A Performance-Sensitive Malware Detection System Using Deep Learning on Mobile Devices R Feng, S Chen, X Xie, G Meng, SW Lin, Y Liu IEEE Transactions on Information Forensics and Security, 1563 - 1578, 2020 | 136 | 2020 |
Mobidroid: A performance-sensitive malware detection system on mobile platform R Feng, S Chen, X Xie, L Ma, G Meng, Y Liu, SW Lin 2019 24th International Conference on Engineering of Complex Computer …, 2019 | 54 | 2019 |
Transrepair: Context-aware program repair for compilation errors X Li, S Liu, R Feng, G Meng, X Xie, K Chen, Y Liu Proceedings of the 37th IEEE/ACM International Conference on Automated …, 2022 | 33 | 2022 |
Enhancing security patch identification by capturing structures in commits B Wu, S Liu, R Feng, X Xie, J Siow, SW Lin IEEE Transactions on Dependable and Secure Computing, 2022 | 31 | 2022 |
Comparison and Evaluation on Static Application Security Testing (SAST) Tools for Java K Li, S Chen, L Fan, R Feng, H Liu, C Liu, Y Liu, Y Chen Proceedings of the 31st ACM Joint European Software Engineering Conference …, 2023 | 25 | 2023 |
Seqmobile: An efficient sequence-based malware detection system using rnn on mobile devices R Feng, JQ Lim, S Chen, SW Lin, Y Liu 2020 25th International Conference on Engineering of Complex Computer …, 2020 | 25* | 2020 |
Detection method of the second-order SQL injection in Web applications L Yan, X Li, R Feng, Z Feng, J Hu Structured Object-Oriented Formal Language and Method: Third International …, 2014 | 23 | 2014 |
Multi-label classification for android malware based on active learning Q Qiao, R Feng, S Chen, F Zhang, X Li IEEE Transactions on Dependable and Secure Computing, 2022 | 14 | 2022 |
DroidEcho: an in-depth dissection of malicious behaviors in Android applications G Meng, R Feng, G Bai, K Chen, Y Liu Cybersecurity 1, 1-17, 2018 | 14 | 2018 |
A comprehensive study on quality assurance tools for java H Liu, S Chen, R Feng, C Liu, K Li, Z Xu, L Nie, Y Liu, Y Chen Proceedings of the 32nd ACM SIGSOFT International Symposium on Software …, 2023 | 13 | 2023 |
An extended uml method for the verification of security protocols G Shen, X Li, R Feng, G Xu, J Hu, Z Feng 2014 19th International Conference on Engineering of Complex Computer …, 2014 | 9 | 2014 |
OOPN-SRAM: A novel method for software risk assessment X Wu, X Li, R Feng, G Xu, J Hu, Z Feng 2014 19th International Conference on Engineering of Complex Computer …, 2014 | 8 | 2014 |
Learning performance optimization from code changes for android apps R Feng, G Meng, X Xie, T Su, Y Liu, SW Lin 2019 IEEE International Conference on Software Testing, Verification and …, 2019 | 7 | 2019 |
FT2Ra: A Fine-Tuning-Inspired Approach to Retrieval-Augmented Code Completion Q Guo, X Li, X Xie, S Liu, Z Tang, R Feng, J Wang, J Ge, L Bu Proceedings of the 33rd ACM SIGSOFT International Symposium on Software …, 2024 | 6 | 2024 |
Enhancing Code Vulnerability Detection via Vulnerability-Preserving Data Augmentation S Liu, W Ma, J Wang, X Xie, R Feng, Y Liu Proceedings of the 25th ACM SIGPLAN/SIGBED International Conference on …, 2024 | 6 | 2024 |
A performance-sensitive malware detection system on mobile platform R Feng, Y Liu, S Lin Formal Methods and Software Engineering: 21st International Conference on …, 2019 | 6 | 2019 |
An orchestrated empirical study on deep learning frameworks and platforms Q Guo, X Xie, L Ma, Q Hu, R Feng, L Li, Y Liu, J Zhao, X Li arXiv preprint arXiv:1811.05187, 2018 | 6 | 2018 |
Deep learning for coverage-guided fuzzing: How far are we? S Li, X Xie, Y Lin, Y Li, R Feng, X Li, W Ge, JS Dong IEEE Transactions on Dependable and Secure Computing, 2022 | 5 | 2022 |
Beyond fidelity: Explaining vulnerability localization of learning-based detectors B Cheng, S Zhao, K Wang, M Wang, G Bai, R Feng, Y Guo, L Ma, H Wang ACM transactions on software engineering and methodology 33 (5), 1-33, 2024 | 4 | 2024 |
A three-dimensional model for software security evaluation Z Han, X Li, R Feng, J Hu, G Xu, Z Feng 2014 Theoretical Aspects of Software Engineering Conference, 34-41, 2014 | 4 | 2014 |