Ping Luo

Orcid: 0000-0001-6171-3811

Affiliations:
  • Tsinghua University, Key Laboratory for Information System Security, Beijing, China
  • Tsinghua University, School of Software, Beijing, China


According to our database1, Ping Luo authored at least 22 papers between 2018 and 2024.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
DSFM: Enhancing Functional Code Clone Detection with Deep Subtree Interactions.
Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024

2022
Obfuscated code is identifiable by a token-based code clone detection technique.
Int. J. Inf. Comput. Secur., 2022

LibDB: An Effective and Efficient Framework for Detecting Third-Party Libraries in Binaries.
Proceedings of the 19th IEEE/ACM International Conference on Mining Software Repositories, 2022

2021
SQVDT: A scalable quantitative vulnerability detection technique for source code security assessment.
Softw. Pract. Exp., 2021

An improved cryptanalysis of large RSA decryption exponent with constrained secret key.
Int. J. Inf. Comput. Secur., 2021

Vulnerability severity prediction model for software based on Markov chain.
Int. J. Inf. Comput. Secur., 2021

DroidMD: an efficient and scalable Android malware detection approach at source code level.
Int. J. Inf. Comput. Secur., 2021

Cryptanalysis of a Special Case of RSA Large Decryption Exponent Using Lattice Basis Reduction Method.
Proceedings of the 6th IEEE International Conference on Computer and Communication Systems, 2021

2020
IBFET: Index-based features extraction technique for scalable code clone detection at file level granularity.
Softw. Pract. Exp., 2020

DroidSD: An Efficient Indexed Based Android Applications Similarity Detection Tool.
J. Inf. Sci. Eng., 2020

Remarks on the cryptanalysis of common prime RSA for IoT constrained low power devices.
Inf. Sci., 2020

How to build a vulnerability benchmark to overcome cyber security attacks.
IET Inf. Secur., 2020

Cryptanalysis of RSA: A Special Case of Boneh-Durfee's Attack.
IACR Cryptol. ePrint Arch., 2020

OSLDetector: Identifying Open-Source Libraries through Binary Analysis.
Proceedings of the 35th IEEE/ACM International Conference on Automated Software Engineering, 2020

2019
An improved software reliability prediction model by using high precision error iterative analysis method.
Softw. Test. Verification Reliab., 2019

A Unified Measurable Software Trustworthy Model Based on Vulnerability Loss Speed Index.
Proceedings of the 18th IEEE International Conference On Trust, 2019

An Integrated Software Vulnerability Discovery Model based on Artificial Neural Network.
Proceedings of the 31st International Conference on Software Engineering and Knowledge Engineering, 2019

VCIPR: Vulnerable Code is Identifiable When a Patch is Released (Hacker's Perspective).
Proceedings of the 12th IEEE Conference on Software Testing, Validation and Verification, 2019

An RSA Based Authentication System for Smart IoT Environment.
Proceedings of the 21st IEEE International Conference on High Performance Computing and Communications; 17th IEEE International Conference on Smart City; 5th IEEE International Conference on Data Science and Systems, 2019

2018
A Unified Measurement Solution of Software Trustworthiness Based on Social-to-Software Framework.
J. Comput. Sci. Technol., 2018

DCCD: An Efficient and Scalable Distributed Code Clone Detection Technique for Big Code.
Proceedings of the 30th International Conference on Software Engineering and Knowledge Engineering, 2018

DroidCC: A Scalable Clone Detection Approach for Android Applications to Detect Similarity at Source Code Level.
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018


  Loading...