ORCID as entered in ROS

Select Publications
2023, 'Event-aware precise dynamic slicing for automatic debugging of Android applications', Journal of Systems and Software, 198, http://dx.doi.org/10.1016/j.jss.2023.111606
,2023, 'Challenging Machine Learning-based Clone Detectors via Semantic-preserving Code Transformations', IEEE Transactions on Software Engineering, http://dx.doi.org/10.1109/TSE.2023.3240118
,2022, 'A Systematical Study on Application Performance Management Libraries for Apps', IEEE Transactions on Software Engineering, 48, pp. 3044 - 3065, http://dx.doi.org/10.1109/TSE.2021.3077654
,2022, 'Multi-triage: A multi-task learning framework for bug triage', Journal of Systems and Software, 184, http://dx.doi.org/10.1016/j.jss.2021.111133
,2022, 'An Empirical Study of Fault Triggers in Deep Learning Frameworks', IEEE Transactions on Dependable and Secure Computing, http://dx.doi.org/10.1109/TDSC.2022.3152239
,2022, 'How About Bug-Triggering Paths? - Understanding and Characterizing Learning-Based Vulnerability Detectors', IEEE Transactions on Dependable and Secure Computing, http://dx.doi.org/10.1109/TDSC.2022.3192419
,2022, 'New challenges in reinforcement learning: a survey of security and privacy', Artificial Intelligence Review, http://dx.doi.org/10.1007/s10462-022-10348-5
,2022, 'Reinforcement-Learning-Guided Source Code Summarization Using Hierarchical Attention', IEEE Transactions on Software Engineering, 48, pp. 102 - 119, http://dx.doi.org/10.1109/TSE.2020.2979701
,2021, 'A Comparative Study of Class Rebalancing Methods for Security Bug Report Classification', IEEE Transactions on Reliability, 70, pp. 1658 - 1670, http://dx.doi.org/10.1109/TR.2021.3118026
,2021, 'Compacting points-to sets through object clustering', Proceedings of the ACM on Programming Languages, 5, http://dx.doi.org/10.1145/3485547
,2021, 'Beyond the virus: a first look at coronavirus-themed Android malware', Empirical Software Engineering, 26, http://dx.doi.org/10.1007/s10664-021-09974-4
,2021, 'A survey of Intel SGX and its applications', Frontiers of Computer Science, 15, http://dx.doi.org/10.1007/s11704-019-9096-y
,2021, 'DeepWukong: Statically Detecting Software Vulnerabilities Using Deep Graph Neural Network', ACM Transactions on Software Engineering and Methodology, 30, http://dx.doi.org/10.1145/3436877
,2021, 'FCCA: Hybrid Code Representation for Functional Clone Detection Using Attention Networks', IEEE Transactions on Reliability, 70, pp. 304 - 318, http://dx.doi.org/10.1109/TR.2020.3001918
,2020, 'Flow2Vec: Value-flow-based precise code embedding', Proceedings of the ACM on Programming Languages, 4, http://dx.doi.org/10.1145/3428301
,2020, 'Value-Flow-Based Demand-Driven Pointer Analysis for C and C++', IEEE Transactions on Software Engineering, 46, pp. 812 - 835, http://dx.doi.org/10.1109/TSE.2018.2869336
,2020, 'An Empirical Study of Regression Bug Chains in Linux', IEEE Transactions on Reliability, 69, pp. 558 - 570, http://dx.doi.org/10.1109/TR.2019.2902171
,2020, 'PGFIT: Static permission analysis of health and fitness apps in IoT programming frameworks', Journal of Network and Computer Applications, 152, http://dx.doi.org/10.1016/j.jnca.2019.102509
,2020, 'Familial Clustering for Weakly-Labeled Android Malware Using Hybrid Representation Learning', IEEE Transactions on Information Forensics and Security, 15, pp. 3401 - 3414, http://dx.doi.org/10.1109/TIFS.2019.2947861
,2020, 'Secure Metric Learning via Differential Pairwise Privacy', IEEE Transactions on Information Forensics and Security, 15, pp. 3640 - 3652, http://dx.doi.org/10.1109/TIFS.2020.2997183
,2018, 'Parallel construction of interprocedural memory SSA form', Journal of Systems and Software, 146, pp. 186 - 195, http://dx.doi.org/10.1016/j.jss.2018.09.038
,2018, 'Managing high-performance computing applications as an on-demand service on federated clouds', Computers and Electrical Engineering, 67, pp. 579 - 595, http://dx.doi.org/10.1016/j.compeleceng.2018.02.036
,2018, 'Loop-Oriented pointer analysis for automatic SIMD vectorization', ACM Transactions on Embedded Computing Systems, 17, http://dx.doi.org/10.1145/3168364
,2017, 'Demand-Driven Pointer Analysis with Strong Updates via Value-Flow Refinement', , http://arxiv.org/abs/1701.05650v1
,2017, 'AutoFix', ACM SIGAPP Applied Computing Review, 16, pp. 38 - 50, http://dx.doi.org/10.1145/3040575.3040579
,2016, 'Swimming performance and vorticity structures of a mother-calf pair of fish', Computers and Fluids, 124, pp. 1 - 11, http://dx.doi.org/10.1016/j.compfluid.2015.10.006
,2016, 'Eliminating Redundant Bounds Checks in Dynamic Buffer Overflow Detection Using Weakest Preconditions', IEEE Transactions on Reliability, PP, pp. 1 - 18, http://dx.doi.org/10.1109/TR.2016.2570538
,2014, 'Detecting memory leaks statically with full-sparse value-flow analysis', IEEE Transactions on Software Engineering, 40, pp. 107 - 122, http://dx.doi.org/10.1109/TSE.2014.2302311
,2014, 'Making context-sensitive inclusion-based pointer analysis practical for compilers using parameterised summarisation', Software: Practice and Experience, 44, pp. 1485 - 1510, http://dx.doi.org/10.1002/spe.2214
,2012, 'Zinc oxide nanotubes decorated with silver nanoparticles as an ultrasensitive substrate for surface-enhanced Raman scattering', Microchimica ACTA, 179, pp. 315 - 321, http://dx.doi.org/10.1007/s00604-012-0898-y
,