Select Publications
Conference Papers
2024, 'Graph Neural Networks for Vulnerability Detection: A Counterfactual Explanation', in ISSTA 2024 - Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis, pp. 389 - 401, http://dx.doi.org/10.1145/3650212.3652136
,2024, 'An Exploratory Investigation of Log Anomalies in Unmanned Aerial Vehicles', in Proceedings - International Conference on Software Engineering, pp. 2593 - 2605, http://dx.doi.org/10.1145/3597503.3639186
,2024, 'Iterative Refinement of Project-Level Code Context for Precise Code Generation with Compiler Feedback', in Proceedings of the Annual Meeting of the Association for Computational Linguistics, pp. 2336 - 2353
,2024, 'NL2FORMULA: Generating Spreadsheet Formulas from Natural Language Queries', in EACL 2024 - 18th Conference of the European Chapter of the Association for Computational Linguistics, Findings of EACL 2024, pp. 2377 - 2388
,2024, 'Precise Sparse Abstract Execution via Cross-Domain Interaction', in Proceedings - International Conference on Software Engineering, pp. 1335 - 1346, http://dx.doi.org/10.1145/3597503.3639220
,2023, 'Compatibility Issues in Deep Learning Systems: Problems and Opportunities', in ESEC/FSE 2023 - Proceedings of the 31st ACM Joint Meeting European Software Engineering Conference and Symposium on the Foundations of Software Engineering, pp. 476 - 488, http://dx.doi.org/10.1145/3611643.3616321
,2023, 'A Hybrid Alias Analysis and Its Application to Global Variable Protection in the Linux Kernel', in 32nd USENIX Security Symposium, USENIX Security 2023, pp. 4211 - 4228
,2023, 'Scalable Compositional Static Taint Analysis for Sensitive Data Tracing on Industrial Micro-Services', in Proceedings - International Conference on Software Engineering, pp. 110 - 121, http://dx.doi.org/10.1109/ICSE-SEIP58684.2023.00015
,2023, 'Two Birds with One Stone: Multi-Derivation for Fast Context-Free Language Reachability Analysis', in Proceedings - 2023 38th IEEE/ACM International Conference on Automated Software Engineering, ASE 2023, pp. 624 - 636, http://dx.doi.org/10.1109/ASE56229.2023.00118
,2023, 'Uncovering Limitations in Text-to-Image Generation: A Contrastive Approach with Structured Semantic Alignment', in Findings of the Association for Computational Linguistics: EMNLP 2023, pp. 8876 - 8888
,2023, 'Why Do Deep Learning Projects Differ in Compatible Framework Versions? An Exploratory Study', in Proceedings - International Symposium on Software Reliability Engineering, ISSRE, pp. 509 - 520, http://dx.doi.org/10.1109/ISSRE59848.2023.00076
,2022, 'Demystifying the underground ecosystem of account registration bots', in ESEC/FSE 2022 - Proceedings of the 30th ACM Joint Meeting European Software Engineering Conference and Symposium on the Foundations of Software Engineering, pp. 897 - 909, http://dx.doi.org/10.1145/3540250.3549090
,2022, 'You see what I want you to see: poisoning vulnerabilities in neural code search', in ESEC/FSE 2022 - Proceedings of the 30th ACM Joint Meeting European Software Engineering Conference and Symposium on the Foundations of Software Engineering, pp. 1233 - 1245, http://dx.doi.org/10.1145/3540250.3549153
,2022, 'MalWhiteout: Reducing Label Errors in Android Malware Detection', in ACM International Conference Proceeding Series, http://dx.doi.org/10.1145/3551349.3560418
,2022, 'Path-sensitive code embedding via contrastive learning for software vulnerability detection', in ISSTA 2022 - Proceedings of the 31st ACM SIGSOFT International Symposium on Software Testing and Analysis, pp. 519 - 531, http://dx.doi.org/10.1145/3533767.3534371
,2022, 'Path-Sensitive and Alias-Aware Typestate Analysis for Detecting OS Bugs', in International Conference on Architectural Support for Programming Languages and Operating Systems - ASPLOS, pp. 859 - 872, http://dx.doi.org/10.1145/3503222.3507770
,2022, 'Cross-Language Binary-Source Code Matching with Intermediate Representations', in Proceedings - 2022 IEEE International Conference on Software Analysis, Evolution and Reengineering, SANER 2022, pp. 601 - 612, http://dx.doi.org/10.1109/SANER53432.2022.00077
