Author of the publication

Efficient vulnerability detection based on an optimized rule-checking static analysis technique.

, , , , , , , and . Frontiers of IT & EE, 18 (3): 332-345 (2017)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Mining Class Temporal Specification Dynamically Based on Extended Markov Model., , , , and . International Journal of Software Engineering and Knowledge Engineering, 25 (3): 573-604 (2015)Empirical study of the effects of different profiles on regression test case reduction., , and . IET Software, 9 (2): 29-38 (2015)Improving Static Analysis Performance Using Rule-Filtering Technique., , , and . SEKE, page 19-24. Knowledge Systems Institute Graduate School, (2014)Mining API protocols based on a balanced probabilistic model., , , , , , and . FSKD, page 2276-2282. IEEE, (2015)Clustering Analysis of Function Call Sequence for Regression Test Case Reduction., , , and . International Journal of Software Engineering and Knowledge Engineering, 24 (8): 1197-1224 (2014)Convolutional Neural Collaborative Filtering with Stacked Embeddings., , , and . ACML, volume 101 of Proceedings of Machine Learning Research, page 726-741. PMLR, (2019)A Software Assessment Method Based on Relevance Vulnerability., , , , , and . CIS, page 424-427. IEEE Computer Society, (2015)A Framework for Recommendation and Trust Assessment in SNS., and . PDCAT, page 405-409. IEEE Computer Society, (2010)A Developed Dynamic Environment Fault Injection Tool for Component Security Testing., , , and . SSIRI, page 417-422. IEEE Computer Society, (2009)Extracting More Object Usage Scenarios for API Protocol Mining., , , , , and . SEKE, page 607-612. KSI Research Inc. and Knowledge Systems Institute Graduate School, (2015)