Showing results 14 to 33 of 86
< previous
next >
Issue Date | Title | Author(s) |
2021-06-12 | Beyond the virus: a first look at coronavirus-themed Android malware | Wang, L; He, R; Wang, H; Xia, P; Li, Y; Wu, L; Zhou, Y; Luo, X; Sui, Y; Guo, Y; Xu, G |
2017-07-10 | Boosting the precision of virtual call integrity protection with partial pointer analysis for C++ | Fan, X; Sui, Y; Liao, X; Xue, J |
2023-05-01 | Challenging Machine Learning-Based Clone Detectors via Semantic-Preserving Code Transformations | Zhang, W; Guo, S; Zhang, H; Sui, Y; Xue, Y; Xu, Y |
2020-06-27 | Clairvoyance: Cross-contract static analysis for detecting practical reentrancy vulnerabilities in smart contracts | Ye, J; Ma, M; Lin, Y; Sui, Y; Xue, Y |
2018-05-28 | CoBOT: Static C/C++ bug detection in the presence of incomplete code | Gao, Q; Ma, S; Shao, S; Sui, Y; Zhao, G; Ma, L; Ma, X; Duan, F; Deng, X; Zhang, S; Chen, X |
2021-10-01 | Compacting points-to sets through object clustering | Barbar, M; Sui, Y |
2023-11-30 | Compatibility Issues in Deep Learning Systems: Problems and Opportunities | Wang, J; Xiao, G; Zhang, S; Lei, H; Liu, Y; Sui, Y |
2020-09-01 | Cross-Contract Static Analysis for Detecting Practical Reentrancy Vulnerabilities in Smart Contracts | Xue, Y; Ma, M; Lin, Y; Sui, Y; Ye, J; Peng, T |
2022-01-01 | Cross-Language Binary-Source Code Matching with Intermediate Representations | Gui, Y; Wan, Y; Zhang, H; Huang, H; Sui, Y; Xu, G; Shao, Z; Jin, H |
2021-05-01 | DeepWukong: Statically Detecting Software Vulnerabilities Using Deep Graph Neural Network | Cheng, X; Wang, H; Hua, J; Xu, G; Sui, Y |
- | Demand-Driven Pointer Analysis with Strong Updates via Value-Flow Refinement | Sui, Y; Xue, J |
2022-11-07 | Demystifying the underground ecosystem of account registration bots | Gao, Y; Xu, G; Li, L; Luo, X; Wang, C; Sui, Y |
2021-01-01 | Disentangled Code Representation Learning for Multiple Programming Languages | Zhang, J; Hong, H; Zhang, Y; Wan, Y; Liu, Y; Sui, Y |
- | Dynamic Transitive Closure-Based Static Analysis through the Lens of Quantum Search | Ren, J; Sui, Y; Cheng, X; Feng, Y; Zhao, J |
2023-10 | Earning Extra Performance From Restrictive Feedbacks. | Li, J; Pan, Y; Lyu, Y; Yao, Y; Sui, Y; Tsang, IW |
2016-12-01 | Eliminating redundant bounds checks in dynamic buffer overflow detection using weakest preconditions | Sui, Y; Ye, D; Su, Y; Xue, J |
2020 | An Empirical Study of Regression Bug Chains in Linux | Xiao, G; Zheng, Z; Jiang, B; Sui, Y |
2022-01-01 | Enhancing Traceability Link Recovery with Unlabeled Data | Zhu, J; Xiao, G; Zheng, Z; Sui, Y |
2019-08-12 | Event trace reduction for effective bug replay of Android apps via differential GUI state analysis | Sui, Y; Zhang, Y; Zheng, W; Zhang, M; Xue, J |
2023-04-01 | Event-aware precise dynamic slicing for automatic debugging of Android applications | Win, HM; Tan, SH; Sui, Y |