Follow
Santanu Dash
Santanu Dash
Senior Lecturer, University of Surrey
Verified email at surrey.ac.uk - Homepage
Title
Cited by
Cited by
Year
Transcend: Detecting concept drift in malware classification models
R Jordaney, K Sharad, SK Dash, Z Wang, D Papini, I Nouretdinov, ...
26th USENIX security symposium (USENIX security 17), 625-642, 2017
3052017
DroidSieve: Fast and Accurate Classification of Obfuscated Android Malware
G Suarez-Tangil, SK Dash, M Ahmadi, J Kinder, G Giacinto, L Cavallaro
Conference on Data and Application Security and Privacy, 2017
2862017
Droidscribe: Classifying android malware based on runtime behavior
SK Dash, G Suarez-Tangil, S Khan, K Tam, M Ahmadi, J Kinder, ...
2016 IEEE Security and Privacy Workshops (SPW), 252-261, 2016
2112016
Euphony: Harmonious Unification of Cacophonous Anti-Virus Vendor Labels for Android Malware
M Hurier, G Suarez-Tangil, SK Dash, TF Bissyandé, Y Le Traon, J Klein, ...
Mining Software Repositories (MSR), 2017
1172017
Prescience: Probabilistic guidance on the retraining conundrum for malware detection
A Deo, SK Dash, G Suarez-Tangil, V Vovk, L Cavallaro
Proceedings of the 2016 ACM workshop on artificial intelligence and security …, 2016
462016
RefiNym: Using Names to Refine Types
SK Dash, M Allamanis, ET Barr
Foundations of Software Engineering (FSE), 2018
342018
A Theory of Dual Channel Constraints
C Casalnuovo, ET Barr, SK Dash, P Devanbu
Proceedings of the 42nd International Conference on Software Engineering …, 2020
252020
Deep learning to detect redundant method comments
A Louis, SK Dash, ET Barr, C Sutton
arXiv preprint arXiv:1806.04616, 2018
202018
Flexeme: Untangling Commits Using Lexical Flows
PP Pârtachi, SK Dash, M Allamanis, ET Barr
Foundations of Software Engineering (FSE), 2020
172020
POSIT: Simultaneously Tagging Natural and Programming Languages
PP Partachi, SK Dash, C Treude, ET Barr
42nd International Conference on Software Engineering (ICSE'20), 2020
132020
Instruction cache tuning for embedded multitasking applications
SK Dash, T Srikanthan
IET computers & digital techniques 4 (6), 439-457, 2010
122010
Where should I comment my code? A dataset and model for predicting locations that need comments
A Louis, SK Dash, ET Barr, MD Ernst, C Sutton
42nd International Conference on Software Engineering (ICSE'20), New Ideas …, 2020
102020
A scalable approach to computing representative lowest common ancestor in directed acyclic graphs
SK Dash, SB Scholz, S Herhut, B Christianson
Theoretical Computer Science 513, 25-37, 2013
92013
Anomaly‐based exploratory analysis and detection of exploits in android mediaserver
G Suárez‐Tangil, SK Dash, P García‐Teodoro, J Camacho, L Cavallaro
IET Information Security 12 (5), 404-413, 2018
52018
Rapid estimation of instruction cache hit rates using loop profiling
SK Dash, T Srikanthan
2008 International Conference on Application-Specific Systems, Architectures …, 2008
52008
AWSomePy: a dataset and characterization of serverless applications
G Raffa, JB Alis, D O'Keeffe, SK Dash
Proceedings of the 1st Workshop on SErverless Systems, Applications and …, 2023
22023
Do Names Echo Semantics? A Large-Scale Study of Identifiers Used in C++'s Named Casts
CC Petrescu, S Smith, G Rafail, SK Dash
Journal of Systems and Software, 2023
22023
Genetic Optimisation of C++ Applications
R Giavrimis, A Butler, CC Petrescu, M Basios, SK Dash
Automated Software Engineering (ASE'21), Late Breaking Results (LBR), 2021
22021
Classifying android malware based on runtime behavior
SK Dash, G Suarez-Tangil, S Khan, K Tam, M Ahmadi, J Kinder, ...
Proceedings of the 2016 IEEE Security and Privacy Workshops, 2016
22016
MSR 2017
A Rahman, A Swidan, A Meyer, B Li, B Aloraini, CG Gavidia, C Theisen, ...
2
The system can't perform the operation now. Try again later.
Articles 1–20