Paper 'EMC: A Semantic-Enhanced Malware Classification Method with Robustness and Scalability' accepted by ICSE'2026
Paper 'CentSCA: 基于中心性分析的C/C++软件成分分析方法' accepted by Journal of Computer Science (Chinese) 2025
Paper 'What is Wrong with Your Code Generated by Large Language Models? An Extensive Study' accepted by SCIS'2025
Paper 'A Scalable Vulnerability Detection System with Multi-View Graph Representations' accepted by TOSEM'2025
Paper 'VulSCA: A Community-Level SCA Approach for Accurate C/C++ Supply Chain Vulnerability Analysis' accepted by NDSS'2026
Paper 'Demystifying the Evolution of Neural Networks with BOM Analysis: Insights from a Large-Scale Study of 55,997 GitHub Repositories' accepted by ASE'2025
Paper 'BinCoFer: Three-Stage Purification for Effective C/C++ Binary Third-Party Library Detection' accepted by JSS'2025
Paper 'MalScan: Android Malware Detection Based on Social-Network Centrality Analysis' accepted by TDSC'2025
Paper 'VulFewShot: 利用对比学习改进少样本漏洞分类检测' accepted by Journal of Software (Chinese) 2025
Paper 'Fine-grained Code Clone Detection by Keywords-based Connection of Program Dependency Graph' accepted by TR'2025
Paper 'Fighting Fire with Fire: Continuous Attack for Adversarial Android Malware Detection' accepted by USENIX Security'2025
Paper 'Vulseye: Detect Smart Contract Vulnerabilities via Stateful Directed Graybox Fuzzing' accepted by TIFS'2025
Paper 'Towards Effective Detection of Ponzi schemes on Ethereum with Contract Runtime Behavior Graph' accepted by TOSEM'2024
Paper 'TokenScout: Early Detection of Ethereum Scam Tokens via Temporal Graph Learning' accepted by CCS'2024
Paper 'The Software Genome Project: Unraveling Software Through Genetic Principles' accepted by ASE NIER'2024
Paper 'MalSensor: Fast and Robust Windows Malware Classification' accepted by TOSEM'2024
Paper 'A Concept Drift-Resistant Malware Classification Method Based on BERT and Autoencoder' accepted by JOS'2024
Paper 'Uncovering and Mitigating the Impact of Code Obfuscation on Dataset Annotation with Antivirus Engines' accepted by ISSTA'2024
Paper 'FIRE: Combining Multi-Stage Filtering with Taint Analysis for Scalable Recurring Vulnerability Detection' accepted by USENIX Security'2024
Paper 'CC2Vec: Combining Typed Tokens with Contrastive Learning for Effective Code Clone Detection' accepted by FSE'2024
Paper 'Historical Embedding-Guided Efficient Large-Scale Federated Graph Learning' accepted by SIGMOD'2024
Paper 'DeepFPD: Browser Fingerprinting Detection via Deep Learning with Multi-Modal Learning and Attention' accepted by TR'2024