)",
pages = "228-239",
address = "Saint-Petersburg,
Russia",
month = "March",
year = "2009",
publisher = "ACM Press",
}
@inproceedings{FCDX09sac,
author = "B. C. M. Fung and M.
Cao and B. C. Desai and H. Xu",
title = "Privacy Protection for
{RFID} Data",
booktitle = "Proc. of the
24th ACM SIGAPP Symposium on Applied Computing (SAC)",
pages = "1528-1535",
address = "Honolulu, HI",
month = "March",
year = "2009",
publisher = "ACM Press",
}
@inproceedings{XFWFP08icdm,
author = "Y. Xu and B. C. M. Fung and
K. Wang and A. W. C. Fu and J. Pei",
title = "Publishing sensitive
transactions for itemset utility",
booktitle = "Proc. of the 8th IEEE
International Conference on Data Mining (ICDM)",
pages = "1109-1114",
month = "December",
year = "2008",
address = "Pisa, Italy",
publisher = "IEEE Computer Society",
}
@inproceedings{ZFMC08fskd,
author = "Y. Zhu and B. C. M.
Fung and D. Mu and Y. Li",
title = "An Efficient Hybrid
Document Clustering Method",
booktitle = "Proc. of the 5th IEEE International Conference on Fuzzy Systems and Knowledge Discovery (FSKD)",
address = "Jinan, China",
month = "August",
year = "2008",
volume = "2",
pages = "395-399",
}
@inproceedings{FWWD08isi,
author = "B. C. M. Fung and
K. Wang and L. Wang and M. Debbabi",
title = "A Framework for
Privacy-Preserving Cluster Analysis",
booktitle = "Proc. of the 2008 IEEE International Conference on
Intelligence and Security Informatics (ISI 2008)",
volume = "2",
pages = "395-399",
address = "Taipei, Taiwan",
month = "June",
year = "2008",
}
@inproceedings{FWFP08edbt,
author = "B. C. M.
Fung and K. Wang and A. W. C. Fu and J. Pei",
title = "Anonymity for Continuous Data Publishing",
booktitle = "Proc. of the
11th International Conference on Extending Database
Technology (EDBT)",
address = "Nantes,
France",
pages = "264--275",
month = "March",
year = "2008",
publisher = "ACM Press",
}
@inproceedings{ZDFM06paclic,
author = "Y. H. Zhu and G. Z.
Dai and B. C. M. Fung and D. J. Mu",
title = "Document Clustering
Method based on Frequent Co-Occurring Words",
booktitle = "Proc. of the
20th Pacific Asia Conference on Language, Information and Computation (PACLIC)",
address = "Wuhan, China",
pages = "442--445",
month = "November",
year = "2006",
}
@inproceedings{WF06kdd,
author = "K. Wang and B. C. M.
Fung",
title = "Anonymizing Sequential
Releases",
booktitle = "Proc. of the 12th
ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD)",
address = "Philadelphia, PA",
pages = "414--423",
month = "August",
year = "2006",
publisher = "ACM Press",
}
@inproceedings{WFY05icdm,
author = "K. Wang and B. C. M.
Fung and P. S. Yu",
title = "Template-Based Privacy
Preservation in Classification Problems",
booktitle = "Proc. of the 5th IEEE International Conference on
Data Mining (ICDM)",
address = "Houston, TX",
pages = "466--473",
month = "November",
year = "2005",
publisher = "IEEE Computer Society",
}
@inproceedings{WFD05isi,
author = "K. Wang and B. C. M. Fung and
G. Dong",
title = "Integrating Private
Databases for Data Analysis",
booktitle = "Proc. of the 2005 IEEE International Conference on
Intelligence and Security Informatics (ISI)",
series = "Lecture Notes in Computer
Science",
volume = "3495",
pages = "171--182",
address = "Atlanta, GA",
month = "May",
year = "2005",
publisher = "Springer-Verlag",
}
