1 | -- | 24 | Pratiksha Gautam, Hemraj Saini. Non-Trivial Software Clone Detection Using Program Dependency Graph |
25 | -- | 43 | Yuehan Wang, Tong Li, Yongquan Cai, Zhenhu Ning, Fei Xue, Di Jiao. A Novel Anti-Obfuscation Model for Detecting Malicious Code |
44 | -- | 58 | Yang Zhang, Xin Yu, Dongwen Zhang, Mengmeng Wei, Yanan Liang. Lock-Free Binary Search Tree Based on Leaf Search |
59 | -- | 75 | Xuzhou Zhang, Yun-Zhan Gong, Yawen Wang. Heuristic Guided Selective Path Exploration for Loop Structure in Coverage Testing |