Showing results 34 to 53 of 86
< previous
next >
Issue Date | Title | Author(s) |
2019-01-01 | Familial Clustering For Weakly-labeled Android Malware Using Hybrid Representation Learning | Zhang, Y; Sui, Y; Pan, S; Zheng, Z; Ning, B; Tsang, I; Zhou, W |
2019-01-01 | Fast and Precise Handling of Positive Weight Cycles for Field-Sensitive Pointer Analysis | Lei, Y; Sui, Y |
2020-10-01 | Fault triggers in the tensorflow framework: An experience report | Du, X; Xiao, G; Sui, Y |
2020 | FCCA: Hybrid Code Representation for Functional Clone Detection Using Attention Networks | Hua, W; Sui, Y; Wan, Y; Liu, G; Xu, G |
2021-01-01 | Fix-Filter-Fix: Intuitively Connect Any Models for Effective Bug Fixing | Hong, H; Zhang, J; Zhang, Y; Wan, Y; Sui, Y |
2020-11-01 | Flow-sensitive type-based heap cloning | Barbar, M; Sui, Y; Chen, S |
2020-11-13 | Flow2Vec: Value-flow-based precise code embedding | Sui, Y; Cheng, X; Zhang, G; Wang, H |
2021-01-01 | Hash Consed Points-To Sets | Barbar, M; Sui, Y |
2020-10-01 | HINDBR: Heterogeneous information network based duplicate bug report prediction | Xiao, G; Du, X; Sui, Y; Yue, T |
2022-01-01 | How About Bug-Triggering Paths? - Understanding and Characterizing Learning-Based Vulnerability Detectors | Cheng, X; Nie, X; Li, N; Wang, H; Zheng, Z; Sui, Y |
2017-01-01 | Incremental analysis for probabilistic programs | Zhang, J; Sui, Y; Xue, J; Ranzato, F |
2019-09-01 | Interactive Traceability Links Visualization using Hierarchical Trace Map | Aung, TWW; Huo, H; Sui, Y |
2015-05-07 | Investigation of a tubular dual-stator flux-switching permanent-magnet linear generator for free-piston energy converter | Sui, Y; Zheng, P; Tong, C; Yu, B; Zhu, S; Zhu, J |
2018-01-01 | Launch-Mode-Aware Context-Sensitive Activity Transition Analysis | Zhang, Y; Sui, Y; Xue, J |
2018-01-01 | Live path CFI against control flow hijacking attacks | Barbar, M; Sui, Y; Zhang, H; Chen, S; Xue, J |
2018-02-01 | Loop-Oriented pointer analysis for automatic SIMD vectorization | Sui, Y; Fan, X; Zhou, H; Xue, J |
2017-12-04 | Machine-learning-guided typestate analysis for static use-After-free detection | Yan, H; Sui, Y; Chen, S; Xue, J |
2022-09-19 | MalWhiteout: Reducing Label Errors in Android Malware Detection | Wang, L; Wang, H; Luo, X; Sui, Y |
2018-04-01 | Managing high-performance computing applications as an on-demand service on federated clouds | Hou, Z; Wang, Y; Sui, Y; Gu, J; Zhao, T; Zhou, X |
2019-11 | Multi-modal Attention Network Learning for Semantic Source Code Retrieval | Wan, Y; Shu, J; Sui, Y; Xu, G; Zhao, Z; Wu, J; Yu, P |