Mutian Yang

Orcid: 0000-0002-0222-7036

According to our database1, Mutian Yang authored at least 19 papers between 2013 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
VulDL: Tree-based and Graph-based Neural Networks for Vulnerability Detection and Localization.
Proceedings of the 28th International Conference on Evaluation and Assessment in Software Engineering, 2024

2023
An Empirical Study of License Conflict in Free and Open Source Software.
Proceedings of the 45th IEEE/ACM International Conference on Software Engineering: Software Engineering in Practice, 2023

2021
AI-CTO: Knowledge graph for automated and dependable software stack solution.
J. Intell. Fuzzy Syst., 2021

A Large-Scale Study on Vulnerabilities in Linux using Vtopia.
Proceedings of the 21st IEEE International Conference on Software Quality, 2021

MultiCode: A Unified Code Analysis Framework based on Multi-type and Multi-granularity Semantic Learning.
Proceedings of the IEEE International Symposium on Software Reliability Engineering, 2021

2020
PassEye: Sniffing Your Password from HTTP Sessions by Deep Neural Network.
Proceedings of the Cyber Security - 17th China Annual Conference, 2020

Information Leakage by Model Weights on Federated Learning.
Proceedings of the PPMLP'20: Proceedings of the 2020 Workshop on Privacy-Preserving Machine Learning in Practice, 2020

2019
VulSniper: Focus Your Attention to Shoot Fine-Grained Vulnerabilities.
Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence, 2019

2018
Pre-Patch: Find Hidden Threats in Open Software Based on Machine Learning Method.
Proceedings of the Services - SERVICES 2018, 2018

MAD-API: Detection, Correction and Explanation of API Misuses in Distributed Android Applications.
Proceedings of the Artificial Intelligence and Mobile Services - AIMS 2018, 2018

2017
LaChouTi: kernel vulnerability responding framework for the fragmented Android devices.
Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering, 2017

Exception beyond Exception: Crashing Android System by Trapping in "Uncaught Exception".
Proceedings of the 39th IEEE/ACM International Conference on Software Engineering: Software Engineering in Practice Track, 2017

Droidrevealer: Automatically detecting Mysterious Codes in Android applications.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2017

PACS: Pemission abuse checking system for android applictions based on review mining.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2017

2015
POSTER: biTheft: Stealing Your Secrets by Bidirectional Covert Channel Communication with Zero-Permission Android Application.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

POSTER: PatchGen: Towards Automated Patch Detection and Generation for 1-Day Vulnerabilities.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

2013
Policykeeper: Recommending Proper Security Mechanisms Based on the Severity of Vulnerability Considering User Experience.
Proceedings of the Seventh International Conference on Software Security and Reliability, 2013

Vulcloud: Scalable and Hybrid Vulnerability Detection in Cloud Computing.
Proceedings of the Seventh International Conference on Software Security and Reliability, 2013

Vulnerability Detection of Android System in Fuzzing Cloud.
Proceedings of the 2013 IEEE Sixth International Conference on Cloud Computing, Santa Clara, CA, USA, June 28, 2013


  Loading...