Ming Fan

Orcid: 0000-0002-9327-0987

Affiliations:
  • Xi'an Jiaotong University, China


According to our database1, Ming Fan authored at least 48 papers between 2013 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
3Erefactor: Effective, Efficient and Executable Refactoring Recommendation for Software Architectural Consistency.
IEEE Trans. Software Eng., October, 2024

BDMMT: Backdoor Sample Detection for Language Models Through Model Mutation Testing.
IEEE Trans. Inf. Forensics Secur., 2024

LIReDroid: LLM-Enhanced Test Case Generation for Static Sensitive Behavior Replication.
Proceedings of the 15th Asia-Pacific Symposium on Internetware, 2024

PyAnalyzer: An Effective and Practical Approach for Dependency Extraction from Python Code.
Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024

Cross-Inlining Binary Function Similarity Detection.
Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024

2023
PatchDiscovery: Patch Presence Test for Identifying Binary Vulnerabilities Based on Key Basic Blocks.
IEEE Trans. Software Eng., December, 2023

Ensemble Framework Combining Family Information for Android Malware Detection.
Comput. J., November, 2023

1-to-1 or 1-to-n? Investigating the Effect of Function Inlining on Binary Similarity Analysis.
ACM Trans. Softw. Eng. Methodol., July, 2023

The impact of class imbalance techniques on crashing fault residence prediction models.
Empir. Softw. Eng., March, 2023

Can We Mitigate Backdoor Attack Using Adversarial Detection Methods?
IEEE Trans. Dependable Secur. Comput., 2023

Do as You Say: Consistency Detection of Data Practice in Program Code and Privacy Policy in Mini-App.
CoRR, 2023

Identifying Code Changes for Architecture Decay via a Metric Forest Structure.
Proceedings of the 2023 ACM/IEEE International Conference on Technical Debt (TechDebt), 2023

MUID: Detecting Sensitive User Inputs in Miniapp Ecosystems.
Proceedings of the 2023 ACM Workshop on Secure and Trustworthy Superapps, 2023

JSLibD: Reliable and Heuristic Detection of Third-party Libraries in Miniapps.
Proceedings of the 2023 ACM Workshop on Secure and Trustworthy Superapps, 2023

Dependency Facade: The Coupling and Conflicts between Android Framework and Its Customization.
Proceedings of the 45th IEEE/ACM International Conference on Software Engineering, 2023

2022
An unsupervised cross project model for crashing fault residence identification.
IET Softw., December, 2022

ConcSpectre: Be Aware of Forthcoming Malware Hidden in Concurrent Programs.
IEEE Trans. Reliab., 2022

Comparing One with Many - Solving Binary2source Function Matching Under Function Inlining.
CoRR, 2022

AdaFrenetic at the SBST 2022 Tool Competition.
Proceedings of the 15th IEEE/ACM International Workshop on Search-Based Software Testing, 2022

One step further: evaluating interpreters using metamorphic testing.
Proceedings of the ISSTA '22: 31st ACM SIGSOFT International Symposium on Software Testing and Analysis, Virtual Event, South Korea, July 18, 2022

Testing Machine Learning Systems in Industry: An Empirical Study.
Proceedings of the 44th IEEE/ACM International Conference on Software Engineering: Software Engineering in Practice, 2022

Explanation-Guided Fairness Testing through Genetic Algorithm.
Proceedings of the 44th IEEE/ACM 44th International Conference on Software Engineering, 2022

2021
Can We Trust Your Explanations? Sanity Checks for Interpreters in Android Malware Analysis.
IEEE Trans. Inf. Forensics Secur., 2021

Text Backdoor Detection Using an Interpretable RNN Abstract Model.
IEEE Trans. Inf. Forensics Secur., 2021

One-to-One or One-to-many? What function inlining brings to binary2source similarity analysis.
CoRR, 2021

Just-in-time defect prediction for Android apps via imbalanced deep learning model.
Proceedings of the SAC '21: The 36th ACM/SIGAPP Symposium on Applied Computing, 2021

Where to Start: Studying Type Annotation Practices in Python.
Proceedings of the 36th IEEE/ACM International Conference on Automated Software Engineering, 2021

Interpretation-enabled Software Reuse Detection Based on a Multi-Level Birthmark Model.
Proceedings of the 43rd IEEE/ACM International Conference on Software Engineering, 2021

Chase: A Large-Scale and Pragmatic Chinese Dataset for Cross-Database Context-Dependent Text-to-SQL.
Proceedings of the 59th Annual Meeting of the Association for Computational Linguistics and the 11th International Joint Conference on Natural Language Processing, 2021

2020
CTDroid: Leveraging a Corpus of Technical Blogs for Android Malware Analysis.
IEEE Trans. Reliab., 2020

A Unified Framework for Analyzing and Detecting Malicious Examples of DNN Models.
CoRR, 2020

Revisiting the Challenges and Opportunities in Software Plagiarism Detection.
Proceedings of the 27th IEEE International Conference on Software Analysis, 2020

Interpretation Area-Guided Detection of Adversarial Samples.
Proceedings of the 20th IEEE International Conference on Software Quality, 2020

From Innovations to Prospects: What Is Hidden Behind Cryptocurrencies?
Proceedings of the MSR '20: 17th International Conference on Mining Software Repositories, 2020

An Empirical Evaluation of GDPR Compliance Violations in Android mHealth Apps.
Proceedings of the 31st IEEE International Symposium on Software Reliability Engineering, 2020

Automated bug reproduction from user reviews for Android applications.
Proceedings of the ICSE-SEIP 2020: 42nd International Conference on Software Engineering, Software Engineering in Practice, Seoul, South Korea, 27 June, 2020

2019
Graph embedding based familial analysis of Android malware using unsupervised learning.
Proceedings of the 41st International Conference on Software Engineering, 2019

2018
Reviving Sequential Program Birthmarking for Multithreaded Software Plagiarism Detection.
IEEE Trans. Software Eng., 2018

Android Malware Familial Classification and Representative Sample Selection via Frequent Subgraph Analysis.
IEEE Trans. Inf. Forensics Secur., 2018

2017
DAPASA: Detecting Android Piggybacked Apps Through Sensitive Subgraph Analysis.
IEEE Trans. Inf. Forensics Secur., 2017

2016
Exploiting thread-related system calls for plagiarism detection of multithreaded programs.
J. Syst. Softw., 2016

Debugging Multithreaded Programs as if They Were Sequential.
Proceedings of the International Conference on Software Analysis, Testing and Evolution, 2016

Frequent Subgraph Based Familial Classification of Android Malware.
Proceedings of the 27th IEEE International Symposium on Software Reliability Engineering, 2016

A new thread-aware birthmark for plagiarism detection of multithreaded programs.
Proceedings of the 38th International Conference on Software Engineering, 2016

2015
Software Plagiarism Detection with Birthmarks Based on Dynamic Key Instruction Sequences.
IEEE Trans. Software Eng., 2015

2014
DBPD: A Dynamic Birthmark-based Software Plagiarism Detection Tool.
Proceedings of the 26th International Conference on Software Engineering and Knowledge Engineering, 2014

Plagiarism detection for multithreaded software based on thread-aware software birthmarks.
Proceedings of the 22nd International Conference on Program Comprehension, 2014

2013
DKISB: Dynamic Key Instruction Sequence Birthmark for Software Plagiarism Detection.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, 2013


  Loading...