Issue Date | Title | Author(s) |
2022-01-01 | How About Bug-Triggering Paths? - Understanding and Characterizing Learning-Based Vulnerability Detectors | Cheng, X; Nie, X; Li, N; Wang, H; Zheng, Z; Sui, Y |
2018-01-01 | Live path CFI against control flow hijacking attacks | Barbar, M; Sui, Y; Zhang, H; Chen, S; Xue, J |
- | Dynamic Transitive Closure-Based Static Analysis through the Lens of Quantum Search | Ren, J; Sui, Y; Cheng, X; Feng, Y; Zhao, J |
2023-11-01 | A Tale of Two Cities: Data and Configuration Variances in Robust Deep Learning | Zhang, G; Sun, J; Xu, F; Sui, Y; Bandara, HMND; Chen, S; Menzies, T |
2023-05-01 | Challenging Machine Learning-Based Clone Detectors via Semantic-Preserving Code Transformations | Zhang, W; Guo, S; Zhang, H; Sui, Y; Xue, Y; Xu, Y |
2023-10-16 | A Container-Usage-Pattern-Based Context Debloating Approach for Object-Sensitive Pointer Analysis | He, D; Gui, Y; Li, W; Tao, Y; Zou, C; Sui, Y; Xue, J |
2023-11-30 | Compatibility Issues in Deep Learning Systems: Problems and Opportunities | Wang, J; Xiao, G; Zhang, S; Lei, H; Liu, Y; Sui, Y |
2023-11-04 | RNNtcs: A test case selection method for Recurrent Neural Networks | Wu, X; Shen, J; Zheng, W; Lin, L; Sui, Y; Semasaba, AOA |
2023-06-06 | Recursive State Machine Guided Graph Folding for Context-Free Language Reachability | Lei, Y; Sui, Y; Tan, SH; Zhang, Q |
2023-01-01 | A Hybrid Alias Analysis and Its Application to Global Variable Protection in the Linux Kernel | Li, G; Zhang, H; Zhou, J; Shen, W; Sui, Y; Qian, Z |