Dinghao Wu
YOU?
Author Swipe
View article: LiteRSan: Lightweight Memory Safety Via Rust-specific Program Analysis and Selective Instrumentation
LiteRSan: Lightweight Memory Safety Via Rust-specific Program Analysis and Selective Instrumentation Open
Rust is a memory-safe language, and its strong safety guarantees combined with high performance have been attracting widespread adoption in systems programming and security-critical applications. However, Rust permits the use of unsafe cod…
View article: Dynamic Environmental Interactions Shape the Volatile Compounds of Agarwood Oils Extracted from Aquilaria sinensis Using Supercritical Carbon Dioxide
Dynamic Environmental Interactions Shape the Volatile Compounds of Agarwood Oils Extracted from Aquilaria sinensis Using Supercritical Carbon Dioxide Open
Aquilaria spp. are a highly valuable plant species found in the Chinese herbal medicine and agarwood fragrance supplement industries for fumigation, combustion and perfume. The phytochemical composition of agarwood oils (extracts) was deri…
View article: Visualization OPLS class models of GC-MS-based metabolomics data for identifying agarwood essential oil extracted by hydro-distillation
Visualization OPLS class models of GC-MS-based metabolomics data for identifying agarwood essential oil extracted by hydro-distillation Open
The composition of natural substances varies with plant species and cultivation environment factors, which is also a complex problem. A total of 127 substances of agarwood essential oils (AEOs) extracted by hydro-distillation were identifi…
View article: Stop Overvaluing Multi-Agent Debate -- We Must Rethink Evaluation and Embrace Model Heterogeneity
Stop Overvaluing Multi-Agent Debate -- We Must Rethink Evaluation and Embrace Model Heterogeneity Open
Multi-agent debate (MAD) has gained significant attention as a promising line of research to improve the factual accuracy and reasoning capabilities of large language models (LLMs). Despite its conceptual appeal, current MAD research suffe…
View article: A Photo‐Switchable Peptide Fibril Esterase
A Photo‐Switchable Peptide Fibril Esterase Open
Recent attempts to mimic enzyme catalysis using simple, short peptides have been successful in enhancing various reactions, but the on‐demand, temporal or spatial regulation of such processes by external triggers remains a great challenge.…
View article: A Photo‐Switchable Peptide Fibril Esterase
A Photo‐Switchable Peptide Fibril Esterase Open
Recent attempts to mimic enzyme catalysis using simple, short peptides have been successful in enhancing various reactions, but the on‐demand, temporal or spatial regulation of such processes by external triggers remains a great challenge.…
View article: Graph Adversarial Diffusion Convolution
Graph Adversarial Diffusion Convolution Open
This paper introduces a min-max optimization formulation for the Graph Signal Denoising (GSD) problem. In this formulation, we first maximize the second term of GSD by introducing perturbations to the graph structure based on Laplacian dis…
View article: Hardware Support for Constant-Time Programming
Hardware Support for Constant-Time Programming Open
Side-channel attacks are one of the rising security concerns in modern computing platforms. Observing this, researchers have proposed both hardware-based and software-based strategies to mitigate side-channel attacks, targeting not only on…
View article: Quantifying and Mitigating Cache Side Channel Leakage with Differential Set
Quantifying and Mitigating Cache Side Channel Leakage with Differential Set Open
Cache side-channel attacks leverage secret-dependent footprints in CPU cache to steal confidential information, such as encryption keys. Due to the lack of a proper abstraction for reasoning about cache side channels, existing static progr…
View article: On the Safety of Open-Sourced Large Language Models: Does Alignment Really Prevent Them From Being Misused?
