Showing results 57 to 76 of 86
< previous
next >
Issue Date | Title | Author(s) |
2022-05-24 | NaturalCC: An Open-Source Toolkit for Code Intelligence | Wan, Y; He, Y; Bi, Z; Zhang, J; Sui, Y; Zhang, H; Hashimoto, K; Jin, H; Xu, G; Xiong, C; Yu, PS |
2022-01-01 | New challenges in reinforcement learning: a survey of security and privacy | Lei, Y; Ye, D; Shen, S; Sui, Y; Zhu, T; Zhou, W |
2021-10-28 | Nondeterministic Impact of CPU Multithreading on Training Deep Learning Systems | Xiao, G; Liu, J; Zheng, Z; Sui, Y |
2015-05-07 | A novel five-phase fault-tolerant modular in-wheel permanent-magnet synchronous machine for electric vehicles | Sui, Y; Zheng, P; Wu, F; Wang, P; Cheng, L; Zhu, J |
2021-02-27 | Object Versioning for Flow-Sensitive Pointer Analysis | Barbar, M; Sui, Y; Chen, S |
2018-12-01 | Parallel construction of interprocedural memory SSA form | Sui, Y; Yan, H; Zheng, Z; Zhang, Y; Xue, J |
2022-02-28 | Path-Sensitive and Alias-Aware Typestate Analysis for Detecting OS Bugs | Li, T; Bai, JJ; Sui, Y; Hu, SM |
2022-07-18 | Path-sensitive code embedding via contrastive learning for software vulnerability detection | Cheng, X; Zhang, G; Wang, H; Sui, Y |
2020-11-08 | PCA: Memory leak detection using partial call-path analysis | Li, W; Cai, H; Sui, Y; Manz, D |
2019-01-01 | Per-Dereference Verification of Temporal Heap Safety via Adaptive Context-Sensitive Analysis | Yan, H; Chen, S; Sui, Y; Zhang, Y; Zou, C; Xue, J |
2020-10-05 | Perf-AL: Performance prediction for configurable software through adversarial learning | Shu, Y; Sui, Y; Zhang, H; Xu, G |
2018-09-05 | Permission Analysis of Health and Fitness Apps in IoT Programming Frameworks | Nobakht, M; Sui, Y; Seneviratne, A; Hu, W |
2020-02-15 | PGFIT: Static permission analysis of health and fitness apps in IoT programming frameworks | Nobakht, M; Sui, Y; Seneviratne, A; Hu, W |
2018-05-27 | POSTER: Live path control flow integrity | Barbar, M; Sui, Y; Zhang, H; Chen, S; Xue, J |
2019-04-01 | Precise static happens-before analysis for detecting UAF order violations in android | Wu, D; Liu, J; Sui, Y; Chen, S; Xue, J |
2020 | Reinforcement-Learning-Guided Source Code Summarization via Hierarchical Attention | Wang, W; Zhang, Y; Sui, Y; Wan, Y; Zhao, Z; Wu, J; Yu, P; Xu, G |
2023-11-04 | RNNtcs: A test case selection method for Recurrent Neural Networks | Wu, X; Shen, J; Zheng, W; Lin, L; Sui, Y; Semasaba, AOA |
2021-07-11 | Runtime detection of memory errors with smart status | Chen, Z; Wang, C; Yan, J; Sui, Y; Xue, J |
2020-01-01 | Secure Metric Learning via Differential Pairwise Privacy | Li, J; Pan, Y; Sui, Y; Tsang, IW |
2018-01-01 | Spatio-Temporal Context Reduction: A Pointer-Analysis-Based Static Approach for Detecting Use-After-Free Vulnerabilities | Yan, H; Sui, Y; Chen, S; Xue, J |