,2022, 'Enhancing Traceability Link Recovery with Unlabeled Data', in Proceedings - International Symposium on Software Reliability Engineering, ISSRE, pp. 446 - 457, http://dx.doi.org/10.1109/ISSRE55969.2022.00050
,2022, 'Field-Based Static Taint Analysis for Industrial Microservices', in Proceedings - International Conference on Software Engineering, pp. 149 - 150, http://dx.doi.org/10.1109/ICSE-SEIP55303.2022.9794096
,2022, 'NaturalCC: An Open-Source Toolkit for Code Intelligence', in Proceedings - International Conference on Software Engineering, pp. 149 - 153, http://dx.doi.org/10.1109/ICSE-Companion55297.2022.9793799
,2022, 'What Do They Capture? - A Structural Analysis of Pre-Trained Language Models for Source Code', in Proceedings - International Conference on Software Engineering, pp. 2377 - 2388, http://dx.doi.org/10.1145/3510003.3510050
,2021, 'An exploratory study of autopilot software bugs in unmanned aerial vehicles', in ESEC/FSE 2021 - Proceedings of the 29th ACM Joint Meeting European Software Engineering Conference and Symposium on the Foundations of Software Engineering, pp. 20 - 31, http://dx.doi.org/10.1145/3468264.3468559
,2021, 'Runtime detection of memory errors with smart status', in ISSTA 2021 - Proceedings of the 30th ACM SIGSOFT International Symposium on Software Testing and Analysis, pp. 296 - 308, http://dx.doi.org/10.1145/3460319.3464807
,2021, 'Object Versioning for Flow-Sensitive Pointer Analysis', in CGO 2021 - Proceedings of the 2021 IEEE/ACM International Symposium on Code Generation and Optimization, pp. 222 - 235, http://dx.doi.org/10.1109/CGO51591.2021.9370334
,2021, 'Disentangled Code Representation Learning for Multiple Programming Languages', in Findings of the Association for Computational Linguistics: ACL-IJCNLP 2021, pp. 4454 - 4466, http://dx.doi.org/10.18653/v1/2021.findings-acl.391
,2021, 'Fix-Filter-Fix: Intuitively Connect Any Models for Effective Bug Fixing', in EMNLP 2021 - 2021 Conference on Empirical Methods in Natural Language Processing, Proceedings, pp. 3495 - 3504
,2021, 'Hash Consed Points-To Sets', in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), pp. 25 - 48, http://dx.doi.org/10.1007/978-3-030-88806-0_2
,2021, 'Nondeterministic Impact of CPU Multithreading on Training Deep Learning Systems', in Proceedings - International Symposium on Software Reliability Engineering, ISSRE, pp. 557 - 568, http://dx.doi.org/10.1109/ISSRE52982.2021.00063
,2020, 'An empirical study of code deobfuscations on detecting obfuscated android piggybacked apps', in Proceedings - Asia-Pacific Software Engineering Conference, APSEC, pp. 41 - 50, http://dx.doi.org/10.1109/APSEC51365.2020.00012
,2020, 'Welcome from the Chairs', in TAPAS 2020 - Proceedings of the 11th ACM SIGPLAN International Workshop on Tools for Automatic Program Analysis, Co-located with SPLASH 2020, pp. III
,2020, 'All your app links are belong to us: Understanding the threats of instant apps based attacks', in ESEC/FSE 2020 - Proceedings of the 28th ACM Joint Meeting European Software Engineering Conference and Symposium on the Foundations of Software Engineering, pp. 914 - 926, http://dx.doi.org/10.1145/3368089.3409702
,2020, 'PCA: Memory leak detection using partial call-path analysis', in ESEC/FSE 2020 - Proceedings of the 28th ACM Joint Meeting European Software Engineering Conference and Symposium on the Foundations of Software Engineering, pp. 1621 - 1625, http://dx.doi.org/10.1145/3368089.3417923
,2020, 'Flow-sensitive type-based heap cloning', in Leibniz International Proceedings in Informatics, LIPIcs, http://dx.doi.org/10.4230/LIPIcs.ECOOP.2020.24
,2020, 'Perf-AL: Performance prediction for configurable software through adversarial learning', in International Symposium on Empirical Software Engineering and Measurement, http://dx.doi.org/10.1145/3382494.3410677
