Showing results 1 to 20 of 64
next >
Issue Date | Title | Author(s) |
2021-12-01 | A Comparative Study of Class Rebalancing Methods for Security Bug Report Classification | Zheng, W; Xun, Y; Wu, X; Deng, Z; Chen, X; Sui, Y |
2020-07-13 | A literature review of automatic traceability links recovery for software change impact analysis | Aung, TWW; Huo, H; Sui, Y |
2020-07-13 | A literature review of automatic traceability links recovery for software change impact analysis | Aung, TWW; Huo, H; Sui, Y |
2021-06-01 | A survey of Intel SGX and its applications | Zheng, W; Wu, Y; Wu, X; Feng, C; Sui, Y; Luo, X; Zhou, Y |
2022-01-01 | A Systematical Study on Application Performance Management Libraries for Apps | Tang, Y; Wang, H; Zhan, X; Luo, X; Zhou, Y; Zhou, H; Yan, Q; Sui, Y; Keung, JW |
2016-03-12 | Accelerating dynamic data race detection using static thread interference analysis | Di, P; Sui, Y |
2020-11-08 | All your app links are belong to us: Understanding the threats of instant apps based attacks | Tang, Y; Sui, Y; Wang, H; Luo, X; Zhou, H; Xu, Z |
2021-03-01 | An Empirical Study of Code Deobfuscations on Detecting Obfuscated Android Piggybacked Apps | Zhang, Y; Xiao, G; Zheng, Z; Zhu, T; Tsang, IW; Sui, Y |
2022-01-01 | An Empirical Study of Fault Triggers in Deep Learning Frameworks | Du, X; Sui, Y; Liu, Z; Ai, J |
2021-08-18 | An exploratory study of autopilot software bugs in unmanned aerial vehicles | Wang, D; Li, S; Xiao, G; Liu, Y; Sui, Y |
2020-10-01 | An exploratory study of bugs in extended reality applications on the web | Li, S; Wu, Y; Liu, Y; Wang, D; Wen, M; Tao, Y; Sui, Y; Liu, Y |
2021-06-12 | Beyond the virus: a first look at coronavirus-themed Android malware | Wang, L; He, R; Wang, H; Xia, P; Li, Y; Wu, L; Zhou, Y; Luo, X; Sui, Y; Guo, Y; Xu, G |
2017-07-10 | Boosting the precision of virtual call integrity protection with partial pointer analysis for C++ | Fan, X; Sui, Y; Liao, X; Xue, J |
2020-06-27 | Clairvoyance: Cross-contract static analysis for detecting practical reentrancy vulnerabilities in smart contracts | Ye, J; Ma, M; Lin, Y; Sui, Y; Xue, Y |
2018-05-28 | CoBOT: Static C/C++ bug detection in the presence of incomplete code | Gao, Q; Ma, S; Shao, S; Sui, Y; Zhao, G; Ma, L; Ma, X; Duan, F; Deng, X; Zhang, S; Chen, X |
2021-10-01 | Compacting points-to sets through object clustering | Barbar, M; Sui, Y |
2020-09-01 | Cross-Contract Static Analysis for Detecting Practical Reentrancy Vulnerabilities in Smart Contracts | Xue, Y; Ma, M; Lin, Y; Sui, Y; Ye, J; Peng, T |
2021-05-01 | DeepWukong: Statically Detecting Software Vulnerabilities Using Deep Graph Neural Network | Cheng, X; Wang, H; Hua, J; Xu, G; Sui, Y |
- | Demand-Driven Pointer Analysis with Strong Updates via Value-Flow Refinement | Sui, Y; Xue, J |
2021-01-01 | Disentangled Code Representation Learning for Multiple Programming Languages | Zhang, J; Hong, H; Zhang, Y; Wan, Y; Liu, Y; Sui, Y |