VulCNN: An Image-inspired Scalable Vulnerability Detection System Y Wu, D Zou, S Dou, W Yang, D Xu, H Jin 44th International Conference on Software Engineering (ICSE), 2022 | 93 | 2022 |
SCDetector: software functional clone detection based on semantic tokens analysis Y Wu, D Zou, S Dou, S Yang, W Yang, F Cheng, H Liang, H Jin 35th IEEE/ACM International Conference on Automated Software Engineering …, 2020 | 60 | 2020 |
Malscan: Fast market-wide mobile malware scanning by social-network centrality analysis Y Wu, X Li, D Zou, W Yang, X Zhang, H Jin 34th IEEE/ACM International Conference on Automated Software Engineering …, 2019 | 51 | 2019 |
IntDroid: Android malware detection based on API intimacy analysis D Zou, Y Wu, S Yang, A Chauhan, W Yang, J Zhong, S Dou, H Jin ACM Transactions on Software Engineering and Methodology (TOSEM) 30 (3), 1-32, 2021 | 41 | 2021 |
Contrastive Learning for Robust Android Malware Familial Classification Y Wu, S Dou, D Zou, W Yang, W Qiang, H Jin IEEE Transactions on Dependable and Secure Computing, 2022 | 33* | 2022 |
A multigranularity forensics and analysis method on privacy leakage in cloud environment D Zou, J Zhao, W Li, Y Wu, W Qiang, H Jin, Y Wu, Y Yang IEEE Internet of Things Journal 6 (2), 1484-1494, 2018 | 27 | 2018 |
HomDroid: detecting Android covert malware by social-network homophily analysis Y Wu, D Zou, W Yang, X Li, H Jin 30th ACM SIGSOFT International Symposium on Software Testing and Analysis …, 2021 | 23 | 2021 |
TreeCen: Building Tree Graph for Scalable Semantic Code Clone Detection Y Hu, D Zou, J Peng, Y Wu, J Shan, H Jin 37th IEEE/ACM International Conference on Automated Software Engineering (ASE), 2022 | 21 | 2022 |
Towards understanding the capability of large language models on code clone detection: a survey S Dou, J Shan, H Jia, W Deng, Z Xi, W He, Y Wu, T Gui, Y Liu, X Huang arXiv preprint arXiv:2308.01191, 2023 | 20* | 2023 |
mvulpreter: A multi-granularity vulnerability detection system with interpretations D Zou, Y Hu, W Li, Y Wu, H Zhao, H Jin IEEE Transactions on Dependable and Secure Computing, 2022 | 18 | 2022 |
Detecting Semantic Code Clones by Building AST-based Markov Chains Model Y Wu, S Feng, D Zou, H Jin 37th IEEE/ACM International Conference on Automated Software Engineering (ASE), 2022 | 16 | 2022 |
Interpreters for GNN-Based Vulnerability Detection: Are We There Yet? Y Hu, S Wang, W Li, J Peng, Y Wu, D Zou, H Jin 32nd International Symposium on Software Testing and Analysis (ISSTA), 2023 | 12 | 2023 |
Fine-Grained Code Clone Detection with Block-Based Splitting of Abstract Syntax Tree T Hu, Z Xu, Y Fang, Y Wu, B Yuan, D Zou, H Jin 32nd International Symposium on Software Testing and Analysis (ISSTA), 2023 | 10 | 2023 |
Subnetwork-lossless robust watermarking for hostile theft attacks in deep transfer learning models J Jia, Y Wu, A Li, S Ma, Y Liu IEEE transactions on dependable and secure computing, 2022 | 9 | 2022 |
OSSFP: Precise and Scalable C/C++ Third-Party Library Detection using Fingerprinting Functions J Wu, Z Xu, W Tang, L Zhang, Y Wu, C Liu, K Sun, L Zhao, Y Liu 45th International Conference on Software Engineering (ICSE), 2023 | 8 | 2023 |
Comparison and Evaluation of Clone Detection Techniques with Different Code Representations Y Wang, Y Ye, Y Wu, W Zhang, Y Xue, Y Liu 45th International Conference on Software Engineering (ICSE), 2023 | 7 | 2023 |
Decorrelate irrelevant, purify relevant: Overcome textual spurious correlations from a feature perspective S Dou, R Zheng, T Wu, S Gao, J Shan, Q Zhang, Y Wu, X Huang arXiv preprint arXiv:2202.08048, 2022 | 7 | 2022 |
PonziGuard: Detecting Ponzi Schemes on Ethereum with Contract Runtime Behavior Graph (CRBG) R Liang, J Chen, K He, Y Wu, G Deng, R Du, C Wu 2024 46th International Conference on Software Engineering (ICSE), 755-766, 2023 | 6 | 2023 |
A Comprehensive Study of Learning-based Android Malware Detectors under Challenging Environments C Gao, G Huang, H Li, B Wu, Y Wu, W Yuan 2024 46th International Conference on Software Engineering (ICSE), 104-116, 2023 | 5 | 2023 |
An Empirical Study on the Effects of Obfuscation on Static Machine Learning-based Malicious JavaScript Detectors K Ren, W Qiang, Y Wu, Y Zhou, D Zou, H Jin 32nd International Symposium on Software Testing and Analysis (ISSTA), 2023 | 5 | 2023 |