Select Publications
Journal articles
, 2025, 'Efficient Abstract Interpretation via Selective Widening', Proceedings of the ACM on Programming Languages, 9, pp. 922 - 949, http://dx.doi.org/10.1145/3763083
, 2025, 'S
, 2025, 'CGP-Tuning: Structure-Aware Soft Prompt Tuning for Code Vulnerability Detection', IEEE Transactions on Software Engineering, 51, pp. 2533 - 2548, http://dx.doi.org/10.1109/TSE.2025.3591934
, 2024, 'SPATA: Effective OS Bug Detection with Summary-Based, Alias-Aware, and Path-Sensitive Typestate Analysis', ACM Transactions on Computer Systems, 42, http://dx.doi.org/10.1145/3695250
, 2024, 'Deep Learning for Code Intelligence: Survey, Benchmark and Toolkit', ACM Computing Surveys, 56, http://dx.doi.org/10.1145/3664597
, 2024, 'Deep semi-supervised learning for recovering traceability links between issues and commits', Journal of Systems and Software, 216, http://dx.doi.org/10.1016/j.jss.2024.112109
, 2024, 'Cross-project concurrency bug prediction using domain-adversarial neural network', Journal of Systems and Software, 214, http://dx.doi.org/10.1016/j.jss.2024.112077
, 2024, 'Finding and Understanding Defects in Static Analyzers by Constructing Automated Oracles', Proceedings of the ACM on Software Engineering, 1, pp. 1656 - 1678, http://dx.doi.org/10.1145/3660781
, 2024, 'TIPS: Tracking Integer-Pointer Value Flows for C++ Member Function Pointers', Proceedings of the ACM on Software Engineering, 1, pp. 1609 - 1631, http://dx.doi.org/10.1145/3660779
, 2024, 'Context-Free Language Reachability via Skewed Tabulation', Proceedings of the ACM on Programming Languages, 8, http://dx.doi.org/10.1145/3656451
, 2024, 'Message from the Chairs', Proceedings of the ACM SIGPLAN Conference on Languages Compilers and Tools for Embedded Systems LCTES, pp. III
, 2024, 'Dynamic Transitive Closure-based Static Analysis through the Lens of Quantum Search', ACM Transactions on Software Engineering and Methodology, 33, http://dx.doi.org/10.1145/3644389
, 2024, 'Cross-Language Taint Analysis: Generating Caller-Sensitive Native Code Specification for Java', IEEE Transactions on Software Engineering, 50, pp. 1518 - 1533, http://dx.doi.org/10.1109/TSE.2024.3392254
, 2024, 'Automated Data Visualization from Natural Language via Large Language Models: An Exploratory Study', Annals of the Entomological Society of America, 2, http://dx.doi.org/10.1145/3654992
, 2024, 'Iterative-Epoch Online Cycle Elimination for Context-Free Language Reachability', Proceedings of the ACM on Programming Languages, 8, http://dx.doi.org/10.1145/3649862
, 2024, 'A Smart Status Based Monitoring Algorithm for the Dynamic Analysis of Memory Safety', ACM Transactions on Software Engineering and Methodology, 33, http://dx.doi.org/10.1145/3637227
, 2024, 'How About Bug-Triggering Paths? - Understanding and Characterizing Learning-Based Vulnerability Detectors', IEEE Transactions on Dependable and Secure Computing, 21, pp. 542 - 558, http://dx.doi.org/10.1109/TDSC.2022.3192419
, 2024, 'Adversarial Learning for Coordinate Regression Through-Layer Penetrating Representation', IEEE Transactions on Dependable and Secure Computing, 21, pp. 5538 - 5552, http://dx.doi.org/10.1109/TDSC.2024.3376437
, 2024, 'Pearl: A Multi-Derivation Approach to Efficient CFL-Reachability Solving', IEEE Transactions on Software Engineering, 50, pp. 2379 - 2397, http://dx.doi.org/10.1109/TSE.2024.3437684
, 2023, 'RNNtcs: A test case selection method for Recurrent Neural Networks', Knowledge Based Systems, 279, http://dx.doi.org/10.1016/j.knosys.2023.110955
, 2023, 'A Tale of Two Cities: Data and Configuration Variances in Robust Deep Learning', IEEE Internet Computing, 27, pp. 13 - 20, http://dx.doi.org/10.1109/MIC.2023.3322283
, 2023, 'A Container-Usage-Pattern-Based Context Debloating Approach for Object-Sensitive Pointer Analysis', Proceedings of the ACM on Programming Languages, 7, http://dx.doi.org/10.1145/3622832
, 2023, 'Earning Extra Performance From Restrictive Feedbacks', IEEE Transactions on Pattern Analysis and Machine Intelligence, 45, pp. 11753 - 11765, http://dx.doi.org/10.1109/TPAMI.2023.3273249
, 2023, 'An Empirical Study of Fault Triggers in Deep Learning Frameworks', IEEE Transactions on Dependable and Secure Computing, 20, pp. 2696 - 2712, http://dx.doi.org/10.1109/TDSC.2022.3152239
, 2023, 'New challenges in reinforcement learning: a survey of security and privacy', Artificial Intelligence Review, 56, pp. 7195 - 7236, http://dx.doi.org/10.1007/s10462-022-10348-5
, 2023, 'Recursive State Machine Guided Graph Folding for Context-Free Language Reachability', Proceedings of the ACM on Programming Languages, 7, http://dx.doi.org/10.1145/3591233
, 2023, 'Challenging Machine Learning-Based Clone Detectors via Semantic-Preserving Code Transformations', IEEE Transactions on Software Engineering, 49, pp. 3052 - 3070, http://dx.doi.org/10.1109/TSE.2023.3240118
, 2023, 'Event-aware precise dynamic slicing for automatic debugging of Android applications', Journal of Systems and Software, 198, http://dx.doi.org/10.1016/j.jss.2023.111606
, 2022, 'Taming transitive redundancy for context-free language reachability', Proceedings of the ACM on Programming Languages, 6, http://dx.doi.org/10.1145/3563343
, 2022, 'A Systematical Study on Application Performance Management Libraries for Apps', IEEE Transactions on Software Engineering, 48, pp. 3044 - 3065, http://dx.doi.org/10.1109/TSE.2021.3077654
, 2022, 'Multi-triage: A multi-task learning framework for bug triage', Journal of Systems and Software, 184, http://dx.doi.org/10.1016/j.jss.2021.111133
, 2022, 'Reinforcement-Learning-Guided Source Code Summarization Using Hierarchical Attention', IEEE Transactions on Software Engineering, 48, pp. 102 - 119, http://dx.doi.org/10.1109/TSE.2020.2979701
, 2021, 'A Comparative Study of Class Rebalancing Methods for Security Bug Report Classification', IEEE Transactions on Reliability, 70, pp. 1658 - 1670, http://dx.doi.org/10.1109/TR.2021.3118026
, 2021, 'Compacting points-to sets through object clustering', Proceedings of the ACM on Programming Languages, 5, http://dx.doi.org/10.1145/3485547
, 2021, 'Beyond the virus: a first look at coronavirus-themed Android malware', Empirical Software Engineering, 26, http://dx.doi.org/10.1007/s10664-021-09974-4
, 2021, 'A survey of Intel SGX and its applications', Frontiers of Computer Science, 15, http://dx.doi.org/10.1007/s11704-019-9096-y
, 2021, 'DeepWukong: Statically Detecting Software Vulnerabilities Using Deep Graph Neural Network', ACM Transactions on Software Engineering and Methodology, 30, http://dx.doi.org/10.1145/3436877
, 2021, 'FCCA: Hybrid Code Representation for Functional Clone Detection Using Attention Networks', IEEE Transactions on Reliability, 70, pp. 304 - 318, http://dx.doi.org/10.1109/TR.2020.3001918
, 2020, 'Flow2Vec: Value-flow-based precise code embedding', Proceedings of the ACM on Programming Languages, 4, http://dx.doi.org/10.1145/3428301
, 2020, 'Value-Flow-Based Demand-Driven Pointer Analysis for C and C++', IEEE Transactions on Software Engineering, 46, pp. 812 - 835, http://dx.doi.org/10.1109/TSE.2018.2869336
, 2020, 'An Empirical Study of Regression Bug Chains in Linux', IEEE Transactions on Reliability, 69, pp. 558 - 570, http://dx.doi.org/10.1109/TR.2019.2902171
, 2020, 'PGFIT: Static permission analysis of health and fitness apps in IoT programming frameworks', Journal of Network and Computer Applications, 152, pp. 102509, http://dx.doi.org/10.1016/j.jnca.2019.102509
, 2020, 'Familial Clustering for Weakly-Labeled Android Malware Using Hybrid Representation Learning', IEEE Transactions on Information Forensics and Security, 15, pp. 3401 - 3414, http://dx.doi.org/10.1109/TIFS.2019.2947861
, 2020, 'Secure Metric Learning via Differential Pairwise Privacy', IEEE Transactions on Information Forensics and Security, 15, pp. 3640 - 3652, http://dx.doi.org/10.1109/TIFS.2020.2997183
, 2018, 'Parallel construction of interprocedural memory SSA form', Journal of Systems and Software, 146, pp. 186 - 195, http://dx.doi.org/10.1016/j.jss.2018.09.038
, 2018, 'Managing high-performance computing applications as an on-demand service on federated clouds', Computers and Electrical Engineering, 67, pp. 579 - 595, http://dx.doi.org/10.1016/j.compeleceng.2018.02.036
, 2018, 'Loop-Oriented pointer analysis for automatic SIMD vectorization', ACM Transactions on Embedded Computing Systems, 17, http://dx.doi.org/10.1145/3168364
, 2017, 'AutoFix', ACM SIGAPP Applied Computing Review, 16, pp. 38 - 50, http://dx.doi.org/10.1145/3040575.3040579
, 2016, 'Swimming performance and vorticity structures of a mother-calf pair of fish', Computers and Fluids, 124, pp. 1 - 11, http://dx.doi.org/10.1016/j.compfluid.2015.10.006
, 2016, 'Eliminating Redundant Bounds Checks in Dynamic Buffer Overflow Detection Using Weakest Preconditions', IEEE Transactions on Reliability, PP, pp. 1 - 18, http://dx.doi.org/10.1109/TR.2016.2570538