


default search action
Kevin Leach
Person information
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2025
- [c49]Dung Thuy Nguyen, Ngoc N. Tran, Taylor T. Johnson, Kevin Leach:
PBP: Post-training Backdoor Purification for Malware Classifiers. NDSS 2025 - [i27]Manish Acharya, Yifan Zhang, Kevin Leach, Yu Huang:
Optimizing Code Runtime Performance through Context-Aware Retrieval-Augmented Generation. CoRR abs/2501.16692 (2025) - 2024
- [j9]Yifan Zhang
, Jiliang Li
, Zachary Karas
, Aakash Bansal
, Toby Jia-Jun Li
, Collin McMillan
, Kevin Leach
, Yu Huang
:
EyeTrans: Merging Human and Machine Attention for Neural Code Summarization. Proc. ACM Softw. Eng. 1(FSE): 115-136 (2024) - [j8]Lei Zhou
, Fengwei Zhang
, Kevin Leach
, Xuhua Ding
, Zhenyu Ning
, Guojun Wang
, Jidong Xiao
:
Hardware-Assisted Live Kernel Function Updating on Intel Platforms. IEEE Trans. Dependable Secur. Comput. 21(4): 2085-2098 (2024) - [j7]Chenxu Wang
, Yunjie Deng, Zhenyu Ning
, Kevin Leach
, Jin Li
, Shoumeng Yan
, Zhengyu He
, Jiannong Cao
, Fengwei Zhang
:
Building a Lightweight Trusted Execution Environment for Arm GPUs. IEEE Trans. Dependable Secur. Comput. 21(4): 3801-3816 (2024) - [j6]Michael Sandborn
, Zach Stoebner, Westley Weimer
, Stephanie Forrest
, Ryan E. Dougherty
, Jules White, Kevin Leach
:
Reducing Malware Analysis Overhead With Coverings. IEEE Trans. Dependable Secur. Comput. 21(4): 4133-4146 (2024) - [c48]Zhijian Li, Stefan Larson, Kevin Leach:
Generating Hard-Negative Out-of-Scope Data with ChatGPT for Intent Classification. LREC/COLING 2024: 7634-7646 - [c47]Stefan Larson, Nicole Lima, Santiago Diaz, Amogh Manoj Joshi, Siddharth Betala, Jamiu Suleiman, Yash Mathur, Kaushal Prajapati, Ramla Alakraa, Junjie Shen, Temi Okotore, Kevin Leach:
De-Identification of Sensitive Personal Data in Datasets Derived from IIT-CDIP. EMNLP 2024: 21494-21505 - [c46]Hunter Baxter
, Yu Huang
, Kevin Leach
:
Genetic Improvement for DNN Security. GI@ICSE 2024: 11-12 - [c45]Cailani Lemieux Mack, Kevin Leach, Kevin Angstadt:
Sensor Data Transplantation for Redundant Hardware Switchover in Micro Autonomous Vehicles. ICCPS 2024: 135-146 - [c44]Yimeng Ma
, Yu Huang
, Kevin Leach
:
Breaking the Flow: A Study of Interruptions During Software Engineering Activities. ICSE 2024: 185:1-185:12 - [c43]Preston K. Robinette
, Diego Manzanas Lopez
, Serena Serbinowska
, Kevin Leach
, Taylor T. Johnson
:
Case Study: Neural Network Malware Detection Verification for Feature and Image Datasets. FormaliSE@ICSE 2024: 127-137 - [c42]Haonan Hou, Kevin Leach, Yu Huang:
ChatGPT Giving Relationship Advice - How Reliable Is It? ICWSM 2024: 610-623 - [c41]Jiliang Li
, Yifan Zhang
, Zachary Karas
, Collin McMillan
, Kevin Leach
, Yu Huang
:
Do Machines and Humans Focus on Similar Code? Exploring Explainability of Large Language Models in Code Summarization. ICPC 2024: 47-51 - [c40]Skyler Grandel
, Douglas C. Schmidt
, Kevin Leach
:
Applying Large Language Models to Enhance the Assessment of Parallel Functional Programming Assignments. LLM4CODE@ICSE 2024: 102-110 - [c39]Chenxu Wang, Fengwei Zhang, Yunjie Deng, Kevin Leach, Jiannong Cao, Zhenyu Ning, Shoumeng Yan, Zhengyu He:
