Author of the publication

VulANalyzeR: Explainable Binary Vulnerability Detection with Multi-task Learning and Attentional Graph Convolution.

, , , , , , , and . ACM Trans. Priv. Secur., 26 (3): 28:1-28:25 (August 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Enriching SE Ontologies with Bug Quality., , and . Semantic Web Enabled Software Engineering, volume 17 of Studies on the Semantic Web, IOS Press, (2014)I-MAD: Interpretable malware detector using Galaxy Transformer., , , and . Comput. Secur., (2021)Quality Validation through Pattern Detection - A Semantic Web Perspective., , , and . COMPSAC, page 251-252. IEEE Computer Society, (2011)VulANalyzeR: Explainable Binary Vulnerability Detection with Multi-task Learning and Attentional Graph Convolution., , , , , , , and . ACM Trans. Priv. Secur., 26 (3): 28:1-28:25 (August 2023)DyAdvDefender: An instance-based online machine learning model for perturbation-trial-based black-box adversarial defense., , and . Inf. Sci., (2022)A Contextual Guidance Approach to Software Security., , , and . COMPSAC (2), page 194-199. IEEE Computer Society, (2009)978-0-7695-3726-9.GenTAL: Generative Denoising Skip-gram Transformer for Unsupervised Binary Code Similarity Detection., , and . IJCNN, page 1-8. IEEE, (2023)Dynamic Neural Control Flow Execution: An Agent-Based Deep Equilibrium Approach for Binary Vulnerability Detection., , , , and . CoRR, (2024)JARV1S: Phenotype Clone Search for Rapid Zero-Day Malware Triage and Functional Decomposition for Cyber Threat Intelligence., , , and . CyCom, page 385-403. IEEE, (2022)Software Visualization - A Process Perspective., , , and . VISSOFT, page 10-17. IEEE Computer Society, (2007)