Seguir
Yulei Sui
Yulei Sui
Dirección de correo verificada de unsw.edu.au - Página principal
Título
Citado por
Citado por
Año
SVF: interprocedural static value-flow analysis in LLVM
Y Sui, J Xue
Proceedings of the 25th international conference on compiler construction …, 2016
4052016
Multi-modal attention network learning for semantic source code retrieval
Y Wan, J Shu, Y Sui, G Xu, Z Zhao, J Wu, P Yu
2019 34th IEEE/ACM International Conference on Automated Software …, 2019
1712019
Deepwukong: Statically detecting software vulnerabilities using deep graph neural network
X Cheng, H Wang, J Hua, G Xu, Y Sui
ACM Transactions on Software Engineering and Methodology (TOSEM) 30 (3), 1-33, 2021
1672021
Static memory leak detection using full-sparse value-flow analysis
Y Sui, D Ye, J Xue
Proceedings of the 2012 International Symposium on Software Testing and …, 2012
1672012
Detecting memory leaks statically with full-sparse value-flow analysis
Y Sui, D Ye, J Xue
IEEE Transactions on Software Engineering 40 (2), 107-122, 2014
1302014
Typestate-guided fuzzer for discovering use-after-free vulnerabilities
H Wang, X Xie, Y Li, C Wen, Y Li, Y Liu, S Qin, H Chen, Y Sui
Proceedings of the ACM/IEEE 42nd International Conference on Software …, 2020
1072020
Reinforcement-learning-guided source code summarization using hierarchical attention
W Wang, Y Zhang, Y Sui, Y Wan, Z Zhao, J Wu, SY Philip, G Xu
IEEE Transactions on software Engineering 48 (1), 102-119, 2020
1002020
Flow2vec: Value-flow-based precise code embedding
Y Sui, X Cheng, G Zhang, H Wang
Proceedings of the ACM on Programming Languages 4 (OOPSLA), 1-27, 2020
942020
{MUZZ}: Thread-aware grey-box fuzzing for effective bug hunting in multithreaded programs
H Chen, S Guo, Y Xue, Y Sui, C Zhang, Y Li, H Wang, Y Liu
29th USENIX Security Symposium (USENIX Security 20), 2325-2342, 2020
942020
On-demand strong update analysis via value-flow refinement
Y Sui, J Xue
Proceedings of the 2016 24th ACM SIGSOFT international symposium on …, 2016
892016
Spatio-temporal context reduction: A pointer-analysis-based static approach for detecting use-after-free vulnerabilities
H Yan, Y Sui, S Chen, J Xue
Proceedings of the 40th International Conference on Software Engineering …, 2018
792018
Fcca: Hybrid code representation for functional clone detection using attention networks
W Hua, Y Sui, Y Wan, G Liu, G Xu
IEEE Transactions on Reliability 70 (1), 304-318, 2020
782020
A comparative study of class rebalancing methods for security bug report classification
W Zheng, Y Xun, X Wu, Z Deng, X Chen, Y Sui
IEEE Transactions on Reliability 70 (4), 1658-1670, 2021
772021
What do they capture? a structural analysis of pre-trained language models for source code
Y Wan, W Zhao, H Zhang, Y Sui, G Xu, H Jin
Proceedings of the 44th international conference on software engineering …, 2022
752022
Familial clustering for weakly-labeled android malware using hybrid representation learning
Y Zhang, Y Sui, S Pan, Z Zheng, B Ning, I Tsang, W Zhou
IEEE Transactions on Information Forensics and Security 15, 3401-3414, 2019
722019
Cross-contract static analysis for detecting practical reentrancy vulnerabilities in smart contracts
Y Xue, M Ma, Y Lin, Y Sui, J Ye, T Peng
Proceedings of the 35th IEEE/ACM International Conference on Automated …, 2020
692020
Self-inferencing reflection resolution for Java
Y Li, T Tan, Y Sui, J Xue
ECOOP 2014–Object-Oriented Programming: 28th European Conference, Uppsala …, 2014
692014
Sparse flow-sensitive pointer analysis for multithreaded programs
Y Sui, P Di, J Xue
Proceedings of the 2016 International Symposium on Code Generation and …, 2016
632016
SPAS: Scalable Path-Sensitive Pointer Analysis on Full-Sparse SSA
Y Sui, S Ye, J Xue, PC Yew
Programming Languages and Systems, 155-171, 2011
612011
Path-sensitive code embedding via contrastive learning for software vulnerability detection
X Cheng, G Zhang, H Wang, Y Sui
Proceedings of the 31st ACM SIGSOFT International Symposium on Software …, 2022
602022
El sistema no puede realizar la operación en estos momentos. Inténtalo de nuevo más tarde.
Artículos 1–20