Year |
Citation |
Score |
2020 |
Li M, Wang P, Wang W, Wang S, Wu D, Liu J, Xue R, Huo W, Zou W. Large-scale Third-party Library Detection in Android Markets Ieee Transactions On Software Engineering. 1-1. DOI: 10.1109/Tse.2018.2872958 |
0.369 |
|
2020 |
Tian D, Zeng Q, Wu D, Liu P, Hu C. Semi-synchronized Non-blocking Concurrent Kernel Cruising Ieee Transactions On Cloud Computing. 1-1. DOI: 10.1109/Tcc.2020.2970183 |
0.317 |
|
2019 |
Ma H, Jia C, Li S, Zheng W, Wu D. Xmark: Dynamic Software Watermarking Using Collatz Conjecture Ieee Transactions On Information Forensics and Security. 14: 2859-2874. DOI: 10.1109/Tifs.2019.2908071 |
0.346 |
|
2017 |
Luo L, Ming J, Wu D, Liu P, Zhu S. Semantics-Based Obfuscation-Resilient Binary Code Similarity Comparison with Applications to Software and Algorithm Plagiarism Detection Ieee Transactions On Software Engineering. 43: 1157-1177. DOI: 10.1109/Tse.2017.2655046 |
0.374 |
|
2016 |
Ming J, Zhang F, Wu D, Liu P, Zhu S. Deviation-Based Obfuscation-Resilient Program Equivalence Checking With Application to Software Plagiarism Detection Ieee Transactions On Reliability. 65: 1647-1664. DOI: 10.1109/Tr.2016.2570554 |
0.337 |
|
2016 |
Ming J, Xu D, Wu D. MalwareHunt: semantics-based malware diffing speedup by normalized basic block memoization Journal of Computer Virology and Hacking Techniques. 1-12. DOI: 10.1007/S11416-016-0279-X |
0.37 |
|
2015 |
Jhi YC, Jia X, Wang X, Zhu S, Liu P, Wu D. Program Characterization Using Runtime Values and Its Application to Software Plagiarism Detection Ieee Transactions On Software Engineering. 41: 925-943. DOI: 10.1109/Tse.2015.2418777 |
0.374 |
|
2012 |
Kong D, Tian D, Pan Q, Liu P, Wu D. Semantic aware attribution analysis of remote exploits Security and Communication Networks. 6: 818-832. DOI: 10.1002/Sec.613 |
0.355 |
|
Show low-probability matches. |