Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

MultiCode: A Unified Code Analysis Framework based on Multi-type and Multi-granularity Semantic Learning., , , , , and . ISSRE Workshops, page 359-364. IEEE, (2021)PassEye: Sniffing Your Password from HTTP Sessions by Deep Neural Network., , , , , , and . CNCERT, volume 1299 of Communications in Computer and Information Science, page 3-15. Springer, (2020)APP-Miner: Detecting API Misuses via Automatically Mining API Path Patterns., , , , , and . SP, page 4034-4052. IEEE, (2024)PACS: Pemission abuse checking system for android applictions based on review mining., , and . DSC, page 251-258. IEEE, (2017)Information Leakage by Model Weights on Federated Learning., , , , , , , and . PPMLP@CCS, page 31-36. ACM, (2020)A Wolf in Sheep's Clothing: Practical Black-box Adversarial Attacks for Evading Learning-based Windows Malware Detection in the Wild., , , , , , , and . CoRR, (2024)Adversarial Attacks against Windows PE Malware Detection: A Survey of the State-of-the-Art., , , , , , , , , and 1 other author(s). CoRR, (2021)RefGaussian: Disentangling Reflections from 3D Gaussian Splatting for Realistic Rendering., , , , , , , and . CoRR, (2024)Automatic Program Repair via Learning Edits on Sequence Code Property Graph., , , , and . ICPADS, page 563-570. IEEE, (2023)MAD-API: Detection, Correction and Explanation of API Misuses in Distributed Android Applications., , , , , and . AIMS, volume 10970 of Lecture Notes in Computer Science, page 123-140. Springer, (2018)