Neuron Coverage-Guided Domain Generalization | 0 | 0.34 | 2023 |
Vulnerability Analysis, Robustness Verification, and Mitigation Strategy for Machine Learning-Based Power System Stability Assessment Model Under Adversarial Examples | 0 | 0.34 | 2022 |
NPC: Neuron Path Coverage via Characterizing Decision Logic of Deep Neural Networks | 0 | 0.34 | 2022 |
Towards Robustness of Deep Program Processing Models—Detection, Estimation, and Enhancement | 0 | 0.34 | 2022 |
RegexScalpel: Regular Expression Denial of Service (ReDoS) Defense by Localize-and-Fix | 0 | 0.34 | 2022 |
Why My App Crashes? Understanding and Benchmarking Framework-Specific Exceptions of Android Apps | 1 | 0.35 | 2022 |
Research on Third-Party Libraries in Android Apps: A Taxonomy and Systematic Literature Review | 0 | 0.34 | 2022 |
Forecasting of nonlinear dynamics based on symbolic invariance | 0 | 0.34 | 2022 |
Online adaptation for autonomous unmanned systems driven by requirements satisfaction model | 0 | 0.34 | 2022 |
Enriching query semantics for code search with reinforcement learning | 1 | 0.36 | 2022 |
Towards characterizing bug fixes through dependency-level changes in Apache Java open source projects | 0 | 0.34 | 2022 |
Erratum to “Accurate and Scalable Cross-Architecture Cross-OS Binary Code Search With Emulation” | 0 | 0.34 | 2021 |
AdvFilter: Predictive Perturbation-aware Filtering against Adversarial Attack via Multi-domain Learning | 0 | 0.34 | 2021 |
FakeTagger: Robust Safeguards against DeepFake Dissemination via Provenance Tracking | 0 | 0.34 | 2021 |
Can We Trust Your Explanations? Sanity Checks for Interpreters in Android Malware Analysis | 3 | 0.44 | 2021 |
Explaining Regressions via Alignment Slicing and Mending | 4 | 0.39 | 2021 |
AVA - Adversarial Vignetting Attack against Visual Recognition. | 1 | 0.38 | 2021 |
Guardauto: A Decentralized Runtime Protection System for Autonomous Driving | 0 | 0.34 | 2021 |
On Evaluating Fault Resilient Encoding Schemes in Software | 0 | 0.34 | 2021 |
Who is Real Bob? Adversarial Attacks on Speaker Recognition Systems | 3 | 0.39 | 2021 |
Systematic testing of autonomous driving systems using map topology-based scenario classification | 0 | 0.34 | 2021 |
How are Deep Learning Models Similar?: An Empirical Study on Clone Analysis of Deep Learning Software | 0 | 0.34 | 2020 |
Privacy-Aware UAV Flights through Self-Configuring Motion Planning. | 0 | 0.34 | 2020 |
Variable Precision Multi-granularity Rough Soft Sets Based on Multiple Thresholds. | 0 | 0.34 | 2020 |
An Empirical Study on ARM Disassembly Tools | 2 | 0.37 | 2020 |
An empirical assessment of security risks of global Android banking apps | 6 | 0.42 | 2020 |
An Empirical Evaluation of GDPR Compliance Violations in Android mHealth Apps | 2 | 0.37 | 2020 |
An energy-efficient deep convolutional neural networks coprocessor for multi-object detection | 0 | 0.34 | 2020 |
An Empirical Study of Usages, Updates and Risks of Third-Party Libraries in Java Projects | 3 | 0.41 | 2020 |
DeepRhythm: Exposing DeepFakes with Attentional Visual Heartbeat Rhythms | 2 | 0.42 | 2020 |
Typestate-guided fuzzer for discovering use-after-free vulnerabilities | 6 | 0.43 | 2020 |
DeepSonar: Towards Effective and Robust Detection of AI-Synthesized Fake Voices | 2 | 0.37 | 2020 |
Audee: automated testing for deep learning frameworks | 6 | 0.52 | 2020 |
SADT: syntax-aware differential testing of certificate validation in SSL/TLS implementations | 1 | 0.35 | 2020 |
MUZZ: Thread-aware Grey-box Fuzzing for Effective Bug Hunting in Multithreaded Programs | 1 | 0.35 | 2020 |
What’s Spain’s Paris? Mining analogical libraries from Q&A discussions | 2 | 0.36 | 2019 |
A Large-Scale Empirical Study on Industrial Fake Apps. | 7 | 0.41 | 2019 |
Architecture-Based Behavioral Adaptation with Generated Alternatives and Relaxed Constraints. | 1 | 0.35 | 2019 |
The Optimization of Sum-Product Network Structure Learning | 1 | 0.35 | 2019 |
DeepCT: Tomographic Combinatorial Testing for Deep Learning Systems | 14 | 0.53 | 2019 |
A Parametric Rely-Guarantee Reasoning Framework for Concurrent Reactive Systems. | 0 | 0.34 | 2019 |
DeepMutation++: a mutation testing framework for deep learning systems | 3 | 0.37 | 2019 |
How security bugs are fixed and what can be improved: an empirical study with Mozilla | 3 | 0.40 | 2019 |
Learning Performance Optimization from Code Changes for Android Apps | 1 | 0.34 | 2019 |
DeepStellar - model-based quantitative analysis of stateful deep learning systems. | 20 | 0.65 | 2019 |
Vultron: catching vulnerable smart contracts once and for all | 2 | 0.36 | 2019 |
Locating vulnerabilities in binaries via memory layout recovering. | 4 | 0.38 | 2019 |
Stochastic on-time arrival problem in transit networks. | 1 | 0.41 | 2018 |
From UI design image to GUI skeleton: a neural machine translator to bootstrap mobile GUI implementation. | 17 | 0.59 | 2018 |
ROPSentry: Runtime defense against ROP attacks using hardware performance counters. | 2 | 0.36 | 2018 |