ORCID as entered in ROS

Select Publications
2025, 'Efficient Neural Network Verification via Order Leading Exploration of Branch-and-Bound Trees', in Leibniz International Proceedings in Informatics Lipics, http://dx.doi.org/10.4230/LIPIcs.ECOOP.2025.36
,2025, 'Taming and Dissecting Recursions Through Interprocedural Weak Topological Ordering', in Leibniz International Proceedings in Informatics Lipics, http://dx.doi.org/10.4230/LIPIcs.ECOOP.2025.34
,2025, 'IllusionCAPTCHA: A CAPTCHA based on Visual Illusion', in Www 2025 Proceedings of the ACM Web Conference, pp. 3683 - 3691, http://dx.doi.org/10.1145/3696410.3714726
,2025, 'Interactive Cross-Language Pointer Analysis for Resolving Native Code in Java Programs', in Proceedings International Conference on Software Engineering, pp. 1089 - 1100, http://dx.doi.org/10.1109/ICSE55347.2025.00075
,2025, 'SVF-SVC: Software Verification Using SVF (Competition Contribution)', in Lecture Notes in Computer Science, pp. 254 - 259, http://dx.doi.org/10.1007/978-3-031-90660-2_21
,2024, 'Graph Neural Networks for Vulnerability Detection: A Counterfactual Explanation', in Issta 2024 Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis, pp. 389 - 401, http://dx.doi.org/10.1145/3650212.3652136
,2024, 'An Exploratory Investigation of Log Anomalies in Unmanned Aerial Vehicles', in Proceedings International Conference on Software Engineering, pp. 2593 - 2605, http://dx.doi.org/10.1145/3597503.3639186
,2024, 'Iterative Refinement of Project-Level Code Context for Precise Code Generation with Compiler Feedback', in Proceedings of the Annual Meeting of the Association for Computational Linguistics, pp. 2336 - 2353, http://dx.doi.org/10.18653/v1/2024.findings-acl.138
,2024, 'NL2FORMULA: Generating Spreadsheet Formulas from Natural Language Queries', in Eacl 2024 18th Conference of the European Chapter of the Association for Computational Linguistics Findings of Eacl 2024, pp. 2377 - 2388
,2024, 'Precise Sparse Abstract Execution via Cross-Domain Interaction', in Proceedings International Conference on Software Engineering, pp. 1335 - 1346, http://dx.doi.org/10.1145/3597503.3639220
,2023, 'Compatibility Issues in Deep Learning Systems: Problems and Opportunities', in Esec Fse 2023 Proceedings of the 31st ACM Joint Meeting European Software Engineering Conference and Symposium on the Foundations of Software Engineering, pp. 476 - 488, http://dx.doi.org/10.1145/3611643.3616321
,2023, 'A Hybrid Alias Analysis and Its Application to Global Variable Protection in the Linux Kernel', in 32nd Usenix Security Symposium Usenix Security 2023, pp. 4211 - 4228
,2023, 'Scalable Compositional Static Taint Analysis for Sensitive Data Tracing on Industrial Micro-Services', in Proceedings International Conference on Software Engineering, pp. 110 - 121, http://dx.doi.org/10.1109/ICSE-SEIP58684.2023.00015
,2023, 'Two Birds with One Stone: Multi-Derivation for Fast Context-Free Language Reachability Analysis', in Proceedings 2023 38th IEEE ACM International Conference on Automated Software Engineering Ase 2023, pp. 624 - 636, http://dx.doi.org/10.1109/ASE56229.2023.00118
,2023, 'Uncovering Limitations in Text-to-Image Generation: A Contrastive Approach with Structured Semantic Alignment', in Findings of the Association for Computational Linguistics Emnlp 2023, pp. 8876 - 8888, http://dx.doi.org/10.18653/v1/2023.findings-emnlp.595
,2023, 'Why Do Deep Learning Projects Differ in Compatible Framework Versions? An Exploratory Study', in Proceedings International Symposium on Software Reliability Engineering ISSRE, pp. 509 - 520, http://dx.doi.org/10.1109/ISSRE59848.2023.00076
,2022, 'Demystifying the underground ecosystem of account registration bots', in Esec Fse 2022 Proceedings of the 30th ACM Joint Meeting European Software Engineering Conference and Symposium on the Foundations of Software Engineering, pp. 897 - 909, http://dx.doi.org/10.1145/3540250.3549090
,2022, 'You see what I want you to see: poisoning vulnerabilities in neural code search', in Esec Fse 2022 Proceedings of the 30th ACM Joint Meeting European Software Engineering Conference and Symposium on the Foundations of Software Engineering, pp. 1233 - 1245, http://dx.doi.org/10.1145/3540250.3549153
,2022, 'MalWhiteout: Reducing Label Errors in Android Malware Detection', in ACM International Conference Proceeding Series, http://dx.doi.org/10.1145/3551349.3560418
,2022, 'Path-sensitive code embedding via contrastive learning for software vulnerability detection', in Issta 2022 Proceedings of the 31st ACM SIGSOFT International Symposium on Software Testing and Analysis, pp. 519 - 531, http://dx.doi.org/10.1145/3533767.3534371
,2022, 'NATURALCC: An Open-Source Toolkit for Code Intelligence', in 2022 ACM/IEEE 44TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING: COMPANION PROCEEDINGS (ICSE-COMPANION 2022), IEEE COMPUTER SOC, PA, Pittsburgh, pp. 149 - 153, presented at 44th ACM/IEEE International Conference on Software Engineering - New Ideas and Emerging Results (ICSE-NIER), PA, Pittsburgh, 22 May 2022 - 27 May 2022, http://dx.doi.org/10.1145/3510454.3516863
,2022, 'Path-Sensitive and Alias-Aware Typestate Analysis for Detecting OS Bugs', in International Conference on Architectural Support for Programming Languages and Operating Systems ASPLOS, pp. 859 - 872, http://dx.doi.org/10.1145/3503222.3507770
,2022, 'Cross-Language Binary-Source Code Matching with Intermediate Representations', in Proceedings 2022 IEEE International Conference on Software Analysis Evolution and Reengineering Saner 2022, pp. 601 - 612, http://dx.doi.org/10.1109/SANER53432.2022.00077
,2022, 'Enhancing Traceability Link Recovery with Unlabeled Data', in Proceedings International Symposium on Software Reliability Engineering ISSRE, pp. 446 - 457, http://dx.doi.org/10.1109/ISSRE55969.2022.00050
,2022, 'Field-Based Static Taint Analysis for Industrial Microservices', in Proceedings International Conference on Software Engineering, pp. 149 - 150, http://dx.doi.org/10.1109/ICSE-SEIP55303.2022.9794096
,2022, 'NaturalCC: An Open-Source Toolkit for Code Intelligence', in Proceedings International Conference on Software Engineering, pp. 149 - 153, http://dx.doi.org/10.1109/ICSE-Companion55297.2022.9793799
,2022, 'What Do They Capture? - A Structural Analysis of Pre-Trained Language Models for Source Code', in Proceedings International Conference on Software Engineering, pp. 2377 - 2388, http://dx.doi.org/10.1145/3510003.3510050
,2021, 'An exploratory study of autopilot software bugs in unmanned aerial vehicles', in Esec Fse 2021 Proceedings of the 29th ACM Joint Meeting European Software Engineering Conference and Symposium on the Foundations of Software Engineering, pp. 20 - 31, http://dx.doi.org/10.1145/3468264.3468559
,2021, 'Runtime detection of memory errors with smart status', in Issta 2021 Proceedings of the 30th ACM SIGSOFT International Symposium on Software Testing and Analysis, pp. 296 - 308, http://dx.doi.org/10.1145/3460319.3464807
,2021, 'Object Versioning for Flow-Sensitive Pointer Analysis', in Lee JW; Soffa ML; Zaks A (eds.), Cgo 2021 Proceedings of the 2021 IEEE ACM International Symposium on Code Generation and Optimization, Institute of Electrical and Electronics Engineers (IEEE), ELECTR NETWORK, pp. 222 - 235, presented at 2021 IEEE/ACM International Symposium on Code Generation and Optimization (CGO), ELECTR NETWORK, 27 February 2021 - 03 March 2021, http://dx.doi.org/10.1109/CGO51591.2021.9370334
,2021, 'Disentangled Code Representation Learning for Multiple Programming Languages', in Findings of the Association for Computational Linguistics Acl Ijcnlp 2021, pp. 4454 - 4466, http://dx.doi.org/10.18653/v1/2021.findings-acl.391
,2021, 'Fix-Filter-Fix: Intuitively Connect Any Models for Effective Bug Fixing', in Emnlp 2021 2021 Conference on Empirical Methods in Natural Language Processing Proceedings, pp. 3495 - 3504, http://dx.doi.org/10.18653/v1/2021.emnlp-main.282
,2021, 'Hash Consed Points-To Sets', in Lecture Notes in Computer Science Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics, pp. 25 - 48, http://dx.doi.org/10.1007/978-3-030-88806-0_2
