Your selections:
Challenging Machine Learning-Based Clone Detectors via Semantic-Preserving Code Transformations
- Zhang, Weiwei, Guo, Shengjian, Zhang, Hongyu, Sui, Yulei, Xue, Yinxing, Xu, Yun
Cross-Language Binary-Source Code Matching with Intermediate Representations
- Gui, Yi, Wan, Yao, Zhang, Hongyu, Huang, Huifang, Sui, Yulei, Xu, Guandong, Shao, Zhiyuan, Jin, Hai
NaturalCC: An Open-Source Toolkit for Code Intelligence
- Wan, Yao, He, Yang, Yu, Philip S., Bi, Zhangqian, Zhang, Jianguo, Sui, Yulei, Zhang, Hongyu, Hashimoto, Kazuma, Jin, Hai, Xu, Guandong, Xiong, Caiming
What Do They Capture? - A Structural Analysis of Pre-Trained Language Models for Source Code
- Wan, Yao, Zhao, Wei, Zhang, Hongyu, Sui, Yulei, Xu, Guandong, Jin, Hai
You see what I want you to see: poisoning vulnerabilities in neural code search
- Wan, Yao, Zhang, Shijie, Zhang, Hongyu, Sui, Yulei, Xu, Guandong, Yao, Dezhong, Jin, Hai, Sun, Lichao
Perf-AL: Performance Prediction for Configurable Software through Adversarial Learning
- Shu, Yangyang, Sui, Yulei, Zhang, Hongyu, Xu, Guandong
Live Path CFI Against Control Flow Hijacking Attacks
- Barbar, Mohamad, Sui, Yulei, Zhang, Hongyu, Chen, Shiping, Xue, Jingling
Are you sure you would like to clear your session, including search history and login status?