Msdroid: Identifying malicious snippets for android malware detection Y He, Y Liu, L Wu, Z Yang, K Ren, Z Qin IEEE Transactions on Dependable and Secure Computing, 2022 | 19 | 2022 |
Pitfalls in language models for code intelligence: A taxonomy and survey X She, Y Liu, Y Zhao, Y He, L Li, C Tantithamthavorn, Z Qin, H Wang arXiv preprint arXiv:2310.17903, 2023 | 6 | 2023 |
Deuedroid: Detecting underground economy apps based on utg similarity Z Chen, J Liu, Y Hu, L Wu, Y Zhou, Y He, X Liao, K Wang, J Li, Z Qin Proceedings of the 32nd ACM SIGSOFT International Symposium on Software …, 2023 | 3 | 2023 |
FINER: Enhancing State-of-the-art Classifiers with Feature Attribution to Facilitate Security Analysis Y He, J Lou, Z Qin, K Ren Proceedings of the 2023 ACM SIGSAC Conference on Computer and Communications …, 2023 | 2 | 2023 |
Explanation as a Watermark: Towards Harmless and Multi-bit Model Ownership Verification via Watermarking Feature Attribution S Shao, Y Li, H Yao, Y He, Z Qin, K Ren arXiv preprint arXiv:2405.04825, 2024 | 1 | 2024 |
BRUTEPRINT: Expose Smartphone Fingerprint Authentication to Brute-force Attack Y Chen, Y He arXiv preprint arXiv:2305.10791, 2023 | 1 | 2023 |
Going Proactive and Explanatory Against Malware Concept Drift Y He, J Lei, Z Qin, K Ren arXiv preprint arXiv:2405.04095, 2024 | | 2024 |
RetouchUAA: Unconstrained Adversarial Attack via Image Retouching M Xie, Y He, M Fang arXiv preprint arXiv:2311.16478, 2023 | | 2023 |