default search action
Xiang Ling 0001
Person information
- affiliation: Institute of Software, Chinese Academy of Sciences, China
- affiliation (former): Zhejiang University, Hangzhou, Zhejiang, China
Other persons with the same name
- Xiang Ling — disambiguation page
- Xiang Ling 0002 — University of Electronic Science and Technology of China, Chengdu, China
- Xiang Ling 0003 — Nanjing Tech University, Nanjing, China
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j8]Yaguan Qian, Wenzhuo Huang, Qinqin Yu, Tengteng Yao, Xiang Ling, Bin Wang, Zhaoquan Gu, Yanchun Zhang:
Robust filter pruning guided by deep frequency-features for edge intelligence. Neurocomputing 610: 128586 (2024) - [j7]Zhenqing Qu, Xiang Ling, Ting Wang, Xiang Chen, Shouling Ji, Chunming Wu:
AdvSQLi: Generating Adversarial SQL Injections Against Real-World WAF-as-a-Service. IEEE Trans. Inf. Forensics Secur. 19: 2623-2638 (2024) - [j6]Yaguan Qian, Zhiqiang He, Yuqi Wang, Bin Wang, Xiang Ling, Zhaoquan Gu, Haijiang Wang, Shaoning Zeng, Wassim Swaileh:
Hierarchical Threshold Pruning Based on Uniform Response Criterion. IEEE Trans. Neural Networks Learn. Syst. 35(8): 10869-10881 (2024) - [c15]Jingzheng Wu, Xiang Ling, Xu Duan, Tianyue Luo, Mutian Yang:
VulDL: Tree-based and Graph-based Neural Networks for Vulnerability Detection and Localization. EASE 2024: 323-332 - [c14]Jianhao Fu, Xiang Ling, Yaguan Qian, Changjiang Li, Tianyue Luo, Jingzheng Wu:
Towards Query-Efficient Decision-Based Adversarial Attacks Through Frequency Domain. ICME 2024: 1-6 - [c13]Yuxiao Chen, Jingzheng Wu, Xiang Ling, Changjiang Li, Zhiqing Rui, Tianyue Luo, Yanjun Wu:
When Large Language Models Confront Repository-Level Automatic Program Repair: How Well They Done? ICSE Companion 2024: 459-471 - [c12]Jiasheng Jiang, Jingzheng Wu, Xiang Ling, Tianyue Luo, Sheng Qu, Yanjun Wu:
APP-Miner: Detecting API Misuses via Automatically Mining API Path Patterns. SP 2024: 4034-4052 - [c11]Xiang Ling, Zhiyu Wu, Bin Wang, Wei Deng, Jingzheng Wu, Shouling Ji, Tianyue Luo, Yanjun Wu:
A Wolf in Sheep's Clothing: Practical Black-box Adversarial Attacks for Evading Learning-based Windows Malware Detection in the Wild. USENIX Security Symposium 2024 - [i9]Zhenqing Qu, Xiang Ling, Ting Wang, Xiang Chen, Shouling Ji, Chunming Wu:
AdvSQLi: Generating Adversarial SQL Injections against Real-world WAF-as-a-service. CoRR abs/2401.02615 (2024) - [i8]Yuxiao Chen, Jingzheng Wu, Xiang Ling, Changjiang Li, Zhiqing Rui, Tianyue Luo, Yanjun Wu:
When Large Language Models Confront Repository-Level Automatic Program Repair: How Well They Done? CoRR abs/2403.00448 (2024) - [i7]Xiang Ling, Zhiyu Wu, Bin Wang, Wei Deng, Jingzheng Wu, Shouling Ji, Tianyue Luo, Yanjun Wu:
A Wolf in Sheep's Clothing: Practical Black-box Adversarial Attacks for Evading Learning-based Windows Malware Detection in the Wild. CoRR abs/2407.02886 (2024) - 2023
- [j5]Xiang Ling, Lingfei Wu, Jiangyu Zhang, Zhenqing Qu, Wei Deng, Xiang Chen, Yaguan Qian, Chunming Wu, Shouling Ji, Tianyue Luo, Jingzheng Wu, Yanjun Wu:
Adversarial attacks against Windows PE malware detection: A survey of the state-of-the-art. Comput. Secur. 128: 103134 (2023) - [j4]Xiaoyu Liang, Yaguan Qian, Jianchang Huang, Xiang Ling, Bin Wang, Chunming Wu, Wassim Swaileh:
Towards desirable decision boundary by Moderate-Margin Adversarial Training. Pattern Recognit. Lett. 173: 30-37 (2023) - [j3]Xiang Ling, Lingfei Wu, Saizhuo Wang, Tengfei Ma, Fangli Xu, Alex X. Liu, Chunming Wu, Shouling Ji:
Multilevel Graph Matching Networks for Deep Graph Similarity Learning. IEEE Trans. Neural Networks Learn. Syst. 34(2): 799-813 (2023) - [c10]Xiaoyu Li, Jingzheng Wu, Xiang Ling, Tianyue Luo, Yanjun Wu:
