Search

Your search keyword '"Sui Y"' showing total 198 results

Search Constraints

Start Over You searched for: Author "Sui Y" Remove constraint Author: "Sui Y" Publication Type Electronic Resources Remove constraint Publication Type: Electronic Resources
198 results on '"Sui Y"'

Search Results

2. Adversarial Learning for Coordinate Regression through k-layer Penetrating Representation

4. Adversarial Learning for Coordinate Regression through k-layer Penetrating Representation

5. Cross-Language Taint Analysis: Generating Caller-Sensitive Native Code Specification for Java

6. Adversarial Learning for Coordinate Regression through k-layer Penetrating Representation

7. A Hybrid Alias Analysis and Its Application to Global Variable Protection in the Linux Kernel

8. Changes in neighborhood physical and social environments matter for change in mental health: Longitudinal evidence from Dutch panel data

9. Two Birds with One Stone: Multi-Derivation for Fast Context-Free Language Reachability Analysis

10. Scalable Compositional Static Taint Analysis for Sensitive Data Tracing on Industrial Micro-Services

12. Event-aware precise dynamic slicing for automatic debugging of Android applications

13. A Tale of Two Cities: Data and Configuration Variances in Robust Deep Learning

14. RNNtcs: A test case selection method for Recurrent Neural Networks

15. Compatibility Issues in Deep Learning Systems: Problems and Opportunities

16. Uncovering Limitations in Text-to-Image Generation: A Contrastive Approach with Structured Semantic Alignment

17. A Hybrid Alias Analysis and Its Application to Global Variable Protection in the Linux Kernel

18. Compatibility Issues in Deep Learning Systems: Problems and Opportunities

19. Challenging Machine Learning-Based Clone Detectors via Semantic-Preserving Code Transformations

20. RNNtcs: A test case selection method for Recurrent Neural Networks

21. Why Do Deep Learning Projects Differ in Compatible Framework Versions? An Exploratory Study

22. Earning Extra Performance From Restrictive Feedbacks.

23. Recursive State Machine Guided Graph Folding for Context-Free Language Reachability

24. A Container-Usage-Pattern-Based Context Debloating Approach for Object-Sensitive Pointer Analysis

25. Longitudinal associations between the neighborhood social, natural, and built environment and mental health: A systematic review with meta-analyses

26. Cost-Effectiveness of Monitoring Patients Post-Stroke With Mobile ECG During the Hospital Stay

27. Cost-Effectiveness of Monitoring Patients Post-Stroke With Mobile ECG During the Hospital Stay

29. How About Bug-Triggering Paths? - Understanding and Characterizing Learning-Based Vulnerability Detectors

31. Path-sensitive code embedding via contrastive learning for software vulnerability detection

32. How About Bug-Triggering Paths? - Understanding and Characterizing Learning-Based Vulnerability Detectors

33. MalWhiteout: Reducing Label Errors in Android Malware Detection

34. Taming transitive redundancy for context-free language reachability

35. Enhancing Traceability Link Recovery with Unlabeled Data

36. Cross-Language Binary-Source Code Matching with Intermediate Representations

37. Path-Sensitive and Alias-Aware Typestate Analysis for Detecting OS Bugs

38. New challenges in reinforcement learning: a survey of security and privacy

39. Path-sensitive code embedding via contrastive learning for software vulnerability detection

40. Demystifying the underground ecosystem of account registration bots

41. You see what I want you to see: poisoning vulnerabilities in neural code search

42. NaturalCC: An Open-Source Toolkit for Code Intelligence

43. What Do They Capture? - A Structural Analysis of Pre-Trained Language Models for Source Code

44. An Empirical Study of Fault Triggers in Deep Learning Frameworks

45. A Systematical Study on Application Performance Management Libraries for Apps

46. Multi-triage: A multi-task learning framework for bug triage

47. Multi-triage: A multi-task learning framework for bug triage

48. Global optimization energy management for multi-energy source vehicles based on “Information layer - Physical layer - Energy layer - Dynamic programming” (IPE-DP)

49. Taming transitive redundancy for context-free language reachability

50. Enhancing Traceability Link Recovery with Unlabeled Data

Catalog

Books, media, physical & digital resources