Search

Your search keyword '"Sui, Yulei"' showing total 316 results

Search Constraints

Start Over You searched for: Author "Sui, Yulei" Remove constraint Author: "Sui, Yulei"
316 results on '"Sui, Yulei"'

Search Results

1. PCART: Automated Repair of Python API Parameter Compatibility Issues

2. Automated Data Visualization from Natural Language via Large Language Models: An Exploratory Study

3. Graph Neural Networks for Vulnerability Detection: A Counterfactual Explanation

4. CodeIP: A Grammar-Guided Multi-Bit Watermark for Large Language Models of Code

5. Does Your Neural Code Completion Model Use My Code? A Membership Inference Approach

6. Iterative Refinement of Project-Level Code Context for Precise Code Generation with Compiler Feedback

7. NL2Formula: Generating Spreadsheet Formulas from Natural Language Queries

8. Beyond Control: Exploring Novel File System Objects for Data-Only Attacks on Linux Systems

9. The Vulnerability Is in the Details: Locating Fine-grained Information of Vulnerable Code Identified by Graph-based Detectors

10. Deep Learning for Code Intelligence: Survey, Benchmark and Toolkit

11. Scalable and Precise Application-Centered Call Graph Construction for Python

12. Earning Extra Performance from Restrictive Feedbacks

13. New Challenges in Reinforcement Learning: A Survey of Security and Privacy

14. A Tale of Two Cities: Data and Configuration Variances in Robust Deep Learning

15. What Do They Capture? -- A Structural Analysis of Pre-Trained Language Models for Source Code

16. Cross-Language Binary-Source Code Matching with Intermediate Representations

17. Challenging Machine Learning-based Clone Detectors via Semantic-preserving Code Transformations

28. A Systematical Study on Application Performance Management Libraries for Apps

29. NaturalCC: A Toolkit to Naturalize the Source Code Corpus

32. MUZZ: Thread-aware Grey-box Fuzzing for Effective Bug Hunting in Multithreaded Programs

33. Beyond the Virus: A First Look at Coronavirus-themed Mobile Malware

34. Secure Metric Learning via Differential Pairwise Privacy

35. Multi-Modal Attention Network Learning for Semantic Source Code Retrieval

48. Hash Consed Points-To Sets

49. Demand-Driven Pointer Analysis with Strong Updates via Value-Flow Refinement

50. A Smart Status Based Monitoring Algorithm for the Dynamic Analysis of Memory Safety.

Catalog

Books, media, physical & digital resources