Select Publications

Journal articles

Chen Z; Yan R; Ma Y; Sui Y; Xue J, 2024, 'A Smart Status Based Monitoring Algorithm for the Dynamic Analysis of Memory Safety', ACM Transactions on Software Engineering and Methodology, 33, http://dx.doi.org/10.1145/3637227

Cheng X; Nie X; Li N; Wang H; Zheng Z; Sui Y, 2024, 'How About Bug-Triggering Paths? - Understanding and Characterizing Learning-Based Vulnerability Detectors', IEEE Transactions on Dependable and Secure Computing, 21, pp. 542 - 558, http://dx.doi.org/10.1109/TDSC.2022.3192419

Jiang M; Sui Y; Lei Y; Xie X; Li C; Liu Y; Tsang IW, 2024, 'Adversarial Learning for Coordinate Regression through k-layer Penetrating Representation', IEEE Transactions on Dependable and Secure Computing, http://dx.doi.org/10.1109/TDSC.2024.3376437

Wu X; Shen J; Zheng W; Lin L; Sui Y; Semasaba AOA, 2023, 'RNNtcs: A test case selection method for Recurrent Neural Networks', Knowledge-Based Systems, 279, http://dx.doi.org/10.1016/j.knosys.2023.110955

Zhang G; Sun J; Xu F; Sui Y; Bandara HMND; Chen S; Menzies T, 2023, 'A Tale of Two Cities: Data and Configuration Variances in Robust Deep Learning', IEEE Internet Computing, 27, pp. 13 - 20, http://dx.doi.org/10.1109/MIC.2023.3322283

He D; Gui Y; Li W; Tao Y; Zou C; Sui Y; Xue J, 2023, 'A Container-Usage-Pattern-Based Context Debloating Approach for Object-Sensitive Pointer Analysis', Proceedings of the ACM on Programming Languages, 7, http://dx.doi.org/10.1145/3622832

Li J; Pan Y; Lyu Y; Yao Y; Sui Y; Tsang IW, 2023, 'Earning Extra Performance From Restrictive Feedbacks', IEEE Transactions on Pattern Analysis and Machine Intelligence, 45, pp. 11753 - 11765, http://dx.doi.org/10.1109/TPAMI.2023.3273249

Du X; Sui Y; Liu Z; Ai J, 2023, 'An Empirical Study of Fault Triggers in Deep Learning Frameworks', IEEE Transactions on Dependable and Secure Computing, 20, pp. 2696 - 2712, http://dx.doi.org/10.1109/TDSC.2022.3152239

Lei Y; Ye D; Shen S; Sui Y; Zhu T; Zhou W, 2023, 'New challenges in reinforcement learning: a survey of security and privacy', Artificial Intelligence Review, 56, pp. 7195 - 7236, http://dx.doi.org/10.1007/s10462-022-10348-5

Lei Y; Sui Y; Tan SH; Zhang Q, 2023, 'Recursive State Machine Guided Graph Folding for Context-Free Language Reachability', Proceedings of the ACM on Programming Languages, 7, http://dx.doi.org/10.1145/3591233

Zhang W; Guo S; Zhang H; Sui Y; Xue Y; Xu Y, 2023, 'Challenging Machine Learning-Based Clone Detectors via Semantic-Preserving Code Transformations', IEEE Transactions on Software Engineering, 49, pp. 3052 - 3070, http://dx.doi.org/10.1109/TSE.2023.3240118

Win HM; Tan SH; Sui Y, 2023, 'Event-aware precise dynamic slicing for automatic debugging of Android applications', Journal of Systems and Software, 198, http://dx.doi.org/10.1016/j.jss.2023.111606

Lei Y; Sui Y; Ding S; Zhang Q, 2022, 'Taming transitive redundancy for context-free language reachability', Proceedings of the ACM on Programming Languages, 6, http://dx.doi.org/10.1145/3563343

Tang Y; Wang H; Zhan X; Luo X; Zhou Y; Zhou H; Yan Q; Sui Y; Keung J, 2022, 'A Systematical Study on Application Performance Management Libraries for Apps', IEEE Transactions on Software Engineering, 48, pp. 3044 - 3065, http://dx.doi.org/10.1109/TSE.2021.3077654

Aung TWW; Wan Y; Huo H; Sui Y, 2022, 'Multi-triage: A multi-task learning framework for bug triage', Journal of Systems and Software, 184, http://dx.doi.org/10.1016/j.jss.2021.111133

Wang W; Zhang Y; Sui Y; Wan Y; Zhao Z; Wu J; Yu PS; Xu G, 2022, 'Reinforcement-Learning-Guided Source Code Summarization Using Hierarchical Attention', IEEE Transactions on Software Engineering, 48, pp. 102 - 119, http://dx.doi.org/10.1109/TSE.2020.2979701

Zheng W; Xun Y; Wu X; Deng Z; Chen X; Sui Y, 2021, 'A Comparative Study of Class Rebalancing Methods for Security Bug Report Classification', IEEE Transactions on Reliability, 70, pp. 1658 - 1670, http://dx.doi.org/10.1109/TR.2021.3118026