,2020, 'An exploratory study of bugs in extended reality applications on the web', in Proceedings - International Symposium on Software Reliability Engineering, ISSRE, pp. 172 - 183, http://dx.doi.org/10.1109/ISSRE5003.2020.00025
,2020, 'Clairvoyance: Cross-contract Static Analysis for Detecting Practical Reentrancy Vulnerabilities in Smart Contracts', in Proceedings - 2020 ACM/IEEE 42nd International Conference on Software Engineering: Companion, ICSE-Companion 2020, pp. 274 - 275, http://dx.doi.org/10.1145/3377812.3390908
,2020, 'Fault triggers in the tensorflow framework: An experience report', in Proceedings - International Symposium on Software Reliability Engineering, ISSRE, pp. 1 - 12, http://dx.doi.org/10.1109/ISSRE5003.2020.00010
,2020, 'HINDBR: Heterogeneous information network based duplicate bug report prediction', in Proceedings - International Symposium on Software Reliability Engineering, ISSRE, pp. 195 - 206, http://dx.doi.org/10.1109/ISSRE5003.2020.00027
,2020, 'Cross-Contract Static Analysis for Detecting Practical Reentrancy Vulnerabilities in Smart Contracts', in Proceedings - 2020 35th IEEE/ACM International Conference on Automated Software Engineering, ASE 2020, pp. 1029 - 1040, http://dx.doi.org/10.1145/3324884.3416553
,2020, 'A literature review of automatic traceability links recovery for software change impact analysis', in IEEE International Conference on Program Comprehension, pp. 14 - 24, http://dx.doi.org/10.1145/3387904.3389251
,2020, 'Typestate-guided fuzzer for discovering use-after-free vulnerabilities', in Proceedings - International Conference on Software Engineering, pp. 999 - 1010, http://dx.doi.org/10.1145/3377811.3380386
,2020, 'MUZZ: Thread-aware grey-box fuzzing for effective bug hunting in multithreaded programs', in Proceedings of the 29th USENIX Security Symposium, pp. 2325 - 2342
,2019, 'Multi-modal attention network learning for semantic source code retrieval', in Proceedings - 2019 34th IEEE/ACM International Conference on Automated Software Engineering, ASE 2019, pp. 13 - 25, http://dx.doi.org/10.1109/ASE.2019.00012
,2019, 'Static detection of control-flow-related vulnerabilities using graph embedding', in Proceedings of the IEEE International Conference on Engineering of Complex Computer Systems, ICECCS, pp. 41 - 50, http://dx.doi.org/10.1109/ICECCS.2019.00012
,2019, 'Per-Dereference Verification of Temporal Heap Safety via Adaptive Context-Sensitive Analysis', in Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), Porto, Portugal, pp. 48 - 72, presented at 26th international symposium, SAS 2019, Porto, Portugal, October 8-11, 2019, Porto, Portugal, 08 October 2019 - 11 October 2019, http://dx.doi.org/10.1007/978-3-030-32304-2_4
,2019, 'TCD: Statically Detecting Type Confusion Errors in C++ Programs', in Proceedings - International Symposium on Software Reliability Engineering, ISSRE, pp. 292 - 302, http://dx.doi.org/10.1109/ISSRE.2019.00037
,2019, 'Interactive Traceability Links Visualization using Hierarchical Trace Map', in Proceedings - 2019 IEEE International Conference on Software Maintenance and Evolution, ICSME 2019, pp. 367 - 369, http://dx.doi.org/10.1109/ICSME.2019.00059
,2019, 'Event trace reduction for effective bug replay of Android apps via differential GUI state analysis', in ESEC/FSE 2019 - Proceedings of the 2019 27th ACM Joint Meeting European Software Engineering Conference and Symposium on the Foundations of Software Engineering, pp. 1095 - 1099, http://dx.doi.org/10.1145/3338906.3341183
,2019, 'VFix: Value-Flow-Guided Precise Program Repair for Null Pointer Dereferences', in Proceedings - International Conference on Software Engineering, pp. 512 - 523, http://dx.doi.org/10.1109/ICSE.2019.00063
,2019, 'Precise static happens-before analysis for detecting UAF order violations in android', in Proceedings - 2019 IEEE 12th International Conference on Software Testing, Verification and Validation, ICST 2019, pp. 276 - 287, http://dx.doi.org/10.1109/ICST.2019.00035
,