Lwin Khin Shar
Orcid: 0000-0001-5130-0407
According to our database1,
Lwin Khin Shar
authored at least 66 papers
between 2010 and 2025.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2025
Out of Distribution, Out of Luck: How Well Can LLMs Trained on Vulnerability Datasets Detect Top 25 CWE Weaknesses?
CoRR, July, 2025
CoRR, July, 2025
CoRR, July, 2025
Let the Trial Begin: A Mock-Court Approach to Vulnerability Detection using LLM-Based Agents.
CoRR, May, 2025
Runtime Anomaly Detection for Drones: An Integrated Rule-Mining and Unsupervised-Learning Approach.
CoRR, May, 2025
VLM-Fuzz: Vision Language Model Assisted Recursive Depth-first Search Exploration for Effective UI Testing of Android Apps.
CoRR, April, 2025
R2Vul: Learning to Reason about Software Vulnerabilities with Reinforcement Learning and Structured Reasoning Distillation.
CoRR, April, 2025
Sustainable LLM Inference for Edge AI: Evaluating Quantized LLMs for Energy Efficiency, Output Accuracy, and Inference Latency.
CoRR, April, 2025
Fixseeker: An Empirical Driven Graph-based Approach for Detecting Silent Vulnerability Fixes in Open Source Software.
CoRR, March, 2025
Deep Learning Approaches for Anti-Money Laundering on Mobile Transactions: Review, Framework, and Directions.
CoRR, March, 2025
Benchmarking Large Language Models for Multi-Language Software Vulnerability Detection.
CoRR, March, 2025
Shelving it rather than Ditching it: Dynamically Debloating DEX and Native Methods of Android Applications without APK Modification.
CoRR, January, 2025
Comput. Secur., 2025
DynDebloater: Dynamically Debloating Unwanted Features of Android Apps without APK Modification.
Proceedings of the 33rd ACM International Conference on the Foundations of Software Engineering, 2025
2024
Decentralized Multimedia Data Sharing in IoV: A Learning-Based Equilibrium of Supply and Demand.
IEEE Trans. Veh. Technol., March, 2024
CoRR, 2024
CleanVul: Automatic Function-Level Vulnerability Detection in Code Commits Using LLM Heuristics.
CoRR, 2024
CoRR, 2024
CoRR, 2024
CoRR, 2024
Empirical Evaluation of Hyper-parameter Optimization Techniques for Deep Learning-based Malware Detectors.
Proceedings of the Knowledge-Based and Intelligent Information & Engineering Systems: Proceedings of the 28th International Conference KES-2024, 2024
Proceedings of the 2024 IEEE/ACM 46th International Conference on Software Engineering: Companion Proceedings, 2024
2023
Experimental comparison of features, analyses, and classifiers for Android malware detection.
Empir. Softw. Eng., November, 2023
AutoConf: Automated Configuration of Unsupervised Learning Systems Using Metamorphic Testing and Bayesian Optimization.
Proceedings of the 38th IEEE/ACM International Conference on Automated Software Engineering, 2023
Fine-Grained In-Context Permission Classification for Android Apps Using Control-Flow Graph Embedding.
Proceedings of the 38th IEEE/ACM International Conference on Automated Software Engineering, 2023
Proceedings of the 38th IEEE/ACM International Conference on Automated Software Engineering, 2023
2022
Benchmark suite for "An Integrated Approach for Effective Injection Vulnerability Analysis of Web Applications through Security Slicing and Hybrid Constraint Solving".
Dataset, May, 2022
Automated reverse engineering of role-based access control policies of web applications.
J. Syst. Softw., 2022
AP-Coach: formative feedback generation for learning introductory programming concepts.
Proceedings of the IEEE International Conference on Teaching, 2022
Differentiated Security Architecture for Secure and Efficient Infotainment Data Communication in IoV Networks.
Proceedings of the Network and System Security - 16th International Conference, 2022
Right to Know, Right to Refuse: Towards UI Perception-Based Automated Fine-Grained Permission Controls for Android Apps.
Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering, 2022
XSS for the Masses: Integrating Security in a Web Programming Course using a Security Scanner.
Proceedings of the ITiCSE 2022: Innovation and Technology in Computer Science Education, Dublin, Ireland, July 8, 2022
UIPDroid: Unrooted Dynamic Monitor of Android App UIs for Fine-Grained Permission Control.
Proceedings of the 44th IEEE/ACM International Conference on Software Engineering: Companion Proceedings, 2022
DronLomaly: Runtime Detection of Anomalous Drone Behaviors via Log Analysis and Deep Learning.
Proceedings of the 29th Asia-Pacific Software Engineering Conference, 2022
2021
IEEE Pervasive Comput., 2021
Empir. Softw. Eng., 2021
Empirical Evaluation of Minority Oversampling Techniques in the Context of Android Malware Detection.
Proceedings of the 28th Asia-Pacific Software Engineering Conference, 2021
2020
An Integrated Approach for Effective Injection Vulnerability Analysis of Web Applications Through Security Slicing and Hybrid Constraint Solving.
IEEE Trans. Software Eng., 2020
Empir. Softw. Eng., 2020
Proceedings of the MOBILESoft '20: IEEE/ACM 7th International Conference on Mobile Software Engineering and Systems, 2020
Proceedings of the 27th Asia-Pacific Software Engineering Conference, 2020
2018
J. Syst. Softw., 2018
Inf. Softw. Technol., 2018
Proceedings of the 5th International Conference on Mobile Software Engineering and Systems, MOBILESoft@ICSE 2018, Gothenburg, Sweden, May 27, 2018
2017
Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering, 2017
Proceedings of the 39th International Conference on Software Engineering, 2017
2015
Web Application Vulnerability Prediction Using Hybrid Program Analysis and Machine Learning.
IEEE Trans. Dependable Secur. Comput., 2015
Proceedings of the 26th IEEE International Symposium on Software Reliability Engineering, 2015
Proceedings of the 10th IEEE/ACM International Workshop on Automation of Software Test, 2015
2014
Empirical Comparison of Intermediate Representations for Android Applications.
Proceedings of the 26th International Conference on Software Engineering and Knowledge Engineering, 2014
2013
Predicting SQL injection and cross site scripting vulnerabilities through mining input sanitization patterns.
Inf. Softw. Technol., 2013
A scalable approach for malware detection through bounded feature space behavior modeling.
Proceedings of the 2013 28th IEEE/ACM International Conference on Automated Software Engineering, 2013
Mining SQL injection and cross site scripting vulnerabilities using hybrid program analysis.
Proceedings of the 35th International Conference on Software Engineering, 2013
Proceedings of the 20th Asia-Pacific Software Engineering Conference, 2013
2012
Inf. Softw. Technol., 2012
IET Softw., 2012
Proceedings of the 20th ACM SIGSOFT Symposium on the Foundations of Software Engineering (FSE-20), 2012
Predicting common web application vulnerabilities from input validation and sanitization code patterns.
Proceedings of the IEEE/ACM International Conference on Automated Software Engineering, 2012
Mining input sanitization patterns for predicting SQL injection and cross site scripting vulnerabilities.
Proceedings of the 34th International Conference on Software Engineering, 2012
Proceedings of the 19th Asia-Pacific Software Engineering Conference, 2012
2010
Semi-Automated Verification and Removal of Open Redirect Vulnerabilities in Web Applications.
Proceedings of the 2010 International Conference on Software Engineering Research & Practice, 2010
Auditing the Defense Against Cross Site Scripting in Web Applications.
Proceedings of the SECRYPT 2010, 2010