Ye, Guixin
121  Ergebnisse:
Personensuche X
?
1

Anonymous, Secure, Traceable, and Efficient Decentralized D..:

Li, Meng ; Shen, Yanzhe ; Ye, Guixin...
IEEE Transactions on Knowledge and Data Engineering.  36 (2024)  5 - p. 1874-1888 , 2024
 
?
2

A Generative and Mutational Approach for Synthesizing Bug-E..:

, In: Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering,
Ye, Guixin ; Hu, Tianmin ; Tang, Zhanyong... - p. 1127-1139 , 2023
 
?
3

Optimizing HPC I/O Performance with Regression Analysis and..:

, In: 2023 IEEE International Conference on Cluster Computing (CLUSTER),
Liu, Zhangyu ; Zhang, Cheng ; Wu, Huijun... - p. 234-246 , 2023
 
?
4

GENDA: A Graph Embedded Network Based Detection Approach on..:

Li, Xiao ; Chang, Yuanhai ; Ye, Guixin..
Journal of Information Security and Applications.  65 (2022)  - p. 103088 , 2022
 
?
5

Detecting code vulnerabilities by learning from large-scale..:

Xu, Rongze ; Tang, Zhanyong ; Ye, Guixin...
Journal of Information Security and Applications.  69 (2022)  - p. 103293 , 2022
 
?
6

BugPre: an intelligent software version-to-version bug pred..:

Wang, Zixu ; Tong, Weiyuan ; Li, Peng...
Complex & Intelligent Systems.  9 (2022)  4 - p. 3835-3855 , 2022
 
?
 
?
9

Automated conformance testing for JavaScript engines via de..:

, In: Proceedings of the 42nd ACM SIGPLAN International Conference on Programming Language Design and Implementation,
Ye, Guixin ; Tang, Zhanyong ; Tan, Shin Hwei... - p. 435-450 , 2021
 
?
10

Input-Output Example-Guided Data Deobfuscation on Binary:

Zhao, Yujie ; Tang, Zhanyong ; Ye, Guixin...
Security and Communication Networks.  2021 (2021)  - p. 1-16 , 2021
 
?
 
?
12

Deep Program Structure Modeling Through Multi-Relational Gr..:

, In: Proceedings of the ACM International Conference on Parallel Architectures and Compilation Techniques,
Ye, Guixin ; Tang, Zhanyong ; Wang, Huanting... - p. 111-123 , 2020
 
?
13

Using Generative Adversarial Networks to Break and Protect ..:

Ye, Guixin ; Tang, Zhanyong ; Fang, Dingyi...
ACM Transactions on Privacy and Security (TOPS).  23 (2020)  2 - p. 1-29 , 2020
 
?
 
?
15

Using Generative Adversarial Networks to Break and Protect ..:

Ye, Guixin ; Tang, Zhanyong ; Fang, Dingyi...
ACM Transactions on Privacy and Security.  23 (2020)  2 - p. 1-29 , 2020
 
1-15