@inproceedings{FWY05icde,
author = "B. C. M. Fung and K. Wang and
P. S. Yu",
title = "Top-Down Specialization for Information and Privacy
Preservation",
booktitle = "Proc. of the 21st IEEE International Conference on Data
Engineering (ICDE)",
pages = "205--216",
address = "Tokyo, Japan",
month = "April",
year = "2005",
publisher = "IEEE Computer Society",
}
@inproceedings{FWE03sdm,
author = "B. C. M. Fung and K. Wang and
M. Ester",
title = "Hierarchical Document Clustering Using Frequent Itemsets",
booktitle = "Proc. of the 3rd SIAM International Conference on Data
Mining (SDM)",
pages = "59--70",
address = "San Francisco, CA",
month = "May",
year = "2003",
publisher = "SIAM",
}
Books
@book{IDF20book,
AUTHOR = "F. Iqbal and M. Debbabi and B. C. M. Fung",
TITLE = "Machine Learning for Authorship Attribution and Cyber Forensics",
PUBLISHER = "Springer Nature",
YEAR = "2020",
series = "Computer Entertainment and Media Technology",
month = "December",
isbn = "9783030616748",
}
@book{FWFY10book,
AUTHOR = "B. C. M. Fung and K. Wang and A. W.-C. Fu and P. S. Yu",
TITLE = "Introduction to Privacy-Preserving Data Publishing: Concepts and Techniques",
PUBLISHER = "Chapman \& Hall/CRC",
YEAR = "2010",
series = "Data Mining and Knowledge Discovery",
month = "August",
isbn = "9781420091489",
}
Refereed Book Chapters
@inbook{HLF24afri,
author = "S. Hogue and M. Lavallée and B. C. M. Fung",
title = "L’Annuaire français de relations internationales (AFRI)",
chapter = "L’ingérence chinoise au Canada au-delà de la myopie du rapport Johnston : l’analyse acteur-réseau pour renforcer la résilience de la démocratie canadienne",
pages = "339-351",
publisher = "AFRI",
month = "June",
year = "2024",
}
@inbook{MF23emlds,
author = "A. Mohammed and B. C. M. Fung",
title = "Encyclopedia of Machine Learning and Data Science",
chapter = "{DiffGen}: Data Anonymization with Differential Privacy",
pages = "1-5",
publisher = "Springer",
editor = "D. Phung and C.
Sammut and G. I Webb",
month = "January",
year = "2023",
}
@inbook{MF23ecsp,
author = "A. Mohammed and B. C. M. Fung",
title = "Encyclopedia of Cryptography, Security and Privacy",
chapter = "Privacy-preserving
Data Publishing",
pages = "1-4",
publisher = "Springer",
editor = "H. C. A. van Tilborg
and S. Jajodia",
year = "2023",
}
@inbook{AF23ECSP,
author = "K. Al-Hussaeni and B. C. M. Fung",
title = "Encyclopedia of Cryptography, Security and Privacy",
chapter = "(X,Y)-Privacy",
pages = "1-4",
publisher = "Springer",
editor = "S. Jajodia and P.
Samarati and M. Yung",
month = "August",
year = "2023",
}
@inbook{LF22ccis,
author = "M.
Q. Li and B. C. M. Fung",
title = "Software Technologies",
chapter = "A novel neural network-based malware severity classification system",
series = "Communications in Computer and Information Science (CCIS)",
pages = "218-232",
publisher = "Springer",
month = "July",
year = "2022",
}
@inbook{FJL15lnsn,
author = "B. C. M. Fung
and Y. Jin and J. Li and J. Liu",
title = "Recommendation and Search in Social Networks",
chapter = "Anonymizing social network data for maximal frequent-sharing pattern mining",
series = "Lecture Notes in Social Networks (LNSN)",
pages = "77-100",
publisher = "Springer",
editor = "Alhajj, R., Glässer,
U.",
month = "February",
year = "2015",
}
@inbook{TLFNH10pakd,
author = "T. Trojer and C. K.