On the Safety of Open-Sourced Large Language Models: Does Alignment Really Prevent Them From Being Misused? Open
Large Language Models (LLMs) have achieved unprecedented performance in Natural Language Generation (NLG) tasks. However, many existing studies have shown that they could be misused to generate undesired content. In response, before releas…
View article: Adversary for Social Good: Leveraging Adversarial Attacks to Protect Personal Attribute Privacy
Adversary for Social Good: Leveraging Adversarial Attacks to Protect Personal Attribute Privacy Open
Social media has drastically reshaped the world that allows billions of people to engage in such interactive environments to conveniently create and share content with the public. Among them, text data (e.g., tweets, blogs) maintains the b…
View article: FusionRetro: Molecule Representation Fusion via In-Context Learning for Retrosynthetic Planning
FusionRetro: Molecule Representation Fusion via In-Context Learning for Retrosynthetic Planning Open
Retrosynthetic planning aims to devise a complete multi-step synthetic route from starting materials to a target molecule. Current strategies use a decoupled approach of single-step retrosynthesis models and search algorithms, taking only …
View article: How Powerful is Implicit Denoising in Graph Neural Networks
How Powerful is Implicit Denoising in Graph Neural Networks Open
Graph Neural Networks (GNNs), which aggregate features from neighbors, are widely used for graph-structured data processing due to their powerful representation learning capabilities. It is generally believed that GNNs can implicitly remov…
View article: Protection of a Gold Catalyst by a Supramolecular Cage Improves Bioorthogonality
Protection of a Gold Catalyst by a Supramolecular Cage Improves Bioorthogonality Open
Gold catalysts exhibit poor compatibility with cellular components. We show that encapsulation of a gold catalyst within the cavity of a supramolecular cage improves the reactivity of the gold complex under biological conditions. The gold …
View article: ALPHAPROG: Reinforcement Generation of Valid Programs for Compiler Fuzzing
ALPHAPROG: Reinforcement Generation of Valid Programs for Compiler Fuzzing Open
Fuzzing is a widely-used testing technique to assure software robustness. However, automatic generation of high-quality test suites is challenging, especially for software that takes in highly-structured inputs, such as the compilers. Comp…
View article: Shedding light into the darknet
Shedding light into the darknet Open
Network telescopes provide a unique window into Internet-wide malicious activities associated with malware propagation, denial of service attacks, network reconnaissance, and others. Analyses of this telescope data can highlight ongoing ma…
View article: Local Augmentation for Graph Neural Networks
Local Augmentation for Graph Neural Networks Open
Graph Neural Networks (GNNs) have achieved remarkable performance on graph-based tasks. The key idea for GNNs is to obtain informative representation through aggregating information from local neighborhoods. However, it remains an open que…
View article: Contents: (Adv. Mater. 37/2021)
Contents: (Adv. Mater. 37/2021) Open
High-Resolution
View article: Zooming Into the Darknet: Characterizing Internet Background Radiation and its Structural Changes
Zooming Into the Darknet: Characterizing Internet Background Radiation and its Structural Changes Open
Network telescopes or "Darknets" provide a unique window into Internet-wide malicious activities associated with malware propagation, denial of service attacks, scanning performed for network reconnaissance, and others. Analyses of the res…
View article: Watermarking-based Defense against Adversarial Attacks on Deep Neural Networks
Watermarking-based Defense against Adversarial Attacks on Deep Neural Networks Open
The vulnerability of deep neural networks to adversarial attacks has posed significant threats to real-world applications, especially security-critical ones. Given a well-trained model, slight modifications to the input samples can cause d…
View article: Abacus: A Tool for Precise Side-Channel Analysis
Abacus: A Tool for Precise Side-Channel Analysis Open
Side-channel vulnerabilities can leak sensitive information unconsciously. In this paper, we introduce the usage of Abacus. Abacus is a tool that can analyze secret-dependent control-flow and secret-dependent data-access leakages in binary…
View article: Abacus: Precise Side-Channel Analysis
Abacus: Precise Side-Channel Analysis Open
Side-channel attacks allow adversaries to infer sensitive information from non-functional characteristics. Prior side-channel detection work is able to identify numerous potential vulnerabilities. However, in practice, many such vulnerabil…
View article: s3team/Abacus v0.1.1
s3team/Abacus v0.1.1 Open
Side-channel Analysis
View article: Fine-Grained Compiler Identification With Sequence-Oriented Neural Modeling
Fine-Grained Compiler Identification With Sequence-Oriented Neural Modeling Open
Different compilers and optimization levels can be used to compile the source code. Revealed in reverse from the produced binaries, these compiler details facilitate essential binary analysis tasks, such as malware analysis and software fo…
View article: SQUIRREL: Testing Database Management Systems with Language Validity and Coverage Feedback
SQUIRREL: Testing Database Management Systems with Language Validity and Coverage Feedback Open
Fuzzing is an increasingly popular technique for verifying software functionalities and finding security vulnerabilities. However, current mutation-based fuzzers cannot effectively test database management systems (DBMSs), which strictly c…
View article: SQUIRREL: Testing Database Management Systems with Language Validity and\n Coverage Feedback
SQUIRREL: Testing Database Management Systems with Language Validity and\n Coverage Feedback Open
Fuzzing is an increasingly popular technique for verifying software\nfunctionalities and finding security vulnerabilities. However, current\nmutation-based fuzzers cannot effectively test database management systems\n(DBMSs), which strictl…