Name
Affiliation
Papers
YANG LIU
Nanyang Technological University,
407
Collaborators
Citations 
PageRank 
805
2194
188.81
Referers 
Referees 
References 
4193
9038
5636
Search Limit
1001000
Title
Citations
PageRank
Year
Neuron Coverage-Guided Domain Generalization00.342023
Vulnerability Analysis, Robustness Verification, and Mitigation Strategy for Machine Learning-Based Power System Stability Assessment Model Under Adversarial Examples00.342022
NPC: Neuron Path Coverage via Characterizing Decision Logic of Deep Neural Networks00.342022
Towards Robustness of Deep Program Processing Models—Detection, Estimation, and Enhancement00.342022
RegexScalpel: Regular Expression Denial of Service (ReDoS) Defense by Localize-and-Fix00.342022
Why My App Crashes? Understanding and Benchmarking Framework-Specific Exceptions of Android Apps10.352022
Research on Third-Party Libraries in Android Apps: A Taxonomy and Systematic Literature Review00.342022
Forecasting of nonlinear dynamics based on symbolic invariance00.342022
Online adaptation for autonomous unmanned systems driven by requirements satisfaction model00.342022
Enriching query semantics for code search with reinforcement learning10.362022
Towards characterizing bug fixes through dependency-level changes in Apache Java open source projects00.342022
Erratum to “Accurate and Scalable Cross-Architecture Cross-OS Binary Code Search With Emulation”00.342021
AdvFilter: Predictive Perturbation-aware Filtering against Adversarial Attack via Multi-domain Learning00.342021
FakeTagger: Robust Safeguards against DeepFake Dissemination via Provenance Tracking00.342021
Can We Trust Your Explanations? Sanity Checks for Interpreters in Android Malware Analysis30.442021
Explaining Regressions via Alignment Slicing and Mending40.392021
AVA - Adversarial Vignetting Attack against Visual Recognition.10.382021
Guardauto: A Decentralized Runtime Protection System for Autonomous Driving00.342021
On Evaluating Fault Resilient Encoding Schemes in Software00.342021
Who is Real Bob? Adversarial Attacks on Speaker Recognition Systems30.392021
Systematic testing of autonomous driving systems using map topology-based scenario classification00.342021
How are Deep Learning Models Similar?: An Empirical Study on Clone Analysis of Deep Learning Software00.342020
Privacy-Aware UAV Flights through Self-Configuring Motion Planning.00.342020
Variable Precision Multi-granularity Rough Soft Sets Based on Multiple Thresholds.00.342020
An Empirical Study on ARM Disassembly Tools20.372020
An empirical assessment of security risks of global Android banking apps60.422020
An Empirical Evaluation of GDPR Compliance Violations in Android mHealth Apps20.372020
An energy-efficient deep convolutional neural networks coprocessor for multi-object detection00.342020
An Empirical Study of Usages, Updates and Risks of Third-Party Libraries in Java Projects30.412020
DeepRhythm: Exposing DeepFakes with Attentional Visual Heartbeat Rhythms20.422020
Typestate-guided fuzzer for discovering use-after-free vulnerabilities60.432020
DeepSonar: Towards Effective and Robust Detection of AI-Synthesized Fake Voices20.372020
Audee: automated testing for deep learning frameworks60.522020
SADT: syntax-aware differential testing of certificate validation in SSL/TLS implementations10.352020
MUZZ: Thread-aware Grey-box Fuzzing for Effective Bug Hunting in Multithreaded Programs10.352020
What’s Spain’s Paris? Mining analogical libraries from Q&A discussions20.362019
A Large-Scale Empirical Study on Industrial Fake Apps.70.412019
Architecture-Based Behavioral Adaptation with Generated Alternatives and Relaxed Constraints.10.352019
The Optimization of Sum-Product Network Structure Learning10.352019
DeepCT: Tomographic Combinatorial Testing for Deep Learning Systems140.532019
A Parametric Rely-Guarantee Reasoning Framework for Concurrent Reactive Systems.00.342019
DeepMutation++: a mutation testing framework for deep learning systems30.372019
How security bugs are fixed and what can be improved: an empirical study with Mozilla30.402019
Learning Performance Optimization from Code Changes for Android Apps10.342019
DeepStellar - model-based quantitative analysis of stateful deep learning systems.200.652019
Vultron: catching vulnerable smart contracts once and for all20.362019
Locating vulnerabilities in binaries via memory layout recovering.40.382019
Stochastic on-time arrival problem in transit networks.10.412018
From UI design image to GUI skeleton: a neural machine translator to bootstrap mobile GUI implementation.170.592018
ROPSentry: Runtime defense against ROP attacks using hardware performance counters.20.362018
  • 1
  • 2