Lee and B. C. M. Fung and L. Narupiyakul and P. C. K. Hung",
title = "Privacy-Aware Knowledge
Discovery: Novel Applications and New Techniques",
chapter = "Privacy-aware health information sharing",
series = "Data Mining and Knowledge Discovery",
pages = "315-349",
publisher = "Chapman & Hall/CRC",
editor = "Bonchi, F. and
Ferrari, E.",
month = "December",
year = "2010",
}
@inbook{FWE08dwm,
author = "B. C. M. Fung and K. Wang and
M. Ester",
title = "The Encyclopedia of
Data Warehousing and Mining",
chapter = "Hierarchical Document
Clustering",
pages = "970-975",
address = "Hershey, PA",
publisher = "Idea Group",
editor = "Wang, J.",
month = "August",
year = "2008",
}
@inbook{Fung07pta,
author = "B. C. M. Fung",
title = "The Encyclopedia of
Portal Technology and Applications",
chapter = "Privacy-Preserving
Data Portals",
pages = "842--847",
address = "Hershey, PA",
publisher = "Idea Group",
editor = "Tatnall, A.",
month = "June",
year = "2007",
volume = "2",
}
@inbook{FWE05dwm,
author = "B. C. M. Fung and K. Wang and
M. Ester",
title = "The Encyclopedia of
Data Warehousing and Mining",
chapter = "Hierarchical Document
Clustering",
pages = "555--559",
address = "Hershey, PA",
publisher = "Idea Group",
editor = "Wang, J.",
month = "July",
year = "2005",
}
Edited Books and Journal Special Issues
@incollection{BGAWF21jpdc,
editor = "T. Baker and Z. Guo and A. I. Awad and S. Wang and B. C. M. Fung",
title = "Special Issue on Enabling Technologies for Energy Cloud",
journal = "Journal of Parallel and Distributed Computing (JPDC)",
publisher = "Elsevier",
month = "March",
year = "2021",
}
@incollection{BFSP20scs,
editor = "T. Baker and B. C. M. Fung
and M. Sheng and R. Prodan",
title = "Special Issue on Enabling Technologies and Tools for Next Generation Internet Security (Enabling-NxtG-Inter-Sec)",
journal = "Sustainable Cities
and Society (SCS)",
publisher = "Elsevier",
month = "July",
year = "2020",
}
@incollection{JAF20scs,
editor = "G. Jeon and A. Ahmad and B. C. M. Fung",
title = "Special Issue on Security and Privacy in Smart Grid and Machine Learning",
journal = "Sustainable Cities and Society
(SCS)",
publisher = "Elsevier",
month = "February",
year = "2020",
}
@incollection{IHF20ijdcf,
editor = "F. Iqbal and P. C. K. Hung and B. C. M. Fung",
title = "Special Issue on Cybercrime Investigation and Digital Forensics",
journal = "The International Journal of Digital Crime and Forensics (IJDCF)",
publisher = "Elsevier",
volume = "12",
issue = "1",
year = "2020",
}
@book{GRFW18book,
EDITOR = "M. Ganji and L. Rashidi and B. C. M. Fung and C. Wang",
TITLE = "Trends and Applications
in Knowledge Discovery and Data Mining (Proceedings of the 22nd Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD) 2018 Workshops)",
PUBLISHER = "Springer",
YEAR = "2018",
series = "Lecture Notes in
Computer Science (LNCS) and Lecture Notes in Artificial Intelligence (LNAI)
11544",
month = "June",
isbn = "9783030045029",
}
@incollection{FIA18scs,
editor = "B. C. M. Fung and F. Iqbal and
A. Ahmad",
title = "Special Issue on Towards Secure, Privacy-Preserving, and Reliable Smart Cities and Society",
journal = "Sustainable Cities and Society
(SCS)",
publisher = "Elsevier",
volume = "38",
month = "April",
year = "2018",
}
@incollection{AFFGJ18scs,
editor = "A. Ahmad and B. C. M. Fung
and Y. Fang and L. Gallo and G. Jeon",
title = "Special Issue on Role of Big Data Analytics in a Sustainable Smart City",
journal = "Sustainable Cities and Society
(SCS)",
publisher = "Elsevier",
volume = "38",
month = "April",
year = "2018",
}
@incollection{SFC15fi,
editor = "D. Ślęzak and B. C. M. Fung
and W. K. Cheung",
title = "Special Issue on Domain Knowledge in Knowledge Discovery and Privacy-Aware Intelligent Systems",
journal = "Fundamenta Informaticae",
publisher = "IOS Press",
volume = "137",
number = "2",
pages = "171-304",
month = "March",
year = "2015",
}
@incollection{ZKRFK13advei,
editor = "Y. Zeng
and K.-Y. Kim and V. Raskin and B. C. M. Fung and Y. Kitamura",
title = "Special Issue on Modeling, Extraction, Transformation of Semantics in Computer Aided Engineering Systems",
journal = "Advanced
Engineering Informatics (ADVEI)",
publisher = "Elsevier",
volume = "27",
number = "1",
month = "January",
year = "2013",
}
Refereed Tutorial Papers
@inproceedings{GFLKH15ase,
author = "L. Guerrouj and B. C. M. Fung and D. Lo and F. Khomh and A. Hamou-Lhadj",
title = "Mining Textual Data for Software Engineering
Tasks",
booktitle = "Proc. of the 30th IEEE/ACM International Conference on Automated Software Engineering (ASE)",
pages = "5 pages",
address = "Lincoln, NB",
month = "November",
year = "2015",
publisher = "IEEE
Computer Society",
}
Presentations, Posters and Abstracts
@inproceedings{TTHBKNMKF23isbe,
author = "H.-A. Tseng and J. Tsai and P. C. K. Hung and P. Bottoni and K. Kanev and A. Nakamura and H. Mimura and M. Kimura and B. C M. Fung",
title = "Development of Haptic Data Gloves for Bilateral Communication",
booktitle = "Proceedings of the 8th International Symposium on Biomedical Engineering (ISBE),",
pages = "100-101",
address = "Hiroshima, Japan",
month = "November",
year = "2023",
}
@inproceedings{RHF23gmc,
author = "O.
