Author of the publication

A Needle is an Outlier in a Haystack: Hunting Malicious PyPI Packages with Code Clustering.

, , , , and . ASE, page 307-318. IEEE, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

C2Detector: a covert channel detection framework in cloud computing., , , , , and . Secur. Commun. Networks, 7 (3): 544-557 (2014)机器学习算法在中医诊疗中的研究综述 (Review of Machine Learning Algorithms in Traditional Chinese Medicine)., , , , , , and . 计算机科学, 45 (11A): 32-36 (2018)Robust and Efficient Covert Channel Communications in Operating Systems: Design, Implementation and Evaluation., , , , and . SERE (Companion), page 45-52. IEEE, (2013)Identification and Evaluation of Sharing Memory Covert Timing Channel in Xen Virtual Machines., , , and . IEEE CLOUD, page 283-291. IEEE Computer Society, (2011)MultiCode: A Unified Code Analysis Framework based on Multi-type and Multi-granularity Semantic Learning., , , , , and . ISSRE Workshops, page 359-364. IEEE, (2021)PassEye: Sniffing Your Password from HTTP Sessions by Deep Neural Network., , , , , , and . CNCERT, volume 1299 of Communications in Computer and Information Science, page 3-15. Springer, (2020)Label Inference Attacks Against Vertical Federated Learning., , , , , , , , and . USENIX Security Symposium, page 1397-1414. USENIX Association, (2022)POSTER: PatchGen: Towards Automated Patch Detection and Generation for 1-Day Vulnerabilities., , , , , and . ACM Conference on Computer and Communications Security, page 1656-1658. ACM, (2015)Solving linear optimization over arithmetic constraint formula., , , , , , , and . J. Glob. Optim., 69 (1): 69-102 (2017)A Large-Scale Empirical Study on the Vulnerability of Deployed IoT Devices., , , , , , , , and . IEEE Trans. Dependable Secur. Comput., 19 (3): 1826-1840 (2022)