Yueming Wu

Orcid: 0000-0002-1515-3558

According to our database1, Yueming Wu authored at least 45 papers between 2009 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
DeepFPD: Browser Fingerprinting Detection via Deep Learning With Multimodal Learning and Attention.
IEEE Trans. Reliab., September, 2024

Goner: Building Tree-Based N-Gram-Like Model for Semantic Code Clone Detection.
IEEE Trans. Reliab., June, 2024

An Empirical Study on Android Malware Characterization by Social Network Analysis.
IEEE Trans. Reliab., March, 2024

COCL: An Intelligent Framework for Enhancing Deep Learning-Based Vulnerability Detection.
IEEE Trans. Ind. Informatics, March, 2024

CC2Vec: Combining Typed Tokens with Contrastive Learning for Effective Code Clone Detection.
Proc. ACM Softw. Eng., 2024

Historical Embedding-Guided Efficient Large-Scale Federated Graph Learning.
Proc. ACM Manag. Data, 2024

Vulseye: Detect Smart Contract Vulnerabilities via Stateful Directed Graybox Fuzzing.
CoRR, 2024

What's Wrong with Your Code Generated by Large Language Models? An Extensive Study.
CoRR, 2024

Towards Effective Detection of Ponzi schemes on Ethereum with Contract Runtime Behavior Graph.
CoRR, 2024

CC2Vec: Combining Typed Tokens with Contrastive Learning for Effective Code Clone Detection.
CoRR, 2024

TGMM: Combining Parse Tree with GPU for Scalable Multilingual and Multi-Granularity Code Clone Detection.
CoRR, 2024

FIRE: Combining Multi-Stage Filtering with Taint Analysis for Scalable Recurring Vulnerability Detection.
Proceedings of the 33rd USENIX Security Symposium, 2024

Uncovering and Mitigating the Impact of Code Obfuscation on Dataset Annotation with Antivirus Engines.
Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2024

PonziGuard: Detecting Ponzi Schemes on Ethereum with Contract Runtime Behavior Graph (CRBG).
Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024

A Comprehensive Study of Learning-based Android Malware Detectors under Challenging Environments.
Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024

Machine Learning is All You Need: A Simple Token-based Approach for Effective Code Clone Detection.
Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024

2023
Code2Img: Tree-Based Image Transformation for Scalable Code Clone Detection.
IEEE Trans. Software Eng., September, 2023

The Software Genome Project: Venture to the Genomic Pathways of Open Source Software and Its Applications.
CoRR, 2023

Towards Understanding the Capability of Large Language Models on Code Clone Detection: A Survey.
CoRR, 2023

Tritor: Detecting Semantic Code Clones by Building Social Network-Based Triads Model.
Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2023

Gitor: Scalable Code Clone Detection by Building Global Sample Graph.
Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2023

An Empirical Study on the Effects of Obfuscation on Static Machine Learning-Based Malicious JavaScript Detectors.
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2023

Fine-Grained Code Clone Detection with Block-Based Splitting of Abstract Syntax Tree.
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2023

Interpreters for GNN-Based Vulnerability Detection: Are We There Yet?
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2023

Enhancing Deep Learning-based Vulnerability Detection by Building Behavior Graph Model.
Proceedings of the 45th IEEE/ACM International Conference on Software Engineering, 2023

OSSFP: Precise and Scalable C/C++ Third-Party Library Detection using Fingerprinting Functions.
Proceedings of the 45th IEEE/ACM International Conference on Software Engineering, 2023

Comparison and Evaluation of Clone Detection Techniques with Different Code Representations.
Proceedings of the 45th IEEE/ACM International Conference on Software Engineering, 2023

JSRevealer: A Robust Malicious JavaScript Detector against Obfuscation.
Proceedings of the 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Network, 2023

2022
Decorrelate Irrelevant, Purify Relevant: Overcome Textual Spurious Correlations from a Feature Perspective.
CoRR, 2022

Detecting Semantic Code Clones by Building AST-based Markov Chains Model.
Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering, 2022

TreeCen: Building Tree Graph for Scalable Semantic Code Clone Detection.
Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering, 2022

VulCNN: An Image-inspired Scalable Vulnerability Detection System.
Proceedings of the 44th IEEE/ACM 44th International Conference on Software Engineering, 2022

Decorrelate Irrelevant, Purify Relevant: Overcome Textual Spurious Correlations from a Feature Perspective.
Proceedings of the 29th International Conference on Computational Linguistics, 2022

2021
IntDroid: Android Malware Detection Based on API Intimacy Analysis.
ACM Trans. Softw. Eng. Methodol., 2021

Gamification narrative design as a predictor for mobile fitness app user persistent usage intentions: a goal priming perspective.
Enterp. Inf. Syst., 2021

Boosting the Capability of Intelligent Vulnerability Detection by Training in a Human-Learning Manner.
CoRR, 2021

Obfuscation-resilient Android Malware Analysis Based on Contrastive Learning.
CoRR, 2021

HomDroid: detecting Android covert malware by social-network homophily analysis.
Proceedings of the ISSTA '21: 30th ACM SIGSOFT International Symposium on Software Testing and Analysis, 2021

2020
Automatic 3D point cloud registration algorithm based on triangle similarity ratio consistency.
IET Image Process., 2020

Bare-Hand Depth Perception Used in Augmented Reality Assembly Supporting.
IEEE Access, 2020

SCDetector: Software Functional Clone Detection Based on Semantic Tokens Analysis.
Proceedings of the 35th IEEE/ACM International Conference on Automated Software Engineering, 2020

2019
A Multigranularity Forensics and Analysis Method on Privacy Leakage in Cloud Environment.
IEEE Internet Things J., 2019

MalScan: Fast Market-Wide Mobile Malware Scanning by Social-Network Centrality Analysis.
Proceedings of the 34th IEEE/ACM International Conference on Automated Software Engineering, 2019

2010
Stereo Educational Game with Vision Based Interaction in Virtual Environment.
Int. J. Virtual Real., 2010

2009
Web-based virtual operating of CNC milling machine tools.
Comput. Ind., 2009


  Loading...