Rahman and D. Hu and B. C. M. Fung",
title = "Fashion and sustainability: A systematic literature review",
booktitle = "Proceedings of the GMC/GAMMA Conference",
address = "Seoul, South
Korea",
month = "July",
year = "2023",
}
@inproceedings{FHVCTUKKM23rcbe,
author = "B. C. M. Fung and P. C. K. Hung and C. Velasco and M. Cano and A. Tokuhiro and A. Uribe-Quevedo and K. Kanev and M. Kimura and H. Mimura",
title = "Augmented Data Glove for Advanced Hand and Finger Motion Interactions",
booktitle = "Proceedings of the Joint Research Center for Biomedical and Dental Engineering Research Result Meeting (RCBE),",
pages = "58-58",
address = "Tokyo, Japan",
month = "March",
year = "2023",
}
@inproceedings{FHTQKMK22isbe,
author = "B. C. M. Fung and P. C. K. Hung amd A. Tokuhiro and A. Quevedo and K. Kanev and H. Mimura and M. Kimura",
title = "Mixed Reality and AI-based Data Glove in Post-Traumatic Hand Recovery",
booktitle = "Proceedings of the 7th International Symposium on Biomedical Engineering (ISBE),",
pages = "",
address = "Online",
month = "November",
year = "2022",
}
@inproceedings{WHRHFMK22confirm,
author = "Z. Wang and D. Hu and R. Raavi and P. C. K. Hung and B. C. M. Fung and D. Meger and K. Kanev",
title = "An Exploratory Study of Recognizing Canine Beloved Objects by Robotic Dogs",
booktitle = "Proc. of the International Conference on Information Resources Management (CONF-IRM)",
pages = "",
address = "Oshawa, Canada",
month = "October",
year = "2022",
publisher = "AIS",
}
@inproceedings{BSF22informs,
author = "A. Bodaghi and K. Schmitt and B. C. M. Fung",
title = "A Reinforcement Learning Approach for Identifying Offensive Language in Online Conversations",
booktitle = "Proceedings of the CORS/INFORMS International Conference,",
pages = "",
address = "Vancouver, Canada",
month = "June",
year = "2022",
}
@inproceedings{FHTUK22rcbe,
author = "B. C. M. Fung and P. C. K. Hung and A. Tokuhiro and A. Uribe-Quevedo and K. Kanev",
title = "AI Data Glove Enhancements for Advanced Hand and Finger Motion Tracking and Analysis",
booktitle = "Proceedings of the 2022 Joint Research Center for Biomedical and Dental Engineering Research Result Meeting (RCBE),",
pages = "50-50",
address = "Tokyo, Japan",
month = "March",
year = "2022",
}
@inproceedings{SFHMKTU21isbe,
author = "A. Salgado and B. C. M. Fung and P. C. K. Hung and H. Mimura and K. Kanev and A. Tokuhiro and A. Uribe-Quevedo",
title = "User Experience Aspects in Wearable Multi-Device Applications Designed for Health Systems: Lessons Learned",
booktitle = "Proceedings of the 6th International Symposium on Biomedical Engineering (ISBE),",
address = "Virtual Meeting",
month = "December",
year = "2021",
}
@inproceedings{LLZWFW21sobp,
author = "A. Larosa and X. Long and T. R. Zhang and A. S. Wong and B. C. M. Fung and T. P. Wong",
title = "Disturbance of egocentric representations of aggressors in the dorsal CA1 of mice susceptible to chronic social defeat stress",
booktitle = "the 2021 Society of Biological Psychiatry Annual Meeting (SOBP),",
address = "Virtual Meeting",
month = "May",
year = "2021",
}
@inbook{Fung20FakeNews,
author = "B. C. M. Fung"
title = "Navigating Fake News, Alternative Facts, and Misinformation in a Post-Truth World",
chapter = "Forward",
pages = "xv--xvi",
publisher = "IGI Global",
editor = "Dalkir, K. and Katz,
R.",
month = "February",
year = "2020",
}
@inproceedings{PHLBRNRRLFSDBGSGSD19napcrg,
author = "P. Pluye
and Q. N. Hong and M.-L. Laroche and Q. Bao and T. Rios and J.-Y. Nie and A. G. Reyes
and S. Rahimi and M. Li and B. C. M. Fung and R. El Sherif and M. Di Carlo
and M. Benigeri and R. Grad and A. Soliman and V. Granikov and R. Souto and M. Dawes",
