Experimental study with real-world data for android app security analysis using machine learning S Roy, J DeLoach, Y Li, N Herndon, D Caragea, X Ou, VP Ranganath, ... Proceedings of the 31st Annual Computer Security Applications Conference, 81-90, 2015 | 89 | 2015 |
Task-oriented dialogue as dataflow synthesis J Andreas, J Bufe, D Burkett, C Chen, J Clausman, J Crawford, K Crim, ... Transactions of the Association for Computational Linguistics 8, 556-571, 2020 | 20 | 2020 |
Subhro Roy JA Semantic Machines, J Bufe, D Burkett, C Chen, J Clausman, ... Jesse Rusak, Beth Short, Div Slomin, Ben Snyder, Stephon Striplin, Yu Su …, 2020 | 14 | 2020 |
Android malware detection with weak ground truth data J DeLoach, D Caragea, X Ou 2016 IEEE International Conference on Big Data (Big Data), 3457-3464, 2016 | 13 | 2016 |
Subhro Roy J Andreas, J Bufe, D Burkett, C Chen, J Clausman, J Crawford, K Crim, ... Jesse Rusak, Beth Short, Div Slomin, Ben Snyder, Stephon Striplin, Yu Su …, 2020 | 9 | 2020 |
Twitter-enhanced android malware detection J DeLoach, D Caragea 2017 IEEE International Conference on Big Data (Big Data), 4648-4657, 2017 | 3 | 2017 |