Qinghao Hu   (胡擎昊)

I am a Ph.D. student of Computer Science at UIUC since 08/2019.
I focus on machine learning security, measurement, and explainable AI.
My advisor is Prof. Gang Wang.
I also work closely with Prof. Xinyu Xing and Prof. Linhai Song from Penn State.

Contact: liminy2@illinois.edu
Office: Room 4111, Thomas M. Siebel Center, Urbana, IL 61801

03/19/2021 I will be joining TikTok as a Security Engineering Intern in summer 2021.
02/24/2021 Our paper got accepted to DLS workshop. We release a new PE malware dataset for ML research.
11/30/2020 I will be serving as a Shadow PC at Oakland 2021.
09/30/2020 Our USENIX Security'21 paper got accepted! Thanks for everyone who helped me!
Conference Papers
[USENIX Security'21] CADE: Detecting and Explaining Concept Drift Samples for Security Applications
Limin Yang, Wenbo Guo, Qingying Hao, Arridhana Ciptadi, Ali Ahmadzadeh, Xinyu Xing, Gang Wang
PDF / Supplementary PDF / Code / Artifact Evaluated
TL;DR: Contrastive learning can help detect drifting samples from previously unseen classes and distance-based explanation can find out why such drifting samples are different from existing classes.
[USENIX Security'20] Measuring and Modeling the Label Dynamics of Online Anti-Malware Engines
Shuofei Zhu, Jianjun Shi, Limin Yang, Boqin Qin, Ziyi Zhang, Linhai Song, Gang Wang
PDF / Data / Artifact Evaluated
TL;DR: How to aggregate VirusTotal labels more properly?
[IMC'19] Opening the Blackbox of VirusTotal: Analyzing Online Phishing Scan Engines
Peng Peng, Limin Yang, Linhai Song, Gang Wang
PDF / Data
TL;DR: Control simple phishing sites to see how bad and inconsistent of the URL detection provided by VirusTotal and security vendors' own APIs.
[USENIX Security'18] Understanding the Reproducibility of Crowd-reported Security Vulnerabilities
Dongliang Mu, Alejandro Cuevas, Limin Yang, Hang Hu, Xinyu Xing, Bing Mao, Gang Wang
PDF / Data
TL;DR: Provide quantitive evidence on the prevalence of missing information in vulnerability reports and low reproducibility by manually reproduce 368 memory corruption bugs.
[GLOBECOM'17] VulDigger: A Just-in-Time and Cost-Aware Tool for Digging Vulnerability-Contributing Changes
Limin Yang, et al.
TL;DR: Use metadata and heuristics to predict whether a git commit introduced a vulnerability.
Journal / Workshop Papers
[DLS'21] BODMAS: An Open Dataset for Learning based Temporal Analysis of PE Malware
Limin Yang, Arridhana Ciptadi, Ali Ahmadzadeh, Gang Wang
TL;DR: We collaborate with Blue Hexagon to release an open Windows PE malware dataset with timestamped metadata as well as curated malware family labels.
[SafeThings'20] A Case Study of the Security Vetting Process of Smart-home Assistant Applications
Hang Hu, Limin Yang, Shihan Lin, Gang Wang
TL;DR: Verify that replay attack and SQL injection are feasible in Amazon Alexa / Google Home apps.
[PPNA'17] Characterizing User Behaviors in Location-based Find-and-Flirt Services: Anonymity and Demographics
Minhui Xue, Limin Yang, Keith W. Ross, Haifeng Qian
TL;DR: Who used the WeChat "People Nearby" feature more often?
Penn State Research Intern, Pennsylvania, US, 09/2017 – 02/2018
Xueba Jun Search and Rank Intern, Shanghai, China, 09/2016 – 10/2016
Peking University Exploit Intern, Beijing, China, 07/2015 – 08/2015
2017 ECNU Graduate Student Overseas Research Scholarship
2013-2015 ECNU Top-notch Innovative Personnel Training Plan
2019 Spring CS-4264 Principles of Computer Security, Virginia Tech, Teaching Assistant
2018 Fall CS-3114 Data Structures and Algorithms, Virginia Tech, Teaching Assistant
Professional Services
[Oakland'21] IEEE Symposium on Security and Privacy, Student PC
[Patterns'21] Patterns (a data science journal by Cell Press), Reviewer

Miscellaneous I'm also a minimalism photographer: whyisyoung.com