title = "Evidence-based artificial intelligence in primary care: Development of the Patient Oriented Machine Learning Appraisal Tool",
booktitle = "the 47th North American Primary Care Research Group (NAPCRG) Annual Meeting",
address = "Toronto, Canada",
month = "November",
year = "2019",
}
@unpublished{BLLLLWFW19douglas,
author = "D. Bian and T. Lin and K. Y. K. Liu and D. Liu and A. Larosa and A. S. Wong and B. C. M. Fung and T. P. Wong",
title = "An Accurate and Markerless Tracking of Multiple Mice Using the Deep Learning Program DeepLabCut",
note = "Poster Presentation in the Undergraduate Research Expo of the Douglas Institute Research Centre",
address = "Montreal,
Canada",
month = "August",
year = "2019",
}
@unpublished{AIF18autodesk,
author = "M. H. Altakrori and F. Iqbal and B. C. M. Fung",
title = "Arabic Authorship Attribution: An Extensive Study on Twitter Posts",
note = "Poster Session of the Deep Learning Montreal at AutoDesk Canada",
address = "Montreal, Canada",
month = "March",
year = "2018",
}
@inproceedings{FMBF17gardeso,
author = "F. Fortin and S. Meloche and R. Bhateja and B. C. M. Fung",
title = "Prédire la menace grâce au machine learning: étude de cas",
booktitle = "Colloque GARDESO",
address = "Montreal, Canada",
month = "June",
year = "2017",
}
@inproceedings{RF16eof,
author = "O. Rahman and B. C. M. Fung",
title = "A
Cross-cultural Perspective on Fashion Selection and Consumption",
booktitle = "Proc. of of The End of Fashion: an international conference and exhibition",
pages = "",
address = "Wellington, New Zealand",
month = "December",
year = "2016",
}
@unpublished{DFC16serene-risc,
author = "S. H. H. Ding and B. C.
M. Fung and P. Charland",
title = "Kam1n0: Simplifying Reverse Engineering of Software for Security Analysis",
note = "Poster Session of the Smart Cybersecurity Network (SERENE-RISC) Workshop",
address = "Ottawa,
ON",
month = "October",
year = "2016",
}
Magazine Articles
@article{PHF23policyoptions,
author = "N. Pellicer-Garcia and S. Hogue and B. C. M. Fung",
title = "Canada should "de-risk" from China by updating its foreign-investment screening",
journal = "Policy Options",
month = "December",
year = "2023",
}
@article{TF23policyoptions,
author = "E. Taylor and B. C. M.
Fung",
title = "The impact of China targeting its diaspora",
journal = "Policy Options",
month = "May",
year = "2023",
}
@article{LF22athehilltimes,
author = "S.-F.
Lee and B. C. M.
Fung",
title = "Why a
foreign influence registry act is necessary for Canada’s national security",
journal = "The Hill Times",
month = "June",
year = "2022",
}
@article{LF22bconversation,
author = "S.-F.
Lee and B. C. M.
Fung",
title = "The use of deepfakes can sow doubt, creating confusion and distrust in viewers",
journal = "The Conversation",
month = "May",
year = "2022",
}
@article{LF22aconversation,
author = "S.-F.
Lee and B. C. M.
Fung",
title = "Vaccine passports can be used for surveillance under the guise of public health measures",
journal = "The Conversation",
month = "February",
year = "2022",
}
@article{LF22apolicyoptions,
author = "S.-F.
Lee and B. C. M.
Fung",
title = "Misinformation and Chinese interference in Canada’s affairs",
journal = "Policy Options",
month = "January",
year = "2022",
}
@article{LF21bconversation,
author = "S.-F.
Lee and B. C. M.
Fung",
title = "Artificial intelligence may not actually be the solution for stopping the spread of fake news",
journal = "The Conversation",
month = "November",
year = "2021",
}
@article{LF21aconversation,
author = "S.-F.
Lee and B. C. M.
Fung",
title = "Governments should inoculate citizens to prevent the spread of fake news",
journal = "The Conversation",
month = "November",
year = "2021",
}
@article{LF21thehilltimes,
author = "S.-F.
Lee and B. C. M.
