Author of the publication

Malicious Package Detection in NPM and PyPI using a Single Model of Malicious Behavior Sequence.

, , , , , and . CoRR, (2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A general approach to enhance the survivability of backdoor attacks by decision path coupling., , , , and . CoRR, (2024)Leopard: identifying vulnerable code for vulnerability assessment through program metrics., , , , , , and . ICSE, page 60-71. IEEE / ACM, (2019)BugMiner: Automating Precise Bug Dataset Construction by Code Evolution History Mining., , , , , , , and . ASE, page 1919-1929. IEEE, (2023)An Empirical Study on Dynamic Typing Related Practices in Python Systems., , , , , and . ICPC, page 83-93. ACM, (2020)Proteus: computing disjunctive loop summary via path dependency analysis., , , , and . SIGSOFT FSE, page 61-72. ACM, (2016)Loopster: static loop termination analysis., , , , , and . ESEC/SIGSOFT FSE, page 84-94. ACM, (2017)Are your sites down? Requirements-driven self-tuning for the survivability of Web systems., , , and . RE, page 219-228. IEEE Computer Society, (2011)Vul-RAG: Enhancing LLM-based Vulnerability Detection via Knowledge-level RAG., , , , , , , , , and . CoRR, (2024)Understanding the Complexity and Its Impact on Testing in ML-Enabled Systems., , , , , and . CoRR, (2023)MVP: Detecting Vulnerabilities using Patch-Enhanced Vulnerability Signatures., , , , , , , , , and 1 other author(s). USENIX Security Symposium, page 1165-1182. USENIX Association, (2020)