Yu Qu
Yu Qu
Xi'an Thermal Power Research Institute
Verified email at - Homepage
Cited by
Cited by
PalmTree: Learning an Assembly Language Model for Instruction Embedding
X Li, Y Qu, H Yin
Proceedings of the 2021 ACM SIGSAC Conference on Computer and Communications …, 2021
Exploring community structure of software call graph and its applications in class cohesion measurement
Y Qu, X Guan, Q Zheng, T Liu, L Wang, Y Hou, Z Yang
Journal of Systems and Software 108, 193-210, 2015
DECAF++: Elastic Whole-System Dynamic Taint Analysis
A Davanian, Z Qi, Y Qu, H Yin
RAID, 31-45, 2019
Using K-core Decomposition on Class Dependency Networks to Improve Bug Prediction Model's Practical Performance
Y Qu, Q Zheng, J Chi, Y Jin, A He, D Cui, H Zhang, T Liu
IEEE Transactions on Software Engineering 47 (2), 348-366, 2021
Relation-based test case prioritization for regression testing
J Chi, Y Qu, Q Zheng, Z Yang, W Jin, D Cui, T Liu
Journal of Systems and Software 163, 110539, 2020
SeqTrans: Automatic Vulnerability Fix via Sequence to Sequence Learning
J Chi, Y Qu, T Liu, Q Zheng, H Yin
IEEE Transactions on Software Engineering 49 (2), 564-585, 2023
node2defect: using network embedding to improve software defect prediction
Y Qu, T Liu, J Chi, Y Jin, D Cui, A He, Q Zheng
Proceedings of the 33rd ACM/IEEE International Conference on Automated …, 2018
A new worm exploiting IPv4-IPv6 dual-stack networks
Q Zheng, T Liu, X Guan, Y Qu, N Wang
Proceedings of the 2007 ACM workshop on Recurring malcode, 9-15, 2007
Investigating the impact of multiple dependency structures on software defects
D Cui, T Liu, Y Cai, Q Zheng, Q Feng, W Jin, J Guo, Y Qu
2019 IEEE/ACM 41st International Conference on Software Engineering (ICSE …, 2019
Calling network: A new method for modeling software runtime behaviors
Y Qu, X Guan, Q Zheng, T Liu, J Zhou, J Li
ACM SIGSOFT Software Engineering Notes 40 (1), 1-8, 2015
DEEPDI: Learning a Relational Graph Convolutional Network Model on Instructions for Fast and Accurate Disassembly
S Yu, Y Qu, X Hu, H Yin
31st USENIX Security Symposium (USENIX Security 22), 2022
Leveraging developer information for efficient effort-aware bug prediction
Y Qu, J Chi, H Yin
Information and Software Technology 137, 106605, 2021
A new worm exploiting IPv6 and IPv4-IPv6 dual-stack networks: experiment, modeling, simulation, and defense
T Liu, X Guan, Q Zheng, Y Qu
IEEE network 23 (5), 22-29, 2009
Evaluating network embedding techniques’ performances in software bug prediction
Y Qu, H Yin
Empirical Software Engineering 26 (4), 60, 2021
Improving linguistic pairwise comparison consistency via linguistic discrete regions
H Zhang, Q Zheng, T Liu, Z Yang, M Luo, Y Qu
IEEE Transactions on Fuzzy Systems 24 (3), 600-614, 2015
Dynamic structure measurement for distributed software
W Jin, T Liu, Y Qu, Q Zheng, D Cui, J Chi
Software Quality Journal 26, 1119-1145, 2018
LOGICMEM: Automatic Profile Generation for Binary-Only Memory Forensics via Logic Inference
Z Qi, Y Qu, H Yin
Network and Distributed System Security Symposium (NDSS 2022), 2022
A layered classification for malicious function identification and malware detection
T Liu, X Guan, Y Qu, Y Sun
Concurrency and Computation: Practice and Experience 24 (11), 1169-1179, 2012
In-depth measurement and analysis on densification power law of software execution
Y Qu, Q Zheng, T Liu, J Li, X Guan
Proceedings of the 5th International Workshop on Emerging Trends in Software …, 2014
An identity authentication mechanism based on timing covert channel
Y Sun, X Guan, T Liu, Y Qu
2012 IEEE 11th International Conference on Trust, Security and Privacy in …, 2012
The system can't perform the operation now. Try again later.
Articles 1–20