Author:
Kim Seulbae,Woo Seunghoon,Lee Heejo,Oh Hakjoo
Cited by
202 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Enhancing vulnerability detection via AST decomposition and neural sub-tree encoding;Expert Systems with Applications;2024-03
2. TRACED: Execution-aware Pre-training for Source Code;Proceedings of the 46th IEEE/ACM International Conference on Software Engineering;2024-02-06
3. A Credential Usage Study: Flow-Aware Leakage Detection in Open-Source Projects;IEEE Transactions on Information Forensics and Security;2024
4. SeHBPL: Behavioral Semantics-Based Patch Presence Test for Binaries;Dependable Software Engineering. Theories, Tools, and Applications;2023-12-15
5. Large Scale Study of Orphan Vulnerabilities in the Software Supply Chain;Proceedings of the 19th International Conference on Predictive Models and Data Analytics in Software Engineering;2023-12-08