Menu:

 

[By Year] [By Google Scholar] [By DBLP] [By RG] [By ORCID]

This page contains the preprint/postprint versions of my published articles. The articles are limited to personal use only. You may find the official versions and the copyright notices from the publishers' websites. Students and postdoctoral fellows under my supervision in the projects are underlined.

[Patents] [Journal Articles] [Conference Papers] [Book] [Book Chapters] [Edited Books and Journal Special Issues] [Tutorials] [Presentations, Posters, and Abstracts] [Magazines] [Copyrighted Work] [Reports] [Theses]

Patents

[4] M. Saqib and B. C. M. Fung. Hybrid and hierarchical explainable model for malware analysis (U.S. Patent Number: N/A). U.S. Patent and Trademark Office. Filed on December 5, 2023 by BlackBerry Limited.
[3] M. Saqib and B. C. M. Fung. Methods and systems for generating description for malware analysis using a genetic algorithm graph explainer (U.S. Patent Number: N/A). U.S. Patent and Trademark Office. Filed on November 21, 2023 by BlackBerry Limited.
[2] J. Q. Yuki, M. Amouei, and B. C. M. Fung. Methods and systems for generating description for assembly functions (U.S. Patent Number: N/A). U.S. Patent and Trademark Office. Filed on June 14, 2023 by BlackBerry Limited.
[1] L. T. Li, H. Ding, and B. C. M. Fung. Methods and systems for identifying binary code vulnerability (US application no. 18/417768, CA application no. 3225899, EP application no. 24151716.8). U.S. Patent and Trademark Office. Filed on January 19, 2024 by BlackBerry Limited.

Refereed Journal Articles

[93] D.-W. Jaw, S.-C. Huang, Z.-H. Lu, B. C. M. Fung, and S.-Y. Kuo. Multi-domain object detection framework using feature domain knowledge distillation. IEEE Transactions on Cybernetics (CYB), in press. IEEE Systems, Man, and Cybernetics Society.
[ full paper | bibtex | JCR impact factor: 11.8, 5-year: 12.2 ]
[92] A. Bodaghi, K. A. Schmitt, P. Watine, and B. C. M. Fung. A literature review on detecting, verifying, and mitigating online misinformation. IEEE Transactions on Computational Social Systems (TCSS), 29 pages, in press, IEEE.
[ full paper | bibtex | JCR impact factor: 5.0, 5-year: 5.2 ]
[91] J. Low, B. C. M. Fung, and P. Xiong. Better entity matching with transformers through ensembles. Knowledge-Based Systems (KBS), 293(111678):1-11, June 2024. Elsevier.
[ full paper | bibtex | JCR impact factor: 8.8, 5-year: 8.6 ]
[90] Y. Sun, F. Haghighat, and B. C. M. Fung. Fairness-aware data-driven based model predictive controller: a study on thermal energy storage in a residential building. Journal of Energy Storage (EST), 87(111402):1-16, May 2024. Elsevier.
[ full paper | bibtex | JCR impact factor: 9.4, 5-year: 9.1 ]
[89] A. Bodaghi, B. C. M. Fung, and K. Schmitt. Technological solutions to online toxicity: potential and pitfalls. IEEE Technology and Society Magazine (TSM), 42(4):57-65, December 2023. IEEE Society on Social Implications of Technology.
[ full paper | bibtex | JCR impact factor: 2.2, 5-year: 2.4 ]
[88] C. W. Cheong, K. Yin, W. K. Cheung, B. C. M. Fung, and J. Poon. Adaptive integration of categorical and multi-relational ontologies with EHR data for medical concept embedding. ACM Transactions on Intelligent Systems and Technology (TIST), 14(6):111.1-111.20, November 2023. ACM.
[ full paper | bibtex | JCR impact factor: 5.0, 5-year: 11.0 ]
[87] O. Rahman, D. Hu, and B. C. M. Fung. A systematic literature review of fashion, sustainability, and consumption using mixed methods approach. Sustainability: Special Issue on Shaping Sustainable Consumption Behavior, 15(16:12213), August 2023. MDPI.
[ full paper | bibtex | JCR impact factor: 3.9, 5-year: 4.0 ]
[86] L. Li, S. H. H. Ding, Y. Tian, B. C. M. Fung, P. Charland, W. Ou, L. Song, and C. Chen. VulANalyzeR: explainable binary vulnerability detection with multi-task learning and attentional graph convolution. ACM Transactions on Privacy and Security (TOPS), 26(3):28.1-28.25, August 2023. ACM.
[ full paper | bibtex | JCR impact factor: 2.3, 5-year: 3.2 ]
[85] J. F. Low, B. C. M. Fung, and F. Iqbal. Of stances, themes, and anomalies in COVID-19 mask-wearing tweets. IEEE Access, 11:87009-87033, August 2023. IEEE.
[ full paper | bibtex | JCR impact factor: 3.9, 5-year: 4.1 ]
[84] M. Q. Li,  B. C. M. Fung, and A. DiwanA novel deep multi-head attentive vulnerable line detector. Procedia Computer Science, 222:35-44, August 2023. Elsevier
[ full paper | bibtex | Part of IJCNN International Neural Network Society Workshop on Deep Learning Innovations and Applications (INNS DLIA) in Queensland, Australia, in June 2023. ]
[83] S. Razaulla, C. Fachkha, C. Markarian, A. Gawanmeh, W. Mansoor, B. C. M. Fung, and C. Assi. The age of ransomware: a survey on the evolution, taxonomy, and research directions. IEEE Access, 11:40698-40723, April 2023. IEEE.
[ full paper | bibtex | JCR impact factor: 3.9, 5-year: 4.1 ]
[82] R. H. Khokhar, B. C. M. Fung, F. Iqbal, K. Al-Hussaeni, and M. Hussain. Differentially private release of heterogeneous network for managing healthcare data. ACM Transactions on Knowledge Discovery from Data (TKDD), 17(6):90.1-90.30. February 2023, ACM.
[ full paper | bibtex | JCR impact factor: 4.3, 5-year: 4.4 ]
[81] A. Abusitta, G. H. S. de Carvalho, O. Adel Wahab, T. Halabi, B. C. M. Fung, and S. Al Mamoori. Deep learning-enabled anomaly detection for IoT systems. Internet of Things (IoT), 21(100656):1-13, April 2023. Elsevier.
[ full paper | bibtex | JCR impact factor: 5.9, 5-year: 6.4 ]
[80] Y. Sun, B. C. M. Fung, and F. Haghighat. In-processing fairness improvement methods for regression data-driven building models: achieving uniform energy prediction. Energy and Buildings (ENB), 277(11265):1-13, December 2022. Elsevier.
[ full paper | bibtex | JCR impact factor: 6.7, 5-year: 6.6 ]
[79] K. Yin, W. K. Cheung, B. C. M. Fung, and J. Poon. Learning inter-modal correspondence and phenotypes from multi-modal electronic health records. IEEE Transactions on Knowledge and Data Engineering (TKDE), 34(9):4328-4341, September 2022. IEEE Computer Society.
[ full paper | bibtex | JCR impact factor: 8.9, 5-year: 8.9 ]
[78] Y. Sun, B. C. M. Fung, and F. Haghighat. The generalizability of pre-processing techniques on the accuracy and fairness of data-driven building model: a case study. Energy and Buildings (ENB), 268(112204):1-19, August 2022. Elsevier.
[ full paper | bibtex | JCR impact factor: 6.7, 5-year: 6.6 ]
[77] M. Q. Li, B. C. M. Fung, and P. Charland. DyAdvDefender: an instance-based online machine learning model for perturbation-trial-based black-box adversarial defense. Information Sciences (INS), 601:357-373, July 2022. Elsevier.
[ full paper | bibtex | JCR impact factor: 8.1, 5-year: 7.5 ]
[76] Y. Sun, F. Haghighat, and B. C. M. Fung. Trade-off between accuracy and fairness of data-driven building and indoor environment models: a comparative study of pre-processing methods. Energy (EGY), 239(122273):1-16, January 2022. Elsevier.
[ full paper | bibtex | JCR impact factor: 8.9, 5-year: 8.2 ]
[75] J. F. Low, B. C. M. Fung, F. Iqbal, and S.-C. Huang. Distinguishing between fake news and satire with transformers. Expert Systems With Applications (ESWA), 187(115824):1-13, January 2022. Elsevier.
[ full paper | bibtex | software | JCR impact factor: 8.5, 5-year: 8.3 ]
[74] B. Yang, F. Haghighat, B. C. M. Fung, and K. Panchabikesana. Season-based occupancy prediction in residential buildings using machine learning models. e-Prime - Advances in Electrical Engineering, Electronics and Energy, 1(100003):1-20, December 2021. Elsevier.
[ full paper | bibtex ]
[73] Y.-H. Liu, P. C. K. Hung, F. Iqbal, and B. C. M. Fung. Automatic fall risk detection based on imbalanced data. IEEE Access, 9:163594-163611, December 2021. IEEE.
[ full paper | bibtex | JCR impact factor: 3.476, 5-year: 3.758 ]
[72] M. Q. Li, B. C. M. Fung, P. Charland, and S. H. H. Ding. I-MAD: interpretable malware detector using Galaxy Transformer. Computers & Security (COSE), 108(102371):1-15, September 2021. Elsevier.
[ full paper | bibtex | software | JCR impact factor: 5.105, 5-year: 5.299 ]
[71] F. Iqbal, R. Batool, B. C. M. Fung, S. Aleem, A. Abbasi, and A. R. Javed. Toward tweet-mining framework for extracting terrorist attack-related information and reporting. IEEE Access, 9:115535-115547, August 2021. IEEE.
[ full paper | bibtex | JCR impact factor: 3.476, 5-year: 3.758 ]
[70] S.-C. Huang, Q.-V. Hoang, T.-H. Le, Y.-T. Peng, C.-C. Huang, C. Zhang, B. C. M. Fung, K.-H. Cheng, and S.-W. Huang. An advanced noise reduction and edge enhancement algorithm. Sensors: Intelligent Sensors, 21(16.5319):1-12, August 2021. MDPI.
[ full paper | bibtex | JCR impact factor: 3.847, 5-year: 4.050 ]
[69] A. Abusitta, M. Q. Li, and B. C. M. Fung. Malware classification and composition analysis: a survey of recent developments. Journal of Information Security and Applications (JISA), 59(102828):1-17, June 2021. Elsevier.
[ full paper | bibtex | JCR impact factor: 4.960, 5-year: 4.379 ]
[68] R. Wang, B. C. M. Fung, Y. Zhu, and Q. Peng. Differentially private data publishing for arbitrarily partitioned data. Information Sciences (INS), 553:247-265, April 2021. Elsevier.
[ full paper | bibtex | JCR impact factor: 8.233, 5-year: 7.299 ]
[67] O. Rahman, B. C. M. Fung, and D. Kharb. Factors influencing consumer choice: A study of apparel and sustainable cues from Canadian and Indian consumers’ perspectives. International Journal of Fashion Design, Technology and Education (TFDT), 14(2):151-161, March 2021. Taylor & Francis.
[ full paper | bibtex ]
[66] S.-C. Huang, D.-W. Jaw, W. Li, Z. Lu, S.-Y. Kuo, B. C. M. Fung, B.-H. Chen, and T. Numnonda. Image dehazing in disproportionate haze distributions. IEEE Access, 9:44599-44609, March 2021. IEEE.
[ full paper | bibtex | JCR impact factor: 3.476, 5-year: 3.758 ]
[65] R. H. Khokhar, F. Iqbal, B. C. M. Fung, and J. Bentahar. Enabling secure trustworthiness assessment and privacy protection in integrating data for trading person-specific information. IEEE Transactions on Engineering Management (TEM) Special Section: Services Computing Management for Artificial Intelligence and Machine Learning, 68(1):149-169, February 2021. IEEE Publishing.
[ full paper | bibtex | JCR impact factor: 8.702, 5-year: 7.388 ]
[64] S. A. Alkhodair, B. C. M. Fung, S. H. H. Ding, W. K. Cheung, and S. C. Huang. Detecting high-engaging breaking news rumors in social media. ACM Transactions on Management Information Systems (TMIS), 12(1):8.1-8.16, December 2020. ACM Press.
[ full paper | bibtex | JCR impact factor: 0.85 ]
[63] R. Wang, B. C. M. Fung, and Y. Zhu. Heterogeneous data release for cluster analysis with differential privacy. Knowledge-Based Systems (KBS), 201-202(106047):1-13, August 2020. Elsevier.
[ full paper | bibtex | JCR impact factor: 8.038, 5-year: 7.842 ]
[62] Y. Sun, F. Haghighat, and B. C. M. Fung. A review of the-state-of-the-art in data-driven approaches for building energy prediction. Energy and Buildings (ENB), 221(110022):1-23, August 2020. Elsevier.
[ full paper | bibtex | JCR impact factor: 5.879, 5-year: 6.175 ]
[61] G. G. Dagher, B. C. M. Fung, N. Mohammed, and J. Clark. SecDM: privacy-preserving data outsourcing framework with differential privacy. Knowledge and Information Systems (KAIS), 62(5):1923-1960, May 2020. Springer.
[ full paper | bibtex | JCR impact factor: 2.822, 5-year: 3.161 ]
[60] O. Rahman, B. C. M. Fung, and Z. Chen. Young Chinese consumers’ choice between product-related and sustainable cues - the effects of gender differences and consumer innovativeness. Sustainability: Special Issue on Sustainable Development and Practices: Production, Consumption and Prosumption, 12(9.3818):1-23, May 2020.
[ full paper | bibtex | JCR impact factor: 3.251, 5-year: 3.473 ]
[59] S. A. Alkhodair, S. H. H. Ding, B. C. M. Fung, and J. Liu. Detecting breaking news rumors of emerging topics in social media. Information Processing & Management (IP&M), 57(2.102018):1-13, March 2020. Elsevier.
[ full paper | bibtex | JCR impact factor: 6.222, 5-year: 5.789 ]
[58] M. Ashouri, B. C. M. Fung, F. Haghighat, and H. Yoshino. Systematic approach to provide building occupants with feedback to reduce energy consumption. Energy (EGY), 194(116813):1-9, March 2020. Elsevier.
[ full paper | bibtex | JCR impact factor: 7.147, 5-year: 6.845 ]
[57] O. Rahman, Z. Chen, B. C. M. Fung, and D. Kharb. A cross-national study of young female consumer behaviour, innovativeness and apparel evaluation: China and India. Journal of the Textile Institute (JOTI), 111(3):334-344, February 2020. Taylor & Francis.
[ full paper | bibtex | JCR impact factor: 1.880, 5-year: 2.028 | top journal in fashion marketing ]
[56] J. Liu, X. Jiu, X. Zhang, B. C. M. Fung, X. Yang, and C. Yu. Incremental mining of high utility patterns in one phase by absence and legacy-based pruning. IEEE Access, 7(1):74168-74180, December 2019. IEEE.
[ full paper | bibtex | JCR impact factor: 3.745, 5-year: 4.076 ]
[55] F. Iqbal, B. C. M. Fung, M. Debbabi, R. Batool, and A. Marrington. WordNet-based criminal networks mining for cybercrime investigation. IEEE Access, 7(1):22740-22755, December 2019. IEEE.
[ full paper | bibtex | JCR impact factor: 3.745, 5-year: 4.076 ]
[54] M. Gil, R. El Sherif, M. Pluye, B. C. M. Fung, R. Grad, and P. Pluye. Towards a knowledge-based recommender system for linking electronic patient records with continuing medical education information at the point of care. IEEE Access, 7(1):15955-15966, December 2019. IEEE.
[ full paper | bibtex | JCR impact factor: 3.745, 5-year: 4.076 ]
[53] F. Iqbal, J. Maqbool, B. C. M. Fung, R. Batool, A. M. Khattak, S. Aleem, and P. C. K. Hung. A hybrid framework for sentiment analysis using genetic algorithm based feature reduction. IEEE Access, 7(1):14637-14652, December 2019. IEEE.
[ full paper | bibtex | JCR impact factor: 3.745, 5-year: 4.076 ]
[52] S. H. H. Ding, B. C. M. Fung, F. Iqbal, and W. K. Cheung. Learning stylometric representations for authorship analysis. IEEE Transactions on Cybernetics (CYB), 49(1):107-121, January 2019. IEEE Systems, Man, and Cybernetics Society.
[ full paper | bibtex | software with source code - StyloMatrix | JCR impact factor: 11.079, 5-year: 10.090 ]
[51] M. Ashouri, F. Haghighat, B. C. M. Fung, and H. Yoshino. Development of a ranking procedure for energy performance evaluation of buildings based on occupant behavior. Energy and Buildings (ENB), 183:659-671, January 2019. Elsevier.
[ full paper | bibtex | JCR impact factor: 4.867, 5-year: 5.055 ]
[50] M. H. Altakrori, F. IqbalB. C. M. Fung, S. H. H. Ding, and A. Tubaishat. Arabic authorship attribution: an extensive study on Twitter posts. ACM Transactions on Asian and Low-Resource Language Information Processing (TALLIP), 18(1):5.1-5.51, November 2018. ACM Press.
[ full paper | bibtex | JCR impact factor: 0.788, 5-year: 0.768 ]
[49] K. Al-Hussaeni, B. C. M. Fung, F. Iqbal, G. G. Dagher, and E. Park. SafePath: differentially-private publishing of passenger trajectories in transportation systems. Computer Networks (COMNET): Special Issue on Intelligent and Connected Transportation Systems, 143:126-139, October 2018. Elsevier.
[ full paper | bibtex | JCR impact factor: 3.030, 5-year: 2.989 ]
[48] K. Al-Hussaeni, B. C. M. Fung, F. Iqbal, J. Liu, and P. C. K. Hung. Differentially private multidimensional data publishing. Knowledge and Information Systems (KAIS): An International Journal, 56(3):717-752, September 2018. Springer.
[ full paper | bibtex | software with source code - DiffMulti | JCR impact factor: 2.397, 5-year: 2.547 ]
[47] P. C. K. Hung, K. Kanev, S.-C. Huang, F. Iqbal, and B. C. M. Fung. Smart TV face monitoring for children privacy. Journal of Internet Technology (JIT): Special Issue on Behavior Data Analytics for Cybersecurity, 19(5):1577-1583, September 2018.
[ full paper | bibtex | JCR impact factor: 0.715, 5-year: 0.848 ]
[46] M. Ashouri, F. Haghighat, B. C. M. Fung, A. Lazrak, and H. Yoshino. Development of building energy saving advisory: a data mining approach. Energy and Buildings (ENB), 172:139-151, August 2018. Elsevier.
[ full paper | bibtex | JCR impact factor: 4.495, 5-year: 4.823 ]
[45] J. Liu, X. Zhang, B. C. M. Fung, J. Li, and F. Iqbal. Opportunistic mining of top-n high utility patterns. Information Sciences (INS), 441:171-186, May 2018. Elsevier.
[ full paper | bibtex | JCR impact factor: 5.524, 5-year: 5.305 ]
