Devign: Effective Vulnerability Identification by Learning Comprehensive Program Semantics via Graph Neural Networks Yaqin Zhou, Shangqing Liu, Jingkai Siow, Xiaoning Du, and Yang Liu NeurIPS 2019 https://arxiv.org/abs/1909.03496, 0 | 967* | |
Automated identification of security issues from commit messages and bug reports Y Zhou, A Sharma ESEC/FSE 2017 Proceedings of the 2017 11th Joint Meeting on Foundations of …, 2017 | 213 | 2017 |
Leopard: Identifying vulnerable code for vulnerability assessment through program metrics X Du, B Chen, Y Li, J Guo, Y Zhou, Y Liu, Y Jiang 2019 IEEE/ACM 41st International Conference on Software Engineering (ICSE …, 2019 | 125 | 2019 |
Optimal-Cost Scheduling of Electrical Vehicle Charging under Uncertainty Y Zhou, DKY Yau, P You, P Cheng IEEE Transactions on Smart Grid, 2017 | 68 | 2017 |
Incentive-based distributed scheduling of electric vehicle charging under uncertainty Y Zhou, R Kumar, S Tang IEEE Transactions on Power Systems 34 (1), 3-11, 2018 | 67 | 2018 |
Spi: Automated identification of security patches via commits Y Zhou, JK Siow, C Wang, S Liu, Y Liu ACM Transactions on Software Engineering and Methodology (TOSEM) 31 (1), 1-27, 2021 | 60 | 2021 |
Throughput optimizing localized link scheduling for multihop wireless networks under physical interference model Y Zhou, XY Li, M Liu, X Mao, S Tang, Z Li IEEE Transactions on Parallel and Distributed Systems 25 (10), 2708-2720, 2013 | 38 | 2013 |
Distributed link scheduling for throughput maximization under physical interference model Y Zhou, XY Li, M Liu, Z Li, S Tang, X Mao, Q Huang 2012 Proceedings IEEE INFOCOM, 2691-2695, 2012 | 28 | 2012 |
A Truthful Incentive Mechanism for Online Recruitment in Mobile Crowd Sensing System X Chen, M Liu, Y Zhou, Z Li, S Chen, X He Sensors 17 (1), 2017 | 20 | 2017 |
Differentially private distributed learning Y Zhou, S Tang INFORMS Journal on Computing 32 (3), 779-789, 2020 | 15 | 2020 |
Almost optimal channel access in multi-hop networks with unknown channel variables Y Zhou, Q Huang, F Li, XY Li, M Liu, Z Li, Z Yin 2014 IEEE 34th International Conference on Distributed Computing Systems …, 2014 | 13 | 2014 |
Networked Stochastic Multi-Armed Bandits with Combinatorial Strategies S Tang, Y Zhou, K Han, Z Zhang, J Yuan, W Wu The 37th IEEE International Conference on Distributed Computing Systems …, 2017 | 12 | 2017 |
Link scheduling for throughput maximization in multihop wireless networks under physical interference Y Zhou, XY Li, M Liu, Z Li, X Xu Wireless Networks 23, 2415-2430, 2017 | 4 | 2017 |
Partner-recruitment: Incentive mechanism for content offloading X Chen, S Wang, M Liu, C Huang, Y Zhou, Z Li ICC, 2538-2543, 2014 | 4 | 2014 |
Differential spread strategy: An incentive for advertisement dissemination X Chen, M Liu, Y Zhou, Z Li, S Chen, X He Computers and Communication (ISCC), 2015 IEEE Symposium on, 2015 | | 2015 |