DEEPSEC: A Uniform Platform for Security Analysis of Deep Learning Model X Ling, S Ji, J Zou, J Wang, C Wu, B Li, T Wang IEEE Symposium on Security and Privacy (S&P), 673--690, 2019 | 154 | 2019 |
Deep Graph Matching and Searching for Semantic Code Retrieval X Ling, L Wu, S Wang, G Pan, T Ma, F Xu, AX Liu, C Wu, S Ji ACM Transactions on Knowledge Discovery from Data (TKDD) 15 (5), 1-21, 2021 | 81 | 2021 |
Multilevel Graph Matching Networks for Deep Graph Similarity Learning X Ling, L Wu, S Wang, T Ma, F Xu, AX Liu, C Wu, S Ji IEEE Transactions on Neural Networks and Learning Systems (TNNLS) 34 (2 …, 2023 | 61 | 2023 |
Adversarial Attacks against Windows PE Malware Detection: A Survey of the State-of-the-Art X Ling, L Wu, J Zhang, Z Qu, W Deng, X Chen, Y Qian, C Wu, S Ji, T Luo, ... Computers & Security 128, 103134, 2023 | 55 | 2023 |
MalGraph: Hierarchical Graph Neural Networks for Robust Windows Malware Detection X Ling, L Wu, W Deng, Z Qu, J Zhang, S Zhang, T Ma, B Wang, C Wu, S Ji IEEE Conference on Computer Communications (INFOCOM), 1998-2007, 2022 | 19 | 2022 |
EI-MTD: Moving Target Defense for Edge Intelligence against Adversarial Attacks Y Qian, Y Guo, Q Shao, J Wang, B Wang, Z Gu, X Ling, C Wu ACM Transactions on Privacy and Security 25 (3), 1-24, 2022 | 15 | 2022 |
Filter Pruning via Feature Discrimination in Deep Neural Networks Z He, Y Qian, Y Wang, B Wang, X Guan, Z Gu, X Ling, S Zeng, H Wang, ... European Conference on Computer Vision, 245-261, 2022 | 15 | 2022 |
H{\_}2 DoS: An Application-Layer DoS Attack Towards HTTP/2 Protocol X Ling, C Wu, S Ji, M Han International Conference on Security and Privacy in Communication Systems …, 2017 | 10 | 2017 |
Graph Neural Networks: Graph Matching X Ling, L Wu, C Wu, S Ji Graph Neural Networks: Foundations, Frontiers, and Applications, 277-295, 2022 | 8 | 2022 |
Hierarchical Threshold Pruning Based on Uniform Response Criterion Y Qian, Z He, Y Wang, B Wang, X Ling, Z Gu, H Wang, S Zeng, W Swaileh IEEE Transactions on Neural Networks and Learning Systems, 2023 | 5 | 2023 |
Robust network architecture search via feature distortion restraining Y Qian, S Huang, B Wang, X Ling, X Guan, Z Gu, S Zeng, W Zhou, ... European Conference on Computer Vision, 122-138, 2022 | 3 | 2022 |
When Large Language Models Confront Repository-Level Automatic Program Repair: How Well They Done? Y Chen, J Wu, X Ling, C Li, Z Rui, T Luo, Y Wu arXiv preprint arXiv:2403.00448, 2024 | 2 | 2024 |
Toward Low-Overhead Inter-Switch Coordination in Network-Wide Data Plane Program Deployment X Chen, H Liu, Q Xiao, K Guo, T Sun, X Ling, X Liu, Q Huang, D Zhang, ... 2022 IEEE 42nd International Conference on Distributed Computing Systems …, 2022 | 2 | 2022 |
AutoSpear: Towards Automatically Bypassing and Inspecting Web Application Firewalls Z Qu, X Ling, W Chunming BlackHat Asia 2022, 2022 | 2 | 2022 |
Robust Backdoor Attacks on Object Detection in Real World Y Qian, B Ji, S He, S Huang, X Ling, B Wang, W Wang arXiv preprint arXiv:2309.08953, 2023 | 1 | 2023 |
An Empirical Study of License Conflict in Free and Open Source Software X Cui, J Wu, Y Wu, X Wang, T Luo, S Qu, X Ling, M Yang 2023 IEEE/ACM 45th International Conference on Software Engineering …, 2023 | 1 | 2023 |
AdvSQLi: Generating Adversarial SQL Injections against Real-world WAF-as-a-service Z Qu, X Ling, T Wang, X Chen, S Ji, C Wu IEEE Transactions on Information Forensics and Security, 2024 | | 2024 |
Automatic Program Repair via Learning Edits on Sequence Code Property Graph X Li, J Wu, X Ling, T Luo, Y Wu 2023 IEEE 29th International Conference on Parallel and Distributed Systems …, 2023 | | 2023 |
APP-Miner: Detecting API Misuses via Automatically Mining API Path Patterns J Jiang, J Wu, X Ling, T Luo, S Qu, Y Wu 2024 IEEE Symposium on Security and Privacy (SP), 43-43, 2023 | | 2023 |
Towards desirable decision boundary by Moderate-Margin Adversarial Training X Liang, Y Qian, J Huang, X Ling, B Wang, C Wu, W Swaileh Pattern Recognition Letters, 2023 | | 2023 |