Automatic Program Repair via Learning Edits on Sequence Code Property Graph. ICPADS 2023: 563-570 - [c9]Xing Cui, Jingzheng Wu, Yanjun Wu, Xu Wang, Tianyue Luo, Sheng Qu, Xiang Ling, Mutian Yang:
An Empirical Study of License Conflict in Free and Open Source Software. ICSE-SEIP 2023: 495-505 - [c8]Wentao Liang, Xiang Ling, Jingzheng Wu, Tianyue Luo, Yanjun Wu:
A Needle is an Outlier in a Haystack: Hunting Malicious PyPI Packages with Code Clustering. ASE 2023: 307-318 - 2022
- [j2]Yaguan Qian, Yankai Guo, Qiqi Shao, Jiamin Wang, Bin Wang, Zhaoquan Gu, Xiang Ling, Chunming Wu:
EI-MTD: Moving Target Defense for Edge Intelligence against Adversarial Attacks. ACM Trans. Priv. Secur. 25(3): 23:1-23:24 (2022) - [c7]Yaguan Qian, Shenghui Huang, Bin Wang, Xiang Ling, Xiaohui Guan, Zhaoquan Gu, Shaoning Zeng, Wujie Zhou, Haijiang Wang:
Robust Network Architecture Search via Feature Distortion Restraining. ECCV (5) 2022: 122-138 - [c6]Zhiqiang He, Yaguan Qian, Yuqi Wang, Bin Wang, Xiaohui Guan, Zhaoquan Gu, Xiang Ling, Shaoning Zeng, Haijiang Wang, Wujie Zhou:
Filter Pruning via Feature Discrimination in Deep Neural Networks. ECCV (21) 2022: 245-261 - [c5]Xiang Chen, Hongyan Liu, Qingjiang Xiao, Kaiwei Guo, Tingxin Sun, Xiang Ling, Xuan Liu, Qun Huang, Dong Zhang, Haifeng Zhou, Fan Zhang, Chunming Wu:
Toward Low-Overhead Inter-Switch Coordination in Network-Wide Data Plane Program Deployment. ICDCS 2022: 370-380 - [c4]Xiang Ling, Lingfei Wu, Wei Deng, Zhenqing Qu, Jiangyu Zhang, Sheng Zhang, Tengfei Ma, Bin Wang, Chunming Wu, Shouling Ji:
MalGraph: Hierarchical Graph Neural Networks for Robust Windows Malware Detection. INFOCOM 2022: 1998-2007 - [c3]Yanjie Shao, Tianyue Luo, Xiang Ling, Limin Wang, Senwen Zheng:
Cross Platform API Mappings based on API Documentation Graphs. QRS 2022: 926-935 - [i6]Xiaoyu Liang, Yaguan Qian, Jianchang Huang, Xiang Ling, Bin Wang, Chunming Wu, Wassim Swaileh:
Towards the Desirable Decision Boundary by Moderate-Margin Adversarial Training. CoRR abs/2207.07793 (2022) - 2021
- [j1]Xiang Ling, Lingfei Wu, Saizhuo Wang, Gaoning Pan, Tengfei Ma, Fangli Xu, Alex X. Liu, Chunming Wu, Shouling Ji:
Deep Graph Matching and Searching for Semantic Code Retrieval. ACM Trans. Knowl. Discov. Data 15(5): 88:1-88:21 (2021) - [i5]Xiang Ling, Lingfei Wu, Jiangyu Zhang, Zhenqing Qu, Wei Deng, Xiang Chen, Chunming Wu, Shouling Ji, Tianyue Luo, Jingzheng Wu, Yanjun Wu:
Adversarial Attacks against Windows PE Malware Detection: A Survey of the State-of-the-Art. CoRR abs/2112.12310 (2021) - 2020
- [i4]Xiang Ling, Lingfei Wu, Saizhuo Wang, Tengfei Ma, Fangli Xu, Alex X. Liu, Chunming Wu, Shouling Ji:
Hierarchical Graph Matching Networks for Deep Graph Similarity Learning. CoRR abs/2007.04395 (2020) - [i3]Yaguan Qian, Qiqi Shao, Jiamin Wang, Xiang Ling, Yankai Guo, Zhaoquan Gu, Bin Wang, Chunming Wu:
EI-MTD: Moving Target Defense for Edge Intelligence against Adversarial Attacks. CoRR abs/2009.10537 (2020) - [i2]Xiang Ling, Lingfei Wu, Saizhuo Wang, Gaoning Pan, Tengfei Ma, Fangli Xu, Alex X. Liu, Chunming Wu, Shouling Ji:
Deep Graph Matching and Searching for Semantic Code Retrieval. CoRR abs/2010.12908 (2020) - [i1]Yaguan Qian, Jiamin Wang, Bin Wang, Zhaoquan Gu, Xiang Ling, Chunming Wu:
Towards Imperceptible Adversarial Image Patches Based on Network Explanations. CoRR abs/2012.00909 (2020)
2010 – 2019
- 2019
- [c2]Xiang Ling, Shouling Ji, Jiaxu Zou, Jiannan Wang, Chunming Wu, Bo Li, Ting Wang:
DEEPSEC: A Uniform Platform for Security Analysis of Deep Learning Model. IEEE Symposium on Security and Privacy 2019: 673-690 - 2017
- [c1]Xiang Ling, Chunming Wu, Shouling Ji, Meng Han:
H _2 DoS: An Application-Layer DoS Attack Towards HTTP/2 Protocol. SecureComm 2017: 550-570
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-10-08 21:30 CEST by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint