default search action
Yueming Wu
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j14]Anran Li, Yuanyuan Chen, Jian Zhang, Mingfei Cheng, Yihao Huang, Yueming Wu, Anh Tuan Luu, Han Yu:
Historical Embedding-Guided Efficient Large-Scale Federated Graph Learning. Proc. ACM Manag. Data 2(3): 144 (2024) - [j13]Shihan Dou, Yueming Wu, Haoxiang Jia, Yuhao Zhou, Yan Liu, Yang Liu:
CC2Vec: Combining Typed Tokens with Contrastive Learning for Effective Code Clone Detection. Proc. ACM Softw. Eng. 1(FSE): 1564-1584 (2024) - [j12]Wenxuan Li, Shihan Dou, Yueming Wu, Chenxi Li, Yang Liu:
COCL: An Intelligent Framework for Enhancing Deep Learning-Based Vulnerability Detection. IEEE Trans. Ind. Informatics 20(3): 4953-4961 (2024) - [j11]Haojun Zhao, Yueming Wu, Deqing Zou, Hai Jin:
An Empirical Study on Android Malware Characterization by Social Network Analysis. IEEE Trans. Reliab. 73(1): 757-770 (2024) - [j10]Yueming Wu, Siyue Feng, Wenqi Suo, Deqing Zou, Hai Jin:
Goner: Building Tree-Based N-Gram-Like Model for Semantic Code Clone Detection. IEEE Trans. Reliab. 73(2): 1310-1324 (2024) - [j9]Weizhong Qiang, Kunlun Ren, Yueming Wu, Deqing Zou, Hai Jin:
DeepFPD: Browser Fingerprinting Detection via Deep Learning With Multimodal Learning and Attention. IEEE Trans. Reliab. 73(3): 1516-1528 (2024) - [c21]Cuiying Gao, Gaozhun Huang, Heng Li, Bang Wu, Yueming Wu, Wei Yuan:
A Comprehensive Study of Learning-based Android Malware Detectors under Challenging Environments. ICSE 2024: 12:1-12:13 - [c20]Ruichao Liang, Jing Chen, Kun He, Yueming Wu, Gelei Deng, Ruiying Du, Cong Wu:
PonziGuard: Detecting Ponzi Schemes on Ethereum with Contract Runtime Behavior Graph (CRBG). ICSE 2024: 64:1-64:12 - [c19]Siyue Feng, Wenqi Suo, Yueming Wu, Deqing Zou, Yang Liu, Hai Jin:
Machine Learning is All You Need: A Simple Token-based Approach for Effective Code Clone Detection. ICSE 2024: 222:1-222:13 - [c18]Cuiying Gao, Yueming Wu, Heng Li, Wei Yuan, Haoyu Jiang, Qidan He, Yang Liu:
Uncovering and Mitigating the Impact of Code Obfuscation on Dataset Annotation with Antivirus Engines. ISSTA 2024: 553-565 - [c17]Siyue Feng, Yueming Wu, Wenjie Xue, Sikui Pan, Deqing Zou, Yang Liu, Hai Jin:
FIRE: Combining Multi-Stage Filtering with Taint Analysis for Scalable Recurring Vulnerability Detection. USENIX Security Symposium 2024 - [i12]Yuhang Ye, Yuekun Wang, Yinxing Xue, Yueming Wu, Yang Liu:
TGMM: Combining Parse Tree with GPU for Scalable Multilingual and Multi-Granularity Code Clone Detection. CoRR abs/2403.18202 (2024) - [i11]Shihan Dou, Yueming Wu, Haoxiang Jia, Yuhao Zhou, Yan Liu, Yang Liu:
CC2Vec: Combining Typed Tokens with Contrastive Learning for Effective Code Clone Detection. CoRR abs/2405.00428 (2024) - [i10]Ruichao Liang, Jing Chen, Cong Wu, Kun He, Yueming Wu, Weisong Sun, Ruiying Du, Qingchuan Zhao, Yang Liu:
Towards Effective Detection of Ponzi schemes on Ethereum with Contract Runtime Behavior Graph. CoRR abs/2406.00921 (2024) - [i9]Shihan Dou, Haoxiang Jia, Shenxi Wu, Huiyuan Zheng, Weikang Zhou, Muling Wu, Mingxu Chai, Jessica Fan, Caishuang Huang, Yunbo Tao, Yan Liu, Enyu Zhou, Ming Zhang, Yuhao Zhou, Yueming Wu, Rui Zheng, Ming Wen, Rongxiang Weng, Jingang Wang, Xunliang Cai, Tao Gui, Xipeng Qiu, Qi Zhang, Xuanjing Huang:
What's Wrong with Your Code Generated by Large Language Models? An Extensive Study. CoRR abs/2407.06153 (2024) - [i8]Ruichao Liang, Jing Chen, Cong Wu, Kun He, Yueming Wu, Ruochen Cao, Ruiying Du, Yang Liu, Ziming Zhao:
Vulseye: Detect Smart Contract Vulnerabilities via Stateful Directed Graybox Fuzzing. CoRR abs/2408.10116 (2024) - 2023
- [j8]Yutao Hu, Yilin Fang, Yifan Sun, Yaru Jia, Yueming Wu, Deqing Zou, Hai Jin:
Code2Img: Tree-Based Image Transformation for Scalable Code Clone Detection. IEEE Trans. Software Eng. 49(9): 4429-4442 (2023) - [c16]Kunlun Ren, Weizhong Qiang, Yueming Wu, Yi Zhou, Deqing Zou, Hai Jin:
JSRevealer: A Robust Malicious JavaScript Detector against Obfuscation. DSN 2023: 339-351 - [c15]Jiahui Wu, Zhengzi Xu, Wei Tang, Lyuye Zhang, Yueming Wu, Chengyue Liu, Kairan Sun, Lida Zhao, Yang Liu:
OSSFP: Precise and Scalable C/C++ Third-Party Library Detection using Fingerprinting Functions. ICSE 2023: 270-282 - [c14]Yuekun Wang, Yuhang Ye, Yueming Wu, Weiwei Zhang, Yinxing Xue, Yang Liu:
Comparison and Evaluation of Clone Detection Techniques with Different Code Representations. ICSE 2023: 332-344 - [c13]Bin Yuan, Yifan Lu, Yilin Fang, Yueming Wu, Deqing Zou, Zhen Li, Zhi Li, Hai Jin:
Enhancing Deep Learning-based Vulnerability Detection by Building Behavior Graph Model. ICSE 2023: 2262-2274 - [c12]Tiancheng Hu, Zijing Xu, Yilin Fang, Yueming Wu, Bin Yuan, Deqing Zou, Hai Jin:
Fine-Grained Code Clone Detection with Block-Based Splitting of Abstract Syntax Tree. ISSTA 2023: 89-100 - [c11]Yutao Hu, Suyuan Wang, Wenke Li, Junru Peng, Yueming Wu, Deqing Zou, Hai Jin:
Interpreters for GNN-Based Vulnerability Detection: Are We There Yet? ISSTA 2023: 1407-1419 - [c10]Kunlun Ren, Weizhong Qiang, Yueming Wu, Yi Zhou, Deqing Zou, Hai Jin:
An Empirical Study on the Effects of Obfuscation on Static Machine Learning-Based Malicious JavaScript Detectors. ISSTA 2023: 1420-1432 - [c9]Deqing Zou, Siyue Feng, Yueming Wu, Wenqi Suo, Hai Jin:
Tritor: Detecting Semantic Code Clones by Building Social Network-Based Triads Model. ESEC/SIGSOFT FSE 2023: 771-783 - [c8]Junjie Shan, Shihan Dou, Yueming Wu, Hairu Wu, Yang Liu:
Gitor: Scalable Code Clone Detection by Building Global Sample Graph. ESEC/SIGSOFT FSE 2023: 784-795 - [i7]Shihan Dou, Junjie Shan, Haoxiang Jia, Wenhao Deng, Zhiheng Xi, Wei He, Yueming Wu, Tao Gui, Yang Liu, Xuanjing Huang:
Towards Understanding the Capability of Large Language Models on Code Clone Detection: A Survey. CoRR abs/2308.01191 (2023) - [i6]Junjie Shan, Shihan Dou, Yueming Wu, Hairu Wu, Yang Liu:
Gitor: Scalable Code Clone Detection by Building Global Sample Graph. CoRR abs/2311.08778 (2023) - [i5]Yueming Wu, Chengwei Liu, Yang Liu:
The Software Genome Project: Venture to the Genomic Pathways of Open Source Software and Its Applications. CoRR abs/2311.09881 (2023) - 2022
- [c7]Shihan Dou, Rui Zheng, Ting Wu, Songyang Gao, Junjie Shan, Qi Zhang, Yueming Wu, Xuanjing Huang:
Decorrelate Irrelevant, Purify Relevant: Overcome Textual Spurious Correlations from a Feature Perspective. COLING 2022: 2278-2287 - [c6]Yueming Wu, Deqing Zou, Shihan Dou, Wei Yang, Duo Xu, Hai Jin:
VulCNN: An Image-inspired Scalable Vulnerability Detection System. ICSE 2022: 2365-2376 - [c5]Yueming Wu, Siyue Feng, Deqing Zou, Hai Jin:
Detecting Semantic Code Clones by Building AST-based Markov Chains Model. ASE 2022: 34:1-34:13 - [c4]Yutao Hu, Deqing Zou, Junru Peng, Yueming Wu, Junjie Shan, Hai Jin:
TreeCen: Building Tree Graph for Scalable Semantic Code Clone Detection. ASE 2022: 109:1-109:12 - [i4]Shihan Dou, Rui Zheng, Ting Wu, Songyang Gao, Qi Zhang, Yueming Wu, Xuanjing Huang:
Decorrelate Irrelevant, Purify Relevant: Overcome Textual Spurious Correlations from a Feature Perspective. CoRR abs/2202.08048 (2022) - 2021
- [j7]Manning Li, Yancheng Wang, Yueming Wu, Hanchen Liu:
Gamification narrative design as a predictor for mobile fitness app user persistent usage intentions: a goal priming perspective. Enterp. Inf. Syst. 15(10): 1501-1545 (2021) - [j6]Deqing Zou, Yueming Wu, Siru Yang, Anki Chauhan, Wei Yang, Jiangying Zhong, Shihan Dou, Hai Jin:
IntDroid: Android Malware Detection Based on API Intimacy Analysis. ACM Trans. Softw. Eng. Methodol. 30(3): 39:1-39:32 (2021) - [c3]Yueming Wu, Deqing Zou, Wei Yang, Xiang Li, Hai Jin:
HomDroid: detecting Android covert malware by social-network homophily analysis. ISSTA 2021: 216-229 - [i3]Yueming Wu, Shihan Dou, Deqing Zou, Wei Yang, Weizhong Qiang, Hai Jin:
Obfuscation-resilient Android Malware Analysis Based on Contrastive Learning. CoRR abs/2107.03799 (2021) - [i2]Yueming Wu, Deqing Zou, Wei Yang, Xiang Li, Hai Jin:
HomDroid: Detecting Android Covert Malware by Social-Network Homophily Analysis. CoRR abs/2107.04743 (2021) - [i1]Shihan Dou, Yueming Wu, Wenxuan Li, Feng Cheng, Wei Yang, Yang Liu:
Boosting the Capability of Intelligent Vulnerability Detection by Training in a Human-Learning Manner. CoRR abs/2112.06250 (2021) - 2020
- [j5]Jianbin Liang, Hanwu He, Yueming Wu:
Bare-Hand Depth Perception Used in Augmented Reality Assembly Supporting. IEEE Access 8: 1534-1541 (2020) - [j4]Xuyan Zou, Hanwu He, Yueming Wu, Youbin Chen, Mingxi Xu:
Automatic 3D point cloud registration algorithm based on triangle similarity ratio consistency. IET Image Process. 14(14): 3314-3323 (2020) - [c2]Yueming Wu, Deqing Zou, Shihan Dou, Siru Yang, Wei Yang, Feng Cheng, Hong Liang, Hai Jin:
SCDetector: Software Functional Clone Detection Based on Semantic Tokens Analysis. ASE 2020: 821-833
2010 – 2019
- 2019
- [j3]Deqing Zou, Jian Zhao, Weiming Li, Yueming Wu, Weizhong Qiang, Hai Jin, Ye Wu, Yifei Yang:
A Multigranularity Forensics and Analysis Method on Privacy Leakage in Cloud Environment. IEEE Internet Things J. 6(2): 1484-1494 (2019) - [c1]Yueming Wu, Xiaodi Li, Deqing Zou, Wei Yang, Xin Zhang, Hai Jin:
MalScan: Fast Market-Wide Mobile Malware Scanning by Social-Network Centrality Analysis. ASE 2019: 139-150 - 2010
- [j2]Hanwu He, Xianyin Duan, Yueming Wu:
Stereo Educational Game with Vision Based Interaction in Virtual Environment. Int. J. Virtual Real. 9(4): 79-85 (2010)
2000 – 2009
- 2009
- [j1]Hanwu He, Yueming Wu:
Web-based virtual operating of CNC milling machine tools. Comput. Ind. 60(9): 686-697 (2009)
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-05 21:59 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint