Huanting Wang
Cited by
Cited by
Combining graph-based learning with automated data collection for code vulnerability detection
H Wang, G Ye, Z Tang, SH Tan, S Huang, D Fang, Y Feng, L Bian, ...
IEEE Transactions on Information Forensics and Security 16, 1943-1958, 2020
Deep program structure modeling through multi-relational graph-based learning
G Ye, Z Tang, H Wang, D Fang, J Fang, S Huang, Z Wang
Proceedings of the ACM International conference on parallel architectures …, 2020
Automating reinforcement learning architecture design for code optimization
H Wang, Z Tang, C Zhang, J Zhao, C Cummins, H Leather, Z Wang
Proceedings of the 31st ACM SIGPLAN International Conference on Compiler …, 2022
Invalidating analysis knowledge for code virtualization protection through partition diversity
W Wang, M Li, Z Tang, H Wang, G Ye, F Wang, J Ren, X Gong, D Fang, ...
IEEE Access 7, 169160-169173, 2019
Leveraging WebAssembly for Numerical JavaScript Code Virtualization
S Wang, G Ye, M Li, L Yuan, Z Tang, H Wang, W Wang, F Wang, J Ren, ...
IEEE Access 7, 182711-182724, 2019
Detecting code vulnerabilities by learning from large-scale open source repositories
R Xu, Z Tang, G Ye, H Wang, X Ke, D Fang, Z Wang
Journal of Information Security and Applications 69, 103293, 2022
The system can't perform the operation now. Try again later.
Articles 1–6