Ting Liu

Orcid: 0000-0002-7600-0934

Affiliations:
  • Xi'an Jiaotong University, School of Electronic and Information Engineering, MOEKLINNS, China (PhD 2010)


According to our database1, Ting Liu authored at least 152 papers between 2009 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
A Dynamic and Static Combined State Recovery Method Against FDI Attacks in Power Grids.
IEEE Trans. Smart Grid, November, 2024

3Erefactor: Effective, Efficient and Executable Refactoring Recommendation for Software Architectural Consistency.
IEEE Trans. Software Eng., October, 2024

Stealthy Data Integrity Attack Against Consensus-Based Distributed Energy Management Algorithm.
IEEE Trans. Ind. Informatics, August, 2024

Data Protection Method Against Cross-Domain Inference Threat in Cyber-Physical Power Grid.
IEEE Trans. Smart Grid, July, 2024

Estimating Nodal Admittance Matrix for Ill-Posed Inverse Power Flow Problem in Power Grid.
IEEE Trans. Ind. Informatics, April, 2024

BDMMT: Backdoor Sample Detection for Language Models Through Model Mutation Testing.
IEEE Trans. Inf. Forensics Secur., 2024

Intrusion Device Detection in Fieldbus Networks Based on Channel-State Group Fingerprint.
IEEE Trans. Inf. Forensics Secur., 2024

IconDM: Text-Guided Icon Set Expansion Using Diffusion Models.
Proceedings of the 32nd ACM International Conference on Multimedia, MM 2024, Melbourne, VIC, Australia, 28 October 2024, 2024

LIReDroid: LLM-Enhanced Test Case Generation for Static Sensitive Behavior Replication.
Proceedings of the 15th Asia-Pacific Symposium on Internetware, 2024

ERD-CQC : Enhanced Rule and Dependency Code Quality Check for Java.
Proceedings of the 15th Asia-Pacific Symposium on Internetware, 2024

PyAnalyzer: An Effective and Practical Approach for Dependency Extraction from Python Code.
Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024

Cross-Inlining Binary Function Similarity Detection.
Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024

A Virtual Primary Key Generation Scheme Based on Dimensionality Reduction and Encoding for Digital Fingerprinting.
Proceedings of the 20th IEEE International Conference on Automation Science and Engineering, 2024

A Positive-Unlabeled Learning Approach for Detecting Malicious In-app Purchases on the App Store.
Proceedings of the 20th IEEE International Conference on Automation Science and Engineering, 2024

2023
PatchDiscovery: Patch Presence Test for Identifying Binary Vulnerabilities Based on Key Basic Blocks.
IEEE Trans. Software Eng., December, 2023

1-to-1 or 1-to-n? Investigating the Effect of Function Inlining on Binary Similarity Analysis.
ACM Trans. Softw. Eng. Methodol., July, 2023

MMTD: Multistage Moving Target Defense for Security-Enhanced D-FACTS Operation.
IEEE Internet Things J., July, 2023

Aesthetics++: Refining Graphic Designs by Exploring Design Principles and Human Preference.
IEEE Trans. Vis. Comput. Graph., June, 2023

A Reflection-Based Channel Fingerprint to Locate Physically Intrusive Devices in ICS.
IEEE Trans. Ind. Informatics, April, 2023

Fast Identification of Vulnerable Set for Cascading Failure Analysis in Power Grid.
IEEE Trans. Ind. Informatics, April, 2023

Evaluating the Impact of Possible Dependencies on Architecture-Level Maintainability.
IEEE Trans. Software Eng., March, 2023

SeqTrans: Automatic Vulnerability Fix Via Sequence to Sequence Learning.
IEEE Trans. Software Eng., February, 2023

Detecting suspicious transactions in a virtual-currency-enabled online social network.
J. Netw. Comput. Appl., February, 2023

Implementation of Risk-Aggregated Substation Testbed Using Generative Adversarial Networks.
IEEE Trans. Smart Grid, 2023

Can We Mitigate Backdoor Attack Using Adversarial Detection Methods?
IEEE Trans. Dependable Secur. Comput., 2023

Do as You Say: Consistency Detection of Data Practice in Program Code and Privacy Policy in Mini-App.
CoRR, 2023

Identifying Code Changes for Architecture Decay via a Metric Forest Structure.
Proceedings of the 2023 ACM/IEEE International Conference on Technical Debt (TechDebt), 2023

MUID: Detecting Sensitive User Inputs in Miniapp Ecosystems.
Proceedings of the 2023 ACM Workshop on Secure and Trustworthy Superapps, 2023

JSLibD: Reliable and Heuristic Detection of Third-party Libraries in Miniapps.
Proceedings of the 2023 ACM Workshop on Secure and Trustworthy Superapps, 2023

Dependency Facade: The Coupling and Conflicts between Android Framework and Its Customization.
Proceedings of the 45th IEEE/ACM International Conference on Software Engineering, 2023

A Parse-Then-Place Approach for Generating Graphic Layouts from Textual Descriptions.
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023

2022
ConcSpectre: Be Aware of Forthcoming Malware Hidden in Concurrent Programs.
IEEE Trans. Reliab., 2022

Multiperiod Unmanned Aerial Vehicles Path Planning With Dynamic Emergency Priorities for Geohazards Monitoring.
IEEE Trans. Ind. Informatics, 2022

An Event-Triggered Hybrid System Model for Cascading Failure in Power Grid.
IEEE Trans Autom. Sci. Eng., 2022

How to manage a task-oriented virtual assistant software project: an experience report.
Frontiers Inf. Technol. Electron. Eng., 2022

Channel-State-Based Fingerprinting Against Physical Access Attack in Industrial Field Bus Network.
IEEE Internet Things J., 2022

Comparing One with Many - Solving Binary2source Function Matching Under Function Inlining.
CoRR, 2022

Multi-stage Moving Target Defense: A Security-enhanced D-FACTS Implementation Approach.
CoRR, 2022

LEMON: Language-Based Environment Manipulation via Execution-Guided Pre-training.
CoRR, 2022

Towards characterizing bug fixes through dependency-level changes in Apache Java open source projects.
Sci. China Inf. Sci., 2022

One step further: evaluating interpreters using metamorphic testing.
Proceedings of the ISSTA '22: 31st ACM SIGSOFT International Symposium on Software Testing and Analysis, Virtual Event, South Korea, July 18, 2022

Testing Machine Learning Systems in Industry: An Empirical Study.
Proceedings of the 44th IEEE/ACM International Conference on Software Engineering: Software Engineering in Practice, 2022

Explanation-Guided Fairness Testing through Genetic Algorithm.
Proceedings of the 44th IEEE/ACM 44th International Conference on Software Engineering, 2022

A Dynamic Cascading Failure Model in Power Grid with Renewable Energy Generation.
Proceedings of the 18th IEEE International Conference on Automation Science and Engineering, 2022

2021
Explaining Regressions via Alignment Slicing and Mending.
IEEE Trans. Software Eng., 2021

Using K-core Decomposition on Class Dependency Networks to Improve Bug Prediction Model's Practical Performance.
IEEE Trans. Software Eng., 2021

Service Candidate Identification from Monolithic Systems Based on Execution Traces.
IEEE Trans. Software Eng., 2021

Can We Trust Your Explanations? Sanity Checks for Interpreters in Android Malware Analysis.
IEEE Trans. Inf. Forensics Secur., 2021

Text Backdoor Detection Using an Interpretable RNN Abstract Model.
IEEE Trans. Inf. Forensics Secur., 2021

A Novel Large Group Decision-Making Method via Normalized Alternative Prediction Selection.
IEEE Trans. Fuzzy Syst., 2021

One-to-One or One-to-many? What function inlining brings to binary2source similarity analysis.
CoRR, 2021

Where to Start: Studying Type Annotation Practices in Python.
Proceedings of the 36th IEEE/ACM International Conference on Automated Software Engineering, 2021

Interpretation-enabled Software Reuse Detection Based on a Multi-Level Birthmark Model.
Proceedings of the 43rd IEEE/ACM International Conference on Software Engineering, 2021

Weakly Supervised Semantic Parsing by Learning from Mistakes.
Proceedings of the Findings of the Association for Computational Linguistics: EMNLP 2021, 2021

An Estimation Method of Transmission Line Parameters Based on Measurements of Injection Power and Voltage Phasor in Power Grid.
Proceedings of the 17th IEEE International Conference on Automation Science and Engineering, 2021

An Unsupervised-Learning Based Method for Detecting Groups of Malicious Web Crawlers in Internet.
Proceedings of the 17th IEEE International Conference on Automation Science and Engineering, 2021

Identifying Vulnerable Set of Cascading Failure in Power Grid Using Deep Learning Framework.
Proceedings of the 17th IEEE International Conference on Automation Science and Engineering, 2021

Chase: A Large-Scale and Pragmatic Chinese Dataset for Cross-Database Context-Dependent Text-to-SQL.
Proceedings of the 59th Annual Meeting of the Association for Computational Linguistics and the 11th International Joint Conference on Natural Language Processing, 2021

2020
Moving Target Defense Approach to Detecting Stuxnet-Like Attacks.
IEEE Trans. Smart Grid, 2020

Tell You a Definite Answer: Whether Your Data is Tainted During Thread Scheduling.
IEEE Trans. Software Eng., 2020

CTDroid: Leveraging a Corpus of Technical Blogs for Android Malware Analysis.
IEEE Trans. Reliab., 2020

Hidden Electricity Theft by Exploiting Multiple-Pricing Scheme in Smart Grids.
IEEE Trans. Inf. Forensics Secur., 2020

Relation-based test case prioritization for regression testing.
J. Syst. Softw., 2020

A Unified Framework for Analyzing and Detecting Malicious Examples of DNN Models.
CoRR, 2020

Revisiting the Challenges and Opportunities in Software Plagiarism Detection.
Proceedings of the 27th IEEE International Conference on Software Analysis, 2020

From Innovations to Prospects: What Is Hidden Behind Cryptocurrencies?
Proceedings of the MSR '20: 17th International Conference on Mining Software Repositories, 2020

Exploring the Architectural Impact of Possible Dependencies in Python Software.
Proceedings of the 35th IEEE/ACM International Conference on Automated Software Engineering, 2020

Patch based vulnerability matching for binary programs.
Proceedings of the ISSTA '20: 29th ACM SIGSOFT International Symposium on Software Testing and Analysis, 2020

Recovering fitness gradients for interprocedural Boolean flags in search-based testing.
Proceedings of the ISSTA '20: 29th ACM SIGSOFT International Symposium on Software Testing and Analysis, 2020

An Empirical Evaluation of GDPR Compliance Violations in Android mHealth Apps.
Proceedings of the 31st IEEE International Symposium on Software Reliability Engineering, 2020

An Empirical Study of Architectural Changes in Code Commits.
Proceedings of the Internetware'20: 12th Asia-Pacific Symposium on Internetware, 2020

MemLock: memory usage guided fuzzing.
Proceedings of the ICSE '20: 42nd International Conference on Software Engineering, Seoul, South Korea, 27 June, 2020

Automated bug reproduction from user reviews for Android applications.
Proceedings of the ICSE-SEIP 2020: 42nd International Conference on Software Engineering, Software Engineering in Practice, Seoul, South Korea, 27 June, 2020

Physical Intrusion Detection against Device-connected Attack in Industrial Control Systems.
Proceedings of the 2020 IEEE International Conference on Communications, 2020

Benchmarking Meaning Representations in Neural Semantic Parsing.
Proceedings of the 2020 Conference on Empirical Methods in Natural Language Processing, 2020

A Dynamic Cascading Failure Model Integrating Relay Protection in Power Grid.
Proceedings of the 16th IEEE International Conference on Automation Science and Engineering, 2020

2019
Enhanced Hidden Moving Target Defense in Smart Grids.
IEEE Trans. Smart Grid, 2019

Preimage Attacks on Round-reduced Keccak-224/256 via an Allocating Approach.
IACR Cryptol. ePrint Arch., 2019

Locating vulnerabilities in binaries via memory layout recovering.
Proceedings of the ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2019

Active Hotspot: An Issue-Oriented Model to Monitor Software Evolution and Degradation.
Proceedings of the 34th IEEE/ACM International Conference on Automated Software Engineering, 2019

Sara: self-replay augmented record and replay for Android in industrial cases.
Proceedings of the 28th ACM SIGSOFT International Symposium on Software Testing and Analysis, 2019

FVT: a fragmented video tutor for "dubbing" software development tutorials.
Proceedings of the 41st International Conference on Software Engineering: Software Engineering Education and Training, 2019

ENRE: a tool framework for extensible eNtity relation extraction.
Proceedings of the 41st International Conference on Software Engineering: Companion Proceedings, 2019

Graph embedding based familial analysis of Android malware using unsupervised learning.
Proceedings of the 41st International Conference on Software Engineering, 2019

Investigating the impact of multiple dependency structures on software defects.
Proceedings of the 41st International Conference on Software Engineering, 2019

Method Selecting Correct One Among Alternatives Utilizing Intuitionistic Fuzzy Preference Relation Without Consensus Reaching Process.
Proceedings of the 2019 IEEE International Conference on Fuzzy Systems, 2019

