Showing results 74 to 91 of 91
< previous
Issue Date | Title | Author(s) |
2023-06-06 | Recursive State Machine Guided Graph Folding for Context-Free Language Reachability | Lei, Y; Sui, Y; Tan, SH; Zhang, Q |
2020 | Reinforcement-Learning-Guided Source Code Summarization via Hierarchical Attention | Wang, W; Zhang, Y; Sui, Y; Wan, Y; Zhao, Z; Wu, J; Yu, P; Xu, G |
2023-11-04 | RNNtcs: A test case selection method for Recurrent Neural Networks | Wu, X; Shen, J; Zheng, W; Lin, L; Sui, Y; Semasaba, AOA |
2021-07-11 | Runtime detection of memory errors with smart status | Chen, Z; Wang, C; Yan, J; Sui, Y; Xue, J |
2020-01-01 | Secure Metric Learning via Differential Pairwise Privacy | Li, J; Pan, Y; Sui, Y; Tsang, IW |
2018-01-01 | Spatio-Temporal Context Reduction: A Pointer-Analysis-Based Static Approach for Detecting Use-After-Free Vulnerabilities | Yan, H; Sui, Y; Chen, S; Xue, J |
2019-11-01 | Static detection of control-flow-related vulnerabilities using graph embedding | Cheng, X; Wang, H; Hua, J; Zhang, M; Xu, G; Yi, L; Sui, Y |
2016-03-17 | SVF: Interprocedural static value-flow analysis in LLVM | Sui, Y; Xue, J |
2022-10-31 | Taming transitive redundancy for context-free language reachability | Lei, Y; Sui, Y; Ding, S; Zhang, Q |
2020 | TCD: Statically Detecting Type Confusion Errors in C++ Programs | Zou, C; Sui, Y; Yan, H; Xue, J |
2020-06-27 | Typestate-guided fuzzer for discovering use-after-free vulnerabilities | Wang, H; Xie, X; Li, Y; Wen, C; Li, Y; Liu, Y; Qin, S; Chen, H; Sui, Y |
2023-01-01 | Uncovering Limitations in Text-to-Image Generation: A Contrastive Approach with Structured Semantic Alignment | Feng, Q; Sui, Y; Zhang, H |
2018-09-06 | Value-Flow-Based Demand-Driven Pointer Analysis for C and C++ | Sui, Y; Xue, J |
2020-08-01 | Value-Flow-Based Demand-Driven Pointer Analysis for C and C++ | Sui, Y |
2019-05-01 | VFix: Value-Flow-Guided Precise Program Repair for Null Pointer Dereferences | Xu, X; Sui, Y; Yan, H; Xue, J |
2022-01-01 | What Do They Capture? - A Structural Analysis of Pre-Trained Language Models for Source Code | Wan, Y; Zhao, W; Zhang, H; Sui, Y; Xu, G; Jin, H |
2023-11-02 | Why Do Deep Learning Projects Differ in Compatible Framework Versions? An Exploratory Study | Lei, H; Zhang, S; Wang, J; Xiao, G; Liu, Y; Sui, Y |
2022-11-07 | You see what I want you to see: poisoning vulnerabilities in neural code search | Wan, Y; Zhang, S; Zhang, H; Sui, Y; Xu, G; Yao, D; Jin, H; Sun, L |