Lwin Khin Shar
Orcid: 0000-0001-5130-0407
According to our database1,
Lwin Khin Shar
authored at least 48 papers
between 2010 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2025
Comput. Secur., 2025
2024
Decentralized Multimedia Data Sharing in IoV: A Learning-Based Equilibrium of Supply and Demand.
IEEE Trans. Veh. Technol., March, 2024
CoRR, 2024
CoRR, 2024
CoRR, 2024
Proceedings of the 2024 IEEE/ACM 46th International Conference on Software Engineering: Companion Proceedings, 2024
2023
Experimental comparison of features, analyses, and classifiers for Android malware detection.
Empir. Softw. Eng., November, 2023
AutoConf: Automated Configuration of Unsupervised Learning Systems Using Metamorphic Testing and Bayesian Optimization.
Proceedings of the 38th IEEE/ACM International Conference on Automated Software Engineering, 2023
Fine-Grained In-Context Permission Classification for Android Apps Using Control-Flow Graph Embedding.
Proceedings of the 38th IEEE/ACM International Conference on Automated Software Engineering, 2023
Proceedings of the 38th IEEE/ACM International Conference on Automated Software Engineering, 2023
2022
Benchmark suite for "An Integrated Approach for Effective Injection Vulnerability Analysis of Web Applications through Security Slicing and Hybrid Constraint Solving".
Dataset, May, 2022
Automated reverse engineering of role-based access control policies of web applications.
J. Syst. Softw., 2022
AP-Coach: formative feedback generation for learning introductory programming concepts.
Proceedings of the IEEE International Conference on Teaching, 2022
Differentiated Security Architecture for Secure and Efficient Infotainment Data Communication in IoV Networks.
Proceedings of the Network and System Security - 16th International Conference, 2022
Right to Know, Right to Refuse: Towards UI Perception-Based Automated Fine-Grained Permission Controls for Android Apps.
Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering, 2022
XSS for the Masses: Integrating Security in a Web Programming Course using a Security Scanner.
Proceedings of the ITiCSE 2022: Innovation and Technology in Computer Science Education, Dublin, Ireland, July 8, 2022
UIPDroid: Unrooted Dynamic Monitor of Android App UIs for Fine-Grained Permission Control.
Proceedings of the 44th IEEE/ACM International Conference on Software Engineering: Companion Proceedings, 2022
DronLomaly: Runtime Detection of Anomalous Drone Behaviors via Log Analysis and Deep Learning.
Proceedings of the 29th Asia-Pacific Software Engineering Conference, 2022
2021
IEEE Pervasive Comput., 2021
Empir. Softw. Eng., 2021
Empirical Evaluation of Minority Oversampling Techniques in the Context of Android Malware Detection.
Proceedings of the 28th Asia-Pacific Software Engineering Conference, 2021
2020
An Integrated Approach for Effective Injection Vulnerability Analysis of Web Applications Through Security Slicing and Hybrid Constraint Solving.
IEEE Trans. Software Eng., 2020
Empir. Softw. Eng., 2020
Proceedings of the MOBILESoft '20: IEEE/ACM 7th International Conference on Mobile Software Engineering and Systems, 2020
Proceedings of the 27th Asia-Pacific Software Engineering Conference, 2020
2018
J. Syst. Softw., 2018
Inf. Softw. Technol., 2018
Proceedings of the 5th International Conference on Mobile Software Engineering and Systems, MOBILESoft@ICSE 2018, Gothenburg, Sweden, May 27, 2018
2017
Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering, 2017
Proceedings of the 39th International Conference on Software Engineering, 2017
2015
Web Application Vulnerability Prediction Using Hybrid Program Analysis and Machine Learning.
IEEE Trans. Dependable Secur. Comput., 2015
Proceedings of the 26th IEEE International Symposium on Software Reliability Engineering, 2015
Proceedings of the 10th IEEE/ACM International Workshop on Automation of Software Test, 2015
2014
Empirical Comparison of Intermediate Representations for Android Applications.
Proceedings of the 26th International Conference on Software Engineering and Knowledge Engineering, 2014
2013
Predicting SQL injection and cross site scripting vulnerabilities through mining input sanitization patterns.
Inf. Softw. Technol., 2013
A scalable approach for malware detection through bounded feature space behavior modeling.
Proceedings of the 2013 28th IEEE/ACM International Conference on Automated Software Engineering, 2013
Mining SQL injection and cross site scripting vulnerabilities using hybrid program analysis.
Proceedings of the 35th International Conference on Software Engineering, 2013
Proceedings of the 20th Asia-Pacific Software Engineering Conference, 2013
2012
Inf. Softw. Technol., 2012
IET Softw., 2012
Proceedings of the 20th ACM SIGSOFT Symposium on the Foundations of Software Engineering (FSE-20), 2012
Predicting common web application vulnerabilities from input validation and sanitization code patterns.
Proceedings of the IEEE/ACM International Conference on Automated Software Engineering, 2012
Mining input sanitization patterns for predicting SQL injection and cross site scripting vulnerabilities.
Proceedings of the 34th International Conference on Software Engineering, 2012
Proceedings of the 19th Asia-Pacific Software Engineering Conference, 2012
2010
Semi-Automated Verification and Removal of Open Redirect Vulnerabilities in Web Applications.
Proceedings of the 2010 International Conference on Software Engineering Research & Practice, 2010
Auditing the Defense Against Cross Site Scripting in Web Applications.
Proceedings of the SECRYPT 2010, 2010