A Model-Driven Learning Approach for Predicting the Personalized Dynamic Thermal Comfort in Ordinary Office Environment.
Proceedings of the 15th IEEE International Conference on Automation Science and Engineering, 2019

Towards Complex Text-to-SQL in Cross-Domain Database with Intermediate Representation.
Proceedings of the 57th Conference of the Association for Computational Linguistics, 2019

2018
Reviving Sequential Program Birthmarking for Multithreaded Software Plagiarism Detection.
IEEE Trans. Software Eng., 2018

Android Malware Familial Classification and Representative Sample Selection via Frequent Subgraph Analysis.
IEEE Trans. Inf. Forensics Secur., 2018

Guest editorial: special issue on concurrent software quality.
Softw. Qual. J., 2018

Dynamic structure measurement for distributed software.
Softw. Qual. J., 2018

Debugging Multithreaded Programs as if They Were Sequential.
IEEE Access, 2018

node2defect: using network embedding to improve software defect prediction.
Proceedings of the 33rd ACM/IEEE International Conference on Automated Software Engineering, 2018

Functionality-Oriented Microservice Extraction Based on Execution Trace Clustering.
Proceedings of the 2018 IEEE International Conference on Web Services, 2018

Crowd Intelligence for Decision Making Based on Positive and Negative Comparing With Linguistic Scale.
Proceedings of the 2018 IEEE International Conference on Fuzzy Systems, 2018

SemRegex: A Semantics-Based Approach for Generating Regular Expressions from Natural Language Specifications.
Proceedings of the 2018 Conference on Empirical Methods in Natural Language Processing, Brussels, Belgium, October 31, 2018

Android Malware Detector Exploiting Convolutional Neural Network and Adaptive Classifier Selection.
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018

Test Case Prioritization Based on Method Call Sequences.
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018

A Search-based Firmware Code Analysis Method for IoT Devices.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

Physical Intrusion Detection for Industrial Control System.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

Mitigating Stealthy False Data Injection Attacks Against State Estimation in Smart Grid.
Proceedings of the 2018 IEEE Conference on Communications and Network Security, 2018

Generating Regular Expressions from Natural Language Specifications: Are We There Yet?
Proceedings of the Workshops of the The Thirty-Second AAAI Conference on Artificial Intelligence, 2018

2017
Dependence Guided Symbolic Execution.
IEEE Trans. Software Eng., 2017

DAPASA: Detecting Android Piggybacked Apps Through Sensitive Subgraph Analysis.
IEEE Trans. Inf. Forensics Secur., 2017

Analyzing and modeling dynamics of information diffusion in microblogging social network.
J. Netw. Comput. Appl., 2017

Butler, Not Servant: A Human-Centric Smart Home Energy Management System.
IEEE Commun. Mag., 2017

ProGuard: Detecting Malicious Accounts in Social-Network-Based Online Promotions.
IEEE Access, 2017

SEDEA: State Estimation-Based Dynamic Encryption and Authentication in Smart Grid.
IEEE Access, 2017

Automated Testing of Definition-Use Data Flow for Multithreaded Programs.
Proceedings of the 2017 IEEE International Conference on Software Testing, 2017

Hidden Moving Target Defense in Smart Grids.
Proceedings of the 2nd Workshop on Cyber-Physical Security and Resilience in Smart Grids, 2017

Load identification based on Factorial Hidden Markov Model and online performance analysis.
Proceedings of the 13th IEEE Conference on Automation Science and Engineering, 2017

2016
Improving Linguistic Pairwise Comparison Consistency via Linguistic Discrete Regions.
IEEE Trans. Fuzzy Syst., 2016

Exploiting thread-related system calls for plagiarism detection of multithreaded programs.
J. Syst. Softw., 2016

Debugging Multithreaded Programs as if They Were Sequential.
Proceedings of the International Conference on Software Analysis, Testing and Evolution, 2016

Dynamic cohesion measurement for distributed system.
Proceedings of the 1st International Workshop on Specification, 2016

Frequent Subgraph Based Familial Classification of Android Malware.
Proceedings of the 27th IEEE International Symposium on Software Reliability Engineering, 2016

A new thread-aware birthmark for plagiarism detection of multithreaded programs.
Proceedings of the 38th International Conference on Software Engineering, 2016

Mixed Intuitionistic Fuzzy Aggregation Operators decreasing results of unusual IFNs.
Proceedings of the 2016 IEEE International Conference on Fuzzy Systems, 2016

A human-centered smart home system with wearable-sensor behavior analysis.
Proceedings of the IEEE International Conference on Automation Science and Engineering, 2016

