Browsing byAuthorSui, Y

Jump to: 0-9 A B C D E F G H I J K L M N O P Q R S T U V W X Y Z
or enter first few letters:  
Showing results 57 to 76 of 86< previous   next >
Issue DateTitleAuthor(s)
2022-05-24NaturalCC: An Open-Source Toolkit for Code IntelligenceWan, Y; He, Y; Bi, Z; Zhang, J; Sui, Y; Zhang, H; Hashimoto, K; Jin, H; Xu, G; Xiong, C; Yu, PS
2022-01-01New challenges in reinforcement learning: a survey of security and privacyLei, Y; Ye, D; Shen, S; Sui, Y; Zhu, T; Zhou, W
2021-10-28Nondeterministic Impact of CPU Multithreading on Training Deep Learning SystemsXiao, G; Liu, J; Zheng, Z; Sui, Y
2015-05-07A novel five-phase fault-tolerant modular in-wheel permanent-magnet synchronous machine for electric vehiclesSui, Y; Zheng, P; Wu, F; Wang, P; Cheng, L; Zhu, J
2021-02-27Object Versioning for Flow-Sensitive Pointer AnalysisBarbar, M; Sui, Y; Chen, S
2018-12-01Parallel construction of interprocedural memory SSA formSui, Y; Yan, H; Zheng, Z; Zhang, Y; Xue, J
2022-02-28Path-Sensitive and Alias-Aware Typestate Analysis for Detecting OS BugsLi, T; Bai, JJ; Sui, Y; Hu, SM
2022-07-18Path-sensitive code embedding via contrastive learning for software vulnerability detectionCheng, X; Zhang, G; Wang, H; Sui, Y
2020-11-08PCA: Memory leak detection using partial call-path analysisLi, W; Cai, H; Sui, Y; Manz, D
2019-01-01Per-Dereference Verification of Temporal Heap Safety via Adaptive Context-Sensitive AnalysisYan, H; Chen, S; Sui, Y; Zhang, Y; Zou, C; Xue, J
2020-10-05Perf-AL: Performance prediction for configurable software through adversarial learningShu, Y; Sui, Y; Zhang, H; Xu, G
2018-09-05Permission Analysis of Health and Fitness Apps in IoT Programming FrameworksNobakht, M; Sui, Y; Seneviratne, A; Hu, W
2020-02-15PGFIT: Static permission analysis of health and fitness apps in IoT programming frameworksNobakht, M; Sui, Y; Seneviratne, A; Hu, W
2018-05-27POSTER: Live path control flow integrityBarbar, M; Sui, Y; Zhang, H; Chen, S; Xue, J
2019-04-01Precise static happens-before analysis for detecting UAF order violations in androidWu, D; Liu, J; Sui, Y; Chen, S; Xue, J
2020Reinforcement-Learning-Guided Source Code Summarization via Hierarchical AttentionWang, W; Zhang, Y; Sui, Y; Wan, Y; Zhao, Z; Wu, J; Yu, P; Xu, G
2023-11-04RNNtcs: A test case selection method for Recurrent Neural NetworksWu, X; Shen, J; Zheng, W; Lin, L; Sui, Y; Semasaba, AOA
2021-07-11Runtime detection of memory errors with smart statusChen, Z; Wang, C; Yan, J; Sui, Y; Xue, J
2020-01-01Secure Metric Learning via Differential Pairwise PrivacyLi, J; Pan, Y; Sui, Y; Tsang, IW
2018-01-01Spatio-Temporal Context Reduction: A Pointer-Analysis-Based Static Approach for Detecting Use-After-Free VulnerabilitiesYan, H; Sui, Y; Chen, S; Xue, J