Follow
Ruitao FENG
Ruitao FENG
UNSW, Sydney
Verified email at unsw.edu.au - Homepage
Title
Cited by
Cited by
Year
A Performance-Sensitive Malware Detection System Using Deep Learning on Mobile Devices
R Feng, S Chen, X Xie, G Meng, SW Lin, Y Liu
IEEE Transactions on Information Forensics and Security, 1563 - 1578, 2020
1092020
Mobidroid: A performance-sensitive malware detection system on mobile platform
R Feng, S Chen, X Xie, L Ma, G Meng, Y Liu, SW Lin
2019 24th International Conference on Engineering of Complex Computer …, 2019
472019
Enhancing security patch identification by capturing structures in commits
B Wu, S Liu, R Feng, X Xie, J Siow, SW Lin
IEEE Transactions on Dependable and Secure Computing, 2022
242022
Seqmobile: An efficient sequence-based malware detection system using rnn on mobile devices
R Feng, JQ Lim, S Chen, SW Lin, Y Liu
2020 25th International Conference on Engineering of Complex Computer …, 2020
23*2020
Detection method of the second-order SQL injection in Web applications
L Yan, X Li, R Feng, Z Feng, J Hu
Structured Object-Oriented Formal Language and Method: Third International …, 2014
212014
Transrepair: Context-aware program repair for compilation errors
X Li, S Liu, R Feng, G Meng, X Xie, K Chen, Y Liu
Proceedings of the 37th IEEE/ACM International Conference on Automated …, 2022
162022
DroidEcho: an in-depth dissection of malicious behaviors in Android applications
G Meng, R Feng, G Bai, K Chen, Y Liu
Cybersecurity 1, 1-17, 2018
142018
An extended uml method for the verification of security protocols
G Shen, X Li, R Feng, G Xu, J Hu, Z Feng
2014 19th International Conference on Engineering of Complex Computer …, 2014
92014
OOPN-SRAM: A novel method for software risk assessment
X Wu, X Li, R Feng, G Xu, J Hu, Z Feng
2014 19th International Conference on Engineering of Complex Computer …, 2014
82014
Multi-label classification for android malware based on active learning
Q Qiao, R Feng, S Chen, F Zhang, X Li
IEEE Transactions on Dependable and Secure Computing, 2022
62022
Learning performance optimization from code changes for android apps
R Feng, G Meng, X Xie, T Su, Y Liu, SW Lin
2019 IEEE International Conference on Software Testing, Verification and …, 2019
62019
An orchestrated empirical study on deep learning frameworks and platforms
Q Guo, X Xie, L Ma, Q Hu, R Feng, L Li, Y Liu, J Zhao, X Li
arXiv preprint arXiv:1811.05187, 2018
62018
A performance-sensitive malware detection system on mobile platform
R Feng, Y Liu, S Lin
Formal Methods and Software Engineering: 21st International Conference on …, 2019
52019
A comprehensive study on quality assurance tools for java
H Liu, S Chen, R Feng, C Liu, K Li, Z Xu, L Nie, Y Liu, Y Chen
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software …, 2023
42023
Deep learning for coverage-guided fuzzing: How far are we?
S Li, X Xie, Y Lin, Y Li, R Feng, X Li, W Ge, JS Dong
IEEE Transactions on Dependable and Secure Computing, 2022
42022
A three-dimensional model for software security evaluation
Z Han, X Li, R Feng, J Hu, G Xu, Z Feng
2014 Theoretical Aspects of Software Engineering Conference, 34-41, 2014
42014
Comparison and Evaluation on Static Application Security Testing (SAST) Tools for Java
K Li, S Chen, L Fan, R Feng, H Liu, C Liu, Y Liu, Y Chen
Proceedings of the 31st ACM Joint European Software Engineering Conference …, 2023
32023
Architecture security evaluation method based on security of the components
C Du, X Li, H Shi, J Hu, R Feng, Z Feng
2013 20th Asia-Pacific Software Engineering Conference (APSEC) 1, 523-528, 2013
22013
IconChecker: Anomaly Detection of Icon-Behaviors for Android Apps
Y Li, R Feng, S Chen, Q Guo, L Fan, X Li
2021 28th Asia-Pacific Software Engineering Conference (APSEC), 202-212, 2021
12021
Automatic verification for later-correspondence of security protocols
X Xie, X Li, Y Liu, L Li, R Feng, Z Feng
International Workshop on Structured Object-Oriented Formal Language and …, 2014
12014
The system can't perform the operation now. Try again later.
Articles 1–20