Issue Date | Title | Author(s) |
2022-01-01 | Cross-Language Binary-Source Code Matching with Intermediate Representations | Gui, Y; Wan, Y; Zhang, H; Huang, H; Sui, Y; Xu, G; Shao, Z; Jin, H |
2016-12-01 | Link State Prediction-Based Reliable Transmission for High-Speed Railway Networks | Zhang, H; Quan, W; Song, J; Jiang, Z; Yu, S |
2022-11-07 | You see what I want you to see: poisoning vulnerabilities in neural code search | Wan, Y; Zhang, S; Zhang, H; Sui, Y; Xu, G; Yao, D; Jin, H; Sun, L |
2020-10-05 | Perf-AL: Performance prediction for configurable software through adversarial learning | Shu, Y; Sui, Y; Zhang, H; Xu, G |
2020-01-01 | Editorial: IEEE access special section editorial: Artificial intelligence in cybersecurity | Chen, CY; Quan, W; Cheng, N; Yu, S; Lee, JH; Perez, GM; Zhang, H; Shieh, S |
2020-01-01 | Motion-Excited Sampler: Video Adversarial Attack with Sparked Prior | Zhang, H; Zhu, L; Zhu, Y; Yang, Y |
2022-01-01 | What Do They Capture? - A Structural Analysis of Pre-Trained Language Models for Source Code | Wan, Y; Zhao, W; Zhang, H; Sui, Y; Xu, G; Jin, H |
2022-12-05 | ET-HF: A novel information sharing model to improve multi-agent cooperation | Xie, S; Zhang, H; Yu, H; Li, Y; Zhang, Z; Luo, X |
2023-12-15 | Computation Placement Orchestrator for Mobile-Edge Computing in Heterogeneous Vehicular Networks | Wang, L; Deng, X; Gui, J; Zhang, H; Yu, S |
2023-02-01 | Overlay Cognitive ABCom-NOMA-Based ITS: An In-Depth Secrecy Analysis | Zheng, Y; Li, X; Zhang, H; Alshehri, MD; Dang, S; Huang, G; Zhang, C |