[44] T. Braun, B. C. M. Fung, F. Iqbal, and B. Shah. Security and privacy challenges in smart cities. Sustainable Cities and Society (SCS): Special Issue on Towards Secure, Privacy-Preserving, and Reliable Smart Cities and Society, 39:499-507, May 2018. Elsevier.
[ full paper | bibtex | JCR impact factor: 4.624, 5-year: 4.466 | acceptance ratio: 499/2381 = 20.96% | the 9th most cited article in 2017 | the 9th most downloaded article in 2018 | one of the top 25 most downloaded articles in SCS ]
[43] S. A. Alkhodair, B. C. M. Fung, O. Rahman, and P. C. K. Hung. Improving interpretations of topic modeling in microblogs. Journal of the Association for Information Science and Technology (JASIST), 69(4):528-540, April 2018. Wiley-Blackwell.
[ full paper | bibtex | JCR impact factor: 2.738, 5-year: 3.101 ]
[42] O. Rahman, B. C. M. Fung, Z. Chen, W.-L. Chang, and X. Gao. A study of apparel consumer behaviour in China and Taiwan. International Journal of Fashion Design, Technology and Education (TFDT), 11(1):22-33, 2018. Taylor & Francis.
[ full paper | bibtex | CiteScore: 0.85 | SJR: 0.278 ]
[41] M. Hasan, F. Iqbal, P. C. K. Hung, B. C. M. Fung, and L. Rafferty. A security study for smart metering systems. International Journal of Urban and Civil Engineering (IJUCE), 12(1):1-11, 2018. WASET.
[ full paper | bibtex | This article was presented in the 20th International Conference on Smart Cities and Infrastructure (ICSCI), Paris, France, January 2018. ]
[40] J. Guo, B. C. M. Fung, F. Iqbal, P. J. K. Kuppen, R. A. E. M. Tollenaar, W. E. Mesker, and J.-J. Lebrun. Revealing determinant factors for early breast cancer recurrence by decision tree. Information Systems Frontiers (ISF), 19(6):1233-1241, December 2017. Springer.
[ full paper | bibtex | JCR impact factor: 3.232, 5-year: 2.563 ]
[39] O. Rahman, B. C. M. Fung, Z. Chen, and X. Gao. A cross-national study of apparel consumers' preferences and the role of product evaluative cues. Asia Pacific Journal of Marketing and Logistics (APJML), 29(4):796-812, September 2017. Emerald Group Publishing.
[ full paper | bibtex | JCR impact factor: 1.204 ]
[38] L. Guerrouj, Z. Kermansaravi, V. Arnaoudouva, B. C. M. Fung, F. Khomh, G. Antoniol, and Y.-G. Guéhéneuc. Investigating the relation between lexical smells and change- and fault-proneness: an empirical study. Software Quality Journal (SQJO), 25(3):641-670, September 2017. Springer.
[ full paper | bibtex | JCR impact factor: 1.596, 5-year: 1.903 ]
[37] Z. Yu, F. Haghighat, and B. C. M. Fung. Advances and challenges in building engineering and data mining applications for energy-efficient communities. Sustainable Cities and Society (SCS), 25:33-38, August 2016. Elsevier.
[ full paper | bibtex | open access | JCR impact factor: 1.777, 5-year: 1.968 | the 6th and 10th most downloaded article of SCS in 2017 and 2018, respectively ]
[36] J. Liu, K. Wang, and B. C. M. Fung. Mining high utility patterns in one phase without generating candidates. IEEE Transactions on Knowledge and Data Engineering (TKDE), 28(5):1245-1257, May 2016. IEEE Computer Society.
[ full paper | bibtex | JCR impact factor: 3.438, 5-year: 3.899 ]
[35] R. H. Khokhar, B. C. M. Fung, F. Iqbal, D. Alhadidi, and J. Bentahar. Privacy-preserving data mashup model for trading person-specific information. Electronic Commerce Research and Applications (ECRA), 17:19-37, May-June 2016. Elsevier.
[ full paper | bibtex | JCR impact factor: 1.954, 5-year: 3.181 ]
[34] O. Rahman, B. C. M. Fung, and A. Yeo. Exploring the meanings of hijab through online comments in Canada. Journal of Intercultural Communication Research (JICR), 45(3):214-232, April 2016. Taylor & Francis.
[ full paper | bibtex ]
[33] M. R. Farhadi, B. C. M. Fung, Y. B. Fung, P. Charland, S. Preda, and M. Debbabi. Scalable code clone search for malware analysis. Digital Investigation (DIIN): Special Issue on Big Data and Intelligent Data Analysis, 15:46-60, December 2015. Elsevier.
[ full paper | bibtex | JCR impact factor: 1.211, 5-year: 1.436 ]
[32] N. Scarabeo, B. C. M. Fung, and R. H. Khokhar. Mining known attack patterns from security-related events. PeerJ Computer Science, 1(e25):1-21, October 2015.
[ full paper | bibtex | open access | collaborated with Hitachi Systems: Above Security ]
[31] M. Schmid, F. Iqbal, and B. C. M. Fung. E-mail authorship attribution using customized associative classification. Digital Investigation (DIIN), 14(1):S116-S126, August 2015. Elsevier.
[ full paper | bibtex | this journal article was presented in the 15th ACM DFRWS | acceptance ratio = 16/46 = 34.8% | JCR impact factor: 1.211, 5-year: 1.436 ]
[30] S. H. H. Ding, B. C. M. Fung, and M. Debbabi. A visualizable evidence-driven approach for authorship attribution. ACM Transactions on Information and System Security (TISSEC), 17(3):12.1-12.30, March 2015. ACM Press.
[ full paper | bibtex | JCR impact factor: 0.759, 5-year: 1.610 | SJR impact factor: 1.772 ]
[29] S. Li, K. Nahar, and B. C. M. Fung. Product customization of tablet computers based on the information of online reviews by customers. Journal of Intelligent Manufacturing (JIM), 26(1):97-110, February 2015. Springer.
[ full paper | bibtex | JCR impact factor: 1.995, 5-year: 2.159 ]
[28] K. Al-Hussaeni, B. C. M. Fung, and W. K. Cheung. Privacy-preserving trajectory stream publishing. Data & Knowledge Engineering (DKE), 94(A):89-109, November 2014. Elsevier.
[ full paper | bibtex | software with source code - ITSA | JCR impact factor in 2014: 1.115, 5-year: 1.594 ]
[27] S. Goryczka, L. Xiong, and B. C. M. Fung. m-privacy for collaborative data publishing. IEEE Transactions on Knowledge and Data Engineering (TKDE), 26(10):2520-2533, October 2014. IEEE Computer Society.
[ full paper | bibtex | JCR impact factor in 2014: 2.067, 5-year: 2.873 ]
[26] R. Chen, B. C. M. Fung, P. S. Yu, and B. C. Desai. Correlated network data publication via differential privacy. Very Large Data Bases Journal (VLDBJ), 23(4):653-676, August 2014. Springer.
[ full paper | bibtex | poster | JCR impact factor in 2014: 1.568, 5-year: 2.300 ]
[25] R. H. Khokhar, R. Chen, B. C. M. Fung, and S. M. Lui. Quantifying the costs and benefits of privacy-preserving health data publishing. Journal of Biomedical Informatics (JBI): Special Issue on Informatics Methods in Medical Privacy, 50:107-121, August 2014. Elsevier.
[ full paper | bibtex | JCR impact factor in 2014: 2.126, 5-year: 3.398 ]
[24] A. Basher and B. C. M. Fung. Analyzing topics and authors in chat logs for crime investigation. Knowledge and Information Systems (KAIS): An International Journal, 39(2):351-381, May 2014. Springer.
[ full paper | bibtex | JCR impact factor in 2014: 1.782, 5-year: 2.016 ]
[23] O. Rahman, B. C. M. Fung, and W.-S. Liu. Using data mining to analyse fashion consumers' preferences from a cross-national perspective. International Journal of Fashion Design, Technology and Education (TFDT), 7(1):42-49, March 2014. Taylor & Francis.
[ full paper | bibtex | SJR impact factor in 2014: 0.24 | indexed by Scopus ]
[22] N. Mohammed, D. Alhadidi, B. C. M. Fung, and M. Debbabi. Secure two-party differentially private data release for vertically-partitioned data. IEEE Transactions on Dependable and Secure Computing (TDSC), 11(1):59-71, January/February 2014. IEEE Computer Society.
[ full paper | bibtex | JCR impact factor in 2014: 1.351, 5-year: 1.652 ]
[21] M. Ghasemzadeh, B. C. M. Fung, R. Chen, and A. Awasthi. Anonymizing trajectory data for passenger flow analysis. Transportation Research Part C: Emerging Technologies (TRC): An International Journal, 39:63-79, February 2014. Elsevier.
[ full paper | bibtex | source code - TALF | JCR impact factor in 2014: 2.818, 5-year: 3.402 ]
[20] G. G. Dagher and B. C. M. Fung. Subject-based semantic document clustering for digital forensic investigations. Data & Knowledge Engineering (DKE), 86:224-241, July 2013. Elsevier.
[ full paper | bibtex | CTV Interview | JCR impact factor in 2013: 1.489, 5-year: 1.609 ]
[19] Z. Yu, B. C. M. Fung, and F. Haghighat. Extracting knowledge from building-related data - a data mining framework. Building Simulation (BUIL): An International Journal, 6(2):207-222, June 2013. Springer.
[ full paper | bibtex | JCR impact factor in 2013: 0.631, 5-year: 0.687 ]
[18] N. Mohammed, X. Jiang, R. Chen, B. C. M. Fung, and L. Ohno-Machado. Privacy-preserving heterogeneous health data sharing. Journal of the American Medical Informatics Association (JAMIA), 20(3):462-469, May 2013. BMJ.
[ full paper | bibtex | software with source code - DiffGen-Hetero | JCR impact factor in 2013: 3.932, 5-year: 4.182 ]
[17] R. Chen, B. C. M. Fung, N. Mohammed, B. C. Desai, and K. Wang. Privacy-preserving trajectory data publishing by local suppression. Information Sciences (INS): Special Issue on Data Mining for Information Security, 231:83-97, May 2013. Elsevier.
[ full paper | bibtex | JCR impact factor in 2013: 3.893, 5-year: 3.969 ]
[ This paper presents a local suppression method to achieve LKC-privacy for trajectory data published by a single data provider. ]
[16] F. Iqbal, H. Binsalleeh, B. C. M. Fung, and M. Debbabi. A unified data mining solution for authorship analysis in anonymous textual communications. Information Sciences (INS): Special Issue on Data Mining for Information Security, 231:98-112, May 2013. Elsevier.
[ full paper | bibtex | JCR impact factor in 2013: 3.893, 5-year: 3.969 ]
[15] B. C. M. Fung, T. Trojer, P. C. K. Hung, L. Xiong, K. Al-Hussaeni, and R. Dssouli. Service-oriented architecture for high-dimensional private data mashup. IEEE Transactions on Services Computing (TSC), 5(3):373-386, July-September 2012. IEEE Computer Society.
[ full paper | bibtex | JCR impact factor in 2012: 2.460 | the Spotlight Paper for the July-September 2012 issue ]
[ This paper presents a SOA to achieve LKC-privacy in a vertically-partitioned data owned by different data providers. ]
[14] Z. Yu, F. Haghighat, B. C. M. Fung, and L. Zhou. A novel methodology for knowledge discovery through mining associations between building operational data. Energy and Buildings (ENB), 47:430-440, April 2012. Elsevier.
[ full paper | bibtex | JCR impact factor in 2012: 2.679, 5-year: 3.254 ]
[13] R. Al-Zaidy, B. C. M. Fung, A. M. Youssef, and F. Fortin. Mining criminal networks from unstructured text documents. Digital Investigation (DIIN), 8(3-4):147-160, February 2012. Elsevier.
[ full paper | bibtex | JCR impact factor in 2014: 1.648, 5-year: 1.318 ]
[12] Z. Yu, F. Haghighat, B. C. M. Fung, E. Morofsky, and H. Yoshino. A methodology for identifying and improving occupant behavior in residential buildings. Energy, 36(11):6596-6608, November 2011. Elsevier.
[ full paper | bibtex | JCR impact factor in 2013: 4.159, 5-year: 4.465 ]
[11] N. Mohammed, B. C. M. Fung, and M. Debbabi. Anonymity meets game theory: secure data integration with malicious participants. Very Large Data Bases Journal (VLDBJ), 20(4):567-588, August 2011. Springer.
[ full paper | bibtex | JCR impact factor in 2013: 1.701, 5-year: 2.111 ]
[ This paper presents a secure protocol to achieve k-anonymity in a vertically-partitioned data owned by different malicious data providers. ]
[10] R. Chen, N. Mohammed, B. C. M. Fung, B. C. Desai, and L. Xiong. Publishing set-valued data via differential privacy. The Proceedings of the VLDB Endowment (PVLDB), 4(11):1087-1098, August 2011. VLDB Endowment.
[ research track full paper | slides | bibtex | source code - DiffPart | this journal paper was presented at the 37th International Conference of Very Large Data Bases (VLDB 2011) | acceptance ratio: 18.1% = 100/553 ]
[ This paper presents a differentially-private sanitization method for transaction data published by a single data provider. ]
[9] Z. Yu, B. C. M. Fung, F. Haghighat, H. Yoshino, and E. Morofsky. A systematic procedure to study the influence of occupant behavior on building energy consumption. Energy and Buildings (ENB), 43(6):1409-1417, June 2011. Elsevier.
[ full paper | bibtex | JCR impact factor in 2012: 2.679, 5-year: 3.254 | one of the most cited articles in ENB since 2010 ]
[8] N. Mohammed, B. C. M. Fung, P. C. K. Hung, and C. Lee. Centralized and distributed anonymization for high-dimensional healthcare data. ACM Transactions on Knowledge Discovery from Data (TKDD), 4(4):18:1-18:33, October 2010. ACM Press.
[ full paper | bibtex | JCR impact factor in 2012: 1.676 ]
[ This paper presents a secure protocol to achieve LKC-privacy in a horizontally-partitioned data owned by different data providers. ]
[7] F. Iqbal, H. Binsalleeh, B. C. M. Fung, and M. Debbabi. Mining writeprints from anonymous e-mails for forensic investigation. Digital Investigation (DIIN), 7(1-2):56-64, October 2010. Elsevier.
[ full paper | bibtex | JCR impact factor in 2010: 0.836, 5-year: 1.043 ]
[6] Z. Yu, F. Haghighat, B. C. M. Fung, and H. Yoshino. A decision tree method for building energy demand modeling. Energy and Buildings (ENB), 42(10):1637-1646, October 2010. Elsevier.
[ full paper | bibtex | JCR impact factor in 2010: 2.046, 5-year: 2.256 ]
[5] B. C. M. Fung, K. Wang, R. Chen, and P. S. Yu. Privacy-preserving data publishing: a survey of recent developments. ACM Computing Surveys (CSUR), 42(4):14:1-14:53, June 2010. ACM Press.
[ full paper | bibtex | JCR impact factor in 2010: 8.000, 5-year: 10.910 | cited by the U.S. Department of Commerce’s National Institute of Standards and Technology (NIST) in NIST IR 8053 DRAFT "De-Identification of Personally Identifiable Information" | This is the most cited article in Concordia University according to ACM Digital Library. ]
[4] B. C. M. Fung, K. Wang, L. Wang, and P. C. K. Hung. Privacy-preserving data publishing for cluster analysis. Data & Knowledge Engineering (DKE), 68(6):552-575, June 2009. Elsevier.
[ full paper | bibtex | publisher link | JCR impact factor in 2009: 1.745, 5-year: 2.036 ]
[3] F. Iqbal, R. Hadjidj, B. C. M. Fung, and M. Debbabi. A novel approach of mining write-prints for authorship attribution in e-mail forensics. Digital Investigation (DIIN), 5(1):S42-S51. September 2008. Elsevier.
[ full paper | slides | bibtex | JCR impact factor in 2008: 0.961 | accepted 17 papers | this journal paper was presented in the 8th DFRWS | The research results were reported by media worldwide. ]
[2] B. C. M. Fung, K. Wang, and P. S. Yu. Anonymizing classification data for privacy preservation. IEEE Transactions on Knowledge and Data Engineering (TKDE), 19(5):711-725, May 2007. IEEE Computer Society.
[ full paper | bibtex | software with source code: TDS | JCR impact factor in 2009: 2.285, 5-year: 3.691 ]
[1] K. Wang, B. C. M. Fung, and P. S. Yu. Handicapping attacker's confidence: an alternative to k-anonymization. Knowledge and Information Systems (KAIS): An International Journal, 11(3):345-368, April 2007. Springer-Verlag.
[ full paper | bibtex | JCR impact factor in 2009: 2.211, 5-year: 2.302 ]

