Author of the publication

iTrustSO: an intelligent system for automatic detection of insecure code snippets in stack overflow.

, , , , , and . ASONAM, page 1097-1104. ACM, (2019)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Adversary for Social Good: Leveraging Adversarial Attacks to Protect Personal Attribute Privacy., , and . ACM Trans. Knowl. Discov. Data, 18 (2): 46:1-46:24 (February 2024)Watermarking-based Defense against Adversarial Attacks on Deep Neural Networks., , , , and . IJCNN, page 1-8. IEEE, (2021)iTrustSO: an intelligent system for automatic detection of insecure code snippets in stack overflow., , , , , and . ASONAM, page 1097-1104. ACM, (2019)Adversarially Reprogramming Pretrained Neural Networks for Data-limited and Cost-efficient Malware Detection., , and . SDM, page 693-701. SIAM, (2022)Code Execution Capability as a Metric for Machine Learning-Assisted Software Vulnerability Detection Models., , and . TrustCom, page 1606-1613. IEEE, (2023)Automatic Detection of Helmet Uses for Construction Safety., , , , , , and . WI Workshops, page 135-142. IEEE Computer Society, (2016)AiDroid: When Heterogeneous Information Network Marries Deep Neural Network for Real-time Android Malware Detection., , , , , , , and . CoRR, (2018)Distilling Knowledge on Text Graph for Social Media Attribute Inference., , , and . SIGIR, page 2024-2028. ACM, (2022)SecMD: Make Machine Learning More Secure Against Adversarial Malware Attacks., and . Australasian Conference on Artificial Intelligence, volume 10400 of Lecture Notes in Computer Science, page 76-89. Springer, (2017)Plagiarism Detection of Multi-threaded Programs using Frequent Behavioral Pattern Mining., , , and . SEKE, page 293-298. KSI Research Inc., (2020)