Mahinthan Chandramohan
TitleCited byYear
subgraph2vec: Learning distributed representations of rooted sub-graphs from large graphs
A Narayanan, M Chandramohan, L Chen, Y Liu, S Saminathan
arXiv preprint arXiv:1606.08928, 2016
982016
Steelix: program-state based binary fuzzing
Y Li, B Chen, M Chandramohan, SW Lin, Y Liu, A Tiu
Proceedings of the 2017 11th Joint Meeting on Foundations of Software …, 2017
912017
Detection of mobile malware in the wild
M Chandramohan, HBK Tan
Computer 45 (9), 65-71, 2012
872012
Semantics-based online malware detection: Towards efficient real-time protection against malware
S Das, Y Liu, W Zhang, M Chandramohan
IEEE transactions on information forensics and security 11 (2), 289-302, 2015
852015
graph2vec: Learning Distributed Representations of Graphs
N Annamalai, C Mahinthan, V Rajasekar, C Lihui, L Yang, J Shantanu
arXiv preprint arXiv:1707.05005, 2017
712017
Bingo: Cross-architecture cross-os binary search
M Chandramohan, Y Xue, Z Xu, Y Liu, CY Cho, HBK Tan
Proceedings of the 2016 24th ACM SIGSOFT International Symposium on …, 2016
432016
Mystique: Evolving Android Malware for Auditing Anti-Malware Tools
G Meng, Y Xue, M Chandramohan, A Narayanan, Y Liu, J Zhang, T Chen
ACM Asia Conference on Computer and Communications Security (ASIACCS 2016), 2016
282016
A scalable approach for malware detection through bounded feature space behavior modeling
M Chandramohan, HBK Tan, LC Briand, LK Shar, BM Padmanabhuni
2013 28th IEEE/ACM International Conference on Automated Software …, 2013
262013
Application of multi-objective bee colony optimization algorithm to automated red teaming
MYH Low, M Chandramohan, CS Choo
Winter Simulation Conference (WSC), Proceedings of the 2009, 1798-1808, 2009
262009
A multi-view context-aware approach to Android malware detection and malicious code localization
A Narayanan, M Chandramohan, L Chen, Y Liu
Empirical Software Engineering 23 (3), 1222-1274, 2018
222018
SPAIN: Security Patch Analysis for Binaries - Towards Understanding the Pain and Pills
Z Xu, B Chen, M Chandramohan, Y Liu, F Song
Proceedings of the 39th International Conference on Software Engineering …, 2017
222017
Has this bug been reported?
K Liu, HBK Tan, H Zhang
2013 20th Working Conference on Reverse Engineering (WCRE), 82-91, 2013
212013
Autonomous bee colony optimization for multi-objective function
F Zeng, J Decraene, MYH Low, P Hingston, C Wentong, Z Suiping, ...
IEEE Congress on Evolutionary Computation, 1-8, 2010
202010
Scalable Malware Clustering through Coarse-Grained Behavior Modeling
M Chandramohan, HBK Tan, LK Shar
Proceedings of the ACM SIGSOFT 20th International Symposium on the …, 2012
182012
Context-aware, adaptive, and scalable android malware detection through online learning
A Narayanan, M Chandramohan, L Chen, Y Liu
IEEE Transactions on Emerging Topics in Computational Intelligence 1 (3 …, 2017
172017
Detection and classification of malicious JavaScript via attack behavior modelling
Y Xue, J Wang, Y Liu, H Xiao, J Sun, M Chandramohan
Proceedings of the 2015 International Symposium on Software Testing and …, 2015
172015
Evolvable simulations applied to Automated Red Teaming: A preliminary study
J Decraene, M Chandramohan, MYH Low, CS Choo
Winter Simulation Conference (WSC), Proceedings of the 2010, 1444-1455, 2010
162010
Evolutionary design of agent-based simulation experiments
J Decraene, YT Lee, F Zeng, M Chandramohan, YY Cheng, MYH Low
The 10th International Conference on Autonomous Agents and Multiagent …, 2011
92011
Evolving Agent-Based Model Structures using Variable-Length Genomes
J Decraene, M Chandramohan, F Zeng, MYH Low, W Cai
Proceedings of the 4th International Workshop on Optimization in Multi-Agent …, 2011
52011
ROPSentry: runtime defense against ROP attacks using hardware performance counters
S Das, B Chen, M Chandramohan, Y Liu, W Zhang
Computers & Security 73, 374-388, 2018
42018
The system can't perform the operation now. Try again later.
Articles 1–20