CAGE: Complementing Arm CCA with GPU Extensions. NDSS 2024 - [i26]Yifan Zhang, Jiliang Li, Zachary Karas, Aakash Bansal, Toby Jia-Jun Li, Collin McMillan, Kevin Leach, Yu Huang:
EyeTrans: Merging Human and Machine Attention for Neural Code Summarization. CoRR abs/2402.14096 (2024) - [i25]Jiliang Li, Yifan Zhang, Zachary Karas, Collin McMillan, Kevin Leach, Yu Huang:
Do Machines and Humans Focus on Similar Code? Exploring Explainability of Large Language Models in Code Summarization. CoRR abs/2402.14182 (2024) - [i24]Zhijian Li, Stefan Larson, Kevin Leach:
Generating Hard-Negative Out-of-Scope Data with ChatGPT for Intent Classification. CoRR abs/2403.05640 (2024) - [i23]Preston K. Robinette, Diego Manzanas Lopez, Serena Serbinowska, Kevin Leach, Taylor T. Johnson:
Case Study: Neural Network Malware Detection Verification for Feature and Image Datasets. CoRR abs/2404.05703 (2024) - [i22]Skyler Grandel, Scott Thomas Andersen, Yu Huang, Kevin Leach:
COMCAT: Leveraging Human Judgment to Improve Automatic Documentation and Summarization. CoRR abs/2407.13648 (2024) - [i21]Eric Li, Yifan Zhang, Yu Huang, Kevin Leach:
MalMixer: Few-Shot Malware Classification with Retrieval-Augmented Semi-Supervised Learning. CoRR abs/2409.13213 (2024) - [i20]Zhijian Li, Stefan Larson, Kevin Leach:
Document Type Classification using File Names. CoRR abs/2410.01166 (2024) - [i19]Dung Thuy Nguyen, Taylor T. Johnson, Kevin Leach:
FISC: Federated Domain Generalization via Interpolative Style Transfer and Contrastive Learning. CoRR abs/2410.22622 (2024) - [i18]Dung Thuy Nguyen, Ziyan An, Taylor T. Johnson, Meiyi Ma, Kevin Leach:
Formal Logic-guided Robust Federated Learning against Poisoning Attacks. CoRR abs/2411.03231 (2024) - [i17]Gordon Lim, Stefan Larson, Kevin Leach:
Robust Testing for Deep Learning using Human Label Noise. CoRR abs/2412.00244 (2024) - [i16]Gordon Lim, Stefan Larson, Yu Huang, Kevin Leach:
Towards Fair Pay and Equal Work: Imposing View Time Limits in Crowdsourced Image Classification. CoRR abs/2412.00260 (2024) - [i15]Dung Thuy Nguyen, Ngoc N. Tran, Taylor T. Johnson, Kevin Leach:
PBP: Post-training Backdoor Purification for Malware Classifiers. CoRR abs/2412.03441 (2024) - [i14]Gordon Lim, Stefan Larson, Kevin Leach:
Label Errors in the Tobacco3482 Dataset. CoRR abs/2412.13140 (2024) - 2023
- [c38]Stefan Larson, Gordon Lim, Kevin Leach:
On Evaluation of Document Classifiers using RVL-CDIP. EACL 2023: 2657-2670 - [c37]Yueke Zhang, Kevin Leach, Yu Huang:
Leveraging Evidence Theory to Improve Fault Localization: An Exploratory Study. ESEM 2023: 1-12 - [c36]Kevin Cao, Kevin Leach:
Revisiting Deep Learning for Variable Type Recovery. ICPC 2023: 275-279 - [c35]Jason Kim, Daniel Genkin, Kevin Leach:
Revisiting Lightweight Compiler Provenance Recovery on ARM Binaries. ICPC 2023: 292-303 - [c34]Zihan Fang
, Madeline Endres
, Thomas Zimmermann
, Denae Ford
, Westley Weimer
, Kevin Leach
, Yu Huang
:
A Four-Year Study of Student Contributions to OSS vs. OSS4SG with a Lightweight Intervention. ESEC/SIGSOFT FSE 2023: 3-15 - [i13]Kevin Cao, Kevin Leach:
Revisiting Deep Learning for Variable Type Recovery. CoRR abs/2304.03854 (2023) - [i12]Jason Kim, Daniel Genkin, Kevin Leach:
Revisiting Lightweight Compiler Provenance Recovery on ARM Binaries. CoRR abs/2305.03934 (2023) - [i11]Stefan Larson, Gordon Lim, Kevin Leach:
