Tianyue Luo

Orcid: 0009-0000-9454-2924

According to our database1, Tianyue Luo authored at least 30 papers between 2015 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Interpretation of Hot Spots in Wuhan New Town Development and Analysis of Influencing Factors Based on Spatio-Temporal Pattern Mining.
ISPRS Int. J. Geo Inf., 2024

RefGaussian: Disentangling Reflections from 3D Gaussian Splatting for Realistic Rendering.
CoRR, 2024

A Wolf in Sheep's Clothing: Practical Black-box Adversarial Attacks for Evading Learning-based Windows Malware Detection in the Wild.
Proceedings of the 33rd USENIX Security Symposium, 2024

APP-Miner: Detecting API Misuses via Automatically Mining API Path Patterns.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

When Large Language Models Confront Repository-Level Automatic Program Repair: How Well They Done?
Proceedings of the 2024 IEEE/ACM 46th International Conference on Software Engineering: Companion Proceedings, 2024

Towards Query-Efficient Decision-Based Adversarial Attacks Through Frequency Domain.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2024

VulDL: Tree-based and Graph-based Neural Networks for Vulnerability Detection and Localization.
Proceedings of the 28th International Conference on Evaluation and Assessment in Software Engineering, 2024

2023
Adversarial attacks against Windows PE malware detection: A survey of the state-of-the-art.
Comput. Secur., May, 2023

Self-supervised Learning for Pre-Training 3D Point Clouds: A Survey.
CoRR, 2023

A Needle is an Outlier in a Haystack: Hunting Malicious PyPI Packages with Code Clustering.
Proceedings of the 38th IEEE/ACM International Conference on Automated Software Engineering, 2023

An Empirical Study of License Conflict in Free and Open Source Software.
Proceedings of the 45th IEEE/ACM International Conference on Software Engineering: Software Engineering in Practice, 2023

Automatic Program Repair via Learning Edits on Sequence Code Property Graph.
Proceedings of the 29th IEEE International Conference on Parallel and Distributed Systems, 2023

Generative Diffusion Prior for Unified Image Restoration and Enhancement.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2023

2022
Research on the Dynamic Evolution of the Landscape Pattern in the Urban Fringe Area of Wuhan from 2000 to 2020.
ISPRS Int. J. Geo Inf., 2022

Cross Platform API Mappings based on API Documentation Graphs.
Proceedings of the 22nd IEEE International Conference on Software Quality, 2022

A Multi-feature Fusion Method with Attention Mechanism for Long Text Classification.
Proceedings of the ICCDA 2022: The 6th International Conference on Compute and Data Analysis, Virtual Event / Shanghai, China, February 25, 2022

2021
AI-CTO: Knowledge graph for automated and dependable software stack solution.
J. Intell. Fuzzy Syst., 2021

Adversarial Attacks against Windows PE Malware Detection: A Survey of the State-of-the-Art.
CoRR, 2021

A Large-Scale Study on Vulnerabilities in Linux using Vtopia.
Proceedings of the 21st IEEE International Conference on Software Quality, 2021

MultiCode: A Unified Code Analysis Framework based on Multi-type and Multi-granularity Semantic Learning.
Proceedings of the IEEE International Symposium on Software Reliability Engineering, 2021

2020
PassEye: Sniffing Your Password from HTTP Sessions by Deep Neural Network.
Proceedings of the Cyber Security - 17th China Annual Conference, 2020

Information Leakage by Model Weights on Federated Learning.
Proceedings of the PPMLP'20: Proceedings of the 2020 Workshop on Privacy-Preserving Machine Learning in Practice, 2020

2019
VulSniper: Focus Your Attention to Shoot Fine-Grained Vulnerabilities.
Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence, 2019

2018
Pre-Patch: Find Hidden Threats in Open Software Based on Machine Learning Method.
Proceedings of the Services - SERVICES 2018, 2018

MAD-API: Detection, Correction and Explanation of API Misuses in Distributed Android Applications.
Proceedings of the Artificial Intelligence and Mobile Services - AIMS 2018, 2018

2017
Exception beyond Exception: Crashing Android System by Trapping in "Uncaught Exception".
Proceedings of the 39th IEEE/ACM International Conference on Software Engineering: Software Engineering in Practice Track, 2017

Droidrevealer: Automatically detecting Mysterious Codes in Android applications.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2017

PACS: Pemission abuse checking system for android applictions based on review mining.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2017

2015
POSTER: biTheft: Stealing Your Secrets by Bidirectional Covert Channel Communication with Zero-Permission Android Application.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015

POSTER: PatchGen: Towards Automated Patch Detection and Generation for 1-Day Vulnerabilities.
Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, 2015


  Loading...