Picture for Yiling He

Yiling He

University College London

Esim: EVM Bytecode Similarity Detection Based on Stable-Semantic Graph

Add code
Nov 17, 2025
Viaarxiv icon

Retrofit: Continual Learning with Bounded Forgetting for Security Applications

Add code
Nov 14, 2025
Viaarxiv icon

Beyond Classification: Evaluating LLMs for Fine-Grained Automatic Malware Behavior Auditing

Add code
Sep 17, 2025
Figure 1 for Beyond Classification: Evaluating LLMs for Fine-Grained Automatic Malware Behavior Auditing
Figure 2 for Beyond Classification: Evaluating LLMs for Fine-Grained Automatic Malware Behavior Auditing
Figure 3 for Beyond Classification: Evaluating LLMs for Fine-Grained Automatic Malware Behavior Auditing
Figure 4 for Beyond Classification: Evaluating LLMs for Fine-Grained Automatic Malware Behavior Auditing
Viaarxiv icon

Explainer-guided Targeted Adversarial Attacks against Binary Code Similarity Detection Models

Add code
Jun 05, 2025
Viaarxiv icon

On Benchmarking Code LLMs for Android Malware Analysis

Add code
Apr 01, 2025
Viaarxiv icon

Boosting Illuminant Estimation in Deep Color Constancy through Enhancing Brightness Robustness

Add code
Feb 18, 2025
Figure 1 for Boosting Illuminant Estimation in Deep Color Constancy through Enhancing Brightness Robustness
Figure 2 for Boosting Illuminant Estimation in Deep Color Constancy through Enhancing Brightness Robustness
Figure 3 for Boosting Illuminant Estimation in Deep Color Constancy through Enhancing Brightness Robustness
Figure 4 for Boosting Illuminant Estimation in Deep Color Constancy through Enhancing Brightness Robustness
Viaarxiv icon

LAMD: Context-driven Android Malware Detection and Classification with LLMs

Add code
Feb 18, 2025
Figure 1 for LAMD: Context-driven Android Malware Detection and Classification with LLMs
Figure 2 for LAMD: Context-driven Android Malware Detection and Classification with LLMs
Figure 3 for LAMD: Context-driven Android Malware Detection and Classification with LLMs
Figure 4 for LAMD: Context-driven Android Malware Detection and Classification with LLMs
Viaarxiv icon

TAPI: Towards Target-Specific and Adversarial Prompt Injection against Code LLMs

Add code
Jul 12, 2024
Figure 1 for TAPI: Towards Target-Specific and Adversarial Prompt Injection against Code LLMs
Figure 2 for TAPI: Towards Target-Specific and Adversarial Prompt Injection against Code LLMs
Figure 3 for TAPI: Towards Target-Specific and Adversarial Prompt Injection against Code LLMs
Figure 4 for TAPI: Towards Target-Specific and Adversarial Prompt Injection against Code LLMs
Viaarxiv icon

Explanation as a Watermark: Towards Harmless and Multi-bit Model Ownership Verification via Watermarking Feature Attribution

Add code
May 08, 2024
Figure 1 for Explanation as a Watermark: Towards Harmless and Multi-bit Model Ownership Verification via Watermarking Feature Attribution
Figure 2 for Explanation as a Watermark: Towards Harmless and Multi-bit Model Ownership Verification via Watermarking Feature Attribution
Figure 3 for Explanation as a Watermark: Towards Harmless and Multi-bit Model Ownership Verification via Watermarking Feature Attribution
Figure 4 for Explanation as a Watermark: Towards Harmless and Multi-bit Model Ownership Verification via Watermarking Feature Attribution
Viaarxiv icon

Going Proactive and Explanatory Against Malware Concept Drift

Add code
May 07, 2024
Figure 1 for Going Proactive and Explanatory Against Malware Concept Drift
Figure 2 for Going Proactive and Explanatory Against Malware Concept Drift
Figure 3 for Going Proactive and Explanatory Against Malware Concept Drift
Figure 4 for Going Proactive and Explanatory Against Malware Concept Drift
Viaarxiv icon