Ruitao Feng

Orcid: 0000-0001-9080-6865

According to our database1, Ruitao Feng authored at least 35 papers between 2012 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Enhancing Code Vulnerability Detection via Vulnerability-Preserving Data Augmentation.
CoRR, 2024

ART: The Alternating Reading Task Corpus for Speech Entrainment and Imitation.
CoRR, 2024

FT2Ra: A Fine-Tuning-Inspired Approach to Retrieval-Augmented Code Completion.
CoRR, 2024

Beyond Fidelity: Explaining Vulnerability Localization of Learning-based Detectors.
CoRR, 2024

2023
Comparison and Evaluation on Static Application Security Testing (SAST) Tools for Java.
Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2023

A Comprehensive Study on Quality Assurance Tools for Java.
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2023

SeqAdver: Automatic Payload Construction and Injection in Sequence-based Android Adversarial Attack.
Proceedings of the IEEE International Conference on Data Mining, 2023

Automatic Detection and Analysis towards Malicious Behavior in IoT Malware.
Proceedings of the IEEE International Conference on Data Mining, 2023

FOCUS: Fatigue-Reducing IOCs Through Prioritization and Scoring.
Proceedings of the IEEE Intl Conf on Dependable, 2023

2022
Overview of the Special Issue on Applications of Remote Sensing Imagery for Urban Areas.
Remote. Sens., 2022

MID: A Novel Mountainous Remote Sensing Imagery Registration Dataset Assessed by a Coarse-to-Fine Unsupervised Cascading Network.
Remote. Sens., 2022

Block Adjustment-Based Radiometric Normalization by Considering Global and Local Differences.
IEEE Geosci. Remote. Sens. Lett., 2022

Optical-to-SAR Image Matching Using Multiscale Masked Structure Features.
IEEE Geosci. Remote. Sens. Lett., 2022

Enhancing Security Patch Identification by Capturing Structures in Commits.
CoRR, 2022

TransRepair: Context-aware Program Repair for Compilation Errors.
Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering, 2022

2021
From market to device: adaptive and efficient malware detection for Android
PhD thesis, 2021

A Performance-Sensitive Malware Detection System Using Deep Learning on Mobile Devices.
IEEE Trans. Inf. Forensics Secur., 2021

Region-by-Region Registration Combining Feature-Based and Optical Flow Methods for Remote Sensing Images.
Remote. Sens., 2021

IconChecker: Anomaly Detection of Icon-Behaviors for Android Apps.
Proceedings of the 28th Asia-Pacific Software Engineering Conference, 2021

2020
Generating High-Quality and High-Resolution Seamless Satellite Imagery for Large-Scale Urban Regions.
Remote. Sens., 2020

SeqMobile: A Sequence Based Efficient Android Malware Detection System Using RNN on Mobile Devices.
CoRR, 2020

SeqMobile: An Efficient Sequence-Based Malware Detection System Using RNN on Mobile Devices.
Proceedings of the 25th International Conference on Engineering of Complex Computer Systems, 2020

2019
Learning Performance Optimization from Code Changes for Android Apps.
Proceedings of the 2019 IEEE International Conference on Software Testing, 2019

A Performance-Sensitive Malware Detection System on Mobile Platform.
Proceedings of the Formal Methods and Software Engineering, 2019

MobiDroid: A Performance-Sensitive Malware Detection System on Mobile Platform.
Proceedings of the 24th International Conference on Engineering of Complex Computer Systems, 2019

2018
DroidEcho: an in-depth dissection of malicious behaviors in Android applications.
Cybersecur., 2018

An Orchestrated Empirical Study on Deep Learning Frameworks and Platforms.
CoRR, 2018

2017
Registration of multitemporal GF-1 remote sensing images with weighting perspective transformation model.
Proceedings of the 2017 IEEE International Conference on Image Processing, 2017

2014
A Three-Dimensional Model for Software Security Evaluation.
Proceedings of the 2014 Theoretical Aspects of Software Engineering Conference, 2014

Automatic Verification for Later-Correspondence of Security Protocols.
Proceedings of the Structured Object-Oriented Formal Language and Method, 2014

OOPN-SRAM: A Novel Method for Software Risk Assessment.
Proceedings of the 2014 19th International Conference on Engineering of Complex Computer Systems, 2014

An Extended UML Method for the Verification of Security Protocols.
Proceedings of the 2014 19th International Conference on Engineering of Complex Computer Systems, 2014

2013
Detection Method of the Second-Order SQL Injection in Web Applications.
Proceedings of the Structured Object-Oriented Formal Language and Method, 2013

Architecture Security Evaluation Method Based on Security of the Components.
Proceedings of the 20th Asia-Pacific Software Engineering Conference, 2013

2012
The diagnosability of the <i>k</i>-ary <i>n</i>-cubes using the pessimistic strategy.
Int. J. Comput. Math., 2012


  Loading...