Shadewatcher: Recommendation-guided cyber threat analysis using system audit records J Zeng, X Wang, J Liu, Y Chen, Z Liang, TS Chua, ZL Chua 2022 IEEE Symposium on Security and Privacy (SP), 489-506, 2022 | 121 | 2022 |
TeLL: log level suggestions via modeling multi-level code block information J Liu, J Zeng, X Wang, K Ji, Z Liang Proceedings of the 31st ACM SIGSOFT International Symposium on Software …, 2022 | 18 | 2022 |
Learning graph-based code representations for source-level functional similarity detection J Liu, J Zeng, X Wang, Z Liang IEEE/ACM 45th International Conference on Software Engineering (ICSE), 345-357, 2023 | 17 | 2023 |
Detecting logic bugs in graph database management systems via injective and surjective graph query transformation Y Jiang, J Liu, J Ba, RHC Yap, Z Liang, M Rigger Proceedings of the 46th IEEE/ACM International Conference on Software …, 2024 | 9 | 2024 |
Unraveling the key of machine learning solutions for android malware detection J Liu, J Zeng, F Pierazzi, L Cavallaro, Z Liang arXiv preprint arXiv:2402.02953, 2024 | 8 | 2024 |
MaskDroid: Robust Android Malware Detection with Masked Graph Representations J Zheng*, J Liu*, A Zhang, J Zeng, Z Yang, Z Liang, TS Chua Proceedings of the 39th IEEE/ACM International Conference on Automated …, 2024 | 1 | 2024 |
KernJC: Automated Vulnerable Environment Generation for Linux Kernel Vulnerabilities B Ruan, J Liu, C Zhang, Z Liang International Symposium on Research in Attacks, Intrusions and Defenses …, 2024 | 1 | 2024 |
Fuzzing the PHP Interpreter via Dataflow Fusion Y Jiang, C Zhang, B Ruan, J Liu, M Rigger, R Yap, Z Liang 34th USENIX Security Symposium, 2025 | | 2025 |
IntelEX: An LLM-driven Attack-level Threat Intelligence Extraction Framework M Xu, H Wang, J Liu, Y Lin, CXY Liu, HW Lim, JS Dong arXiv preprint arXiv:2412.10872, 2024 | | 2024 |
VulZoo: A Comprehensive Vulnerability Intelligence Dataset B Ruan, J Liu, W Zhao, Z Liang IEEE/ACM International Conference on Automated Software Engineering, Tool …, 2024 | | 2024 |