Refereed Conference Papers

[70] J. Q. Yuki, M. Amouei, and B. C. M. Fung, P. Charland, and A. Walenstein. AsmDocGen: Generating Functional Natural Language Descriptions for Assembly Code. In Proceedings of the 19th International Conference on Software Technologies (ICSOFT), 11 pages, Dijon, France: ScitePress, July 2024.
[ full paper | bibtex ]
[69] S. Razaulla, C. Fachkha, A. Gawanmeh, C. Markarian, B. C. M. Fung, and C. Assi. Tracing the ransomware bloodline: investigation and detection of drifting virlock variants. In Proceedings of the 6th IEEE International Conference on Computer Communication and the Internet (ICCCI), 6 pages, Tokyo, Japan: IEEE Press, June 2024.
[ full paper | bibtex ]
[68] M. Saqib, B. C. M. Fung, P. Charland, and A. Walenstein. GAGE: genetic algorithm-based graph explainer for malware analysis. In Proceedings of the 40th IEEE International Conference on Data Engineering (ICDE), 13 pages, Utrecht, Netherlands: IEEE Computer Society, May 2024.
[ full paper | bibtex ]
[67] M. Beninger, P. Charland, S. H. H. Ding, and B. C. M. Fung. ERS0: enhancing military cybersecurity with AI-driven SBOM for firmware vulnerability detection and asset management. In Proceedings of the 16th NATO International Conference on Cyber Conflict (CyCon), 20 pages, Tallinn, Estonia, May 2024.
[ full paper | bibtex ]
[66] G. Breyton, M. Saqib, B. C. M. Fung, and P. Charland. BETAC: bidirectional encoder transformer for assembly code function name recovery. In Proceedings of the 20th IEEE International Conference on the Design of Reliable Communication Networks (DRCN), 8 pages, Montreal, Canada: IEEE Communications Society, May 2024.
[ invited full paper | bibtex ]
[65] D. Hu, P. C. K. Hung, and B. C. M. Fung. An exploratory study of recognizing canine beloved objects by robotic dogs. In Proceedings of the 12th International Conference on Smart Media and Applications (SMA), 7 pages, Taichung, Taiwan, December 2023.
[ full paper | bibtex ]
[64] M. Altakrori, T. Scialom, B. C. M. Fung, and J. C. K. Cheung. A multifaceted framework to evaluate evasion, content preservation, and misattribution in authorship obfuscation techniques. In Proceedings of the 2022 Conference on Empirical Methods in Natural Language Processing (EMNLP), pages 2391-2403, Abu Dhabi, UAE: ACL, December 2022.
[ long paper with oral presentation |  slides | video | bibtex ]
[63] A. Diwan, M. Q. Li and B. C. M. Fung. VDGraph2Vec: Vulnerability detection in assembly code using message passing neural networks. In Proceedings of the 21st IEEE International Conference on Machine Learning and Applications (ICMLA), pages 1039-1046, Nassau, The Bahamas: IEEE, December 2022.
[ full paper | slides | bibtex ]
[62] T. Halabi, M. Bellaiche, and B. C. M. Fung. Towards adaptive cybersecurity for green IoT. In Proceedings of the IEEE International Conference on Internet of Things and Intelligence Systems (IoTaIS), pages 64-69, Bali, Indonesia: IEEE, November 2022.
[ full paper | bibtex ]
[61] M. Q. Li, B. C. M. Fung, and A. Abusitta. On the effectiveness of interpretable feedforward neural network. In Proceedings of the International Joint Conference on Neural Networks (IJCNN), pages 1-8, Padova, Italy: IEEE, July 2022.
[ full paper | bibtex | software ]
[60] T. Halabi, A. Abusitta, G. H. S. Carvalho, and B. C. M. Fung. Incentivized security-aware computation offloading for large-scale internet of things applications. In Proceedings of the 7th IEEE International Conference on Smart and Sustainable Technologies (SpliTech): International Symposium on Internet of Things, 6 pages, Split and Bol, Croatia: IEEE, July 2022.
[ full paper | bibtex ]
[59] C. Molloy, S. H. H. Ding, B. C. M. Fung, and P. Charland. H4rm0ny: a competitive zero-sum two-player markov game for multi-agent learning on evasive malware generation and detection. In Proceedings of the IEEE International Conference on Cyber Security and Resilience (CSR), pages 22-29, Virtual Conference: IEEE Press, July 2022.
[ full paper | bibtex | best research paper award - This award is established to recognize and promote high-quality regular research contributions to theoretical and practical aspects of security, privacy, trust, and resilience of networks, systems (including complex cyber-physical systems), applications, and services. ]
[58] M. Q. Li and B. C. M. Fung. Interpretable malware classification based on functional analysis. In Proceedings of the 17th International Conference on Software Technologies (ICSOFT), pages 500-507, Lisbon, Portugal: ScitePress, July 2022.
[ short paper | bibtex ]
[57] Y. Sun, F. Haghighat, and B. C. M. Fung. Fairness-aware regression models for building energy prediction to achieve uniform performance. In Proceedings of the 5th International Conference on Building Energy and Environment (COBEE), Montreal, Canada: Springer Nature, July 2022.
[ full paper | bibtex ]
[56] C. Molloy, P. Charland, S. H. H. Ding, and B. C. M. Fung. JARV1S: phenotype clone search for rapid zero-Day malware triage and functional decomposition for cyber threat intelligence. In Proceedings of the 14th NATO International Conference on Cyber Conflict (CyCon), pages 385-403, Tallinn, Estonia, June 2022.
[ full paper | bibtex ]
[55] M. Altakrori, J. C. K. Cheung, and B. C. M. Fung. The topic confusion task: a novel evaluation scenario for authorship attribution. In Proceedings of the 2021 Conference on Empirical Methods in Natural Language Processing (EMNLP), pages 4242-4256, Punta Cana, Dominican Republic: ACL, November 2021.
[ full paper | presentation | bibtex | software and datasets ]
[54] M. Q. Li, B. C. M. Fung, P. Charland, and S. H. H. Ding. A novel and dedicated machine learning model for malware classification. In Proceedings of the 16th International Conference on Software Technologies (ICSOFT), pages 617-628, Virtual Conference: ScitePress, July 2021.
[ full paper | bibtex | full paper acceptance ratio: 15% ]
[53] A. Abusitta, A. W. Omar, and B. C. M. Fung. VirtualGAN: reducing mode collapse in generative adversarial networks using virtual mapping. In Proceedings of the International Joint Conference on Neural Networks (IJCNN), pages 1-6, Virtual Conference: IEEE, July 2021.
[ full paper | bibtex ]
[52] H. Bo, S. H. H. Ding, B. C. M. Fung, and F. Iqbal. ER-AE: Differentially private text generation for authorship anonymization. In Proceedings of the 2021 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies (NAACL-HLT), pages 3997-4007, Virtual Conference, June 2021. Association for Computational Linguistics.
[ full paper | poster | slides | video | bibtex | software ]
[51] O. Rahman and B. C. M. Fung. A data mining analysis of cross-national study of apparel consumption. In Proceedings of the International Conference on Comprehensible Science (ICCS) - Lecture Notes in Networks and Systems (LNNS), 10 pages, Eilat, Israel, June 2021. Springer.
[ full paper | bibtex ]
[50] K. Yin, W. K. Cheung, B. C. M. Fung, and J. Poon. TedPar: temporally dependent PARAFAC2 factorization for phenotype-based disease progression modeling. In Proceedings of the 21st SIAM International Conference on Data Mining (SDM), pages 594-602, Alexandria, VA: SIAM, May 2021.
[ full paper | bibtex | acceptance ratio: 21.25% = 85/400 ]
[49] Q. Wang, B. C. M. Fung, and P. C. K. Hung. DUGRA: dual-graph representation learning for health information networks. In Proceedings of the 2020 IEEE International Conference on Big Data (Big Data), pages 4961-4970, Virtual Conference, December 2020.
[ full paper | bibtex | note ]
[48] J. Lu, B. C. M. Fung, and W. K. Cheung. Embedding for anomaly detection on health insurance claims. In Proceedings of the 7th IEEE International Conference on Data Science and Advanced Analytics (DSAA), pages 459-468, Sydney, Australia, October 2020.
[ full paper | bibtex | video presentation | slides | acceptance ratio: 26.5% ]
[47] L. Song, C. W. Cheong, K. Yin, W. K. Cheung, B. C. M. Fung, and J. Poon. Medical concept embedding with multiple ontological representations. In Proceedings of the 28th International Joint Conference on Artificial Intelligence (IJCAI), pages 4613-4619, Macao, China, August 2019.
[ full paper | bibtex | acceptance ratio: 850/4752 = 17.9% ]
[46] S. H. H. Ding, B. C. M. Fung, and P. Charland. Asm2Vec: boosting static representation robustness for binary clone search against code obfuscation and compiler optimization. In Proceedings of the 40th IEEE Symposium on Security and Privacy (S&P), pages 38-55, San Francisco, CA: IEEE Computer Society, May 2019.
[ full paper | bibtexvideosoftware and source code: Kam1n0: Asm2Vec | acceptance ratio: 84/679 = 12.4% | collaborated with Defence Research & Development Canada (DRDC) ]
[45] K. Yin, D. Qian, W. K. Cheung, B. C. M. Fung, and J. Poon. Learning phenotypes and dynamic patient representations via RNN regularized collective non-negative tensor factorization. In Proceedings of the 33rd AAAI Conference on Artificial Intelligence (AAAI), pages 1246-1253, Honolulu, HI, January 2019.
[ full paper with oral presentation | bibtex | acceptance ratio: 1150/7095 = 16.2% ]
[44] K. Yin, W. K. Cheung, Y. Liu, B. C. M. Fung, and J. Poon. Joint learning of phenotypes and diagnosis-medication correspondence via hidden interaction tensor factorization. In Proceedings of the 27th International Joint Conference on Artificial Intelligence (IJCAI), pages 3627-3633, Stockholm, Sweden, July 2018.
[ full paper | bibtex | acceptance ratio: 710/3470 = 20% ]
[43] P. C. K. Hung, K. Kanev, F. Iqbal, D. Mettrick, L. Rafferty, G.-P. Pan, S.-C. Huang, and B. C. M. Fung. A study of children facial recognition for privacy in smart TV. In Proceedings of the International Symposium on Computational Modeling of Objects Represented in Images (CompIMAGE), LNCS 10149, pages 229-240, Niagara Falls, NY: Springer, September 2016.
[ full paper | bibtex ]
[42] S. H. H. Ding, B. C. M. Fung, and P. Charland. Kam1n0: MapReduce-based assembly clone search for reverse engineering. In Proceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (SIGKDD), pages 461-470, San Francisco, CA: ACM Press, August 2016.
[ full paper with poster presentationbibtex | video | slidesposter | software and source code: Kam1n0: Asm-Clone | Hex-Rays plug-in contest award | acceptance ratio: (70+72)/784 = 18% | collaborated with Defence Research & Development Canada (DRDC) ]
[41] M. Bonenfant, B. C. Deasi, D. Desai, B. C. M. Fung, M. T. Özsu, and J. D. Ullman. Panel: The State of Data. In Proceedings of the 20th International Database Engineering & Applications Symposium (IDEAS), pages 2-11, Montreal, Canada: ACM Press, July 2016.
invited paper | bibtex | poster | The authors are sorted in an alphabetical order. ]
[40] G. G. Dagher, F. Iqbal, M. Arafati, and B. C. M. Fung. Fusion: privacy-preserving distributed protocol for high-dimensional data mashup. In Proceedings of the 21st IEEE International Conference on Parallel and Distributed Systems (ICPADS), pages 760-769, Melbourne, Australia: IEEE Computer Society, December 2015.
[ full paper | bibtex | acceptance ratio = 82/230 = 35.7% ]
[39] J. Liu, J. Li, S. Xu, and B. C. M. Fung. Secure outsourced frequent pattern mining by fully homomorphic encryption. In Proceedings of the 17th International Conference on Big Data Analytics and Knowledge Discovery (DaWak), LNCS 9263, pages 70-81, València, Spain: Springer, September 2015.
[ full paper | bibtex ]
[38] J. Liu, Y. Wu, Q. Zhou, B. C. M. Fung, F. Chen, and B. Yu. Parallel eclat for opportunistic mining of frequent itemsets. In Proceedings of the 26th International Conference on Database and Expert Systems Applications (DEXA), LNCS 9261, pages 401-415, València, Spain: Springer, September 2015.
[ full paper | bibtex ]
[37] M. Arafati, G. G. Dagher, B. C. M. Fung, and P. C. K. Hung. D-Mash: a framework for privacy-preserving data-as-a-service mashups. In Proceedings of the 7th IEEE International Conference on Cloud Computing (CLOUD), pages 498-505, Anchorage, AK: IEEE Computer Society, June 2014.
[ full paper | bibtex | acceptance ratio = 30% ]
[36] M. R. Farhadi, B. C. M. Fung, P. Charland, and M. Debbabi. BinClone: detecting code clones in malware. In Proceedings of the 8th IEEE International Conference on Software Security and Reliability (SERE), pages 78-87, San Francisco, CA: IEEE Reliability Society, June 2014.
[ full paper | bibtex | source code - BinClone | acceptance ratio = 30% | the conference has been renamed as IEEE QRS since 2015 ]
[35] A. K. Hmood, B. C. M. Fung, and F. Iqbal. Privacy-preserving medical reports publishing for cluster analysis. In Proceedings of the 6th IFIP International Conference on New Technologies, Mobility and Security (NTMS): Security Track, pages 1-8, Dubai, UAE: IEEE Computer Society, March 2014.
[ full paper | bibtex ]
