142 results on '"Yulei Sui"'
Search Results
2. Precise Sparse Abstract Execution via Cross-Domain Interaction.
3. An Exploratory Investigation of Log Anomalies in Unmanned Aerial Vehicles.
4. NL2Formula: Generating Spreadsheet Formulas from Natural Language Queries.
5. How About Bug-Triggering Paths? - Understanding and Characterizing Learning-Based Vulnerability Detectors.
6. A Smart Status Based Monitoring Algorithm for the Dynamic Analysis of Memory Safety.
7. Dynamic Transitive Closure-based Static Analysis through the Lens of Quantum Search.
8. Iterative-Epoch Online Cycle Elimination for Context-Free Language Reachability.
9. Context-Free Language Reachability via Skewed Tabulation.
10. TIPS: Tracking Integer-Pointer Value Flows for C++ Member Function Pointers.
11. Finding and Understanding Defects in Static Analyzers by Constructing Automated Oracles.
12. Fast Graph Simplification for Path-Sensitive Typestate Analysis through Tempo-Spatial Multi-Point Slicing.
13. Cross-Language Taint Analysis: Generating Caller-Sensitive Native Code Specification for Java.
14. Iterative Refinement of Project-Level Code Context for Precise Code Generation with Compiler Feedback.
15. Graph Neural Networks for Vulnerability Detection: A Counterfactual Explanation.
16. The Vulnerability Is in the Details: Locating Fine-grained Information of Vulnerable Code Identified by Graph-based Detectors.
17. NL2Formula: Generating Spreadsheet Formulas from Natural Language Queries.
18. Deep Learning for Code Intelligence: Survey, Benchmark and Toolkit.
19. Automated Data Visualization from Natural Language via Large Language Models: An Exploratory Study.
20. Does Your Neural Code Completion Model Use My Code? A Membership Inference Approach.
21. CodeIP: A Grammar-Guided Multi-Bit Watermark for Large Language Models of Code.
22. PCART: Automated Repair of Python API Parameter Compatibility Issues.
23. Beyond Control: Exploring Novel File System Objects for Data-Only Attacks on Linux Systems.
24. Uncovering Limitations in Text-to-Image Generation: A Contrastive Approach with Structured Semantic Alignment.
25. Scalable Compositional Static Taint Analysis for Sensitive Data Tracing on Industrial Micro-Services.
26. Why Do Deep Learning Projects Differ in Compatible Framework Versions? An Exploratory Study.
27. Compatibility Issues in Deep Learning Systems: Problems and Opportunities.
28. A Hybrid Alias Analysis and Its Application to Global Variable Protection in the Linux Kernel.
29. Two Birds with One Stone: Multi-Derivation for Fast Context-Free Language Reachability Analysis.
30. New challenges in reinforcement learning: a survey of security and privacy.
31. An Empirical Study of Fault Triggers in Deep Learning Frameworks.
32. A Tale of Two Cities: Data and Configuration Variances in Robust Deep Learning.
33. A Container-Usage-Pattern-Based Context Debloating Approach for Object-Sensitive Pointer Analysis.
34. Recursive State Machine Guided Graph Folding for Context-Free Language Reachability.
35. Challenging Machine Learning-Based Clone Detectors via Semantic-Preserving Code Transformations.
36. Earning Extra Performance From Restrictive Feedbacks.
37. Automated Data Visualization from Natural Language via Large Language Models: An Exploratory Study.
38. Cross-project concurrency bug prediction using domain-adversarial neural network.
39. Deep semi-supervised learning for recovering traceability links between issues and commits.
40. NaturalCC: An Open-Source Toolkit for Code Intelligence.
41. What Do They Capture? - A Structural Analysis of Pre-Trained Language Models for Source Code.
42. Path-sensitive and alias-aware typestate analysis for detecting OS bugs.
43. Enhancing Traceability Link Recovery with Unlabeled Data.
44. Demystifying the underground ecosystem of account registration bots.
45. You see what I want you to see: poisoning vulnerabilities in neural code search.
46. MalWhiteout: Reducing Label Errors in Android Malware Detection.
47. Path-sensitive code embedding via contrastive learning for software vulnerability detection.
48. Cross-Language Binary-Source Code Matching with Intermediate Representations.
49. New Challenges in Reinforcement Learning: A Survey of Security and Privacy.
50. Earning Extra Performance from Restrictive Feedbacks.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.