Barbar M; Sui Y, 2021, 'Compacting points-to sets through object clustering', Proceedings of the ACM on Programming Languages, 5, http://dx.doi.org/10.1145/3485547

Wang L; He R; Wang H; Xia P; Li Y; Wu L; Zhou Y; Luo X; Sui Y; Guo Y; Xu G, 2021, 'Beyond the virus: a first look at coronavirus-themed Android malware', Empirical Software Engineering, 26, http://dx.doi.org/10.1007/s10664-021-09974-4

Zheng W; Wu Y; Wu X; Feng C; Sui Y; Luo X; Zhou Y, 2021, 'A survey of Intel SGX and its applications', Frontiers of Computer Science, 15, http://dx.doi.org/10.1007/s11704-019-9096-y

Cheng X; Wang H; Hua J; Xu G; Sui Y, 2021, 'DeepWukong: Statically Detecting Software Vulnerabilities Using Deep Graph Neural Network', ACM Transactions on Software Engineering and Methodology, 30, http://dx.doi.org/10.1145/3436877

Hua W; Sui Y; Wan Y; Liu G; Xu G, 2021, 'FCCA: Hybrid Code Representation for Functional Clone Detection Using Attention Networks', IEEE Transactions on Reliability, 70, pp. 304 - 318, http://dx.doi.org/10.1109/TR.2020.3001918

Sui Y; Cheng X; Zhang G; Wang H, 2020, 'Flow2Vec: Value-flow-based precise code embedding', Proceedings of the ACM on Programming Languages, 4, http://dx.doi.org/10.1145/3428301

Sui Y; Xue J, 2020, 'Value-Flow-Based Demand-Driven Pointer Analysis for C and C++', IEEE Transactions on Software Engineering, 46, pp. 812 - 835, http://dx.doi.org/10.1109/TSE.2018.2869336

Xiao G; Zheng Z; Jiang B; Sui Y, 2020, 'An Empirical Study of Regression Bug Chains in Linux', IEEE Transactions on Reliability, 69, pp. 558 - 570, http://dx.doi.org/10.1109/TR.2019.2902171

Nobakht M; Sui Y; Seneviratne A; Hu W, 2020, 'PGFIT: Static permission analysis of health and fitness apps in IoT programming frameworks', Journal of Network and Computer Applications, 152, pp. 102509, http://dx.doi.org/10.1016/j.jnca.2019.102509

Zhang Y; Sui Y; Pan S; Zheng Z; Ning B; Tsang I; Zhou W, 2020, 'Familial Clustering for Weakly-Labeled Android Malware Using Hybrid Representation Learning', IEEE Transactions on Information Forensics and Security, 15, pp. 3401 - 3414, http://dx.doi.org/10.1109/TIFS.2019.2947861

Li J; Pan Y; Sui Y; Tsang IW, 2020, 'Secure Metric Learning via Differential Pairwise Privacy', IEEE Transactions on Information Forensics and Security, 15, pp. 3640 - 3652, http://dx.doi.org/10.1109/TIFS.2020.2997183

Sui Y; Yan H; Zheng Z; Zhang Y; Xue J, 2018, 'Parallel construction of interprocedural memory SSA form', Journal of Systems and Software, 146, pp. 186 - 195, http://dx.doi.org/10.1016/j.jss.2018.09.038

Hou Z; Wang Y; Sui Y; Gu J; Zhao T; Zhou X, 2018, 'Managing high-performance computing applications as an on-demand service on federated clouds', Computers and Electrical Engineering, 67, pp. 579 - 595, http://dx.doi.org/10.1016/j.compeleceng.2018.02.036

Sui Y; Fan X; Zhou H; Xue J, 2018, 'Loop-Oriented pointer analysis for automatic SIMD vectorization', ACM Transactions on Embedded Computing Systems, 17, http://dx.doi.org/10.1145/3168364

Sui Y; Xue J, 2017, 'Demand-Driven Pointer Analysis with Strong Updates via Value-Flow Refinement', , http://arxiv.org/abs/1701.05650v1

Yan H; Sui Y; Chen S; Xue J, 2017, 'AutoFix', ACM SIGAPP Applied Computing Review, 16, pp. 38 - 50, http://dx.doi.org/10.1145/3040575.3040579

Tian FB; Wang W; Wu J; Sui Y, 2016, 'Swimming performance and vorticity structures of a mother-calf pair of fish', Computers and Fluids, 124, pp. 1 - 11, http://dx.doi.org/10.1016/j.compfluid.2015.10.006

Sui Y; Ye D; Su Y; Xue J, 2016, 'Eliminating Redundant Bounds Checks in Dynamic Buffer Overflow Detection Using Weakest Preconditions', IEEE Transactions on Reliability, PP, pp. 1 - 18, http://dx.doi.org/10.1109/TR.2016.2570538

Sui Y; Ye D; Xue J, 2014, 'Detecting memory leaks statically with full-sparse value-flow analysis', IEEE Transactions on Software Engineering, 40, pp. 107 - 122, http://dx.doi.org/10.1109/TSE.2014.2302311

