Bytecode-centric Detection of Known-to-be-vulnerable Dependencies in Java Projects
Stefan Rausch- Schott +4 more
openalex +1 more source
Mobile malware detection method using improved GhostNetV2 with image enhancement technique. [PDF]
Du Y +5 more
europepmc +1 more source
AST, Bytecode, and the Space In Between: An Exploration of Interpreter Design Tradeoffs.
Octave Larose +2 more
openalex +1 more source
VarLifter: Recovering Variables and Types from Bytecode of Solidity Smart Contracts
Yichuan Li, Wei Song, Jeff Huang
openalex +1 more source
Malware detection in IoT networks with CNNs and integrated feature engineering. [PDF]
Abd-Ellah MK +3 more
europepmc +1 more source
CAPPR-Wallet: a context-aware and recoverable wallet architecture with privacy-preserving rules for trustless blockchain ecosystems. [PDF]
Liu M +4 more
europepmc +1 more source
LLM-Based Unknown Function Automated Modeling in Sensor-Driven Systems for Multi-Language Software Security Verification. [PDF]
Deng L, Zhong Q, Song J, Lei H, Li W.
europepmc +1 more source
Evaluation of quantum contouring algorithms for treatment planning on MR abdominal images. [PDF]
Glenn R +6 more
europepmc +1 more source