[34] B. C. M. Fung, Y. Jin, and J. Li. Preserving privacy and frequent sharing patterns for social network data publishing. In Proceedings of the 5th IEEE/ACM International Conference on Social Networks Analysis and Mining (ASONAM), pages 479-485, Niagara Falls, Canada: IEEE Computer Society, August 2013.
[ short paper | bibtex | acceptance ratio: 28% = 13% + 15% ]
[33] J. Liu, K. Wang, and B. C. M. Fung. Direct discovery of high utility itemsets without candidate generation. In Proceedings of the 12th IEEE International Conference on Data Mining (ICDM), pages 984-989, Brussels, Belgium: IEEE Computer Society, December 2012.
[ short paper | bibtex | acceptance ratio: 20% = (81+70)/756 ]
[32] F. Iqbal, B. C. M. Fung, and M. Debbabi. Mining criminal networks from chat log. In Proceedings of the IEEE/WIC/ACM International Conferences on Web Intelligence and Intelligent Agent Technology (WI-IAT), pages 332-337, Macau: IEEE Computer Society, December 2012.
[ research track short paper | bibtex ]
[31] L. Bonomi, L. Xiong, R. Chen, and B. C. M. Fung. Frequent grams based embedding for privacy preserving record linkage. In Proceedings of the 21st ACM Conference on Information and Knowledge Management (CIKM), pages 1597-1601, Maui, HI: ACM Press, October 2012.
[ database track short paper | bibtex | acceptance ratio: 27.7% = (146+156)/1088 ]
[30] P. Charland, B. C. M. Fung, and M. R. Farhadi. Clone search for malicious code correlation. In Proceedings of the NATO RTO Symposium on Information Assurance and Cyber Defense (STO-MP-IST-111), pages 1.1-1.12, Koblenz, Germany, September 2012.
[ full paper | bibtex | first runner-up for the best paper award ]
[29] R. Chen, B. C. M. Fung, B. C. Desai, and N. M. Sossou. Differentially private transit data publication: a case study on the Montreal transportation system. In Proceedings of the 18th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (SIGKDD), pages 213-221, Beijing, China: ACM Press, August 2012.
[ full paper with oral presentation | slides | poster | bibtex | acceptance ratio: 17.6% = 133/755 ]
[ This paper presents a differentially-private sanitization method for sequential data published by a single data provider. ]
[28] D. Alhadidi, N. Mohammed, B. C. M. Fung, and M. Debbabi. Secure distributed framework for achieving ε-differential privacy. In Proceedings of the 12th Privacy Enhancing Technologies Symposium (PETS), LNCS 7834, pages 120-139, Vigo, Spain: Springer-Verlag, July 2012.
[ full paper | slides | bibtex | acceptance ratio: 22.2% = 16/72 ]
[ This paper presents a secure protocol to achieve differential privacy in a horizontally-partitioned data owned by different data providers. ]
[27] H. AbuSharkh and B. C. M. Fung. Service-oriented architecture for sharing private spatial-temporal data. In Proceedings of the IEEE International Conference on Cloud and Service Computing (CSC), pages 40-47, Hong Kong: IEEE Computer Society, December 2011.
[ full paper | slides | bibtex ]
[ This paper presents a SOA to achieve LKC-privacy on spatial-temporal data. It is an extension of the ICDM08 paper, which focuses on anonymizing transaction data. ]
[26] S. Goryczka, L. Xiong, and B. C. M. Fung. m-privacy for collaborative data publishing. In Proceedings of the 7th IEEE International Conference on Collaborative Computing (CollaborateCom), 10 pages, Orlando, FL, October 2011.
[ full paper | slides | bibtex ]
[25] N. Mohammed, R. Chen, B. C. M. Fung, and P. S. Yu. Differentially private data release for data mining. In Proceedings of the 17th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (SIGKDD), pages 493-501, San Diego, CA: ACM Press, August 2011.
[ full paper with oral presentation | slides | poster | bibtex | software with source code - DiffGen | acceptance ratio (with oral presentation): 7.8% = 56/714 ]
[ This paper presents a differentially-private sanitization method for relational data published by a single data provider. ]
[24] R. Chen and B. C. M. Fung. A unified RFID data anonymization platform. In Proceedings of the 5th IEEE International Conference on RFID, pages 95-96, Orlando, FL: IEEE Communications Society, April 2011.
[ poster paper | poster | bibtex ]
[23] R. Al-Zaidy, B. C. M. Fung, and A. M. Youssef. Towards discovering criminal communities from textual data. In Proceedings of the 26th ACM SIGAPP Symposium on Applied Computing (SAC), pages 172-177, TaiChung, Taiwan: ACM Press, March 2011.
[ computer forensics track full paper | slides | bibtex | acceptance ratio: 30% = 237/790 ]
[22] S. Ray, M. F. Nizam, S. Das, and B. C. M. Fung. Verification of data pattern for interactive privacy preservation model. In Proceedings of the 26th ACM SIGAPP Symposium on Applied Computing (SAC), pages 1716-1723, TaiChung, Taiwan: ACM Press, March 2011.
[ TRECK track full paper | bibtex | acceptance ratio: 30% = 237/790 ]
[ This paper is an extension of a course project in INSE 6180. ]
[21] P. Shi, L. Xiong, and B. C. M. Fung. Anonymizing data with quasi-sensitive attribute values. In Proceedings of the 19th ACM Conference on Information and Knowledge Management (CIKM), pages 1389-1392, Toronto, Canada: ACM Press, October 2010.
[ database track short paper | poster | bibtex | acceptance ratio: 34.7% = (123+171)/847 ]
[20] F. Iqbal, L. A. Khan, B. C. M. Fung, and M. Debbabi. E-mail authorship verification for forensic investigation. In Proceedings of the 25th ACM SIGAPP Symposium on Applied Computing (SAC), pages 1591-1598, Sierre, Switzerland: ACM Press, March 2010.
[ computer forensics track full paper | slides | bibtex | acceptance ratio: 25% ]
[19] H. Binsalleeh, N. Mohammed, P. S. Sandhu, F. Aljumah, and B. C. M. Fung. Using RFID tags to improve pilgrimage management. In Proceedings of the 6th IEEE International Conference on Innovations in Information Technology (IIT), pages 1-5, Al Ain, United Arab Emirates: IEEE Communications Society, December 2009.
[ full paper | bibtex ]
[18] N. Mohammed, B. C. M. Fung, and M. Debbabi. Walking in the crowd: anonymizing trajectory data for pattern analysis. In Proceedings of the 18th ACM Conference on Information and Knowledge Management (CIKM), pages 1441-1444, Hong Kong: ACM Press, November 2009.
[ database track short paper | poster | bibtex ]
[ This paper uses global suppressions to achieve LKC-privacy while preserving frequent sequences in trajectory data. See the technical report for details. ]
[17] T. Trojer, B. C. M. Fung, and P. C. K. Hung. Service-oriented architecture for privacy-preserving data mashup. In Proceedings of the 7th IEEE International Conference on Web Services (ICWS), pages 767-774, Los Angeles, CA: IEEE Computer Society Press, July 2009.
[ industrial track full paper | slides | bibtex | acceptance ratio: 18% = 61/339 ]
[ See TSC11 for an extended version. ]
[16] N. Mohammed, B. C. M. Fung, P. C. K. Hung, and C. Lee. Anonymizing healthcare data: a case study on the blood transfusion service. In Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (SIGKDD), pages 1285-1294, Paris, France: ACM Press, June 2009.
[ industrial track full paper | video presentation | slides | bibtex | software with source code - PAIS | acceptance ratio: 10% | best student paper award ]
[ This paper presents an anonymization method to achieve LKC-privacy for relational data published by a single data provider. See TKDD10 for an extended version. ]
[15] Y. Wang, L. Wang, and B. C. M. Fung. Preserving privacy for location-based services with continuous queries. In Proceedings of the 12th IEEE International Conference on Communications (ICC): Communication and Information Systems Security, pages 1-5, Dresden, Germany: IEEE Press, June 2009.
[ full paper | slides | bibtex | acceptance ratio: 28% ]
[14] J. Singh, Q. Shi, H. Sandhu, and B. C. M. Fung. Anonymizing location-based data. In Proceedings of the 2009 C3S2E, pages 27-33, Montreal, Canada: ACM Press, May 2009.
[ full paper | slides | bibtex | acceptance ratio: 17% ]
[13] B. C. M. Fung, K. Al-Hussaeni, and M. Cao. Preserving RFID data privacy. In Proceedings of the 2009 IEEE International Conference on RFID, pages 200-207, Orlando, FL: IEEE Communications Society, April 2009.
[ full paper | slides | bibtex | acceptance ratio: 27% = 47/175 ]
[ This paper is an extension of SAC09. The primary contribution of this paper is to present experimental results conducted on real-life data. See Concordia Technical Report 6850 for an extended version. ]
[12] N. Mohammed, B. C. M. Fung, K. Wang, and P. C. K. Hung. Privacy-preserving data mashup. In Proceedings of the 12th International Conference on Extending Database Technology (EDBT), pages 228-239, Saint-Petersburg, Russia: ACM Press, March 2009.
[ research track full paper | slides | bibtex | average acceptance ratio: 16% ]
[ See VLDBJ11 for an extended version to malicious participants. ]
[ See ICWS11 and TSC11 for extensions to SOA and high-dimensional data anonymization. ]
[11] B. C. M. Fung, M. Cao, B. C. Desai, and H. Xu. Privacy protection for RFID data. In Proceedings of the 24th ACM SIGAPP Symposium on Applied Computing (SAC), pages 1528-1535, Honolulu, HI: ACM Press, March 2009.
[ database track full paper | slides | bibtex | acceptance ratio: 29% = 316/1084 ]
[ This paper uses global suppressions to achieve LKC-privacy for RFID data while preserving general information usefulness. See Concordia Technical Report 6850 for an extended version. ]
[10] Y. Xu, B. C. M. Fung, K. Wang, A. W. C. Fu, and J. Pei. Publishing sensitive transactions for itemset utility. In Proceedings of the 8th IEEE International Conference on Data Mining (ICDM), pages 1109-1114, Pisa, Italy: IEEE Computer Society, December 2008.
[ short paper | slides | slides with audio | bibtex | acceptance ratio: 19.9% = (70+74)/724 ]
[9] Y. Zhu, B. C. M. Fung, D. Mu, and Y. Li. An efficient hybrid document clustering method. In Proceedings of the 5th IEEE International Conference on Fuzzy Systems and Knowledge Discovery (FSKD), volume 2, pages 395-399, Shandong, China, August 2008.
[ full paper | bibtex ]
[8] B. C. M. Fung, K. Wang, L. Wang, and M. Debbabi. A framework for privacy-preserving cluster analysis. In Proceedings of the 2008 IEEE International Conference on Intelligence and Security Informatics (ISI), pages 46-51, Taipei, Taiwan, June 2008.
[ full paper | slides | bibtex | acceptance ratio: 22% ]
[ See DKE09 for an extended version. ]
[7] B. C. M. Fung, K. Wang, A. W. C. Fu, and J. Pei. Anonymity for continuous data publishing. In Proceedings of the 11th International Conference on Extending Database Technology (EDBT), pages 264-275, Nantes, France: ACM Press, March 2008.
[ research track full paper | slides | bibtex | research track acceptance ratio: 16.7% = 52/311 ]
[6] Y. H. Zhu, G. Z. Dai, B. C. M. Fung, and D. J. Mu. Document Clustering Method based on Frequent Co-Occurring Words. In Proceedings of the 20th Pacific Asia Conference on Language, Information and Computation (PACLIC), pages 442-445, November 2006.
[ short paper | bibtex ]
[5] K. Wang and B. C. M. Fung. Anonymizing sequential releases. In Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (SIGKDD), pages 414-423, Philadelphia, PA: ACM Press, August 2006.
[ research track full paper | slides | bibtex | research track acceptance ratio: 10.9% = 50/457 ]
[4] K. Wang, B. C. M. Fung, and P. S. Yu. Template-based privacy preservation in classification problems. In Proceedings of the 5th IEEE International Conference on Data Mining (ICDM), pages 466-473, Houston, TX: IEEE Computer Society, November 2005.
[ full paper | slides | bibtex | acceptance ratio: 11.0% = 69/630 ]
[ Selected as one of the best papers to appear in Knowledge and Information Systems ]
[ See KAIS07 for an extended version. ]
[3] K. Wang, B. C. M. Fung, and G. Dong. Integrating private databases for data analysis. In Proceedings of the 2005 IEEE International Conference on Intelligence and Security Informatics (ISI), Lecture Notes in Computer Science (LNCS), 3495, pages 171-182, Atlanta, GA: Springer-Verlag, May 2005.
[ full paper | slides | bibtex |
© Springer-Verlag | accepted 28 full papers ]
[ See EDBT09 for an extended version. ]
[2] B. C. M. Fung, K. Wang, and P. S. Yu. Top-down specialization for information and privacy preservation. In Proceedings of the 21st IEEE International Conference on Data Engineering (ICDE), pages 205-216, Tokyo, Japan: IEEE Computer Society, April 2005.
[ research track full paper | slides | bibtex | software with source code: TDS | enhanced software with source code: SIGKDD09: PAIS | one of the top 3 most cited papers in ICDE05 | research track acceptance ratio: 12.9% = 67/521 ]
[ See TKDE07 for an extended version. ]
[1] B. C. M. Fung, K. Wang, and M. Ester. Hierarchical document clustering using frequent itemsets. In Proceedings of the 3rd SIAM International Conference on Data Mining (SDM), pages 59-70, San Francisco, CA: SIAM, May 2003.
[ full paper | slides | bibtex | software - FIHC | acceptance ratio: 19.8% = 21/106 | Crawl-By-Example ]

