Author of the publication

Decorrelate Irrelevant, Purify Relevant: Overcome Textual Spurious Correlations from a Feature Perspective.

, , , , , , and . CoRR, (2022)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Automatic 3D point cloud registration algorithm based on triangle similarity ratio consistency., , , , and . IET Image Process., 14 (14): 3314-3323 (2020)An Empirical Study on Android Malware Characterization by Social Network Analysis., , , and . IEEE Trans. Reliab., 73 (1): 757-770 (March 2024)Towards Understanding the Capability of Large Language Models on Code Clone Detection: A Survey., , , , , , , , , and . CoRR, (2023)Boosting the Capability of Intelligent Vulnerability Detection by Training in a Human-Learning Manner., , , , , and . CoRR, (2021)Gamification narrative design as a predictor for mobile fitness app user persistent usage intentions: a goal priming perspective., , , and . Enterp. Inf. Syst., 15 (10): 1501-1545 (2021)IntDroid: Android Malware Detection Based on API Intimacy Analysis., , , , , , , and . ACM Trans. Softw. Eng. Methodol., 30 (3): 39:1-39:32 (2021)Obfuscation-resilient Android Malware Analysis Based on Contrastive Learning., , , , , and . CoRR, (2021)Fine-Grained Code Clone Detection with Block-Based Splitting of Abstract Syntax Tree., , , , , , and . ISSTA, page 89-100. ACM, (2023)OSSFP: Precise and Scalable C/C++ Third-Party Library Detection using Fingerprinting Functions., , , , , , , , and . ICSE, page 270-282. IEEE, (2023)PonziGuard: Detecting Ponzi Schemes on Ethereum with Contract Runtime Behavior Graph (CRBG)., , , , , , and . ICSE, page 64:1-64:12. ACM, (2024)