2015
Software Plagiarism Detection with Birthmarks Based on Dynamic Key Instruction Sequences.
IEEE Trans. Software Eng., 2015

Calling Network: A New Method for Modeling Software Runtime Behaviors.
ACM SIGSOFT Softw. Eng. Notes, 2015

Exploring community structure of software Call Graph and its applications in class cohesion measurement.
J. Syst. Softw., 2015

Abnormal traffic-indexed state estimation: A cyber-physical fusion approach for Smart Grid attack detection.
Future Gener. Comput. Syst., 2015

SHE: Smart home energy management system based on social and motion behavior cognition.
Proceedings of the 2015 IEEE International Conference on Smart Grid Communications, 2015

An appliance classification method for residential appliance scheduling.
Proceedings of the 2015 ACM International Joint Conference on Pervasive and Ubiquitous Computing and Proceedings of the 2015 ACM International Symposium on Wearable Computers, 2015

A grade assignment and IFS translation approach based on intensive region searching.
Proceedings of the 2015 IEEE International Conference on Fuzzy Systems, 2015

2014
A Dynamic Secret-Based Encryption Scheme for Smart Grid Wireless Communication.
IEEE Trans. Smart Grid, 2014

Reducing Test Cases with Causality Partitions.
Proceedings of the 26th International Conference on Software Engineering and Knowledge Engineering, 2014

DBPD: A Dynamic Birthmark-based Software Plagiarism Detection Tool.
Proceedings of the 26th International Conference on Software Engineering and Knowledge Engineering, 2014

SEDE: state estimation-based dynamic encryption scheme for smart grid communication.
Proceedings of the Symposium on Applied Computing, 2014

Plagiarism detection for multithreaded software based on thread-aware software birthmarks.
Proceedings of the 22nd International Conference on Program Comprehension, 2014

Directed test suite augmentation via exploiting program dependency.
Proceedings of the 6th International Workshop on Constraints in Software Testing, 2014

In-depth measurement and analysis on densification power law of software execution.
Proceedings of the 5th International Workshop on Emerging Trends in Software Metrics, 2014

A user demand and preference profiling method for residential energy management.
Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2014

SHE: smart home energy management system for appliance identification and personalized scheduling.
Proceedings of the 2014 ACM International Joint Conference on Pervasive and Ubiquitous Computing, 2014

A new approach to improve the consistency of linguistic pair-wise comparison matrix and derive interval weight vector.
Proceedings of the IEEE International Conference on Fuzzy Systems, 2014

IFSDA: An intuitionistic fuzzy set-based data aggregation approach for software maintainability evaluation.
Proceedings of the 11th International Conference on Fuzzy Systems and Knowledge Discovery, 2014

A residential load scheduling approach based on load behavior analysis.
Proceedings of the 2014 IEEE International Conference on Automation Science and Engineering, 2014

2013
Security risks evaluation toolbox for smart grid devices.
Proceedings of the ACM SIGCOMM 2013 Conference, 2013

A novel method to detect bad data injection attack in smart grid.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

Bad data detection method for smart grids based on distributed state estimation.
Proceedings of IEEE International Conference on Communications, 2013

DKISB: Dynamic Key Instruction Sequence Birthmark for Software Plagiarism Detection.
Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications & 2013 IEEE International Conference on Embedded and Ubiquitous Computing, 2013

A discrete region-based approach to improve the consistency of pair-wise comparison matrix.
Proceedings of the FUZZ-IEEE 2013, 2013

2012
An Entropy-based Method for Attack Detection in Large Scale Network.
Int. J. Comput. Commun. Control, 2012

A layered classification for malicious function identification and malware detection.
Concurr. Comput. Pract. Exp., 2012

Software structure evaluation based on the interaction and encapsulation of methods.
Sci. China Inf. Sci., 2012

An Identity Authentication Mechanism Based on Timing Covert Channel.
Proceedings of the 11th IEEE International Conference on Trust, 2012

2011
A New Method for Authentication Based on Covert Channel.
Proceedings of the Network and Parallel Computing - 8th IFIP International Conference, 2011

A Layered Detection Method for Malware Identification.
Proceedings of the Network and Parallel Computing - 8th IFIP International Conference, 2011

2009
A new worm exploiting IPv6 and IPv4-IPv6 dual-stack networks: experiment, modeling, simulation, and defense.
IEEE Netw., 2009

Prototype Demonstration: Trojan Detection and Defense System.
Proceedings of the 6th IEEE Consumer Communications and Networking Conference, 2009


  Loading...