On Evaluation of Document Classification using RVL-CDIP. CoRR abs/2306.12550 (2023) - 2022
- [c33]Christopher Clarke, Joseph Peper, Karthik Krishnamurthy, Walter Talamonti, Kevin Leach, Walter S. Lasecki, Yiping Kang, Lingjia Tang, Jason Mars:
One Agent To Rule Them All: Towards Multi-agent Conversational AI. ACL (Findings) 2022: 3258-3267 - [c32]Yunjie Deng
, Chenxu Wang
, Shunchang Yu, Shiqing Liu, Zhenyu Ning
, Kevin Leach, Jin Li, Shoumeng Yan
, Zhengyu He, Jiannong Cao, Fengwei Zhang:
StrongBox: A GPU TEE on Arm Endpoints. CCS 2022: 769-783 - [c31]Kevin Leach, Christopher Steven Timperley, Kevin Angstadt, Anh Nguyen-Tuong, Jason Hiser, Aaron Paulos, Partha P. Pal
, Patrick Hurley, Carl Thomas, Jack W. Davidson, Stephanie Forrest, Claire Le Goues
, Westley Weimer:
START: A Framework for Trusted and Resilient Autonomous Vehicles (Practical Experience Report). ISSRE 2022: 73-84 - [c30]Stefan Larson, Gordon Lim, Yutong Ai, David Kuang, Kevin Leach:
Evaluating Out-of-Distribution Performance on Document Image Classifiers. NeurIPS 2022 - [c29]Stefan Larson, Kevin Leach:
Redwood: Using Collision Detection to Grow a Large-Scale Intent Classification Dataset. SIGDIAL 2022: 468-477 - [i10]Christopher Clarke, Joseph Joshua Peper, Karthik Krishnamurthy, Walter Talamonti, Kevin Leach, Walter S. Lasecki, Yiping Kang, Lingjia Tang, Jason Mars:
One Agent To Rule Them All: Towards Multi-agent Conversational AI. CoRR abs/2203.07665 (2022) - [i9]Stefan Larson, Kevin Leach:
Redwood: Using Collision Detection to Grow a Large-Scale Intent Classification Dataset. CoRR abs/2204.05483 (2022) - [i8]Stefan Larson, Kevin Leach:
A Survey of Intent Classification and Slot-Filling Datasets for Task-Oriented Dialog. CoRR abs/2207.13211 (2022) - [i7]Yifan Zhang, Junwen Yang, Haoyu Dong, Qingchen Wang, Huajie Shao, Kevin Leach, Yu Huang:
ASTRO: An AST-Assisted Approach for Generalizable Neural Clone Detection. CoRR abs/2208.08067 (2022) - [i6]Yifan Zhang, Chen Huang, Yueke Zhang, Kevin Cao, Scott Thomas Andersen, Huajie Shao, Kevin Leach, Yu Huang:
COMBO: Pre-Training Representations of Binary Code Using Contrastive Learning. CoRR abs/2210.05102 (2022) - [i5]Stefan Larson, Gordon Lim, Yutong Ai, David Kuang, Kevin Leach:
Evaluating Out-of-Distribution Performance on Document Image Classifiers. CoRR abs/2210.07448 (2022) - [i4]Andrew Lee, Zhenguo Chen, Kevin Leach, Jonathan K. Kummerfeld:
Augmenting Task-Oriented Dialogue Systems with Relation Extraction. CoRR abs/2210.13344 (2022) - 2021
- [j5]Lei Zhou, Fengwei Zhang
, Jidong Xiao
, Kevin Leach
, Westley Weimer, Xuhua Ding
, Guojun Wang
:
A Coprocessor-Based Introspection Framework Via Intel Management Engine. IEEE Trans. Dependable Secur. Comput. 18(4): 1920-1932 (2021) - [j4]Zohreh Sharafi, Yu Huang, Kevin Leach, Westley Weimer:
Toward an Objective Measure of Developers' Cognitive Activities. ACM Trans. Softw. Eng. Methodol. 30(3): 30:1-30:40 (2021) - [i3]Mohsen Ahmadi, Kevin Leach, Ryan E. Dougherty, Stephanie Forrest, Westley Weimer:
MIMOSA: Reducing Malware Analysis Overhead with Coverings. CoRR abs/2101.07328 (2021) - 2020
- [c28]Yujun Qin, Samuel Gonzalez, Kevin Angstadt
, Xiaowei Wang, Stephanie Forrest
, Reetuparna Das
, Kevin Leach, Westley Weimer:
MARTINI: Memory Access Traces to Detect Attacks. CCSW 2020: 77-90 - [c27]Chad Spensky, Aravind Machiry, Marcel Busch
, Kevin Leach, Rick Housley, Christopher Kruegel, Giovanni Vigna:
TRUST.IO: Protecting Physical Interfaces on Cyber-physical Systems. CNS 2020: 1-9 - [c26]Stefan Larson, Adrian Cheung, Anish Mahendran, Kevin Leach, Jonathan K. Kummerfeld:
Inconsistencies in Crowdsourced Slot-Filling Annotations: A Typology and Identification Methods. COLING 2020: 5035-5046 - [c25]Lei Zhou, Fengwei Zhang, Jinghui Liao, Zhenyu Ning, Jidong Xiao, Kevin Leach, Westley Weimer, Guojun Wang:
KShot: Live Kernel Patching with SMM and SGX. DSN 2020: 1-13 - [c24]Stefan Larson, Anthony Zheng, Anish Mahendran, Rishi Tekriwal, Adrian Cheung, Eric Guldan, Kevin Leach, Jonathan K. Kummerfeld:
Iterative Feature Mining for Constraint-Based Data Collection to Increase Data Diversity and Model Robustness. EMNLP (1) 2020: 8097-8106 - [c23]Yu Huang, Kevin Angstadt
, Kevin Leach, Westley Weimer:
Selective Symbolic Type-Guided Checkpointing and Restoration for Autonomous Vehicle Repair. ICSE (Workshops) 2020: 3-10 - [c22]Ryan Krueger, Yu Huang, Xinyu Liu
, Tyler Santander
, Westley Weimer, Kevin Leach:
Neurological divide: an fMRI study of prose and code writing. ICSE 2020: 678-690 - [c21]Sean Stapleton, Yashmeet Gambhir, Alexander LeClair, Zachary Eberhart, Westley Weimer, Kevin Leach, Yu Huang:
A Human Study of Comprehension and Code Summarization. ICPC 2020: 2-13 - [c20]Stefan Larson, Eric Guldan, Kevin Leach:
Data Query Language and Corpus Tools for Slot-Filling and Intent Classification Data. LREC 2020: 7060-7068 - [c19]Yu Huang, Kevin Leach, Zohreh Sharafi, Nicholas McKay, Tyler Santander
, Westley Weimer:
Biases and differences in code review using medical imaging and eye-tracking: genders, humans, and machines. ESEC/SIGSOFT FSE 2020: 456-468
2010 – 2019
- 2019
- [j3]William B. Langdon, Westley Weimer, Christopher Steven Timperley, Oliver Krauss, Zhen Yu Ding, Yiwei Lyu, Nicolas Chausseau, Eric M. Schulte, Shin Hwei Tan, Kevin Leach, Yu Huang, Gabin An:
The State and Future of Genetic Improvement. ACM SIGSOFT Softw. Eng. Notes 44(3): 25-29 (2019) - [c18]Stefan Larson, Anish Mahendran, Joseph J. Peper, Christopher Clarke, Andrew Lee, Parker Hill, Jonathan K. Kummerfeld
, Kevin Leach, Michael A. Laurenzano, Lingjia Tang, Jason Mars:
An Evaluation Dataset for Intent Classification and Out-of-Scope Prediction. EMNLP/IJCNLP (1) 2019: 1311-1316 - [c17]Lei Zhou, Jidong Xiao, Kevin Leach, Westley Weimer, Fengwei Zhang, Guojun Wang:
Nighthawk: Transparent System Introspection from Ring -3. ESORICS (2) 2019: 217-238 - [c16]Kevin Leach, Ryan E. Dougherty
, Chad Spensky, Stephanie Forrest
, Westley Weimer:
Evolutionary computation for improving malware analysis. GI@ICSE 2019: 18-19 - [c15]Yu Huang, Xinyu Liu
, Ryan Krueger, Tyler Santander
, Xiaosu Hu
, Kevin Leach, Westley Weimer:
Distilling neural representations of data structure manipulation using fMRI and fNIRS. ICSE 2019: 396-407 - [c14]Brandon Carlson, Kevin Leach, Darko Marinov, Meiyappan Nagappan, Atul Prakash
:
Open Source Vulnerability Notification. OSS 2019: 12-23 - [i2]William B. Langdon, Westley Weimer, Christopher Steven Timperley, Oliver Krauss, Zhen Yu Ding, Yiwei Lyu, Nicolas Chausseau, Eric M. Schulte, Shin Hwei Tan, Kevin Leach, Yu Huang, Gabin An:
