Select Publications
Journal articles
2024, 'Deep Learning for Code Intelligence: Survey, Benchmark and Toolkit', ACM Computing Surveys, 56, http://dx.doi.org/10.1145/3664597
,2024, 'Deep semi-supervised learning for recovering traceability links between issues and commits', Journal of Systems and Software, 216, http://dx.doi.org/10.1016/j.jss.2024.112109
,2024, 'Cross-project concurrency bug prediction using domain-adversarial neural network', Journal of Systems and Software, 214, http://dx.doi.org/10.1016/j.jss.2024.112077
,2024, 'Finding and Understanding Defects in Static Analyzers by Constructing Automated Oracles', Proceedings of the ACM on Software Engineering, 1, pp. 1656 - 1678, http://dx.doi.org/10.1145/3660781
,2024, 'TIPS: Tracking Integer-Pointer Value Flows for C++ Member Function Pointers', Proceedings of the ACM on Software Engineering, 1, pp. 1609 - 1631, http://dx.doi.org/10.1145/3660779
,2024, 'Context-Free Language Reachability via Skewed Tabulation', Proceedings of the ACM on Programming Languages, 8, http://dx.doi.org/10.1145/3656451
,2024, 'Message from the Chairs', Proceedings of the ACM SIGPLAN Conference on Languages, Compilers, and Tools for Embedded Systems (LCTES), pp. III
,2024, 'Dynamic Transitive Closure-based Static Analysis through the Lens of Quantum Search', ACM Transactions on Software Engineering and Methodology, 33, http://dx.doi.org/10.1145/3644389
,2024, 'Cross-Language Taint Analysis: Generating Caller-Sensitive Native Code Specification for Java', IEEE Transactions on Software Engineering, 50, pp. 1518 - 1533, http://dx.doi.org/10.1109/TSE.2024.3392254
,2024, 'Iterative-Epoch Online Cycle Elimination for Context-Free Language Reachability', Proceedings of the ACM on Programming Languages, 8, http://dx.doi.org/10.1145/3649862
,2024, 'A Smart Status Based Monitoring Algorithm for the Dynamic Analysis of Memory Safety', ACM Transactions on Software Engineering and Methodology, 33, http://dx.doi.org/10.1145/3637227
,2024, 'How About Bug-Triggering Paths? - Understanding and Characterizing Learning-Based Vulnerability Detectors', IEEE Transactions on Dependable and Secure Computing, 21, pp. 542 - 558, http://dx.doi.org/10.1109/TDSC.2022.3192419
,2024, 'Adversarial Learning for Coordinate Regression through k-layer Penetrating Representation', IEEE Transactions on Dependable and Secure Computing, http://dx.doi.org/10.1109/TDSC.2024.3376437
,2024, 'Pearl: A Multi-Derivation Approach to Efficient CFL-Reachability Solving', IEEE Transactions on Software Engineering, 50, pp. 2379 - 2397, http://dx.doi.org/10.1109/TSE.2024.3437684
,2023, 'RNNtcs: A test case selection method for Recurrent Neural Networks', Knowledge-Based Systems, 279, http://dx.doi.org/10.1016/j.knosys.2023.110955
,2023, 'A Tale of Two Cities: Data and Configuration Variances in Robust Deep Learning', IEEE Internet Computing, 27, pp. 13 - 20, http://dx.doi.org/10.1109/MIC.2023.3322283
,2023, 'A Container-Usage-Pattern-Based Context Debloating Approach for Object-Sensitive Pointer Analysis', Proceedings of the ACM on Programming Languages, 7, http://dx.doi.org/10.1145/3622832
,2023, 'Earning Extra Performance From Restrictive Feedbacks', IEEE Transactions on Pattern Analysis and Machine Intelligence, 45, pp. 11753 - 11765, http://dx.doi.org/10.1109/TPAMI.2023.3273249
,2023, 'An Empirical Study of Fault Triggers in Deep Learning Frameworks', IEEE Transactions on Dependable and Secure Computing, 20, pp. 2696 - 2712, http://dx.doi.org/10.1109/TDSC.2022.3152239
,2023, 'New challenges in reinforcement learning: a survey of security and privacy', Artificial Intelligence Review, 56, pp. 7195 - 7236, http://dx.doi.org/10.1007/s10462-022-10348-5
,2023, 'Recursive State Machine Guided Graph Folding for Context-Free Language Reachability', Proceedings of the ACM on Programming Languages, 7, http://dx.doi.org/10.1145/3591233
,2023, 'Challenging Machine Learning-Based Clone Detectors via Semantic-Preserving Code Transformations', IEEE Transactions on Software Engineering, 49, pp. 3052 - 3070, http://dx.doi.org/10.1109/TSE.2023.3240118
,2023, 'Event-aware precise dynamic slicing for automatic debugging of Android applications', Journal of Systems and Software, 198, http://dx.doi.org/10.1016/j.jss.2023.111606
,2022, 'Taming transitive redundancy for context-free language reachability', Proceedings of the ACM on Programming Languages, 6, http://dx.doi.org/10.1145/3563343
,2022, 'A Systematical Study on Application Performance Management Libraries for Apps', IEEE Transactions on Software Engineering, 48, pp. 3044 - 3065, http://dx.doi.org/10.1109/TSE.2021.3077654
