Cited By
View all- Nong YFang RYi GZhao KLuo XChen FCai HRoychoudhury APaiva AAbreu RStorey M(2024)VGX: Large-Scale Sample Generation for Boosting Learning-Based Software Vulnerability AnalysesProceedings of the IEEE/ACM 46th International Conference on Software Engineering10.1145/3597503.3639116(1-13)Online publication date: 20-May-2024
- Ouyang YShao KChen KShen RChen CXu MZhang YZhang LGrundy JPollock LPenta M(2023)MirrorTaint: Practical Non-Intrusive Dynamic Taint Tracking for JVM-Based Microservice SystemsProceedings of the 45th International Conference on Software Engineering10.1109/ICSE48619.2023.00210(2514-2526)Online publication date: 14-May-2023
- Cai HNong YOu YChen F(2023)Generating Vulnerable Code via Learning-Based Program TransformationsAI Embedded Assurance for Cyber Systems10.1007/978-3-031-42637-7_7(123-138)Online publication date: 11-Aug-2023
- Show More Cited By