Author of the publication

A Comprehensive Study of Learning-based Android Malware Detectors under Challenging Environments.

, , , , , and . ICSE, page 12:1-12:13. ACM, (2024)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Vulseye: Detect Smart Contract Vulnerabilities via Stateful Directed Graybox Fuzzing., , , , , , , , and . CoRR, (2024)Code2Img: Tree-Based Image Transformation for Scalable Code Clone Detection., , , , , , and . IEEE Trans. Software Eng., 49 (9): 4429-4442 (September 2023)Historical Embedding-Guided Efficient Large-Scale Federated Graph Learning., , , , , , , and . Proc. ACM Manag. Data, 2 (3): 144 (2024)Web-based virtual operating of CNC milling machine tools., and . Comput. Ind., 60 (9): 686-697 (2009)Gitor: Scalable Code Clone Detection by Building Global Sample Graph., , , , and . ESEC/SIGSOFT FSE, page 784-795. ACM, (2023)Interpreters for GNN-Based Vulnerability Detection: Are We There Yet?, , , , , , and . ISSTA, page 1407-1419. ACM, (2023)A Comprehensive Study of Learning-based Android Malware Detectors under Challenging Environments., , , , , and . ICSE, page 12:1-12:13. ACM, (2024)SCDetector: Software Functional Clone Detection Based on Semantic Tokens Analysis., , , , , , , and . ASE, page 821-833. IEEE, (2020)MalScan: Fast Market-Wide Mobile Malware Scanning by Social-Network Centrality Analysis., , , , , and . ASE, page 139-150. IEEE, (2019)Automatic 3D point cloud registration algorithm based on triangle similarity ratio consistency., , , , and . IET Image Process., 14 (14): 3314-3323 (2020)