Yueming Wu
Orcid: 0000-0002-1515-3558
According to our database1,
Yueming Wu
authored at least 45 papers
between 2009 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
On csauthors.net:
Bibliography
2024
DeepFPD: Browser Fingerprinting Detection via Deep Learning With Multimodal Learning and Attention.
IEEE Trans. Reliab., September, 2024
IEEE Trans. Reliab., June, 2024
IEEE Trans. Reliab., March, 2024
COCL: An Intelligent Framework for Enhancing Deep Learning-Based Vulnerability Detection.
IEEE Trans. Ind. Informatics, March, 2024
CC2Vec: Combining Typed Tokens with Contrastive Learning for Effective Code Clone Detection.
Proc. ACM Softw. Eng., 2024
Proc. ACM Manag. Data, 2024
Vulseye: Detect Smart Contract Vulnerabilities via Stateful Directed Graybox Fuzzing.
CoRR, 2024
CoRR, 2024
Towards Effective Detection of Ponzi schemes on Ethereum with Contract Runtime Behavior Graph.
CoRR, 2024
CC2Vec: Combining Typed Tokens with Contrastive Learning for Effective Code Clone Detection.
CoRR, 2024
TGMM: Combining Parse Tree with GPU for Scalable Multilingual and Multi-Granularity Code Clone Detection.
CoRR, 2024
FIRE: Combining Multi-Stage Filtering with Taint Analysis for Scalable Recurring Vulnerability Detection.
Proceedings of the 33rd USENIX Security Symposium, 2024
Uncovering and Mitigating the Impact of Code Obfuscation on Dataset Annotation with Antivirus Engines.
Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2024
PonziGuard: Detecting Ponzi Schemes on Ethereum with Contract Runtime Behavior Graph (CRBG).
Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024
A Comprehensive Study of Learning-based Android Malware Detectors under Challenging Environments.
Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024
Machine Learning is All You Need: A Simple Token-based Approach for Effective Code Clone Detection.
Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024
2023
IEEE Trans. Software Eng., September, 2023
The Software Genome Project: Venture to the Genomic Pathways of Open Source Software and Its Applications.
CoRR, 2023
Towards Understanding the Capability of Large Language Models on Code Clone Detection: A Survey.
CoRR, 2023
Tritor: Detecting Semantic Code Clones by Building Social Network-Based Triads Model.
Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2023
Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2023
An Empirical Study on the Effects of Obfuscation on Static Machine Learning-Based Malicious JavaScript Detectors.
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2023
Fine-Grained Code Clone Detection with Block-Based Splitting of Abstract Syntax Tree.
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2023
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2023
Enhancing Deep Learning-based Vulnerability Detection by Building Behavior Graph Model.
Proceedings of the 45th IEEE/ACM International Conference on Software Engineering, 2023
OSSFP: Precise and Scalable C/C++ Third-Party Library Detection using Fingerprinting Functions.
Proceedings of the 45th IEEE/ACM International Conference on Software Engineering, 2023
Comparison and Evaluation of Clone Detection Techniques with Different Code Representations.
Proceedings of the 45th IEEE/ACM International Conference on Software Engineering, 2023
Proceedings of the 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Network, 2023
2022
Decorrelate Irrelevant, Purify Relevant: Overcome Textual Spurious Correlations from a Feature Perspective.
CoRR, 2022
Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering, 2022
Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering, 2022
Proceedings of the 44th IEEE/ACM 44th International Conference on Software Engineering, 2022
Decorrelate Irrelevant, Purify Relevant: Overcome Textual Spurious Correlations from a Feature Perspective.
Proceedings of the 29th International Conference on Computational Linguistics, 2022
2021
ACM Trans. Softw. Eng. Methodol., 2021
Gamification narrative design as a predictor for mobile fitness app user persistent usage intentions: a goal priming perspective.
Enterp. Inf. Syst., 2021
Boosting the Capability of Intelligent Vulnerability Detection by Training in a Human-Learning Manner.
CoRR, 2021
CoRR, 2021
Proceedings of the ISSTA '21: 30th ACM SIGSOFT International Symposium on Software Testing and Analysis, 2021
2020
Automatic 3D point cloud registration algorithm based on triangle similarity ratio consistency.
IET Image Process., 2020
IEEE Access, 2020
Proceedings of the 35th IEEE/ACM International Conference on Automated Software Engineering, 2020
2019
A Multigranularity Forensics and Analysis Method on Privacy Leakage in Cloud Environment.
IEEE Internet Things J., 2019
MalScan: Fast Market-Wide Mobile Malware Scanning by Social-Network Centrality Analysis.
Proceedings of the 34th IEEE/ACM International Conference on Automated Software Engineering, 2019
2010
Int. J. Virtual Real., 2010
2009