The State and Future of Genetic Improvement. CoRR abs/1907.03773 (2019) - [i1]Stefan Larson, Anish Mahendran, Joseph J. Peper, Christopher Clarke, Andrew Lee, Parker Hill, Jonathan K. Kummerfeld, Kevin Leach, Michael A. Laurenzano, Lingjia Tang, Jason Mars:
An Evaluation Dataset for Intent Classification and Out-of-Scope Prediction. CoRR abs/1909.02027 (2019) - 2018
- [j2]Fengwei Zhang
, Kevin Leach, Angelos Stavrou
, Haining Wang:
Towards Transparent Debugging. IEEE Trans. Dependable Secur. Comput. 15(2): 321-335 (2018) - 2017
- [j1]Haoyi Xiong
, Jinghe Zhang, Yu Huang, Kevin Leach, Laura E. Barnes:
Daehr: A Discriminant Analysis Framework for Electronic Health Record Data and an Application to Early Detection of Mental Health Disorders. ACM Trans. Intell. Syst. Technol. 8(3): 47:1-47:21 (2017) - [c13]Jacob Breiholz, Farah B. Yahya, Christopher J. Lukas
, Xing Chen, Kevin Leach, David D. Wentzloff, Benton H. Calhoun:
A 4.4 nW lossless sensor data compression accelerator for 2.9x system power reduction in wireless body sensors. MWSCAS 2017: 1041-1044 - [c12]Kevin Leach, Fengwei Zhang, Westley Weimer:
Scotch: Combining Software Guard Extensions and System Management Mode to Monitor Cloud Resource Usage. RAID 2017: 403-424 - 2016
- [c11]Nicholas J. Napoli
, Kevin Leach, Laura E. Barnes, Westley Weimer:
A MapReduce framework to improve template matching uncertainty. BigComp 2016: 77-84 - [c10]Kate Highnam, Kevin Angstadt
, Kevin Leach, Westley Weimer, Aaron Paulos, Patrick Hurley:
An Uncrewed Aerial Vehicle Attack Scenario and Trustworthy Repair Architecture. DSN Workshops 2016: 222-225 - [c9]Yu Huang, Haoyi Xiong
, Kevin Leach, Yuyan Zhang, Philip Chow, Karl C. Fua, Bethany A. Teachman, Laura E. Barnes:
Assessing social anxiety using gps trajectories and point-of-interest data. UbiComp 2016: 898-903 - [c8]Chad Spensky, Hongyi Hu, Kevin Leach:
LO-PHI: Low-Observable Physical Host Instrumentation for Malware Analysis. NDSS 2016 - [c7]Kevin Leach, Chad Spensky, Westley Weimer, Fengwei Zhang:
Towards Transparent Introspection. SANER 2016: 248-259 - 2015
- [c6]Jinghe Zhang, Haoyi Xiong
, Yu Huang, Hao Wu, Kevin Leach, Laura E. Barnes:
M-SEQ: Early detection of anxiety and depression via temporal orders of diagnoses in electronic health data. IEEE BigData 2015: 2569-2577 - [c5]Fengwei Zhang, Kevin Leach, Haining Wang, Angelos Stavrou
:
TrustLogin: Securing Password-Login on Commodity Operating Systems. AsiaCCS 2015: 333-344 - [c4]Fengwei Zhang, Kevin Leach, Angelos Stavrou
, Haining Wang, Kun Sun
:
Using Hardware Features for Increased Debugging Transparency. IEEE Symposium on Security and Privacy 2015: 55-69 - 2014
- [c3]Fengwei Zhang, Haining Wang, Kevin Leach, Angelos Stavrou
:
A Framework to Secure Peripherals at Runtime. ESORICS (1) 2014: 219-238 - 2013
- [c2]Kevin Leach:
BARLEY: Modelling program behavior with resource usage. DSN Workshops 2013: 1-4 - [c1]Fengwei Zhang, Kevin Leach, Kun Sun
, Angelos Stavrou
:
SPECTRE: A dependable introspection framework via System Management Mode. DSN 2013: 1-12
Coauthor Index

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-03-21 02:16 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint