Showing results 1 to 20 of 88
next >
Issue Date | Title | Author(s) |
2021-12-01 | A Comparative Study of Class Rebalancing Methods for Security Bug Report Classification | Zheng, W; Xun, Y; Wu, X; Deng, Z; Chen, X; Sui, Y |
2023-10-16 | A Container-Usage-Pattern-Based Context Debloating Approach for Object-Sensitive Pointer Analysis | He, D; Gui, Y; Li, W; Tao, Y; Zou, C; Sui, Y; Xue, J |
2023-01-01 | A Hybrid Alias Analysis and Its Application to Global Variable Protection in the Linux Kernel | Li, G; Zhang, H; Zhou, J; Shen, W; Sui, Y; Qian, Z |
2020-07-13 | A literature review of automatic traceability links recovery for software change impact analysis | Aung, TWW; Huo, H; Sui, Y |
2020-07-13 | A literature review of automatic traceability links recovery for software change impact analysis | Aung, TWW; Huo, H; Sui, Y |
2021-06-01 | A survey of Intel SGX and its applications | Zheng, W; Wu, Y; Wu, X; Feng, C; Sui, Y; Luo, X; Zhou, Y |
2022-01-01 | A Systematical Study on Application Performance Management Libraries for Apps | Tang, Y; Wang, H; Zhan, X; Luo, X; Zhou, Y; Zhou, H; Yan, Q; Sui, Y; Keung, JW |
2023-11-01 | A Tale of Two Cities: Data and Configuration Variances in Robust Deep Learning | Zhang, G; Sun, J; Xu, F; Sui, Y; Bandara, HMND; Chen, S; Menzies, T |
2016-03-12 | Accelerating dynamic data race detection using static thread interference analysis | Di, P; Sui, Y |
2020-11-08 | All your app links are belong to us: Understanding the threats of instant apps based attacks | Tang, Y; Sui, Y; Wang, H; Luo, X; Zhou, H; Xu, Z |
2021-03-01 | An Empirical Study of Code Deobfuscations on Detecting Obfuscated Android Piggybacked Apps | Zhang, Y; Xiao, G; Zheng, Z; Zhu, T; Tsang, IW; Sui, Y |
2022-01-01 | An Empirical Study of Fault Triggers in Deep Learning Frameworks | Du, X; Sui, Y; Liu, Z; Ai, J |
2021-08-18 | An exploratory study of autopilot software bugs in unmanned aerial vehicles | Wang, D; Li, S; Xiao, G; Liu, Y; Sui, Y |
2020-10-01 | An exploratory study of bugs in extended reality applications on the web | Li, S; Wu, Y; Liu, Y; Wang, D; Wen, M; Tao, Y; Sui, Y; Liu, Y |
2021-06-12 | Beyond the virus: a first look at coronavirus-themed Android malware | Wang, L; He, R; Wang, H; Xia, P; Li, Y; Wu, L; Zhou, Y; Luo, X; Sui, Y; Guo, Y; Xu, G |
2017-07-10 | Boosting the precision of virtual call integrity protection with partial pointer analysis for C++ | Fan, X; Sui, Y; Liao, X; Xue, J |
2023-05-01 | Challenging Machine Learning-Based Clone Detectors via Semantic-Preserving Code Transformations | Zhang, W; Guo, S; Zhang, H; Sui, Y; Xue, Y; Xu, Y |
2020-06-27 | Clairvoyance: Cross-contract static analysis for detecting practical reentrancy vulnerabilities in smart contracts | Ye, J; Ma, M; Lin, Y; Sui, Y; Xue, Y |
2018-05-28 | CoBOT: Static C/C++ bug detection in the presence of incomplete code | Gao, Q; Ma, S; Shao, S; Sui, Y; Zhao, G; Ma, L; Ma, X; Duan, F; Deng, X; Zhang, S; Chen, X |
2021-10-01 | Compacting points-to sets through object clustering | Barbar, M; Sui, Y |