Seguir
Huanting Wang
Huanting Wang
Dirección de correo verificada de leeds.ac.uk - Página principal
Título
Citado por
Citado por
Año
Combining graph-based learning with automated data collection for code vulnerability detection
H Wang, G Ye, Z Tang, SH Tan, S Huang, D Fang, Y Feng, L Bian, ...
IEEE Transactions on Information Forensics and Security 16, 1943-1958, 2020
1902020
Deep program structure modeling through multi-relational graph-based learning
G Ye, Z Tang, H Wang, D Fang, J Fang, S Huang, Z Wang
Proceedings of the ACM International conference on parallel architectures …, 2020
342020
Automating reinforcement learning architecture design for code optimization
H Wang, Z Tang, C Zhang, J Zhao, C Cummins, H Leather, Z Wang
Proceedings of the 31st ACM SIGPLAN International Conference on Compiler …, 2022
152022
Leveraging WebAssembly for Numerical JavaScript Code Virtualization
S Wang, G Ye, M Li, L Yuan, Z Tang, H Wang, W Wang, F Wang, J Ren, ...
IEEE Access 7, 182711-182724, 2019
72019
Invalidating analysis knowledge for code virtualization protection through partition diversity
W Wang, M Li, Z Tang, H Wang, G Ye, F Wang, J Ren, X Gong, D Fang, ...
IEEE Access 7, 169160-169173, 2019
62019
Detecting code vulnerabilities by learning from large-scale open source repositories
R Xu, Z Tang, G Ye, H Wang, X Ke, D Fang, Z Wang
Journal of Information Security and Applications 69, 103293, 2022
52022
Combining Structured Static Code Information and Dynamic Symbolic Traces for Software Vulnerability Prediction
H Wang, Z Tang, SH Tan, J Wang, Y Liu, H Fang, C Xia, Z Wang
Proceedings of the IEEE/ACM 46th International Conference on Software …, 2024
12024
UPBEAT: Test Input Checks of Q# Quantum Libraries
T Hu, G Ye, Z Tang, SH Tan, H Wang, M Li, Z Wang
Proceedings of ACM SIGSOFT International Symposium on Software Testing and …, 2024
2024
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–8