Login / Signup
Ping Luo
ORCID
Publication Activity (10 Years)
Years Active: 2018-2022
Publications (10 Years): 16
Top Topics
Software Reliability
Source Code
Clone Detection
Markov Chain
Top Venues
Int. J. Inf. Comput. Secur.
Softw. Pract. Exp.
J. Inf. Sci. Eng.
ICST
</>
Publications
</>
Junaid Akram
,
Danish Vasan
,
Ping Luo
Obfuscated code is identifiable by a token-based code clone detection technique.
Int. J. Inf. Comput. Secur.
19 (3/4) (2022)
Gul Jabeen
,
Xi Yang
,
Ping Luo
Vulnerability severity prediction model for software based on Markov chain.
Int. J. Inf. Comput. Secur.
15 (2/3) (2021)
Majid Mumtaz
,
Ping Luo
An improved cryptanalysis of large RSA decryption exponent with constrained secret key.
Int. J. Inf. Comput. Secur.
14 (2) (2021)
Junaid Akram
,
Ping Luo
SQVDT: A scalable quantitative vulnerability detection technique for source code security assessment.
Softw. Pract. Exp.
51 (2) (2021)
Majid Mumtaz
,
Ping Luo
Cryptanalysis of a Special Case of RSA Large Decryption Exponent Using Lattice Basis Reduction Method.
ICCCS
(2021)
Junaid Akram
,
Majid Mumtaz
,
Gul Jabeen
,
Ping Luo
DroidMD: an efficient and scalable Android malware detection approach at source code level.
Int. J. Inf. Comput. Secur.
15 (2/3) (2021)
Majid Mumtaz
,
Ping Luo
Cryptanalysis of RSA: A Special Case of Boneh-Durfee's Attack.
IACR Cryptol. ePrint Arch.
2020 (2020)
Junaid Akram
,
Ping Luo
How to build a vulnerability benchmark to overcome cyber security attacks.
IET Inf. Secur.
14 (1) (2020)
Junaid Akram
,
Zhendong Shi
,
Majid Mumtaz
,
Ping Luo
DroidSD: An Efficient Indexed Based Android Applications Similarity Detection Tool.
J. Inf. Sci. Eng.
36 (1) (2020)
Majid Mumtaz
,
Ping Luo
Remarks on the cryptanalysis of common prime RSA for IoT constrained low power devices.
Inf. Sci.
538 (2020)
Junaid Akram
,
Majid Mumtaz
,
Ping Luo
IBFET: Index-based features extraction technique for scalable code clone detection at file level granularity.
Softw. Pract. Exp.
50 (1) (2020)
Gul Jabeen
,
Ping Luo
,
Wasif Afzal
An improved software reliability prediction model by using high precision error iterative analysis method.
Softw. Test. Verification Reliab.
29 (6-7) (2019)
Junaid Akram
,
Liang Qi
,
Ping Luo
VCIPR: Vulnerable Code is Identifiable When a Patch is Released (Hacker's Perspective).
ICST
(2019)
Junaid Akram
,
Zhendong Shi
,
Majid Mumtaz
,
Ping Luo
DCCD: An Efficient and Scalable Distributed Code Clone Detection Technique for Big Code.
SEKE
(2018)
Junaid Akram
,
Zhendong Shi
,
Majid Mumtaz
,
Ping Luo
DroidCC: A Scalable Clone Detection Approach for Android Applications to Detect Similarity at Source Code Level.
COMPSAC (1)
(2018)
Xi Yang
,
Gul Jabeen
,
Ping Luo
,
Xiao-Ling Zhu
,
Mei-Hua Liu
A Unified Measurement Solution of Software Trustworthiness Based on Social-to-Software Framework.
J. Comput. Sci. Technol.
33 (3) (2018)