Follow
Santanu Dash
Santanu Dash
Verified email at rhul.ac.uk - Homepage
Title
Cited by
Cited by
Year
Transcend: Detecting concept drift in malware classification models
R Jordaney, K Sharad, SK Dash, Z Wang, D Papini, I Nouretdinov, ...
26th USENIX Security Symposium (USENIX Security 17), 625-642, 2017
2482017
DroidSieve: Fast and Accurate Classification of Obfuscated Android Malware
G Suarez-Tangil, SK Dash, M Ahmadi, J Kinder, G Giacinto, L Cavallaro
Conference on Data and Application Security and Privacy, 2017
2452017
Droidscribe: Classifying android malware based on runtime behavior
SK Dash, G Suarez-Tangil, S Khan, K Tam, M Ahmadi, J Kinder, ...
2016 IEEE Security and Privacy Workshops (SPW), 252-261, 2016
2052016
Euphony: Harmonious Unification of Cacophonous Anti-Virus Vendor Labels for Android Malware
M Hurier, G Suarez-Tangil, SK Dash, TF Bissyandé, Y Le Traon, J Klein, ...
Mining Software Repositories (MSR), 2017
942017
Prescience: Probabilistic guidance on the retraining conundrum for malware detection
A Deo, SK Dash, G Suarez-Tangil, V Vovk, L Cavallaro
Proceedings of the 2016 ACM workshop on artificial intelligence and security …, 2016
362016
RefiNym: Using Names to Refine Types
SK Dash, M Allamanis, ET Barr
Foundations of Software Engineering (FSE), 2018
302018
A Theory of Dual Channel Constraints
C Casalnuovo, ET Barr, SK Dash, P Devanbu
Proceedings of the 42nd International Conference on Software Engineering …, 2020
192020
Deep learning to detect redundant method comments
A Louis, SK Dash, ET Barr, C Sutton
arXiv preprint arXiv:1806.04616, 2018
182018
Instruction cache tuning for embedded multitasking applications
SK Dash, T Srikanthan
IET computers & digital techniques 4 (6), 439-457, 2010
122010
POSIT: Simultaneously Tagging Natural and Programming Languages
PP Partachi, SK Dash, C Treude, ET Barr
42nd International Conference on Software Engineering (ICSE'20), 2020
112020
Where should I comment my code? A dataset and model for predicting locations that need comments
A Louis, SK Dash, ET Barr, MD Ernst, C Sutton
42nd International Conference on Software Engineering (ICSE'20), New Ideas …, 2020
102020
Flexeme: Untangling Commits Using Lexical Flows
PP Pârtachi, SK Dash, M Allamanis, ET Barr
Foundations of Software Engineering (FSE), 2020
92020
A scalable approach to computing representative lowest common ancestor in directed acyclic graphs
SK Dash, SB Scholz, S Herhut, B Christianson
Theoretical Computer Science 513, 25-37, 2013
92013
Rapid estimation of instruction cache hit rates using loop profiling
SK Dash, T Srikanthan
2008 International Conference on Application-Specific Systems, Architectures …, 2008
52008
Anomaly‐based exploratory analysis and detection of exploits in android mediaserver
G Suárez‐Tangil, SK Dash, P García‐Teodoro, J Camacho, L Cavallaro
IET Information Security 12 (5), 404-413, 2018
32018
Classifying android malware based on runtime behavior
SK Dash, G Suarez-Tangil, S Khan, K Tam, M Ahmadi, J Kinder, ...
Proceedings of the 2016 IEEE Security and Privacy Workshops, 2016
22016
MSR 2017
A Rahman, A Swidan, A Meyer, B Li, B Aloraini, CG Gavidia, C Theisen, ...
2
Do Names Echo Semantics? A Large-Scale Study of Identifiers Used in C++'s Named Casts
CC Petrescu, S Smith, G Rafail, SK Dash
Journal of Systems and Software, 2023
12023
Genetic Optimisation of C++ Applications
R Giavrimis, A Butler, CC Petrescu, M Basios, SK Dash
Automated Software Engineering (ASE'21), Late Breaking Results (LBR), 2021
12021
Checkers: Multi-modal Darwinian API Optimisation
SK Dash, F Wu, M Basios, L Li, L Kanthan
8th International Workshop on Genetic Improvement, 2020
12020
The system can't perform the operation now. Try again later.
Articles 1–20