Yueming Wu

Orcid: 0000-0002-1515-3558

According to our database1, Yueming Wu authored at least 33 papers between 2009 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
An Empirical Study on Android Malware Characterization by Social Network Analysis.
IEEE Trans. Reliab., March, 2024

COCL: An Intelligent Framework for Enhancing Deep Learning-Based Vulnerability Detection.
IEEE Trans. Ind. Informatics, March, 2024

PonziGuard: Detecting Ponzi Schemes on Ethereum with Contract Runtime Behavior Graph (CRBG).
Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024

A Comprehensive Study of Learning-based Android Malware Detectors under Challenging Environments.
Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024

2023
Code2Img: Tree-Based Image Transformation for Scalable Code Clone Detection.
IEEE Trans. Software Eng., September, 2023

The Software Genome Project: Venture to the Genomic Pathways of Open Source Software and Its Applications.
CoRR, 2023

Towards Understanding the Capability of Large Language Models on Code Clone Detection: A Survey.
CoRR, 2023

Tritor: Detecting Semantic Code Clones by Building Social Network-Based Triads Model.
Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2023

Gitor: Scalable Code Clone Detection by Building Global Sample Graph.
Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2023

An Empirical Study on the Effects of Obfuscation on Static Machine Learning-Based Malicious JavaScript Detectors.
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2023

Fine-Grained Code Clone Detection with Block-Based Splitting of Abstract Syntax Tree.
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2023

Interpreters for GNN-Based Vulnerability Detection: Are We There Yet?
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2023

Enhancing Deep Learning-based Vulnerability Detection by Building Behavior Graph Model.
Proceedings of the 45th IEEE/ACM International Conference on Software Engineering, 2023

OSSFP: Precise and Scalable C/C++ Third-Party Library Detection using Fingerprinting Functions.
Proceedings of the 45th IEEE/ACM International Conference on Software Engineering, 2023

Comparison and Evaluation of Clone Detection Techniques with Different Code Representations.
Proceedings of the 45th IEEE/ACM International Conference on Software Engineering, 2023

JSRevealer: A Robust Malicious JavaScript Detector against Obfuscation.
Proceedings of the 53rd Annual IEEE/IFIP International Conference on Dependable Systems and Network, 2023

2022
Decorrelate Irrelevant, Purify Relevant: Overcome Textual Spurious Correlations from a Feature Perspective.
CoRR, 2022

Detecting Semantic Code Clones by Building AST-based Markov Chains Model.
Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering, 2022

TreeCen: Building Tree Graph for Scalable Semantic Code Clone Detection.
Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering, 2022

VulCNN: An Image-inspired Scalable Vulnerability Detection System.
Proceedings of the 44th IEEE/ACM 44th International Conference on Software Engineering, 2022

Decorrelate Irrelevant, Purify Relevant: Overcome Textual Spurious Correlations from a Feature Perspective.
Proceedings of the 29th International Conference on Computational Linguistics, 2022

2021
IntDroid: Android Malware Detection Based on API Intimacy Analysis.
ACM Trans. Softw. Eng. Methodol., 2021

Gamification narrative design as a predictor for mobile fitness app user persistent usage intentions: a goal priming perspective.
Enterp. Inf. Syst., 2021

Boosting the Capability of Intelligent Vulnerability Detection by Training in a Human-Learning Manner.
CoRR, 2021

Obfuscation-resilient Android Malware Analysis Based on Contrastive Learning.
CoRR, 2021

HomDroid: detecting Android covert malware by social-network homophily analysis.
Proceedings of the ISSTA '21: 30th ACM SIGSOFT International Symposium on Software Testing and Analysis, 2021

2020
Automatic 3D point cloud registration algorithm based on triangle similarity ratio consistency.
IET Image Process., 2020

Bare-Hand Depth Perception Used in Augmented Reality Assembly Supporting.
IEEE Access, 2020

SCDetector: Software Functional Clone Detection Based on Semantic Tokens Analysis.
Proceedings of the 35th IEEE/ACM International Conference on Automated Software Engineering, 2020

2019
A Multigranularity Forensics and Analysis Method on Privacy Leakage in Cloud Environment.
IEEE Internet Things J., 2019

MalScan: Fast Market-Wide Mobile Malware Scanning by Social-Network Centrality Analysis.
Proceedings of the 34th IEEE/ACM International Conference on Automated Software Engineering, 2019

2010
Stereo Educational Game with Vision Based Interaction in Virtual Environment.
Int. J. Virtual Real., 2010

2009
Web-based virtual operating of CNC milling machine tools.
Comput. Ind., 2009


  Loading...