Jiang Ming
  • Bio
  • Honors & Awards
  • Publications
  • Team
  • Teaching & Services
  • Versatility
  • Contact
  • Templates
    • Recent & Upcoming Talks
      • Example Talk
    • Blog
      • ๐ŸŽ‰ Easily create your own simple yet highly customizable blog
      • ๐Ÿง  Sharpen your thinking with a second brain
      • ๐Ÿ“ˆ Communicate your results effectively with the best data visualizations
      • ๐Ÿ‘ฉ๐Ÿผโ€๐Ÿซ Teach academic courses
      • โœ… Manage your projects
    • Pandas
    • PyTorch
    • scikit-learn
    • Teaching
      • Learn JavaScript
      • Learn Python
    • An example preprint / working paper
    • An example journal article
    • An example conference paper
  • Publications
    • [USENIX ATC '25] MemoryTrap: Booby Trapping Memory to Counter Memory Disclosure Attacks with Hardware Support
    • [FSE '25] Revisiting Optimization-Resilience Claims in Binary Diffing Tools: Insights from LLVM Peephole Optimization Analysis
    • [S&P '25] Inspecting Virtual Machine Diversification Inside Virtualization Obfuscation
    • [NDSS '25] Retrofitting XoM for Stripped Binaries without Embedded Data Relocation
    • [NSDI '24] Towards Intelligent Automobile Cockpit via A New Container Architecture
    • [CCS '23] PackGenome: Automatically Generating Robust YARA Rules for Accurate Malware Packer Detection
    • [USENIX Security '23] On the Feasibility of Malware Unpacking via Hardware-assisted Loop Profiling
    • [USENIX Security '22] PolyCruise: A Cross-Language Dynamic Information Flow Analysis
    • [ASPLOS '22] One Size Does Not Fit All: Security Hardening of MIPS Embedded Systems via Static Binary Debloating for Shared Libraries
    • [NDSS '22] Chosen-Instruction Attack Against Commercial Code Virtualization Obfuscators
    • [CCS '21] Towards Transparent and Stealthy Android OS Sandboxing via Customizable Container-Based Virtualization
    • [USENIX Security '21] MBA-Blast: Unveiling and Simplifying Mixed Boolean-Arithmetic Obfuscation
    • [USENIX Security '21] Obfuscation-Resilient Executable Payload Extraction From Packed Malware
    • [PLDI '21] Unleashing the Hidden Power of Compiler Optimization on Binary Code Difference: An Empirical Study
    • [PLDI '21] Boosting SMT Solver Performance on Mixed-Bitwise-Arithmetic Expressions
    • [ICSE '21] App's Auto-Login Function Security Testing via Android OS-Level Virtualization
    • [CCS '20] PatchScope: Memory Object Centric Patch Diffing
    • [CCS '20] VAHunt: Warding Off New Repackaged Android Malware in App-Virtualization's Clothing
    • [MobiSys '19] "Jekyll and Hyde" is Risky: Shared-Everything Threat Mitigation in Dual-Instance Apps
    • [CCS '18] VMHunt: A Verifiable Approach to Partial-Virtualized Binary Code Simplification
    • [CCS '18] Towards Paving the Way for Large-Scale Windows Malware Analysis: Generic Binary Unpacking with Orders-of-Magnitude Performance Boost
    • [USENIX Security '18] Towards Predicting Efficient and Anonymous Tor Circuits
    • [USENIX Security '17] BinSim: Trace-based Semantic Binary Diffing via System Call Sliced Segment Equivalence Checking
    • [S&P '17] Cryptographic Function Detection in Obfuscated Binaries via Bit-precise Symbolic Loop Mapping
    • [ASE '16] StraightTaint: Decoupled Offline Symbolic Taint Analysis
    • [CCS '15] LOOP: Logic-Oriented Opaque Predicate Detection in Obfuscated Binary Code
    • [USENIX Security '15] TaintPipe: Pipelined Symbolic Taint Analysis
    • [FSE '14] Semantics-Based Obfuscation-Resilient Binary Code Similarity Comparison with Applications to Software Plagiarism Detection
  • Recent & Upcoming Talks
    • Postdoc, PhD, Master, and Visiting Students
  • Recent & Upcoming Talks
    • Photography
  • Teaching & Services
    • Information Security
    • Intro to Language-Based Security
    • Technical Program Committee
  • Projects
  • Experience

scikit-learn

Oct 26, 2023 ยท 1 min read
Go to Project Site

scikit-learn is a Python module for machine learning built on top of SciPy and is distributed under the 3-Clause BSD license.

Last updated on Oct 26, 2023
Hugo Wowchemy Markdown
Jiang Ming
Authors
Jiang Ming
Associate Professor of Computer Science

← PyTorch Oct 26, 2023
An example preprint / working paper Apr 7, 2019 →

ยฉ 2025 Me. This work is licensed under CC BY NC ND 4.0

Published with Hugo Blox Builder โ€” the free, open source website builder that empowers creators.