Select Publications

Journal articles

Cheng X; Nie X; Li N; Wang H; Zheng Z; Sui Y, 2024, 'How About Bug-Triggering Paths? - Understanding and Characterizing Learning-Based Vulnerability Detectors', IEEE Transactions on Dependable and Secure Computing, 21, pp. 542 - 558, http://dx.doi.org/10.1109/TDSC.2022.3192419

Jiang M; Sui Y; Lei Y; Xie X; Li C; Liu Y; Tsang IW, 2024, 'Adversarial Learning for Coordinate Regression through k-layer Penetrating Representation', IEEE Transactions on Dependable and Secure Computing, http://dx.doi.org/10.1109/TDSC.2024.3376437

Chen Z; Yan R; Ma Y; Sui Y; Xue J, 2023, 'A Smart Status Based Monitoring Algorithm for the Dynamic Analysis of Memory Safety', ACM Transactions on Software Engineering and Methodology, http://dx.doi.org/10.1145/3637227

Wu X; Shen J; Zheng W; Lin L; Sui Y; Semasaba AOA, 2023, 'RNNtcs: A test case selection method for Recurrent Neural Networks', Knowledge-Based Systems, 279, http://dx.doi.org/10.1016/j.knosys.2023.110955

Zhang G; Sun J; Xu F; Sui Y; Bandara HMND; Chen S; Menzies T, 2023, 'A Tale of Two Cities: Data and Configuration Variances in Robust Deep Learning', IEEE Internet Computing, 27, pp. 13 - 20, http://dx.doi.org/10.1109/MIC.2023.3322283

He D; Gui Y; Li W; Tao Y; Zou C; Sui Y; Xue J, 2023, 'A Container-Usage-Pattern-Based Context Debloating Approach for Object-Sensitive Pointer Analysis', Proceedings of the ACM on Programming Languages, 7, http://dx.doi.org/10.1145/3622832

Li J; Pan Y; Lyu Y; Yao Y; Sui Y; Tsang IW, 2023, 'Earning Extra Performance From Restrictive Feedbacks', IEEE Transactions on Pattern Analysis and Machine Intelligence, 45, pp. 11753 - 11765, http://dx.doi.org/10.1109/TPAMI.2023.3273249

Du X; Sui Y; Liu Z; Ai J, 2023, 'An Empirical Study of Fault Triggers in Deep Learning Frameworks', IEEE Transactions on Dependable and Secure Computing, 20, pp. 2696 - 2712, http://dx.doi.org/10.1109/TDSC.2022.3152239

Lei Y; Ye D; Shen S; Sui Y; Zhu T; Zhou W, 2023, 'New challenges in reinforcement learning: a survey of security and privacy', Artificial Intelligence Review, 56, pp. 7195 - 7236, http://dx.doi.org/10.1007/s10462-022-10348-5

Lei Y; Sui Y; Tan SH; Zhang Q, 2023, 'Recursive State Machine Guided Graph Folding for Context-Free Language Reachability', Proceedings of the ACM on Programming Languages, 7, http://dx.doi.org/10.1145/3591233

Zhang W; Guo S; Zhang H; Sui Y; Xue Y; Xu Y, 2023, 'Challenging Machine Learning-Based Clone Detectors via Semantic-Preserving Code Transformations', IEEE Transactions on Software Engineering, 49, pp. 3052 - 3070, http://dx.doi.org/10.1109/TSE.2023.3240118

Win HM; Tan SH; Sui Y, 2023, 'Event-aware precise dynamic slicing for automatic debugging of Android applications', Journal of Systems and Software, 198, http://dx.doi.org/10.1016/j.jss.2023.111606

Lei Y; Sui Y; Ding S; Zhang Q, 2022, 'Taming transitive redundancy for context-free language reachability', Proceedings of the ACM on Programming Languages, 6, http://dx.doi.org/10.1145/3563343

Tang Y; Wang H; Zhan X; Luo X; Zhou Y; Zhou H; Yan Q; Sui Y; Keung J, 2022, 'A Systematical Study on Application Performance Management Libraries for Apps', IEEE Transactions on Software Engineering, 48, pp. 3044 - 3065, http://dx.doi.org/10.1109/TSE.2021.3077654

Aung TWW; Wan Y; Huo H; Sui Y, 2022, 'Multi-triage: A multi-task learning framework for bug triage', Journal of Systems and Software, 184, http://dx.doi.org/10.1016/j.jss.2021.111133

Wang W; Zhang Y; Sui Y; Wan Y; Zhao Z; Wu J; Yu PS; Xu G, 2022, 'Reinforcement-Learning-Guided Source Code Summarization Using Hierarchical Attention', IEEE Transactions on Software Engineering, 48, pp. 102 - 119, http://dx.doi.org/10.1109/TSE.2020.2979701

Zheng W; Xun Y; Wu X; Deng Z; Chen X; Sui Y, 2021, 'A Comparative Study of Class Rebalancing Methods for Security Bug Report Classification', IEEE Transactions on Reliability, 70, pp. 1658 - 1670, http://dx.doi.org/10.1109/TR.2021.3118026

Barbar M; Sui Y, 2021, 'Compacting points-to sets through object clustering', Proceedings of the ACM on Programming Languages, 5, http://dx.doi.org/10.1145/3485547

Wang L; He R; Wang H; Xia P; Li Y; Wu L; Zhou Y; Luo X; Sui Y; Guo Y; Xu G, 2021, 'Beyond the virus: a first look at coronavirus-themed Android malware', Empirical Software Engineering, 26, http://dx.doi.org/10.1007/s10664-021-09974-4

Zheng W; Wu Y; Wu X; Feng C; Sui Y; Luo X; Zhou Y, 2021, 'A survey of Intel SGX and its applications', Frontiers of Computer Science, 15, http://dx.doi.org/10.1007/s11704-019-9096-y

Cheng X; Wang H; Hua J; Xu G; Sui Y, 2021, 'DeepWukong: Statically Detecting Software Vulnerabilities Using Deep Graph Neural Network', ACM Transactions on Software Engineering and Methodology, 30, http://dx.doi.org/10.1145/3436877

Hua W; Sui Y; Wan Y; Liu G; Xu G, 2021, 'FCCA: Hybrid Code Representation for Functional Clone Detection Using Attention Networks', IEEE Transactions on Reliability, 70, pp. 304 - 318, http://dx.doi.org/10.1109/TR.2020.3001918

Sui Y; Cheng X; Zhang G; Wang H, 2020, 'Flow2Vec: Value-flow-based precise code embedding', Proceedings of the ACM on Programming Languages, 4, http://dx.doi.org/10.1145/3428301

Sui Y; Xue J, 2020, 'Value-Flow-Based Demand-Driven Pointer Analysis for C and C++', IEEE Transactions on Software Engineering, 46, pp. 812 - 835, http://dx.doi.org/10.1109/TSE.2018.2869336

Xiao G; Zheng Z; Jiang B; Sui Y, 2020, 'An Empirical Study of Regression Bug Chains in Linux', IEEE Transactions on Reliability, 69, pp. 558 - 570, http://dx.doi.org/10.1109/TR.2019.2902171

Nobakht M; Sui Y; Seneviratne A; Hu W, 2020, 'PGFIT: Static permission analysis of health and fitness apps in IoT programming frameworks', Journal of Network and Computer Applications, 152, pp. 102509, http://dx.doi.org/10.1016/j.jnca.2019.102509

Zhang Y; Sui Y; Pan S; Zheng Z; Ning B; Tsang I; Zhou W, 2020, 'Familial Clustering for Weakly-Labeled Android Malware Using Hybrid Representation Learning', IEEE Transactions on Information Forensics and Security, 15, pp. 3401 - 3414, http://dx.doi.org/10.1109/TIFS.2019.2947861

Li J; Pan Y; Sui Y; Tsang IW, 2020, 'Secure Metric Learning via Differential Pairwise Privacy', IEEE Transactions on Information Forensics and Security, 15, pp. 3640 - 3652, http://dx.doi.org/10.1109/TIFS.2020.2997183

Sui Y; Yan H; Zheng Z; Zhang Y; Xue J, 2018, 'Parallel construction of interprocedural memory SSA form', Journal of Systems and Software, 146, pp. 186 - 195, http://dx.doi.org/10.1016/j.jss.2018.09.038

Hou Z; Wang Y; Sui Y; Gu J; Zhao T; Zhou X, 2018, 'Managing high-performance computing applications as an on-demand service on federated clouds', Computers and Electrical Engineering, 67, pp. 579 - 595, http://dx.doi.org/10.1016/j.compeleceng.2018.02.036

Sui Y; Fan X; Zhou H; Xue J, 2018, 'Loop-Oriented pointer analysis for automatic SIMD vectorization', ACM Transactions on Embedded Computing Systems, 17, http://dx.doi.org/10.1145/3168364

Sui Y; Xue J, 2017, 'Demand-Driven Pointer Analysis with Strong Updates via Value-Flow Refinement', , http://arxiv.org/abs/1701.05650v1

Yan H; Sui Y; Chen S; Xue J, 2017, 'AutoFix', ACM SIGAPP Applied Computing Review, 16, pp. 38 - 50, http://dx.doi.org/10.1145/3040575.3040579

Tian FB; Wang W; Wu J; Sui Y, 2016, 'Swimming performance and vorticity structures of a mother-calf pair of fish', Computers and Fluids, 124, pp. 1 - 11, http://dx.doi.org/10.1016/j.compfluid.2015.10.006

Sui Y; Ye D; Su Y; Xue J, 2016, 'Eliminating Redundant Bounds Checks in Dynamic Buffer Overflow Detection Using Weakest Preconditions', IEEE Transactions on Reliability, PP, pp. 1 - 18, http://dx.doi.org/10.1109/TR.2016.2570538

Sui Y; Ye D; Xue J, 2014, 'Detecting memory leaks statically with full-sparse value-flow analysis', IEEE Transactions on Software Engineering, 40, pp. 107 - 122, http://dx.doi.org/10.1109/TSE.2014.2302311

Sui Y; Ye S; Xue J; Zhang J, 2014, 'Making context-sensitive inclusion-based pointer analysis practical for compilers using parameterised summarisation', Software: Practice and Experience, 44, pp. 1485 - 1510, http://dx.doi.org/10.1002/spe.2214


Back to profile page