Sui Y; Ye S; Xue J; Zhang J, 2014, 'Making context-sensitive inclusion-based pointer analysis practical for compilers using parameterised summarisation', Software: Practice and Experience, 44, pp. 1485 - 1510, http://dx.doi.org/10.1002/spe.2214

Conference Papers

Zhao W; Hou Z; Wu S; Gao Y; Dong H; Wan Y; Zhang H; Sui Y; Zhang H, 2024, 'NL2FORMULA: Generating Spreadsheet Formulas from Natural Language Queries', in EACL 2024 - 18th Conference of the European Chapter of the Association for Computational Linguistics, Findings of EACL 2024, pp. 2377 - 2388

Wang J; Xiao G; Zhang S; Lei H; Liu Y; Sui Y, 2023, 'Compatibility Issues in Deep Learning Systems: Problems and Opportunities', in ESEC/FSE 2023 - Proceedings of the 31st ACM Joint Meeting European Software Engineering Conference and Symposium on the Foundations of Software Engineering, pp. 476 - 488, http://dx.doi.org/10.1145/3611643.3616321

Li G; Zhang H; Zhou J; Shen W; Sui Y; Qian Z, 2023, 'A Hybrid Alias Analysis and Its Application to Global Variable Protection in the Linux Kernel', in 32nd USENIX Security Symposium, USENIX Security 2023, pp. 4211 - 4228

Zhong Z; Liu J; Wu D; Di P; Sui Y; Liu AX; Lui JCS, 2023, 'Scalable Compositional Static Taint Analysis for Sensitive Data Tracing on Industrial Micro-Services', in Proceedings - International Conference on Software Engineering, pp. 110 - 121, http://dx.doi.org/10.1109/ICSE-SEIP58684.2023.00015

Shi C; Li H; Sui Y; Lu J; Li L; Xue J, 2023, 'Two Birds with One Stone: Multi-Derivation for Fast Context-Free Language Reachability Analysis', in Proceedings - 2023 38th IEEE/ACM International Conference on Automated Software Engineering, ASE 2023, pp. 624 - 636, http://dx.doi.org/10.1109/ASE56229.2023.00118

Feng Q; Sui Y; Zhang H, 2023, 'Uncovering Limitations in Text-to-Image Generation: A Contrastive Approach with Structured Semantic Alignment', in Findings of the Association for Computational Linguistics: EMNLP 2023, pp. 8876 - 8888

Lei H; Zhang S; Wang J; Xiao G; Liu Y; Sui Y, 2023, 'Why Do Deep Learning Projects Differ in Compatible Framework Versions? An Exploratory Study', in Proceedings - International Symposium on Software Reliability Engineering, ISSRE, pp. 509 - 520, http://dx.doi.org/10.1109/ISSRE59848.2023.00076

Gao Y; Xu G; Li L; Luo X; Wang C; Sui Y, 2022, 'Demystifying the underground ecosystem of account registration bots', in ESEC/FSE 2022 - Proceedings of the 30th ACM Joint Meeting European Software Engineering Conference and Symposium on the Foundations of Software Engineering, pp. 897 - 909, http://dx.doi.org/10.1145/3540250.3549090

Wan Y; Zhang S; Zhang H; Sui Y; Xu G; Yao D; Jin H; Sun L, 2022, 'You see what I want you to see: poisoning vulnerabilities in neural code search', in ESEC/FSE 2022 - Proceedings of the 30th ACM Joint Meeting European Software Engineering Conference and Symposium on the Foundations of Software Engineering, pp. 1233 - 1245, http://dx.doi.org/10.1145/3540250.3549153

Wang L; Wang H; Luo X; Sui Y, 2022, 'MalWhiteout: Reducing Label Errors in Android Malware Detection', in ACM International Conference Proceeding Series, http://dx.doi.org/10.1145/3551349.3560418

Cheng X; Zhang G; Wang H; Sui Y, 2022, 'Path-sensitive code embedding via contrastive learning for software vulnerability detection', in ISSTA 2022 - Proceedings of the 31st ACM SIGSOFT International Symposium on Software Testing and Analysis, pp. 519 - 531, http://dx.doi.org/10.1145/3533767.3534371

Li T; Bai JJ; Sui Y; Hu SM, 2022, 'Path-Sensitive and Alias-Aware Typestate Analysis for Detecting OS Bugs', in International Conference on Architectural Support for Programming Languages and Operating Systems - ASPLOS, pp. 859 - 872, http://dx.doi.org/10.1145/3503222.3507770

Gui Y; Wan Y; Zhang H; Huang H; Sui Y; Xu G; Shao Z; Jin H, 2022, 'Cross-Language Binary-Source Code Matching with Intermediate Representations', in Proceedings - 2022 IEEE International Conference on Software Analysis, Evolution and Reengineering, SANER 2022, pp. 601 - 612, http://dx.doi.org/10.1109/SANER53432.2022.00077


Back to profile page