Obserwuj
Yu Shi
Yu Shi
Zweryfikowany adres z purdue.edu
Tytuł
Cytowane przez
Cytowane przez
Rok
SilentKey: A new authentication framework through ultrasonic-based lip reading
J Tan, X Wang, CT Nguyen, Y Shi
Proceedings of the ACM on Interactive, Mobile, Wearable and Ubiquitous …, 2018
642018
CPC: Automatically classifying and propagating natural language comments via program analysis
J Zhai, X Xu, Y Shi, G Tao, M Pan, S Ma, L Xu, W Zhang, L Tan, X Zhang
Proceedings of the ACM/IEEE 42nd International Conference on Software …, 2020
422020
C2S: translating natural language comments to formal program specifications
J Zhai, Y Shi, M Pan, G Zhou, Y Liu, C Fang, S Ma, L Tan, X Zhang
Proceedings of the 28th ACM Joint Meeting on European Software Engineering …, 2020
372020
Android {SmartTVs} vulnerability discovery via {log-guided} fuzzing
Y Aafer, W You, Y Sun, Y Shi, X Zhang, H Yin
30th USENIX Security Symposium (USENIX Security 21), 2759-2776, 2021
292021
Pmp: Cost-effective forced execution with probabilistic memory pre-planning
W You, Z Zhang, Y Kwon, Y Aafer, F Peng, Y Shi, C Harmon, X Zhang
2020 IEEE Symposium on Security and Privacy (SP), 1121-1138, 2020
212020
Nie można teraz wykonać tej operacji. Spróbuj ponownie później.
Prace 1–5