Author of the publication

POSTER: Vulnerability Discovery with Function Representation Learning from Unlabeled Projects.

, , , , and . CCS, page 2539-2541. ACM, (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

DeepBalance: Deep-Learning and Fuzzy Oversampling for Vulnerability Detection., , , , , and . IEEE Trans. Fuzzy Syst., 28 (7): 1329-1343 (2020)Boosting aquila optimizer by marine predators algorithm for combinatorial optimization., , , , , , , and . J. Comput. Des. Eng., 11 (2): 37-69 (March 2024)Intelligent detection of vulnerable functions in software through neural embedding-based code analysis., , , and . Int. J. Netw. Manag., (May 2023)A Context-Aware Neural Embedding for Function-Level Vulnerability Detection., , , and . Algorithms, 14 (11): 335 (2021)Detecting vulnerabilities in IoT software: New hybrid model and comprehensive data analysis., , , and . J. Inf. Secur. Appl., (May 2023)Deep neural-based vulnerability discovery demystified: data, model and performance., , , , , and . Neural Comput. Appl., 33 (20): 13287-13300 (2021)Statistical Twitter Spam Detection Demystified: Performance, Stability and Scalability., , , , , and . IEEE Access, (2017)Software Vulnerability Analysis and Discovery Using Deep Learning Techniques: A Survey., , , , and . IEEE Access, (2020)Sensor Network Structure Recognition Based on P-law., , , , , and . Comput. Syst. Sci. Eng., 46 (2): 1277-1292 (2023)Cross-Project Transfer Representation Learning for Vulnerable Function Discovery., , , , , , and . IEEE Trans. Ind. Informatics, 14 (7): 3289-3297 (2018)