基于智能化方法的代码安全加固技术研究
序号 | 标题 | 类型 | 作者 |
---|---|---|---|
1 | 软件安全漏洞检测关键技术研究及应用 | 奖励 | 李晓红;孙贞文;刘旭生;陈恺;谢肖飞;孟国柱;王俊杰;陈森;陶文源 |
2 | MalRadar: Demystifying Android Malware in the New Era | 会议论文 | Liu Wang;Haoyu Wang;He Ren;Ran Tao;Guozhu Meng;Xiapu Luo;Xuanzhe Liu |
3 | 代码注释自动生成方法综述 | 期刊论文 | 陈翔;杨光;崔展齐;孟国柱;王赞 |
4 | 机器学习在模糊测试中的应用现状与挑战 | 期刊论文 | 陈宏程;闫秋存;相璐;孟国柱;陈翔;纪守领 |
5 | A Performance-Sensitive Malware Detection System Using Deep Learning on Mobile Devices | 期刊论文 | Feng Ruitao;Chen Sen;Xie Xiaofei;Meng Guozhu;Lin Shang-Wei;Liu Yang |
6 | Understanding Real-world Threats to Deep Learning Models in Android Apps | 会议论文 | Zizhuang Deng;Kai Chen;Guozhu Meng;Xiaodong Zhang;Ke Xu;Yao Cheng |
7 | TransRepair: Context-aware Program Repair for Compilation Errors | 会议论文 | Xueyang Li;Shangqing Liu;Ruitao Feng;Guozhu Meng;Xiaofei Xie;Kai Chen;Yang Liu |
8 | Vall-nut: Principled Anti-Grey-box Fuzzing | 会议论文 | Yuekang Li;Guozhu Meng;Jun Xu;Cen Zhang;Hongxu Chen;Xiaofei Xie;Haijun Wang;Yang Liu |
9 | DRMI: A Dataset Reduction Technology based on Mutual Information for Black-box Attacks | 会议论文 | He Yingzhe;Meng Guozhu;Chen Kai;Hu Xingbo;He Jinwen |
10 | A Large-Scale Empirical Study on Vulnerability Distribution within Projects and the Lessons Learned | 会议论文 | Liu Bingchang;Meng Guozhu;Zou Wei;Gong Qi;Li Feng;Lin Min;Sun Dandan;Huo Wei;Zhang Chao;Zhang Chao |
11 | 确定目标程序中恶意功能代码模块及检测方法、装置及设备 | 专利 | 黄伟豪;林超阳;闫秋存;相璐;张志宇;孟国柱;陈恺;孟雷;陈新明;张宗明 |
12 | 一种针对深度神经网络模型训练的数据集约简方法及系统 | 专利 | 孟国柱;何英哲;陈恺 |
13 | Why is Your Trojan NOT Responding? A Quantitative Analysis of Failures in Backdoor Attacks of Neural Networks | 会议论文 | Xingbo Hu;Yibing Lan;Ruimin Gao;Guozhu Meng;Kai Chen |
14 | Learning Program Semantics with Code Representations: An Empirical Study | 会议论文 | Siow Jing Kai;Liu Shangqing;Xie Xiaofei;Meng Guozhu;Liu Yang |
15 | GraphSearchNet: Enhancing GNNs via Capturing Global Dependencies for Semantic Code Search | 期刊论文 | Shangqing Liu;Xiaofei Xie;Jingkai Siow;Lei Ma;Guozhu Meng;Yang Liu |
16 | Have you been properly notified? automatic compliance analysis of privacy policy text with GDPR article 13 | 会议论文 | Liu Shuang;Zhao Baiyang;Guo Renjie;Meng Guozhu;Zhang Fan;Zhang Meishan |
17 | A3Ident: A Two-phased Approach to Identify the Leading Authors of Android Apps | 会议论文 | Wang Wei;Meng Guozhu;Wang Haoyu;Chen Kai;Ge Weimin;Li Xiaohong |
18 | Towards Security Threats of Deep Learning Systems: A Survey | 期刊论文 | He Yingzhe;Meng Guozhu;Chen Kai;Hu Xingbo;He Jinwen |
19 | SEPAL: Towards a Large-scale Analysis of SeAndroid Policy Customization | 会议论文 | Yu Dongsong;Yang Guangliang;Meng Guozhu;Gong Xiaorui;Zhang Xiu;Xiang Xiaobo;Wang Xiaoyu;Jiang Yue;Chen Kai;Zou Wei;Lee Wenke;Shi Wenchang |
20 | The inconsistency of documentation: a study of online C standard library documents | 期刊论文 | Ruishi Li;Yunfei Yang;Jinghua Liu;Peiwei Hu;Guozhu Meng |
21 | 一种针对深度学习模型的数据记忆消除方法和装置 | 专利 | 孟国柱;何英哲;陈恺;何锦雯;胡兴波 |