Books

[2] F. Iqbal, M. Debbabi, and B. C. M. Fung. Machine Learning for Authorship Attribution and Cyber Forensics, ser. Computer Entertainment and Media Technology. 194 pages, Springer Nature, December 2020.
[ book | bibtex | ISBN: 978-3-030-61674-8 ]
[1] B. C. M. Fung, K. Wang, A. W.-C. Fu, and P. S. Yu. Introduction to Privacy-Preserving Data Publishing: Concepts and Techniques, ser. Data Mining and Knowledge Discovery. 376 pages, Chapman & Hall/CRC, August 2010.
[ book | bibtex | ISBN: 9781420091489 ]

Refereed Book Chapters

[9] K. Al-Hussaeni and B. C. M. Fung. Encyclopedia of Cryptography, Security and Privacy, chapter (X,Y)-Privacy. pages 1-4, August 2023. Springer.
[ book chapter | bibtex ]
[8] A. Mohammed and B. C. M. Fung. Encyclopedia of Machine Learning and Data Science, chapter DiffGen: data anonymization with differential privacy. pages 1-5, January 2023. Springer.
[ book chapter | bibtex ]
[7] A. Mohammed and B. C. M. Fung. Encyclopedia of Cryptography, Security and Privacy, chapter Privacy-preserving data publishing. pages 1-5, 2023. Springer.
[ book chapter | bibtex ]
[6] M. Q. Li and B. C. M. Fung. Software Technologies, chapter A novel neural network-based malware severity classification system, pages 218-232, ser. Communications in Computer and Information Science (CCIS), July 2022. Springer.
[ book chapter | bibtex | This book chapter is an extension of ICSOFT21. ]
[5] B. C. M. Fung, Y. Jin, J. Li, and J. Liu. Recommendation and Search in Social Networks, chapter Anonymizing social network data for maximal frequent-sharing pattern mining. Lecture Notes in Social Networks (LNSN), pages 77-100, February 2015. Springer.
[ book chapter | bibtex | This book chapter is an extension of ASONAM13. ]
[4] T. Trojer, C. K. Lee, B. C. M. Fung, L. Narupiyakul, and P. C. K. Hung. Privacy-Aware Knowledge Discovery: Novel Applications and New Techniques, chapter Privacy-aware health information sharing, pages 315-349, ser. Data Mining and Knowledge Discovery. Chapman & Hall/CRC, December 2010.
[ book chapter | bibtex ]
[3] B. C. M. Fung, K. Wang, and M. Ester. The Encyclopedia of Data Warehousing and Mining, 2nd ed., chapter Hierarchical document clustering, pages 970-975. Idea Group, Hershey, PA, August 2008.
[ book chapter | bibtex |
© Idea Group ]
[2] B. C. M. Fung. The Encyclopedia of Portal Technologies and Applications, chapter Privacy-preserving data portals, pages 842-847. Idea Group, Hershey, PA, June 2007.
[ book chapter | bibtex |
© Idea Group ]
[1] B. C. M. Fung, K. Wang, and M. Ester. The Encyclopedia of Data Warehousing and Mining, chapter Hierarchical document clustering, pages 555-559. Idea Group, Hershey, PA, July 2005.
[ book chapter | bibtex |
© Idea Group ]