Fung",
title = "Deep fakes and big data: the next level of cyber warfare",
journal = "The Hill Times Policy Briefing:
Cybersecurity",
pages = "18",
month = "October",
year = "2021",
}
@article{Fung21thehilltimes,
author = "B. C. M.
Fung",
title = "Are Canadians prepared for cyberattacks in the second Cold War?",
journal = "The Hill Times Policy Briefing: Privacy
& Security",
pages = "17",
month = "May",
year = "2021",
}
@article{F18wef,
author = "B. C. M.
Fung",
title = "Cyber Security",
editor = "J. Letzing",
journal = "World Economic Forum
(WEF) TopLink",
pages = "1-9",
month = "May",
year = "2018",
}
@article{KF17wef,
author = "K. Kolody and B. C. M.
Fung",
title = "Cyber Security:
Technology and the Law, and Cybercrime",
journal = "World Economic Forum
(WEF) TopLink",
pages = "1-4",
month = "April",
year = "2017",
}
@article{BF16wef,
author = "T. Braun and B. C. M.
Fung",
title = "Cyber Security: Cyber
War, Critical Infrastructure Protection, Privacy, System Risk and
Resilience, New Norms of Collaboration, Cybercrime, and Security of Things",
journal = "World Economic Forum
(WEF) TopLink",
pages = "1-14",
month = "June",
year = "2016",
}
@article{MF13pentest,
author = "N. Mohammed and B. C. M.
Fung",
title = "Privacy-preserving Data
Publishing",
journal = "Pentest Magazine:
Pester's Development Kit",
volume = "3",
number = "5",
pages = "16-22",
month = "August",
year = "2013",
}
Copyrighted Work
@unpublished{PFNS18copyright,
author = "P. Pierre and B. C. M. Fung and J.-Y. Nie and T. Schuster",
title = "Patient Oriented Machine Learning Appraisal Tool (POMLAT)",
year = "2018",
month = "December",
note = "Registration of Copyright (#1155590)",
source = "Canadian Intellectual Property Office, Industry Canada",
}
Technical Reports
@TECHREPORT{FDF24drdc,
author = "Z. Fu and S. H. H. Ding and B. C. M. Fung",
title = "Software Reverse Engineering",
institution = "Defence Research and Development Canada",
month = "March",
year = "2024",
number = "W7701-217332 (TA03)",
}
@TECHREPORT{ABBLDFFFLOSSY24drdc,
author = "M. Amouei and S. Bellemare and M. Beninger and G. Le Bideau and S. H. H. Ding and Z. Fu and X. Fu and B. C. M. Fung and L. Li and W. Ou and Z. Song and M. Saqib and H. Yu",
title = "Software Reverse Engineering",
institution = "Defence Research and Development Canada",
month = "March",
year = "2024",
number = "W7701-217332 (TA02M1)",
}
@TECHREPORT{AABDFFLMMOPSS23alliance,
author = "S. Acharya and M. Amouei and G. Breyton and S. H. H. Ding and Z. Fu and B. C. M. Fung and L. Li and A. K. Manssour and C. Molloy and W. Ou and A. L.-H. Pineault and M. Saqib and L. Song",
title = "Defending our cyberspace: AI-powered search engine for cyber threat intelligence",
institution = "BlackBerry
Limited",
month = "December",
year = "2023",
number = "ALLRP 561035-20 Year
2",
}
@TECHREPORT{AFBDF23drdc,
author = "M. Amouei and Z. Fu and M. Beninger and S. H. H. Ding and B. C. M. Fung",
title = "Software Reverse Engineering",
institution = "Defence Research and Development Canada",
month = "August",
year = "2023",
number = "W7701-217332
(TA01)",
}
@TECHREPORT{ABDFFLMMMOSSY22alliance,
author = "M. Amouei
and G. Breyton and S. H. H. Ding and Z. Fu and B. C. M. Fung and L. Li and S. Mahdavifar
and Z. K. Mansour and C. Molloy and W. Ou and M. Saqib and L. Song and J. Yuki",
title = "Defending our cyberspace: AI-powered search engine for cyber threat intelligence",
institution = "BlackBerry
Limited",
month = "July",
year = "2022",
number = "ALLRP 561035-20 Year 1",
}
@TECHREPORT{LDAMF22M4ideas,
author = "M. Q. Li and
A. Diwan and A. Abusitta and S. Mahdavifar and B. C. M. Fung",
title = "AI-powered Assembly Code
Analytics for Discerning Malware Intent",
institution = "Defence Research
and Development Canada",
month = "March",
year = "2022",
number = "W7714-217794
(Milestone 4)",
}
@TECHREPORT{MDDF22drdc,
