Author of the publication

Good-looking but Lacking Faithfulness: Understanding Local Explanation Methods through Trend-based Testing.

, , , , and . CCS, page 431-445. ACM, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

SEPAL: Towards a Large-scale Analysis of SEAndroid Policy Customization., , , , , , , , , and 2 other author(s). WWW, page 2733-2744. ACM / IW3C2, (2021)FMDiv: Functional Module Division on Binary Malware for Accurate Malicious Code Localization., , , , , , and . CSCWD, page 947-952. IEEE, (2023)Contextual Weisfeiler-Lehman graph kernel for malware detection., , , , and . IJCNN, page 4701-4708. IEEE, (2016)MobiDroid: A Performance-Sensitive Malware Detection System on Mobile Platform., , , , , , and . ICECCS, page 61-70. IEEE, (2019)DataElixir: Purifying Poisoned Dataset to Mitigate Backdoor Attacks via Diffusion Models., , , , , and . AAAI, page 21850-21858. AAAI Press, (2024)Semantic modelling of Android malware for effective malware comprehension, detection, and classification., , , , , and . ISSTA, page 306-317. ACM, (2016)TraceDroid: A Robust Network Traffic Analysis Framework for Privacy Leakage in Android Apps., , , , , , , and . SciSec, volume 13580 of Lecture Notes in Computer Science, page 541-556. Springer, (2022)RoLMA: A Practical Adversarial Attack Against Deep Learning-Based LPR Systems., , , , and . Inscrypt, volume 12020 of Lecture Notes in Computer Science, page 101-117. Springer, (2019)GraphSearchNet: Enhancing GNNs via Capturing Global Dependencies for Semantic Code Search., , , , , and . IEEE Trans. Software Eng., 49 (4): 2839-2855 (April 2023)Detecting API Missing-Check Bugs Through Complete Cross Checking of Erroneous Returns., , , , and . Inscrypt, volume 13837 of Lecture Notes in Computer Science, page 391-407. Springer, (2022)