Xiang Ling

Orcid: 0000-0002-7377-7844

Affiliations:
  • Institute of Software, Chinese Academy of Sciences, China
  • Zhejiang University, Hangzhou, Zhejiang, China (former)


According to our database1, Xiang Ling authored at least 26 papers between 2017 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Hierarchical Threshold Pruning Based on Uniform Response Criterion.
IEEE Trans. Neural Networks Learn. Syst., August, 2024

AdvSQLi: Generating Adversarial SQL Injections Against Real-World WAF-as-a-Service.
IEEE Trans. Inf. Forensics Secur., 2024

Robust filter pruning guided by deep frequency-features for edge intelligence.
Neurocomputing, 2024

A Wolf in Sheep's Clothing: Practical Black-box Adversarial Attacks for Evading Learning-based Windows Malware Detection in the Wild.
Proceedings of the 33rd USENIX Security Symposium, 2024

APP-Miner: Detecting API Misuses via Automatically Mining API Path Patterns.
Proceedings of the IEEE Symposium on Security and Privacy, 2024

When Large Language Models Confront Repository-Level Automatic Program Repair: How Well They Done?
Proceedings of the 2024 IEEE/ACM 46th International Conference on Software Engineering: Companion Proceedings, 2024

Towards Query-Efficient Decision-Based Adversarial Attacks Through Frequency Domain.
Proceedings of the IEEE International Conference on Multimedia and Expo, 2024

VulDL: Tree-based and Graph-based Neural Networks for Vulnerability Detection and Localization.
Proceedings of the 28th International Conference on Evaluation and Assessment in Software Engineering, 2024

2023
Towards desirable decision boundary by Moderate-Margin Adversarial Training.
Pattern Recognit. Lett., September, 2023

Adversarial attacks against Windows PE malware detection: A survey of the state-of-the-art.
Comput. Secur., May, 2023

Multilevel Graph Matching Networks for Deep Graph Similarity Learning.
IEEE Trans. Neural Networks Learn. Syst., February, 2023

A Needle is an Outlier in a Haystack: Hunting Malicious PyPI Packages with Code Clustering.
Proceedings of the 38th IEEE/ACM International Conference on Automated Software Engineering, 2023

An Empirical Study of License Conflict in Free and Open Source Software.
Proceedings of the 45th IEEE/ACM International Conference on Software Engineering: Software Engineering in Practice, 2023

Automatic Program Repair via Learning Edits on Sequence Code Property Graph.
Proceedings of the 29th IEEE International Conference on Parallel and Distributed Systems, 2023

2022
EI-MTD: Moving Target Defense for Edge Intelligence against Adversarial Attacks.
ACM Trans. Priv. Secur., 2022

Cross Platform API Mappings based on API Documentation Graphs.
Proceedings of the 22nd IEEE International Conference on Software Quality, 2022

MalGraph: Hierarchical Graph Neural Networks for Robust Windows Malware Detection.
Proceedings of the IEEE INFOCOM 2022, 2022

Toward Low-Overhead Inter-Switch Coordination in Network-Wide Data Plane Program Deployment.
Proceedings of the 42nd IEEE International Conference on Distributed Computing Systems, 2022

Robust Network Architecture Search via Feature Distortion Restraining.
Proceedings of the Computer Vision - ECCV 2022, 2022

Filter Pruning via Feature Discrimination in Deep Neural Networks.
Proceedings of the Computer Vision - ECCV 2022, 2022

2021
Deep Graph Matching and Searching for Semantic Code Retrieval.
ACM Trans. Knowl. Discov. Data, 2021

Adversarial Attacks against Windows PE Malware Detection: A Survey of the State-of-the-Art.
CoRR, 2021

2020
Towards Imperceptible Adversarial Image Patches Based on Network Explanations.
CoRR, 2020

Hierarchical Graph Matching Networks for Deep Graph Similarity Learning.
CoRR, 2020

2019
DEEPSEC: A Uniform Platform for Security Analysis of Deep Learning Model.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019

2017
H _2 DoS: An Application-Layer DoS Attack Towards HTTP/2 Protocol.
Proceedings of the Security and Privacy in Communication Networks, 2017


  Loading...