Combining graph-based learning with automated data collection for code vulnerability detection H Wang, G Ye, Z Tang, SH Tan, S Huang, D Fang, Y Feng, L Bian, ... IEEE Transactions on Information Forensics and Security 16, 1943-1958, 2020 | 261 | 2020 |
Deep program structure modeling through multi-relational graph-based learning G Ye, Z Tang, H Wang, D Fang, J Fang, S Huang, Z Wang Proceedings of the ACM International conference on parallel architectures …, 2020 | 36 | 2020 |
Automating reinforcement learning architecture design for code optimization H Wang, Z Tang, C Zhang, J Zhao, C Cummins, H Leather, Z Wang Proceedings of the 31st ACM SIGPLAN International Conference on Compiler …, 2022 | 22 | 2022 |
Detecting code vulnerabilities by learning from large-scale open source repositories R Xu, Z Tang, G Ye, H Wang, X Ke, D Fang, Z Wang Journal of Information Security and Applications 69, 103293, 2022 | 8 | 2022 |
Leveraging WebAssembly for numerical JavaScript code virtualization S Wang, G Ye, M Li, L Yuan, Z Tang, H Wang, W Wang, F Wang, J Ren, ... IEEE Access 7, 182711-182724, 2019 | 8 | 2019 |
Invalidating analysis knowledge for code virtualization protection through partition diversity W Wang, M Li, Z Tang, H Wang, G Ye, F Wang, J Ren, X Gong, D Fang, ... IEEE Access 7, 169160-169173, 2019 | 7 | 2019 |
Combining Structured Static Code Information and Dynamic Symbolic Traces for Software Vulnerability Prediction H Wang, Z Tang, SH Tan, J Wang, Y Liu, H Fang, C Xia, Z Wang Proceedings of the IEEE/ACM 46th International Conference on Software …, 2024 | 3 | 2024 |
UPBEAT: Test Input Checks of Q# Quantum Libraries T Hu, G Ye, Z Tang, SH Tan, H Wang, M Li, Z Wang Proceedings of the 33rd ACM SIGSOFT International Symposium on Software …, 2024 | | 2024 |