VulCNN: An Image-inspired Scalable Vulnerability Detection System Y Wu, D Zou, S Dou, W Yang, D Xu, H Jin 44th International Conference on Software Engineering (ICSE), 2022 | 138 | 2022 |
Malscan: Fast market-wide mobile malware scanning by social-network centrality analysis Y Wu, X Li, D Zou, W Yang, X Zhang, H Jin 34th IEEE/ACM International Conference on Automated Software Engineering …, 2019 | 70 | 2019 |
SCDetector: software functional clone detection based on semantic tokens analysis Y Wu, D Zou, S Dou, S Yang, W Yang, F Cheng, H Liang, H Jin 35th IEEE/ACM International Conference on Automated Software Engineering …, 2020 | 66 | 2020 |
IntDroid: Android malware detection based on API intimacy analysis D Zou, Y Wu, S Yang, A Chauhan, W Yang, J Zhong, S Dou, H Jin ACM Transactions on Software Engineering and Methodology (TOSEM) 30 (3), 1-32, 2021 | 48 | 2021 |
Towards understanding the capability of large language models on code clone detection: A survey S Dou, J Shan, H Jia, W Deng, Z Xi, W He, Y Wu, T Gui, Y Liu, X Huang arXiv preprint arXiv:2308.01191, 2023 | 35* | 2023 |
PonziGuard: Detecting Ponzi Schemes on Ethereum with Contract Runtime Behavior Graph (CRBG) R Liang, J Chen, K He, Y Wu, G Deng, R Du, C Wu 2024 46th International Conference on Software Engineering (ICSE), 755-766, 2023 | 31 | 2023 |
A multigranularity forensics and analysis method on privacy leakage in cloud environment D Zou, J Zhao, W Li, Y Wu, W Qiang, H Jin, Y Wu, Y Yang IEEE Internet of Things Journal 6 (2), 1484-1494, 2018 | 30 | 2018 |
TreeCen: Building Tree Graph for Scalable Semantic Code Clone Detection Y Hu, D Zou, J Peng, Y Wu, J Shan, H Jin 37th IEEE/ACM International Conference on Automated Software Engineering (ASE), 2022 | 28 | 2022 |
mvulpreter: A multi-granularity vulnerability detection system with interpretations D Zou, Y Hu, W Li, Y Wu, H Zhao, H Jin IEEE Transactions on Dependable and Secure Computing, 2022 | 26 | 2022 |
Contrastive Learning for Robust Android Malware Familial Classification Y Wu, S Dou, D Zou, W Yang, W Qiang, H Jin IEEE Transactions on Dependable and Secure Computing, 2022 | 25* | 2022 |
HomDroid: detecting Android covert malware by social-network homophily analysis Y Wu, D Zou, W Yang, X Li, H Jin 30th ACM SIGSOFT International Symposium on Software Testing and Analysis …, 2021 | 24 | 2021 |
OSSFP: Precise and Scalable C/C++ Third-Party Library Detection using Fingerprinting Functions J Wu, Z Xu, W Tang, L Zhang, Y Wu, C Liu, K Sun, L Zhao, Y Liu 45th International Conference on Software Engineering (ICSE), 2023 | 22 | 2023 |
Detecting Semantic Code Clones by Building AST-based Markov Chains Model Y Wu, S Feng, D Zou, H Jin 37th IEEE/ACM International Conference on Automated Software Engineering (ASE), 2022 | 22 | 2022 |
Interpreters for GNN-Based Vulnerability Detection: Are We There Yet? Y Hu, S Wang, W Li, J Peng, Y Wu, D Zou, H Jin 32nd International Symposium on Software Testing and Analysis (ISSTA), 2023 | 20 | 2023 |
What's Wrong with Your Code Generated by Large Language Models? An Extensive Study S Dou, H Jia, S Wu, H Zheng, W Zhou, M Wu, M Chai, J Fan, C Huang, ... arXiv preprint arXiv:2407.06153, 2024 | 18 | 2024 |
Vulseye: Detect smart contract vulnerabilities via stateful directed graybox fuzzing R Liang, J Chen, C Wu, K He, Y Wu, R Cao, R Du, Z Zhao, Y Liu IEEE Transactions on Information Forensics and Security, 2025 | 17 | 2025 |
Fine-Grained Code Clone Detection with Block-Based Splitting of Abstract Syntax Tree T Hu, Z Xu, Y Fang, Y Wu, B Yuan, D Zou, H Jin 32nd International Symposium on Software Testing and Analysis (ISSTA), 2023 | 17 | 2023 |
Towards Effective Detection of Ponzi Schemes on Ethereum with Contract Runtime Behavior Graph R Liang, J Chen, C Wu, K He, Y Wu, W Sun, R Du, Q Zhao, Y Liu ACM Transactions on Software Engineering and Methodology, 2024 | 16 | 2024 |
A Comprehensive Study of Learning-based Android Malware Detectors under Challenging Environments C Gao, G Huang, H Li, B Wu, Y Wu, W Yuan 2024 46th International Conference on Software Engineering (ICSE), 104-116, 2023 | 16 | 2023 |
Comparison and Evaluation of Clone Detection Techniques with Different Code Representations Y Wang, Y Ye, Y Wu, W Zhang, Y Xue, Y Liu 45th International Conference on Software Engineering (ICSE), 2023 | 16 | 2023 |