Sitemap

A list of all the posts and pages found on the site. For you robots out there is an XML version available for digesting as well.

Pages

Posts

Future Blog Post

less than 1 minute read

Published:

This post will show up by default. To disable scheduling of future posts, edit config.yml and set future: false.

Blog Post number 4

less than 1 minute read

Published:

This is a sample blog post. Lorem ipsum I can’t remember the rest of lorem ipsum and don’t have an internet connection right now. Testing testing testing this blog post. Blog posts are cool.

Blog Post number 3

less than 1 minute read

Published:

This is a sample blog post. Lorem ipsum I can’t remember the rest of lorem ipsum and don’t have an internet connection right now. Testing testing testing this blog post. Blog posts are cool.

Blog Post number 2

less than 1 minute read

Published:

This is a sample blog post. Lorem ipsum I can’t remember the rest of lorem ipsum and don’t have an internet connection right now. Testing testing testing this blog post. Blog posts are cool.

Blog Post number 1

less than 1 minute read

Published:

This is a sample blog post. Lorem ipsum I can’t remember the rest of lorem ipsum and don’t have an internet connection right now. Testing testing testing this blog post. Blog posts are cool.

portfolio

Sunset

Sunset shot from a parking lot near home

publications

A Novel Neural Network-Based Malware Severity Classification System

Published in International Conference on Software Technologies (Springer), 2021

This paper proposes a neural network-based malware severity classification method.

Recommended citation: Miles Q. Li and Benjamin CM Fung. "A Novel Neural Network-Based Malware Severity Classification System." In International Conference on Software Technologies, pp. 218-232. Springer, 2021. https://link.springer.com/chapter/10.1007/978-3-031-11513-4_10

DyAdvDefender: An instance-based online machine learning model for perturbation-trial-based black-box adversarial defense

Published in Journal of Information Sciences, 2022

This paper is about our novel black-box adversarial defense method

Recommended citation: Li, Miles Q., Benjamin CM Fung, and Philippe Charland. "DyAdvDefender: An instance-based online machine learning model for perturbation-trial-based black-box adversarial defense." Information Sciences (2022). https://www.sciencedirect.com/science/article/pii/S0020025522003747?casa_token=p5N50hWOf0oAAAAA:OoG3up9I8-W8kW1zutzK3zuzOZL1kpWspm_7h0YJZC_aowNcFvN97aUNwcWJvMX61QngMi4aNjy4

VDGraph2Vec: Vulnerability Detection in Assembly Code Using Message Passing Neural Networks

Published in ICMLA 2022, 2022

This paper proposes an automated deep learning method to generate representations of assembly code for vulnerability detection.

Recommended citation: Ashita Diwan, Miles Q. Li, and Benjamin CM Fung. "VDGraph2Vec: Vulnerability Detection in Assembly Code Using Message Passing Neural Networks." In 2022 21st IEEE International Conference on Machine Learning and Applications (ICMLA), pp. 1039-1046. IEEE, 2022. https://ieeexplore.ieee.org/document/10069134/

Security Concerns for Large Language Models: A Survey

Published in Journal of Information Security and Applications, 2025

This paper is about our study on the security concerns with LLMs

Recommended citation: Miles Q. Li, and Benjamin CM Fung. Security Concerns for Large Language Models: A Survey. Journal of Information Security and Applications 95 (2025): 104284. https://www.sciencedirect.com/science/article/pii/S2214212625003217?casa_token=8Ce8QlKHMEoAAAAA:Dy_eO6f0zDbNjuXcwnPBnT9ezs0QQu8Ne_sn1DThh55aw4u-QP4OL0PbOIWzlL_ydi8uhlsP4w

A Benchmark for Evaluating Outcome-Driven Constraint Violations in Autonomous AI Agents

Published in arXiv preprint / Under review for ICML 2026, 2025

This paper presents ODCV-Bench, a safety benchmark for evaluating constraint violations in autonomous AI agents.

Recommended citation: Miles Q. Li, Benjamin Fung, Martin Weiss, Pulei Xiong, Khalil Al-Hussaeni, and Claude Fachkha. A Benchmark for Evaluating Outcome-Driven Constraint Violations in Autonomous AI Agents. arXiv preprint arXiv:2512.20798 (2025). https://arxiv.org/abs/2512.20798

GPT-based Self-supervised Anomaly Detection in Command Lines

Published in Journal of Computer Virology and Hacking Techniques, 2026

This paper is about our GPT-based self-supervised anomaly detection system for command lines

Recommended citation: Miles Q. Li, Julien Keutchayan, François Charest, and Benjamin C.M. Fung. GPT-based Self-supervised Anomaly Detection in Command Lines. Journal of Computer Virology and Hacking Techniques, Springer, 2026.

talks

Generative AI Model for Security

Published:

Invited presentation at the IVADO Community of Practice at HEC Montreal. Presented research on generative AI models for security to the IVADO research community.

teaching