Ping Luo
Orcid: 0000-0001-6171-3811Affiliations:
- Tsinghua University, Key Laboratory for Information System Security, Beijing, China
- Tsinghua University, School of Software, Beijing, China
According to our database1,
Ping Luo
authored at least 22 papers
between 2018 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024
2022
Int. J. Inf. Comput. Secur., 2022
LibDB: An Effective and Efficient Framework for Detecting Third-Party Libraries in Binaries.
Proceedings of the 19th IEEE/ACM International Conference on Mining Software Repositories, 2022
2021
SQVDT: A scalable quantitative vulnerability detection technique for source code security assessment.
Softw. Pract. Exp., 2021
An improved cryptanalysis of large RSA decryption exponent with constrained secret key.
Int. J. Inf. Comput. Secur., 2021
Int. J. Inf. Comput. Secur., 2021
DroidMD: an efficient and scalable Android malware detection approach at source code level.
Int. J. Inf. Comput. Secur., 2021
Cryptanalysis of a Special Case of RSA Large Decryption Exponent Using Lattice Basis Reduction Method.
Proceedings of the 6th IEEE International Conference on Computer and Communication Systems, 2021
2020
IBFET: Index-based features extraction technique for scalable code clone detection at file level granularity.
Softw. Pract. Exp., 2020
J. Inf. Sci. Eng., 2020
Remarks on the cryptanalysis of common prime RSA for IoT constrained low power devices.
Inf. Sci., 2020
IET Inf. Secur., 2020
IACR Cryptol. ePrint Arch., 2020
Proceedings of the 35th IEEE/ACM International Conference on Automated Software Engineering, 2020
2019
An improved software reliability prediction model by using high precision error iterative analysis method.
Softw. Test. Verification Reliab., 2019
A Unified Measurable Software Trustworthy Model Based on Vulnerability Loss Speed Index.
Proceedings of the 18th IEEE International Conference On Trust, 2019
An Integrated Software Vulnerability Discovery Model based on Artificial Neural Network.
Proceedings of the 31st International Conference on Software Engineering and Knowledge Engineering, 2019
VCIPR: Vulnerable Code is Identifiable When a Patch is Released (Hacker's Perspective).
Proceedings of the 12th IEEE Conference on Software Testing, Validation and Verification, 2019
Proceedings of the 21st IEEE International Conference on High Performance Computing and Communications; 17th IEEE International Conference on Smart City; 5th IEEE International Conference on Data Science and Systems, 2019
2018
A Unified Measurement Solution of Software Trustworthiness Based on Social-to-Software Framework.
J. Comput. Sci. Technol., 2018
DCCD: An Efficient and Scalable Distributed Code Clone Detection Technique for Big Code.
Proceedings of the 30th International Conference on Software Engineering and Knowledge Engineering, 2018
DroidCC: A Scalable Clone Detection Approach for Android Applications to Detect Similarity at Source Code Level.
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018