Edited Books and Journal Special Issues

[9] T. Baker, Z. Guo, A. I. Awad, S. Wang, and B. C. M. Fung (Eds.). Journal of Parallel and Distributed Computing (JPDC): Special Issue on Enabling Technologies for Energy Cloud, March 2021. Elsevier.
[ special issue | bibtex | JCR impact factor: 4.542, 5-year: 3.351 ]
[8] T. Baker, B. C. M. Fung, M. Sheng, and R. Prodan (Eds.). Sustainable Cities and Society (SCS): Special Issue on Enabling Technologies and Tools for Next Generation Internet Security (Enabling-NxtG-Inter-Sec), July 2020. Elsevier.
[ special issue | bibtex | JCR impact factor: 7.587, 5-year: 7.308 ]
[7] G. Jeon, A. Ahmad, and B. C. M. Fung (Eds.). Sustainable Cities and Society (SCS): Special Issue on Security and Privacy in Smart Grid and Machine Learning, February 2020. Elsevier.
[ special issue | bibtex | JCR impact factor: 7.587, 5-year: 7.308 ]
[6] F. Iqbal, P. C. K. Hung, and B. C. M. Fung (Eds.). The International Journal of Digital Crime and Forensics (IJDCF): Cybercrime Investigation and Digital Forensics, 12(1), 2020. IGI.
[ special issue | bibtex ]
[5] M. Ganji, L. Rashidi, B. C. M. Fung, and C. Wang (Eds). Trends and Applications in Knowledge Discovery and Data Mining (Proceedings of the 22nd Pacific-Asia Conference on Knowledge Discovery and Data Mining (PAKDD) 2018 Workshops) - Lecture Notes in Computer Science (LNCS) and Lecture Notes in Artificial Intelligence (LNAI) 11544. 370 pages, Springer, June 2018.
[ edited book | bibtex | ISBN: 9783030045029 ]
[4] B. C. M. Fung, F. Iqbal, and A. Ahmad (Eds.). Sustainable Cities and Society (SCS): Special Issue on Towards Secure, Privacy-Preserving, and Reliable Smart Cities and Society, 38, April 2018. Elsevier.
[ special issue | bibtex | JCR impact factor: 4.624, 5-year: 4.466 ]
[3] A. Ahmad, B. C. M. Fung, Y. Fang, L. Gallo, and G. Jeon (Eds.). Sustainable Cities and Society (SCS): Special Issue on Role of Big Data Analytics in a Sustainable Smart City, 38, April 2018. Elsevier.
[ special issue | bibtex | JCR impact factor: 4.624, 5-year: 4.466 ]
[2] D. Ślęzak, B. C. M. Fung, and W. K. Cheung (Eds.). Fundamenta Informaticae: Special Issue on Domain Knowledge in Knowledge Discovery and Privacy-Aware Intelligent Systems, 137(2):171-304, March 2015. IOS Press.
[ special issue | bibtex | JCR impact factor: 0.658, 5-year: 0.674 ]
[1] Y. Zeng, K.-Y. Kim, V. Raskin, B. C. M. Fung, and Y. Kitamura (Eds.). Advanced Engineering Informatics (ADVEI): Special Issue on Modeling, Extraction, Transformation of Semantics in Computer Aided Engineering Systems, 27(1), January 2013. Elsevier.
[ special issue | bibtex | JCR impact factor in 2012: 1.593, 5-year: 1.708 ]

Tutorials

[1] L. Guerrouj, B. C. M. Fung, D. Lo, F. Khomh, and A. Hamou-Lhadj. Mining textual data for software engineering tasks. In Proceedings of the 30th IEEE/ACM International Conference on Automated Software Engineering (ASE), 5 pages, Lincoln, NB: IEEE Computer Society, November 2015.
[ tutorial | bibtex ]

Presentations, Posters, and Abstracts

[17] H.-A. Tseng, J. Tsai, P. C. K. Hung, P. Bottoni, K. Kanev, A. Nakamura, H. Mimura, M. Kimura, and B. C M. Fung. Development of haptic data gloves for bilateral communication. In Proceedings of the 8th International Symposium on Biomedical Engineering (ISBE), pages 100-101, Hiroshima, Japan, November 2023.
[ paper | poster | bibtex ]
[16] O. Rahman, D. Hu, and B. C. M. Fung. Fashion and sustainability: A systematic literature review. In Proceedings of the GMC/GAMMA Conference, Seoul, South Koera, July 2023.
[ abstract | bibtex ]
[15] B. C. M. Fung, P. C. K. Hung, C. Velasco, M. Cano, A. Tokuhiro, A. Uribe-Quevedo, K. Kanev, M. Kimura, and H. Mimura. Augmented data glove for advanced hand and finger motion interactions. In Proceedings of Joint Research Center for Biomedical and Dental Engineering Research Result Meeting (RCBE), page 58, Tokyo, Japan, March 2023.
[ presentation paper | bibtex ]
[14] B. C. M. Fung, P. C. K. Hung, A. Tokuhiro, A. Quevedo, K. Kanev, H. Mimura, and M. Kimura. Mixed reality and AI-based data glove in post-traumatic hand recovery. In Proceedings of the The 7th International Symposium on Biomedical Engineering (ISBE), Online, November 2022.
[ abstract and presentation | bibtex ]
[13] Z. Wang, D. Hu, R. Raavi, P. C. K. Hung, B. C. M. Fung, D. Meger and K. Kanev. An exploratory study of recognizing canine beloved objects by robotic dogs. In Proceedings of the International Conference on Information Resources Management (CONF-IRM), Oshawa, Canada: AIS, October 2022.
[ presentation paper | bibtex ]
[12] A. Larosa, X. Long, T. R. Zhang, Alice S. Wong, B. C. M. Fung, and T. P. Wong. Stress susceptibility is related to changes in the hippocampal representation of conspecific location. Journal of Psychiatry & Neuroscience (JPN), 47(3):S6-S7, June 2022. CMA.
[ abstract | bibtex | JCR impact factor: 4.3, 5-year: 5.2 ]
[11] A. Bodaghi, K. Schmitt, and B. C. M. Fung. A reinforcement learning approach for identifying offensive language in online conversations. In Proceedings of the CORS/INFORMS International Conference, Vancouver, Canada, June 2022.
[ abstract and presentation | bibtex ]
[10] B. C. M. Fung, P. C. K. Hung, A. Tokuhiro, A. Uribe-Quevedo, and K. Kanev. AI data glove enhancements for advanced hand and finger motion tracking and analysis. In Proceedings of 2022 Joint Research Center for Biomedical and Dental Engineering Research Result Meeting (RCBE), page 50, Tokyo, Japan, March 2022.
[ presentation paper | bibtex ]
[9] A. Salgado, B. C. M. Fung, P. C. K. Hung, H. Mimura, K. Kanev, A. Tokuhiro, and A. Uribe-Quevedo. User experience aspects in wearable multi-device applications designed for health systems: lessons learned. In Proceedings of the 6th International Symposium on Biomedical Engineering (ISBE), Virtual Meeting, December 2021.
[ presentation paper | bibtex ]
[8] A. Larosa, X. Long, T. R. Zhang, A. S. Wong, B. C. M. Fung, and T. P. Wong. Disturbance of egocentric representations of aggressors in the dorsal CA1 of mice susceptible to chronic social defeat stress. In Proceedings of the 2021 Society of Biological Psychiatry Annual Meeting (SOBP), Virtual Meeting, May 2021.
[ abstract and poster | bibtex ]
[7] B. C. M. Fung. Forward in Navigating Fake News, Alternative Facts, and Misinformation in a Post-Truth World, K. Dalkir and R. Katz (Ed.), pages xv-xvi. IGI Global, February 2020.
[ forward | bibtex ]
[6] P. Pluye, Q. N. Hong, M.-L. Laroche, Q. Bao, T. Rios, J.-Y. Nie, A. G. Reyes, S. Rahimi, M. Li, B. C. M. Fung, R. El Sherif, M. Di Carlo, M. Benigeri, R. Grad, A. Soliman, V. Granikov, R. Souto, and M. Dawes. Evidence-based artificial intelligence in primary care: development of the patient oriented machine learning appraisal tool. In the 47th North American Primary Care Research Group (NAPCRG) Annual Meeting, Toronto, Canada, November 2019.
[ poster | bibtex ]
[5] D. Bian, T. Lin, K. Y. K. Liu, D. Liu, A. Larosa, A. S. Wong, B. C. M. Fung, and T. P. Wong. An accurate and markerless tracking of multiple mice using the deep learning program DeepLabCut. The Undergraduate Research Expo of the Douglas Institute Research Centre, Montreal, QC, Canada, August 2019.
[ poster | bibtex | 2nd place for the best poster award ]
[4] M. H. Altakrori, F. Iqbal, and B. C. M. Fung. Arabic authorship attribution: an extensive study on Twitter posts. Deep Learning Montreal at AutoDesk Canada, Montreal, Canada, March 2018.
[ poster | bibtex ]
[3] F. Fortin, S. Meloche, R. Bhateja, and B. C. M. Fung. Prédire la menace grâce au machine learning: étude de cas. In Colloque GARDESO, Montreal, Canada, June 2017.
[ abstract | bibtex ]
[2] O. Rahman and B. C. M. Fung. A cross-cultural perspective on fashion selection and consumption. In Proceedings of The End of Fashion: an international conference and exhibition, 2 pages, Wellington, New Zealand, December 2016.
[ abstract | bibtex ]
[1] S. H. H. Ding, B. C. M. Fung, and P. Charland. Kam1n0: simplifying reverse engineering of software for security analysis. In Research Showcase of the Smart Cybersecurity Network (SERENE-RISC) Fall Workshop, Ottawa, ON, October 2016.
[ poster | bibtex | best poster award ]

