Folgen
Zhen Li(李珍)
Zhen Li(李珍)
Bestätigte E-Mail-Adresse bei hust.edu.cn
Titel
Zitiert von
Zitiert von
Jahr
VulDeePecker: A deep learning-based system for vulnerability detection
Z Li, D Zou, S Xu, X Ou, H Jin, S Wang, Z Deng, Y Zhong
Proceedings of the 25th Annual Network and Distributed System Security …, 2018
12112018
SySeVR: A framework for using deep learning to detect software vulnerabilities
Z Li, D Zou, S Xu, H Jin, Y Zhu, Z Chen
IEEE Transactions on Dependable and Secure Computing 19 (4), 2244-2258, 2022
7452022
VulDeePecker: A Deep Learning-Based System for Multiclass Vulnerability Detection
D Zou, S Wang, S Xu, Z Li, H Jin
IEEE Transactions on Dependable and Secure Computing 18 (5), 2224-2236, 2021
3652021
VulPecker: An automated vulnerability detection system based on code similarity analysis
Z Li, D Zou, S Xu, H Jin, H Qi, J Hu
Proceedings of the 32nd Annual Computer Security Applications Conference …, 2016
3072016
VulDeeLocator: A Deep Learning-based Fine-grained Vulnerability Detector
Z Li, D Zou, S Xu, Z Chen, Y Zhu, H Jin
IEEE Transactions on Dependable and Secure Computing 19 (4), 2821-2837, 2022
2452022
A comparative study of deep learning-based vulnerability detection system
Z Li, D Zou, J Tang, Z Zhang, M Sun, H Jin
IEEE Access 7, 103184-103197, 2019
1192019
BVDetector: A program slice-based binary code vulnerability intelligent detection system
J Tian, W Xing, Z Li
Information and Software Technology 123, 106289, 2020
672020
RoPGen: Towards Robust Code Authorship Attribution via Automatic Coding Style Transformation
Z Li, G Chen, C Chen, Y Zou, S Xu
Proceedings of the 44th International Conference on Software Engineering (ICSE), 2022
472022
Interpreting deep learning-based vulnerability detector predictions based on heuristic searching
D Zou, Y Zhu, S Xu, Z Li, H Jin, H Ye
ACM Transactions on Software Engineering and Methodology (TOSEM) 30 (2), 1-31, 2021
462021
Network intrusion detection based on the temporal convolutional model
IO Lopes, D Zou, IH Abdulqadder, S Akbar, Z Li, F Ruambo, W Pereira
Computers & Security 135, 103465, 2023
192023
Automatically identifying security bug reports via multitype features analysis
D Zou, Z Deng, Z Li, H Jin
Proceedings of the 23rd Australasian Conference on Information Security and …, 2018
182018
SCVD: A New Semantics-Based Approach for Cloned Vulnerable Code Detection
D Zou, H Qi, Z Li, S Wu, H Jin, G Sun, S Wang, Y Zhong
Proceedings of the 14th International Conference on Detection of Intrusions …, 2017
172017
Enhancing deep learning-based vulnerability detection by building behavior graph model
B Yuan, Y Lu, Y Fang, Y Wu, D Zou, Z Li, Z Li, H Jin
2023 IEEE/ACM 45th International Conference on Software Engineering (ICSE …, 2023
122023
Towards making deep learning-based vulnerability detectors robust
Z Li, J Tang, D Zou, Q Chen, S Xu, C Zhang, Y Li, H Jin
arXiv preprint arXiv:2108.00669, 2021
122021
Generating adversarial examples of source code classification models via q-learning-based markov decision process
J Tian, C Wang, Z Li, Y Wen
2021 IEEE 21st International Conference on Software Quality, Reliability and …, 2021
92021
On the Effectiveness of Function-Level Vulnerability Detectors for Inter-Procedural Vulnerabilities
Z Li, N Wang, D Zou, Y Li, R Zhang, S Xu, C Zhang, H Jin
Proceedings of the IEEE/ACM 46th International Conference on Software …, 2024
82024
Generating adversarial source programs using important tokens-based structural transformations
P Chen, Z Li, Y Wen, L Liu
2022 26th International Conference on Engineering of Complex Computer …, 2022
82022
AutoCVSS: An Approach for Automatic Assessment of Vulnerability Severity Based on Attack Process
D Zou, J Yang, Z Li, H Jin, X Ma
Proceedings of the 14th International Conference on Green, Pervasive and …, 2019
72019
A Comparative Study of Adversarial Training Methods for Neural Models of Source Code
Z Li, X Huang, Y Li, G Chen
Future Generation Computer Systems 142, 165-181, 2023
62023
Investigating the Impact of Vulnerability Datasets on Deep Learning-based Vulnerability Detectors
L Liu, Z Li, Y Wen, P Chen
PeerJ Computer Science 8, e975, 2022
62022
Das System kann den Vorgang jetzt nicht ausführen. Versuchen Sie es später erneut.
Artikel 1–20