Παρακολούθηση
Ruitao FENG
Ruitao FENG
Η διεύθυνση ηλεκτρονικού ταχυδρομείου έχει επαληθευτεί στον τομέα scu.edu.au - Αρχική σελίδα
Τίτλος
Παρατίθεται από
Παρατίθεται από
Έτος
A Performance-Sensitive Malware Detection System Using Deep Learning on Mobile Devices
R Feng, S Chen, X Xie, G Meng, SW Lin, Y Liu
IEEE Transactions on Information Forensics and Security, 1563 - 1578, 2020
1382020
Mobidroid: A performance-sensitive malware detection system on mobile platform
R Feng, S Chen, X Xie, L Ma, G Meng, Y Liu, SW Lin
2019 24th International conference on engineering of complex computer …, 2019
542019
Transrepair: Context-aware program repair for compilation errors
X Li, S Liu, R Feng, G Meng, X Xie, K Chen, Y Liu
Proceedings of the 37th IEEE/ACM international conference on automated …, 2022
332022
Enhancing security patch identification by capturing structures in commits
B Wu, S Liu, R Feng, X Xie, J Siow, SW Lin
IEEE Transactions on Dependable and Secure Computing, 2022
332022
Seqmobile: An efficient sequence-based malware detection system using rnn on mobile devices
R Feng, JQ Lim, S Chen, SW Lin, Y Liu
2020 25th International Conference on Engineering of Complex Computer …, 2020
26*2020
Comparison and evaluation on static application security testing (sast) tools for java
K Li, S Chen, L Fan, R Feng, H Liu, C Liu, Y Liu, Y Chen
Proceedings of the 31st ACM Joint European Software Engineering Conference …, 2023
252023
Detection method of the second-order SQL injection in Web applications
L Yan, X Li, R Feng, Z Feng, J Hu
Structured Object-Oriented Formal Language and Method: Third International …, 2014
232014
A comprehensive study on quality assurance tools for java
H Liu, S Chen, R Feng, C Liu, K Li, Z Xu, L Nie, Y Liu, Y Chen
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software …, 2023
142023
Multi-label classification for android malware based on active learning
Q Qiao, R Feng, S Chen, F Zhang, X Li
IEEE transactions on dependable and secure computing, 2022
142022
DroidEcho: an in-depth dissection of malicious behaviors in Android applications
G Meng, R Feng, G Bai, K Chen, Y Liu
Cybersecurity 1, 1-17, 2018
142018
An extended uml method for the verification of security protocols
G Shen, X Li, R Feng, G Xu, J Hu, Z Feng
2014 19th International Conference on Engineering of Complex Computer …, 2014
92014
OOPN-SRAM: A novel method for software risk assessment
X Wu, X Li, R Feng, G Xu, J Hu, Z Feng
2014 19th International Conference on Engineering of Complex Computer …, 2014
82014
FT2Ra: A Fine-Tuning-Inspired Approach to Retrieval-Augmented Code Completion
Q Guo, X Li, X Xie, S Liu, Z Tang, R Feng, J Wang, J Ge, L Bu
Proceedings of the 33rd ACM SIGSOFT International Symposium on Software …, 2024
72024
Enhancing code vulnerability detection via vulnerability-preserving data augmentation
S Liu, W Ma, J Wang, X Xie, R Feng, Y Liu
Proceedings of the 25th ACM SIGPLAN/SIGBED International Conference on …, 2024
72024
Learning performance optimization from code changes for android apps
R Feng, G Meng, X Xie, T Su, Y Liu, SW Lin
2019 IEEE International Conference on Software Testing, Verification and …, 2019
72019
A performance-sensitive malware detection system on mobile platform
R Feng, Y Liu, S Lin
Formal Methods and Software Engineering: 21st International Conference on …, 2019
62019
An orchestrated empirical study on deep learning frameworks and platforms
Q Guo, X Xie, L Ma, Q Hu, R Feng, L Li, Y Liu, J Zhao, X Li
arXiv preprint arXiv:1811.05187, 2018
62018
Beyond fidelity: Explaining vulnerability localization of learning-based detectors
B Cheng, S Zhao, K Wang, M Wang, G Bai, R Feng, Y Guo, L Ma, H Wang
ACM transactions on software engineering and methodology 33 (5), 1-33, 2024
52024
Deep learning for coverage-guided fuzzing: How far are we?
S Li, X Xie, Y Lin, Y Li, R Feng, X Li, W Ge, JS Dong
IEEE transactions on dependable and secure computing, 2022
52022
A three-dimensional model for software security evaluation
Z Han, X Li, R Feng, J Hu, G Xu, Z Feng
2014 Theoretical Aspects of Software Engineering Conference, 34-41, 2014
42014
Δεν είναι δυνατή η εκτέλεση της ενέργειας από το σύστημα αυτή τη στιγμή. Προσπαθήστε ξανά αργότερα.
Άρθρα 1–20