author = "S. Mahdavifar and A. Diwan and S. H. H. Ding and B. C. M. Fung",
title = "Assembly code data
mining: functionality design and prototyping and plug-in development",
institution = "Defence Research
and Development Canada",
month = "March",
year = "2022",
number = "W7701-176483
(TA07)",
}
@TECHREPORT{LADF21M3ideas,
author = "M. Q. Li and
A. Diwan and B. C. M. Fung",
title = "AI-powered Assembly Code
Analytics for Discerning Malware Intent",
institution = "Defence Research
and Development Canada",
month = "December",
year = "2021",
number = "W7714-217794
(Milestone 3)",
}
@TECHREPORT{ALDHF21M2ideas,
author = "A. Abusitta and M. Q. Li and
A. Diwan and J. Hill and B. C. M. Fung",
title = "AI-powered Assembly Code
Analytics for Discerning Malware Intent",
institution = "Defence Research
and Development Canada",
month = "August",
year = "2021",
number = "W7714-217794
(Milestone 2)",
}
@TECHREPORT{LADF21M1ideas,
author = "M. Q. Li and
A. Diwan and A. Abusitta and B. C. M. Fung",
title = "AI-powered Assembly Code
Analytics for Discerning Malware Intent",
institution = "Defence Research
and Development Canada",
month = "May",
year = "2021",
number = "W7714-217794
(Milestone 1)",
}
@TECHREPORT{LDDF21drdc,
author = "M. Q. Li and A. Diwan and S. H. H. Ding and B. C. M. Fung",
title = "Assembly code data
mining: functionality design and prototyping and state-of-the-art report",
institution = "Defence Research
and Development Canada",
month = "March",
year = "2021",
number = "W7701-176483
(TA06)",
}
@TECHREPORT{LDF20adrdc,
author = "M. Q. Li and S. H. H. Ding and B. C. M. Fung",
title = "Assembly code data
mining: data mining techniques design and prototyping & functionality design and prototyping",
institution = "Defence Research
and Development Canada",
month = "March",
year = "2020",
number = "W7701-176483
(TA05)",
}
@TECHREPORT{DLF20bdrdc,
author = "S. H. H. Ding and M.
Q. Li and B. C. M. Fung",
title = "Assembly code data
mining: plug-in development",
institution = "Defence Research
and Development Canada",
month = "March",
year = "2020",
number = "W7701-176483
(TA04)",
}
@TECHREPORT{DLF20adrdc,
author = "S. H. H. Ding and M.
Q. Li and B. C. M. Fung",
title = "Assembly code data
mining: functionality design and prototyping & security product evaluation",
institution = "Defence Research
and Development Canada",
month = "March",
year = "2020",
number = "W7701-176483
(TA03)",
}
@TECHREPORT{LAF20M2ideas,
author = "M. Q. Li and A. Abusitta and B. C. M. Fung",
title = "AI-powered Assembly Code Analytics for
Discerning Malware Intent",
institution = "Defence Research
and Development Canada",
month = "February",
year = "2020",
number = "W7714-207117 (Milestone
2)",
}
@TECHREPORT{ALF19M1ideas,
author = "A.
Abusitta and M. Q. Li and B. C. M. Fung",
title = "AI-powered Assembly Code Analytics for
Discerning Malware Intent",
institution = "Defence Research
and Development Canada",
month = "October",
year = "2019",
number = "W7714-207117 (Milestone 1)",
}
@TECHREPORT{LDF1903bdrdc,
author = "M.
Q. Li and S. H. H.
Ding and B. C. M. Fung",
title = "Assembly code data
mining: design and prototyping & security product evaluation",
institution = "Defence Research
and Development Canada",
month = "March",
year = "2019",
number = "W7701-176483
(TA02)",
}
@TECHREPORT{LDF1903adrdc,
author = "M.
Q. Li and S. H. H.
Ding and B. C. M. Fung",
title = "Assembly code data
mining: design and prototyping",
institution = "Defence Research
and Development Canada",
month = "March",
year = "2019",
number = "W7701-176483
(TA01)",
}
@TECHREPORT{DLF1803drdc,
author = "S. H. H.
Ding and M. Q. Li and B. C. M. Fung",
title = "Assembly code data
mining: design and prototyping (part 7)",
institution = "Defence Research
and Development Canada",
month = "March",
year = "2018",
number = "W7701-155902/001/QCL
(TA07)",
}
@TECHREPORT{DFLF1801drdc,
author = "S. H. H.