,2022, 'Multi-triage: A multi-task learning framework for bug triage', Journal of Systems and Software, 184, http://dx.doi.org/10.1016/j.jss.2021.111133
,2022, 'Reinforcement-Learning-Guided Source Code Summarization Using Hierarchical Attention', IEEE Transactions on Software Engineering, 48, pp. 102 - 119, http://dx.doi.org/10.1109/TSE.2020.2979701
,2021, 'A Comparative Study of Class Rebalancing Methods for Security Bug Report Classification', IEEE Transactions on Reliability, 70, pp. 1658 - 1670, http://dx.doi.org/10.1109/TR.2021.3118026
,2021, 'Compacting points-to sets through object clustering', Proceedings of the ACM on Programming Languages, 5, http://dx.doi.org/10.1145/3485547
,2021, 'Beyond the virus: a first look at coronavirus-themed Android malware', Empirical Software Engineering, 26, http://dx.doi.org/10.1007/s10664-021-09974-4
,2021, 'A survey of Intel SGX and its applications', Frontiers of Computer Science, 15, http://dx.doi.org/10.1007/s11704-019-9096-y
,2021, 'DeepWukong: Statically Detecting Software Vulnerabilities Using Deep Graph Neural Network', ACM Transactions on Software Engineering and Methodology, 30, http://dx.doi.org/10.1145/3436877
,2021, 'FCCA: Hybrid Code Representation for Functional Clone Detection Using Attention Networks', IEEE Transactions on Reliability, 70, pp. 304 - 318, http://dx.doi.org/10.1109/TR.2020.3001918
,2020, 'Flow2Vec: Value-flow-based precise code embedding', Proceedings of the ACM on Programming Languages, 4, http://dx.doi.org/10.1145/3428301
,2020, 'Value-Flow-Based Demand-Driven Pointer Analysis for C and C++', IEEE Transactions on Software Engineering, 46, pp. 812 - 835, http://dx.doi.org/10.1109/TSE.2018.2869336
,2020, 'An Empirical Study of Regression Bug Chains in Linux', IEEE Transactions on Reliability, 69, pp. 558 - 570, http://dx.doi.org/10.1109/TR.2019.2902171
,2020, 'PGFIT: Static permission analysis of health and fitness apps in IoT programming frameworks', Journal of Network and Computer Applications, 152, pp. 102509, http://dx.doi.org/10.1016/j.jnca.2019.102509
,2020, 'Familial Clustering for Weakly-Labeled Android Malware Using Hybrid Representation Learning', IEEE Transactions on Information Forensics and Security, 15, pp. 3401 - 3414, http://dx.doi.org/10.1109/TIFS.2019.2947861
,2020, 'Secure Metric Learning via Differential Pairwise Privacy', IEEE Transactions on Information Forensics and Security, 15, pp. 3640 - 3652, http://dx.doi.org/10.1109/TIFS.2020.2997183
,2018, 'Parallel construction of interprocedural memory SSA form', Journal of Systems and Software, 146, pp. 186 - 195, http://dx.doi.org/10.1016/j.jss.2018.09.038
,2018, 'Managing high-performance computing applications as an on-demand service on federated clouds', Computers and Electrical Engineering, 67, pp. 579 - 595, http://dx.doi.org/10.1016/j.compeleceng.2018.02.036
,2018, 'Loop-Oriented pointer analysis for automatic SIMD vectorization', ACM Transactions on Embedded Computing Systems, 17, http://dx.doi.org/10.1145/3168364
,2017, 'Demand-Driven Pointer Analysis with Strong Updates via Value-Flow Refinement', , http://arxiv.org/abs/1701.05650v1
,2017, 'AutoFix', ACM SIGAPP Applied Computing Review, 16, pp. 38 - 50, http://dx.doi.org/10.1145/3040575.3040579
,2016, 'Swimming performance and vorticity structures of a mother-calf pair of fish', Computers and Fluids, 124, pp. 1 - 11, http://dx.doi.org/10.1016/j.compfluid.2015.10.006
,2016, 'Eliminating Redundant Bounds Checks in Dynamic Buffer Overflow Detection Using Weakest Preconditions', IEEE Transactions on Reliability, PP, pp. 1 - 18, http://dx.doi.org/10.1109/TR.2016.2570538
,2014, 'Detecting memory leaks statically with full-sparse value-flow analysis', IEEE Transactions on Software Engineering, 40, pp. 107 - 122, http://dx.doi.org/10.1109/TSE.2014.2302311
,2014, 'Making context-sensitive inclusion-based pointer analysis practical for compilers using parameterised summarisation', Software: Practice and Experience, 44, pp. 1485 - 1510, http://dx.doi.org/10.1002/spe.2214
,Conference Papers
2024, 'Graph Neural Networks for Vulnerability Detection: A Counterfactual Explanation', in ISSTA 2024 - Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis, pp. 389 - 401, http://dx.doi.org/10.1145/3650212.3652136
,2024, 'An Exploratory Investigation of Log Anomalies in Unmanned Aerial Vehicles', in Proceedings - International Conference on Software Engineering, pp. 2593 - 2605, http://dx.doi.org/10.1145/3597503.3639186
,