Follow
Yueming Wu
Title
Cited by
Cited by
Year
VulCNN: An Image-inspired Scalable Vulnerability Detection System
Y Wu, D Zou, S Dou, W Yang, D Xu, H Jin
44th International Conference on Software Engineering (ICSE), 2022
662022
SCDetector: software functional clone detection based on semantic tokens analysis
Y Wu, D Zou, S Dou, S Yang, W Yang, F Cheng, H Liang, H Jin
35th IEEE/ACM International Conference on Automated Software Engineering …, 2020
542020
Malscan: Fast market-wide mobile malware scanning by social-network centrality analysis
Y Wu, X Li, D Zou, W Yang, X Zhang, H Jin
34th IEEE/ACM International Conference on Automated Software Engineering …, 2019
452019
IntDroid: Android malware detection based on API intimacy analysis
D Zou, Y Wu, S Yang, A Chauhan, W Yang, J Zhong, S Dou, H Jin
ACM Transactions on Software Engineering and Methodology (TOSEM) 30 (3), 1-32, 2021
352021
Contrastive Learning for Robust Android Malware Familial Classification
Y Wu, S Dou, D Zou, W Yang, W Qiang, H Jin
IEEE Transactions on Dependable and Secure Computing, 2022
26*2022
A multigranularity forensics and analysis method on privacy leakage in cloud environment
D Zou, J Zhao, W Li, Y Wu, W Qiang, H Jin, Y Wu, Y Yang
IEEE Internet of Things Journal 6 (2), 1484-1494, 2018
252018
HomDroid: detecting Android covert malware by social-network homophily analysis
Y Wu, D Zou, W Yang, X Li, H Jin
30th ACM SIGSOFT International Symposium on Software Testing and Analysis …, 2021
202021
TreeCen: Building Tree Graph for Scalable Semantic Code Clone Detection
Y Hu, D Zou, J Peng, Y Wu, J Shan, H Jin
37th IEEE/ACM International Conference on Automated Software Engineering (ASE), 2022
152022
mvulpreter: A multi-granularity vulnerability detection system with interpretations
D Zou, Y Hu, W Li, Y Wu, H Zhao, H Jin
IEEE Transactions on Dependable and Secure Computing, 2022
152022
Detecting Semantic Code Clones by Building AST-based Markov Chains Model
Y Wu, S Feng, D Zou, H Jin
37th IEEE/ACM International Conference on Automated Software Engineering (ASE), 2022
142022
Interpreters for GNN-Based Vulnerability Detection: Are We There Yet?
Y Hu, S Wang, W Li, J Peng, Y Wu, D Zou, H Jin
32nd International Symposium on Software Testing and Analysis (ISSTA), 2023
92023
Subnetwork-lossless robust watermarking for hostile theft attacks in deep transfer learning models
J Jia, Y Wu, A Li, S Ma, Y Liu
IEEE transactions on dependable and secure computing, 2022
82022
OSSFP: Precise and Scalable C/C++ Third-Party Library Detection using Fingerprinting Functions
J Wu, Z Xu, W Tang, L Zhang, Y Wu, C Liu, K Sun, L Zhao, Y Liu
45th International Conference on Software Engineering (ICSE), 2023
62023
Comparison and Evaluation of Clone Detection Techniques with Different Code Representations
Y Wang, Y Ye, Y Wu, W Zhang, Y Xue, Y Liu
45th International Conference on Software Engineering (ICSE), 2023
62023
Decorrelate irrelevant, purify relevant: Overcome textual spurious correlations from a feature perspective
S Dou, R Zheng, T Wu, S Gao, J Shan, Q Zhang, Y Wu, X Huang
arXiv preprint arXiv:2202.08048, 2022
62022
Towards understanding the capability of large language models on code clone detection: a survey
S Dou, J Shan, H Jia, W Deng, Z Xi, W He, Y Wu, T Gui, Y Liu, X Huang
arXiv preprint arXiv:2308.01191, 2023
52023
An Empirical Study on the Effects of Obfuscation on Static Machine Learning-based Malicious JavaScript Detectors
K Ren, W Qiang, Y Wu, Y Zhou, D Zou, H Jin
32nd International Symposium on Software Testing and Analysis (ISSTA), 2023
42023
Fine-Grained Code Clone Detection with Block-Based Splitting of Abstract Syntax Tree
T Hu, Z Xu, Y Fang, Y Wu, B Yuan, D Zou, H Jin
32nd International Symposium on Software Testing and Analysis (ISSTA), 2023
42023
Code2Img: Tree-Based Image Transformation for Scalable Code Clone Detection
Y Hu, Y Fang, Y Sun, Y Jia, Y Wu, D Zou, H Jin
IEEE Transactions on Software Engineering, 2023
32023
Enhancing Deep Learning-based Vulnerability Detection by Building Behavior Graph Model
B Yuan, Y Lu, Y Fang, Y Wu, D Zou, Z Li, Z Li, H Jin
45th International Conference on Software Engineering (ICSE), 2023
32023
The system can't perform the operation now. Try again later.
Articles 1–20