,2021, 'Nondeterministic Impact of CPU Multithreading on Training Deep Learning Systems', in Proceedings International Symposium on Software Reliability Engineering ISSRE, pp. 557 - 568, http://dx.doi.org/10.1109/ISSRE52982.2021.00063
,2020, 'An empirical study of code deobfuscations on detecting obfuscated android piggybacked apps', in Proceedings Asia Pacific Software Engineering Conference APSEC, pp. 41 - 50, http://dx.doi.org/10.1109/APSEC51365.2020.00012
,2020, 'Welcome from the Chairs', in Tapas 2020 Proceedings of the 11th ACM SIGPLAN International Workshop on Tools for Automatic Program Analysis Co Located with Splash 2020, pp. III
,2020, 'All your app links are belong to us: Understanding the threats of instant apps based attacks', in Esec Fse 2020 Proceedings of the 28th ACM Joint Meeting European Software Engineering Conference and Symposium on the Foundations of Software Engineering, pp. 914 - 926, http://dx.doi.org/10.1145/3368089.3409702
,2020, 'PCA: Memory leak detection using partial call-path analysis', in Esec Fse 2020 Proceedings of the 28th ACM Joint Meeting European Software Engineering Conference and Symposium on the Foundations of Software Engineering, pp. 1621 - 1625, http://dx.doi.org/10.1145/3368089.3417923
,2020, 'Flow-sensitive type-based heap cloning', in Leibniz International Proceedings in Informatics Lipics, http://dx.doi.org/10.4230/LIPIcs.ECOOP.2020.24
,2020, 'Perf-AL: Performance prediction for configurable software through adversarial learning', in International Symposium on Empirical Software Engineering and Measurement, http://dx.doi.org/10.1145/3382494.3410677
,2020, 'An exploratory study of bugs in extended reality applications on the web', in Proceedings International Symposium on Software Reliability Engineering ISSRE, pp. 172 - 183, http://dx.doi.org/10.1109/ISSRE5003.2020.00025
,2020, 'Clairvoyance: Cross-contract Static Analysis for Detecting Practical Reentrancy Vulnerabilities in Smart Contracts', in Proceedings 2020 ACM IEEE 42nd International Conference on Software Engineering Companion ICSE Companion 2020, pp. 274 - 275, http://dx.doi.org/10.1145/3377812.3390908
,2020, 'Fault triggers in the tensorflow framework: An experience report', in Proceedings International Symposium on Software Reliability Engineering ISSRE, pp. 1 - 12, http://dx.doi.org/10.1109/ISSRE5003.2020.00010
,2020, 'HINDBR: Heterogeneous information network based duplicate bug report prediction', in Proceedings International Symposium on Software Reliability Engineering ISSRE, pp. 195 - 206, http://dx.doi.org/10.1109/ISSRE5003.2020.00027
,2020, 'Cross-Contract Static Analysis for Detecting Practical Reentrancy Vulnerabilities in Smart Contracts', in Proceedings 2020 35th IEEE ACM International Conference on Automated Software Engineering Ase 2020, pp. 1029 - 1040, http://dx.doi.org/10.1145/3324884.3416553
,2020, 'A literature review of automatic traceability links recovery for software change impact analysis', in IEEE International Conference on Program Comprehension, pp. 14 - 24, http://dx.doi.org/10.1145/3387904.3389251
,2020, 'Typestate-guided fuzzer for discovering use-after-free vulnerabilities', in Proceedings International Conference on Software Engineering, pp. 999 - 1010, http://dx.doi.org/10.1145/3377811.3380386
,2020, 'MUZZ: Thread-aware grey-box fuzzing for effective bug hunting in multithreaded programs', in Proceedings of the 29th Usenix Security Symposium, pp. 2325 - 2342
,2019, 'Multi-modal attention network learning for semantic source code retrieval', in Proceedings 2019 34th IEEE ACM International Conference on Automated Software Engineering Ase 2019, pp. 13 - 25, http://dx.doi.org/10.1109/ASE.2019.00012
,2019, 'Static detection of control-flow-related vulnerabilities using graph embedding', in Proceedings of the IEEE International Conference on Engineering of Complex Computer Systems ICECCS, pp. 41 - 50, http://dx.doi.org/10.1109/ICECCS.2019.00012
,