Formal analysis of QUIC handshake protocol using symbolic model checking J Zhang, L Yang, X Gao, G Tang, J Zhang, Q Wang IEEE Access 9, 14836-14848, 2021 | 25 | 2021 |
A comparative study of neural network techniques for automatic software vulnerability detection G Tang, L Meng, H Wang, S Ren, Q Wang, L Yang, W Cao 2020 International symposium on theoretical aspects of software engineering …, 2020 | 20 | 2020 |
Uav sensor spoofing detection algorithm based on gps and optical flow fusion L Meng, S Ren, G Tang, C Yang, W Yang Proceedings of the 2020 4th International Conference on Cryptography …, 2020 | 19 | 2020 |
An approach of linear regression-based UAV GPS spoofing detection L Meng, L Yang, S Ren, G Tang, L Zhang, F Yang, W Yang Wireless Communications and Mobile Computing 2021, 1-16, 2021 | 15 | 2021 |
An automatic source code vulnerability detection approach based on KELM G Tang, L Yang, S Ren, L Meng, F Yang, H Wang Security and Communication Networks 2021, 1-12, 2021 | 13 | 2021 |
An optimization of deep sensor fusion based on generalized intersection over union L Meng, L Yang, G Tang, S Ren, W Yang International Conference on Algorithms and Architectures for Parallel …, 2020 | 5 | 2020 |
Interpretation of learning-based automatic source code vulnerability detection model using LIME G Tang, L Zhang, F Yang, L Meng, W Cao, M Qiu, S Ren, L Yang, H Wang International Conference on Knowledge Science, Engineering and Management …, 2021 | 2 | 2021 |
A reactive traffic flow estimation in software defined networks S Ren, G Tang 2020 5th International Conference on Computer and Communication Systems …, 2020 | 2 | 2020 |
Leveraging User-Defined Identifiers for Counterfactual Data Generation in Source Code Vulnerability Detection H Kuang, F Yang, L Zhang, G Tang, L Yang 2023 IEEE 23rd International Working Conference on Source Code Analysis and …, 2023 | 1 | 2023 |
An attention-based automatic vulnerability detection approach with GGNN G Tang, L Yang, L Zhang, W Cao, L Meng, H He, H Kuang, F Yang, ... International Journal of Machine Learning and Cybernetics 14 (9), 3113-3127, 2023 | 1 | 2023 |
MRC-VulLoc: Software source code vulnerability localization based on multi-choice reading comprehension G Tang, L Yang, L Zhang, H Kuang, H Wang Computers & Security 141, 103816, 2024 | | 2024 |
2020 International Symposium on Theoretical Aspects of Software Engineering (TASE)| 978-1-7281-4086-5/20/$31.00© 2020 IEEE| DOI: 10.1109/TASE49443. 2020.00039 S Arora, M Bonsangue, M Butler, CH Cai, W Cao, B Chen, X Chen, ... | | |