팔로우
Ruitao FENG
제목
인용
인용
연도
A Performance-Sensitive Malware Detection System Using Deep Learning on Mobile Devices
R Feng, S Chen, X Xie, G Meng, SW Lin, Y Liu
IEEE Transactions on Information Forensics and Security, 1563 - 1578, 2020
1362020
Mobidroid: A performance-sensitive malware detection system on mobile platform
R Feng, S Chen, X Xie, L Ma, G Meng, Y Liu, SW Lin
2019 24th International Conference on Engineering of Complex Computer …, 2019
542019
Transrepair: Context-aware program repair for compilation errors
X Li, S Liu, R Feng, G Meng, X Xie, K Chen, Y Liu
Proceedings of the 37th IEEE/ACM International Conference on Automated …, 2022
332022
Enhancing security patch identification by capturing structures in commits
B Wu, S Liu, R Feng, X Xie, J Siow, SW Lin
IEEE Transactions on Dependable and Secure Computing, 2022
312022
Comparison and Evaluation on Static Application Security Testing (SAST) Tools for Java
K Li, S Chen, L Fan, R Feng, H Liu, C Liu, Y Liu, Y Chen
Proceedings of the 31st ACM Joint European Software Engineering Conference …, 2023
252023
Seqmobile: An efficient sequence-based malware detection system using rnn on mobile devices
R Feng, JQ Lim, S Chen, SW Lin, Y Liu
2020 25th International Conference on Engineering of Complex Computer …, 2020
25*2020
Detection method of the second-order SQL injection in Web applications
L Yan, X Li, R Feng, Z Feng, J Hu
Structured Object-Oriented Formal Language and Method: Third International …, 2014
232014
Multi-label classification for android malware based on active learning
Q Qiao, R Feng, S Chen, F Zhang, X Li
IEEE Transactions on Dependable and Secure Computing, 2022
142022
DroidEcho: an in-depth dissection of malicious behaviors in Android applications
G Meng, R Feng, G Bai, K Chen, Y Liu
Cybersecurity 1, 1-17, 2018
142018
A comprehensive study on quality assurance tools for java
H Liu, S Chen, R Feng, C Liu, K Li, Z Xu, L Nie, Y Liu, Y Chen
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software …, 2023
132023
An extended uml method for the verification of security protocols
G Shen, X Li, R Feng, G Xu, J Hu, Z Feng
2014 19th International Conference on Engineering of Complex Computer …, 2014
92014
OOPN-SRAM: A novel method for software risk assessment
X Wu, X Li, R Feng, G Xu, J Hu, Z Feng
2014 19th International Conference on Engineering of Complex Computer …, 2014
82014
Learning performance optimization from code changes for android apps
R Feng, G Meng, X Xie, T Su, Y Liu, SW Lin
2019 IEEE International Conference on Software Testing, Verification and …, 2019
72019
FT2Ra: A Fine-Tuning-Inspired Approach to Retrieval-Augmented Code Completion
Q Guo, X Li, X Xie, S Liu, Z Tang, R Feng, J Wang, J Ge, L Bu
Proceedings of the 33rd ACM SIGSOFT International Symposium on Software …, 2024
62024
Enhancing Code Vulnerability Detection via Vulnerability-Preserving Data Augmentation
S Liu, W Ma, J Wang, X Xie, R Feng, Y Liu
Proceedings of the 25th ACM SIGPLAN/SIGBED International Conference on …, 2024
62024
A performance-sensitive malware detection system on mobile platform
R Feng, Y Liu, S Lin
Formal Methods and Software Engineering: 21st International Conference on …, 2019
62019
An orchestrated empirical study on deep learning frameworks and platforms
Q Guo, X Xie, L Ma, Q Hu, R Feng, L Li, Y Liu, J Zhao, X Li
arXiv preprint arXiv:1811.05187, 2018
62018
Deep learning for coverage-guided fuzzing: How far are we?
S Li, X Xie, Y Lin, Y Li, R Feng, X Li, W Ge, JS Dong
IEEE Transactions on Dependable and Secure Computing, 2022
52022
Beyond fidelity: Explaining vulnerability localization of learning-based detectors
B Cheng, S Zhao, K Wang, M Wang, G Bai, R Feng, Y Guo, L Ma, H Wang
ACM transactions on software engineering and methodology 33 (5), 1-33, 2024
42024
A three-dimensional model for software security evaluation
Z Han, X Li, R Feng, J Hu, G Xu, Z Feng
2014 Theoretical Aspects of Software Engineering Conference, 34-41, 2014
42014
현재 시스템이 작동되지 않습니다. 나중에 다시 시도해 주세요.
학술자료 1–20