Author of the publication

Malicious Package Detection in NPM and PyPI using a Single Model of Malicious Behavior Sequence.

, , , , , and . CoRR, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Application of Dual Bilinear Interpolation Fuzzy Algorithm in Fan Speed Control., , , , , and . BIC-TA, volume 212 of Advances in Intelligent Systems and Computing, page 957-963. Springer, (2013)Understanding the Complexity and Its Impact on Testing in ML-Enabled Systems., , , , , and . CoRR, (2023)Designing a high-speed light emitting diode driver circuit for visible light communications., , , and . Int. J. Embed. Syst., 14 (1): 19-26 (2021)An Empirical Study of Usages, Updates and Risks of Third-Party Libraries in Java Projects., , , , , , , and . ICSME, page 35-45. IEEE, (2020)Enhancing Field Tracking and Interprocedural Analysis to Find More Null Pointer Exceptions., , , , , , and . SANER, page 849-859. IEEE, (2024)An Adaptive State of Charge Estimation Method of Lithium-ion Battery Based on Residual Constraint Fading Factor Unscented Kalman Filter., , , , and . IEEE Access, (2022)Malicious Package Detection in NPM and PyPI using a Single Model of Malicious Behavior Sequence., , , , , and . CoRR, (2023)Demystifying Dependency Bugs in Deep Learning Stack., , , , , and . CoRR, (2022)Characterizing usages, updates and risks of third-party libraries in Java projects., , , , , , , and . Empir. Softw. Eng., 27 (4): 90 (2022)How and Why LLMs Use Deprecated APIs in Code Completion? An Empirical Study., , , , , , and . CoRR, (2024)