Magazine Articles

[14] N. Pellicer-Garcia, S. Hogue, and B. C. M. FungCanada should "de-risk" from China by updating its foreign-investment screeningPolicy Options, December 18, 2023.
[ op-ed | bibtex ]
[13] E. Taylor and B. C. M. FungThe impact of China targeting its diasporaPolicy Options, May 8, 2022.
[ op-ed | bibtex ]
[12] S.-F. Lee and B. C. M. FungWhy a foreign influence registry act is necessary for Canada’s national securityThe Hill Times, June 16, 2022.
[ op-ed | bibtex | Canada-China committee in the Parliament of Canada ]
[11] S.-F. Lee and B. C. M. FungThe use of deepfakes can sow doubt, creating confusion and distrust in viewersThe Conversation, May 8, 2022.
[ op-ed | bibtex ]
[10] S.-F. Lee and B. C. M. FungVaccine passports can be used for surveillance under the guise of public health measuresThe Conversation, February 22, 2022.
[ op-ed | bibtex ]
[9] S.-F. Lee and B. C. M. FungMisinformation and Chinese interference in Canada’s affairsPolicy Options, January 4, 2022.
[ op-ed | bibtex | Follow-ups: Globe and Mail (1), Globe and Mail (2), and Fairchild TV | Canada-China committee in the Parliament of Canada ]
[8] S.-F. Lee and B. C. M. FungArtificial intelligence may not actually be the solution for stopping the spread of fake newsThe Conversation, November 28, 2021.
[ op-ed | bibtex ]
[7] S.-F. Lee and B. C. M. FungGovernments should inoculate citizens to prevent the spread of fake newsThe Conversation, November 1, 2021.
[ op-ed | bibtex ]
[6] S.-F. Lee and B. C. M. FungDeep fakes and big data: the next level of cyber warfare. The Hill Times Policy Briefing: Cybersecurity, 18, October 27, 2021.
[ op-ed | bibtex ]
[5] B. C. M. FungAre Canadians prepared for cyberattacks in the second Cold War? The Hill Times Policy Briefing: Privacy & Security, 17, May 5, 2021.
[ op-ed | bibtex ]
[4] B. C. M. Fung. Cyber Security. J. Letzing, editor, World Economic Forum (WEF) TopLink, 9 pages, May 2018.
[ summary of 8 cyber security key issues for world leaders | bibtex ]
[3] T. Kolody and B. C. M. Fung. Cyber Security: Technology and the Law, and Cybercrime. World Economic Forum (WEF) TopLink, 4 pages, April 2017.
[ summary of 2 cyber security key issues for world leaders | bibtex ]
[2] T. Braun and B. C. M. Fung. Cyber Security: Cyber War, Critical Infrastructure Protection, Privacy, System Risk and Resilience, New Norms of Collaboration, Cybercrime, and Security of Things. World Economic Forum (WEF) TopLink, 14 pages, June 2016.
[ summaries of 7 cyber security key issues for world leaders | prominently featured on the Transformation Map of WEF's year-in-review | bibtex ]
[1] N. Mohammed and B. C. M. Fung. Privacy-preserving data publishing. PenTest Magazine: Pentester's Development Kit, 3(5):16-22, August 2013.
[ magazine article | bibtex ]

Copyrighted Work

[1] P. Pierre, B. C. M. Fung, J.-Y. Nie, and T. Schuster. Patient Oriented Machine Learning Appraisal Tool (POMLAT). Registration of Copyright (#1155590), December 2018. Canadian Intellectual Property Office, Industry Canada.
[ copyrighted work | bibtex ]

Technical Reports

[32] Z. Fu, S. H. H. Ding, and B. C. M. Fung. Software Reverse Engineering. Technical Report W7701-217332 (TA03), Defence Research and Development Canada, 24 pages, March 2024.
[ report | bibtex ]
[31] M. Amouei, S. Bellemare, M. Beninger, G. Le Bideau, S. H. H. Ding, Z. Fu, X. Fu, B. C. M. Fung, L. Li, W. Ou, Z. Song, M. Saqib, and H. Yu (alphabetical order). Software Reverse Engineering. Technical Report W7701-217332 (TA02M1), Defence Research and Development Canada, 21 pages, March 2024.
[ report | bibtex ]
[30] S. Acharya, M. Amouei, G. Breyton, S. H. H. Ding, Z. Fu, B. C. M. Fung, L. Li, A. K. Manssour, C. Molloy, W. Ou, A. L.-H. Pineault, M. Saqib, and L. Song (alphabetical order). Defending our cyberspace: AI-powered search engine for cyber threat intelligence. Technical Report for NSERC Alliance (ALLRP 561035-20 Year 2), Defence Research and Development Canada and BlackBerry, 163 pages, December 2023.
[ report | bibtex ]
[29] M. Amouei, Z. Fu, M. Beninger, S. H. H. Ding, and B. C. M. Fung. Software Reverse Engineering. Technical Report W7701-217332 (TA01), Defence Research and Development Canada, 58 pages, August 2023.
[ report | bibtex ]
[28] M. Amouei, G. Breyton, S. H. H. Ding, Z. Fu, B. C. M. Fung, L. Li, S. Mahdavifar, Z. K. Mansour, C. Molloy, W. Ou, M. Saqib, L. Song, and J. Yuki (alphabetical order). Defending our cyberspace: AI-powered search engine for cyber threat intelligence. Technical Report for NSERC Alliance (ALLRP 561035-20 Year 1), Defence Research and Development Canada and BlackBerry, 71 pages, July 2022.
[ report | bibtex ]
[27] M. Q. Li, A. Diwan, A. Abusitta, S. Mahdavifar, and B. C. M. Fung. AI-powered assembly code analytics for discerning malware intent. Technical Report W7714-217794 (Milestone 4), Defence Research and Development Canada, 115 pages, March 2022.
[ report | bibtex ]
[26] S. Mahdavifar, A. Diwan, S. H. H. Ding, and B. C. M. Fung. Assembly code data mining: functionality design and prototyping and plug-in development. Technical Report W7701-176483 (TA07), Defence Research and Development Canada, 28 pages, March 2022.
[ report | bibtex ]
[25] M. Q. Li, A. Diwan, and B. C. M. Fung. AI-powered assembly code analytics for discerning malware intent. Technical Report W7714-217794 (Milestone 3), Defence Research and Development Canada, 25 pages, December 2021.
[ report | bibtex ]
[24] A. Abusitta, M. Q. Li, A. Diwan, J. Hill and B. C. M. Fung. AI-powered assembly code analytics for discerning malware intent. Technical Report W7714-217794 (Milestone 2), Defence Research and Development Canada, 98 pages, August 2021.
[ report | bibtex ]
[23] M. Q. Li, A. Diwan, A. Abusitta, and B. C. M. Fung. AI-powered assembly code analytics for discerning malware intent. Technical Report W7714-217794 (Milestone 1), Defence Research and Development Canada, 35 pages, May 2021.
[ report | bibtex ]
[22] M. Q. Li, A. Diwan, S. H. H. Ding, and B. C. M. Fung. Assembly code data mining: functionality design and prototyping and state-of-the-art report. Technical Report W7701-176483 (TA06), Defence Research and Development Canada, 42 pages, March 2021.
[ report | bibtex ]
[21] M. Q. Li, S. H. H. Ding, and B. C. M. Fung. Assembly code data mining: data mining techniques design and prototyping & functionality design and prototyping. Technical Report W7701-176483 (TA05), Defence Research and Development Canada, 12 pages, March 2020.
[ report | bibtex ]
[20] S. H. H. Ding, M. Q. Li, and B. C. M. Fung. Assembly code data mining: plug-in development. Technical Report W7701-176483 (TA04), Defence Research and Development Canada, 19 pages, March 2020.
[ report | bibtex ]
[19] S. H. H. Ding, M. Q. Li, and B. C. M. Fung. Assembly code data mining: functionality design and prototyping & security product evaluation. Technical Report W7701-176483 (TA03), Defence Research and Development Canada, 11 pages, March 2020.
[ report | bibtex ]
[18] M. Q. Li, A. Abusitta, and B. C. M. Fung. AI-powered assembly code analytics for discerning malware intent. Technical Report W7714-207117 (Milestone 2), Defence Research and Development Canada, 38 pages, February 2020.
[ report | bibtex ]
[17] A. Abusitta, M. Q. Li, and B. C. M. Fung. AI-powered assembly code analytics for discerning malware intent. Technical Report W7714-207117 (Milestone 1), Defence Research and Development Canada, 70 pages, October 2019.
[ report | bibtex ]
[16] M. Q. Li, S. H. H. Ding, and B. C. M. Fung. Assembly code data mining: design and prototyping & security product evaluation. Technical Report W7701-176483 (TA02), Defence Research and Development Canada, 27 pages, March 2019.
[ report | bibtex ]
[15] M. Q. Li, S. H. H. Ding, and B. C. M. Fung. Assembly code data mining: design and prototyping. Technical Report W7701-176483 (TA01), Defence Research and Development Canada, 24 pages, March 2019.
[ report | bibtex ]
[14] S. H. H. Ding, M. Q. Li, and B. C. M. Fung. Assembly code data mining: design and prototyping (part 7). Technical Report W7701-155902/001/QCL (TA07), Defence Research and Development Canada, 21 pages, March 2018.
[ report | bibtex ]
[13] S. H. H. Ding, B. C. M. Fung, M. Q. Li, and M. R. Farhadi. Assembly code data mining: design and prototyping (part 6). Technical Report W7701-155902/001/QCL (TA06), Defence Research and Development Canada, 19 pages, January 2018.
[ report | bibtex ]
[12] D. Tweed and B. C. M. Fung. Demonstration of a secure credential transfer protocol. Technical Report, McAlear Management Inc., 11 pages, February 2017.
[ report | bibtex | source code ]
[11] S. H. H. Ding, B. C. M. Fung, and M. R. Farhadi. Assembly code data mining: design and prototyping (part 5). Technical Report W7701-155902/001/QCL (TA05), Defence Research and Development Canada, 18 pages, February 2017.
[ report | bibtex ]
[10] S. H. H. Ding, B. C. M. Fung, and M. R. Farhadi. Assembly code data mining: design and prototyping (part 4). Technical Report W7701-155902/001/QCL (TA04), Defence Research and Development Canada, 17 pages, January 2017.
[ report | bibtex ]
[9] S. H. H. Ding, B. C. M. Fung, and K. Zhao. Assembly code data mining: design and prototyping (part 3). Technical Report W7701-155902/001/QCL (TA02), Defence Research and Development Canada, 36 pages, March 2016.
[ report | bibtex ]
[8] S. H. H. Ding, B. C. M. Fung, and K. Zhao. Assembly code data mining: porting to other platforms. Technical Report W7701-155902/001/QCL (TA03), Defence Research and Development Canada, 35 pages, February 2016.
[ report | bibtex ]
[7] B. C. M. Fung, S. H. H. Ding, and K. Zhao. Assembly code data mining: design and prototyping (part 2). Technical Report W7701-155902/001/QCL (TA01), Defence Research and Development Canada, 41 pages, January 2016.
[ report | bibtex ]
[6] B. C. M. Fung, S. H. H. Ding, M. R. Farhadi, and K. Zhao. Assembly code data mining: design and prototyping (part 1). Technical Report W7701-155902/001/QCL (Firm Portion), Defence Research and Development Canada, 36 pages, March 2015.
[ report | bibtex ]
[5] M. R. Farhadi, B. C. M. Fung, S. Preda, and M. Debbabi. Progress update on the implementation of assembly code clone detection systems. Technical Report, Defence Research and Development Canada, 18 pages, January 2014.
[ report | bibtex ]
[4] Y. B. Fung, M. R. Farhadi, and B. C. M. Fung. Semantic code clone search. Technical Report, Defence Research and Development Canada, 23 pages, March 2013.
[ report | bibtex ]
[3] B. C. M. Fung, M. R. Farhadi, and M. Debbabi. Assembly code clone search. Technical Report, Defence Research and Development Canada, 71 pages, March 2012.
[ report | bibtex ]
[2] B. C. M. Fung, T. Ormerod, A. Boukhetouta, M. R. Farhadi, and M. Debbabi. A survey of assembly code analysis techniques. Technical Report, Defence Research and Development Canada, 98 pages, September 2011.
[ report | bibtex ]
[1] N. Mohammed, B. C. M. Fung, and M. Debbabi. Preserving Privacy and Utility in RFID Data Publishing. Technical Report 6850, Concordia University, Montreal, QC, Canada, October 2010.
[ report | bibtex ]