Author of the publication

Demystifying the Vulnerability Propagation and Its Evolution via Dependency Trees in the NPM Ecosystem.

, , , , , and . ICSE, page 672-684. ACM, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Why an Android App is Classified as Malware? Towards Malware Classification Interpretation., , , , , , and . CoRR, (2020)Towards Efficient Data-Flow Test Data Generation., , , , , , and . Theories of Programming and Formal Methods, volume 14080 of Lecture Notes in Computer Science, page 257-293. Springer, (2023)Decentralized control of power systems using-disturbance accommodation techniques., , and . ACC, page 799-804. IEEE, (2001)Automated Third-Party Library Detection for Android Applications: Are We There Yet?, , , , , , , , and . ASE, page 919-930. IEEE, (2020)Mitigating Persistence of Open-Source Vulnerabilities in Maven Ecosystem., , , , , , , and . ASE, page 191-203. IEEE, (2023)Compatibility Issue Detection for Android Apps Based on Path-Sensitive Semantic Analysis., , , , , and . ICSE, page 257-269. IEEE, (2023)StoryDroid: automated generation of storyboard for Android apps., , , , , , and . ICSE, page 596-607. IEEE / ACM, (2019)IconChecker: Anomaly Detection of Icon-Behaviors for Android Apps., , , , , and . APSEC, page 202-212. IEEE, (2021)Mechanism Analysis of Wind Turbine Var Oscillations., , and . IEEE Trans. Ind. Electron., 70 (10): 10750-10754 (October 2023)Data-Driven Distributed Information-Weighted Consensus Filtering in Discrete-Time Sensor Networks With Switching Topologies., , , , , and . IEEE Trans. Cybern., 53 (12): 7548-7559 (December 2023)