Ding and B. C. M. Fung and M. Q. Li and M. R. Farhadi",
title = "Assembly code data
mining: design and prototyping (part 6)",
institution = "Defence Research
and Development Canada",
month = "January",
year = "2018",
number = "W7701-155902/001/QCL
(TA06)",
}
@TECHREPORT{TF17mcalear,
author = "D.
Tweed and B. C. M. Fung",
title = "Demonstration of a Secure
Credential Transfer Protocol",
institution = "McAlear
Management Inc.",
month = "February",
year = "2017",
}
@TECHREPORT{DFF1702drdc,
author = "S. H. H.
Ding and B. C. M. Fung and M. R. Farhadi",
title = "Assembly code data
mining: design and prototyping (part 5)",
institution = "Defence Research
and Development Canada",
month = "February",
year = "2017",
number = "W7701-155902/001/QCL
(TA05)",
}
@TECHREPORT{DFF1701drdc,
author = "S. H. H.
Ding and B. C. M. Fung and M. R. Farhadi",
title = "Assembly code data
mining: design and prototyping (part 4)",
institution = "Defence Research
and Development Canada",
month = "January",
year = "2017",
number = "W7701-155902/001/QCL
(TA04)",
}
@TECHREPORT{DFZ1603drdc,
author = "S. H. H.
Ding and B. C. M. Fung and K. Zhao",
title = "Assembly code data
mining: design and prototyping (part 3)",
institution = "Defence Research
and Development Canada",
month = "March",
year = "2016",
number = "W7701-155902/001/QCL
(TA02)",
}
@TECHREPORT{DFZ1602drdc,
author = "S. H. H.
Ding and B. C. M. Fung and K. Zhao",
title = "Assembly code data
mining: porting to other platforms",
institution = "Defence Research
and Development Canada",
month = "February",
year = "2016",
number = "W7701-155902/001/QCL
(TA03)",
}
@TECHREPORT{FDZ1601drdc,
author = "B. C. M. Fung and S. H. H.
Ding and K. Zhao",
title = "Assembly code data
mining: design and prototyping (part 2)",
institution = "Defence Research
and Development Canada",
month = "January",
year = "2016",
number = "W7701-155902/001/QCL
(TA01)",
}
@TECHREPORT{FDFZ15drdc,
author = "B. C. M. Fung
and S. H. H. Ding and M. R. Farhadi and K. Zhao",
title = "Assembly code data
mining: design and prototyping (part 1)",
institution = "Defence Research
and Development Canada",
month = "March",
year = "2015",
number = "W7701-155902/001/QCL
(Firm Portion)",
}
@TECHREPORT{FFPD14drdc,
author = "M. R. Farhadi and B. C. M. Fung
and S. Preda and M. Debbabi",
title = "Progress update on the
implementation of assembly code clone detection systems",
institution = "Defence Research
and Development Canada",
month = "January",
year = "2014",
}
@TECHREPORT{FFF13drdc,
author = "Y. B. Fung and M. R. Farhadi
and B. C. M. Fung",
title = "Semantic code clone
search",
institution = "Defence Research
and Development Canada",
month = "March",
year = "2013",
}
@TECHREPORT{FFD12drdc,
author = "B. C. M. Fung and M. R. Farhadi and
M. Debbabi",
title = "Assembly code clone
search",
institution = "Defence Research
and Development Canada",
month = "March",
year = "2012",
}
@TECHREPORT{FOBFD11drdc,
author = "B. C. M. Fung and T. Ormerod
and A. Boukhetouta and M. R. Farhadi and
M. Debbabi",
title = "A survey of assembly
code analysis techniques",
institution = "Defence Research
and Development Canada",
month = "September",
year = "2011",
}
@TECHREPORT{MFD10tr,
author = "N. Mohammed and B. C. M. Fung and M. Debbabi",
title = "Preserving Privacy and Utility in {RFID} Data Publishing",
institution = "Concordia University",
year = "2010",
month = "October",
address = "Montreal, QC, Canada",
number = "6850",
}
Thesis
@phdthesis{Fung07thesis,
author = "B. C. M. Fung",
title = "Privacy-Preserving Data
Publishing",
school = "Simon Fraser University",
year = "2007",
address = "Burnaby, BC, Canada",
month = "May",
}
@masterthesis{Fung02thesis,
author = "B. C. M. Fung",
title = "Hierarchical document clustering using frequent itemsets",
school = "Simon Fraser University",
year = "2002",
address = "Burnaby, BC, Canada",
month = "September",
}