Wei Dong

Orcid: 0000-0002-8033-7943

Affiliations:
  • National University of Defense Technology, School of Computer, Changsha, China


According to our database1, Wei Dong authored at least 106 papers between 2001 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Synthesizing Controller for Unsynthesizable Specification Based on Criticality Levels.
Proceedings of the 15th Asia-Pacific Symposium on Internetware, 2024

2023
Mitigating False Positive Static Analysis Warnings: Progress, Challenges, and Opportunities.
IEEE Trans. Software Eng., December, 2023

deGraphCS: Embedding Variable-based Flow Graph for Neural Code Search.
ACM Trans. Softw. Eng. Methodol., April, 2023

MulCS: Towards a Unified Deep Representation for Multilingual Code Search.
Proceedings of the IEEE International Conference on Software Analysis, 2023

FAEG: Feature-Driven Automatic Exploit Generation.
Proceedings of the 14th Asia-Pacific Symposium on Internetware, 2023

One Adapter for All Programming Languages? Adapter Tuning for Code Search and Summarization.
Proceedings of the 45th IEEE/ACM International Conference on Software Engineering, 2023

2022
Probabilistic synthesis against GR(1) winning condition.
Frontiers Comput. Sci., 2022

Bridging Pre-trained Models and Downstream Tasks for Source Code Understanding.
Proceedings of the 44th IEEE/ACM 44th International Conference on Software Engineering, 2022

Extension-Compression Learning: A deep learning code search method that simulates reading habits.
Proceedings of the 26th International Conference on Engineering of Complex Computer Systems, 2022

2021
Matching user accounts with spatio-temporal awareness across social networks.
Inf. Sci., 2021

deGraphCS: Embedding Variable-based Flow Graph for Neural Code Search.
CoRR, 2021

MulCode: A Multi-task Learning Approach for Source Code Understanding.
Proceedings of the 28th IEEE International Conference on Software Analysis, 2021

MACA: A Residual Network with Multi-Attention and Core Attributes for Code Search (S).
Proceedings of the 33rd International Conference on Software Engineering and Knowledge Engineering, 2021

Simplify Array Processing Loops for Efficient Program Verification.
Proceedings of the 32nd IEEE International Symposium on Software Reliability Engineering, 2021

An Evolutionary Study of Configuration Design and Implementation in Cloud Systems.
Proceedings of the 43rd IEEE/ACM International Conference on Software Engineering, 2021

Program Verification Enhanced Precise Analysis of Interrupt-Driven Program Vulnerabilities.
Proceedings of the 28th Asia-Pacific Software Engineering Conference, 2021

2020
On Scheduling Constraint Abstraction for Multi-Threaded Program Verification.
IEEE Trans. Software Eng., 2020

Iterative Controller Synthesis for Multirobot System.
IEEE Trans. Reliab., 2020

Runtime Verification on Hierarchical Properties of ROS-Based Robot Swarms.
IEEE Trans. Reliab., 2020

The Java Pathfinder Workshop 2019.
ACM SIGSOFT Softw. Eng. Notes, 2020

Decentralized runtime enforcement for robotic swarms.
Frontiers Inf. Technol. Electron. Eng., 2020

Modified condition/decision coverage (MC/DC) oriented compiler optimization for symbolic execution.
Frontiers Inf. Technol. Electron. Eng., 2020

Entity disambiguation with context awareness in user-generated short texts.
Expert Syst. Appl., 2020

Controller Resynthesis for Multirobot System When Changes Happen.
Computer, 2020

Controller Synthesis for ROS-based Multi-Robot Collaboration.
Proceedings of the 32nd International Conference on Software Engineering and Knowledge Engineering, 2020

Probabilistic Synthesis for Program with Non-API Operations.
Proceedings of the 20th IEEE International Conference on Software Quality, 2020

Graph-based Vulnerability Detection via Extracting Features from Sliced Code.
Proceedings of the 20th IEEE International Conference on Software Quality, 2020

Effective Iterative Program Synthesis with Knowledge Searched from Internet.
Proceedings of the 20th IEEE International Conference on Software Quality, 2020

Rchecker: A CBMC-based Data Race Detector for Interrupt-driven Programs.
Proceedings of the 20th IEEE International Conference on Software Quality, 2020

Vulnerability Analysis through Interface-based Checker Design.
Proceedings of the 20th IEEE International Conference on Software Quality, 2020

Security Controller Synthesis for ROS-based Robot.
Proceedings of the 20th IEEE International Conference on Software Quality, 2020

Collective intelligence for smarter neural program synthesis.
Proceedings of the 35th IEEE/ACM International Conference on Automated Software Engineering Workshops, 2020

Boosting component-based synthesis with API usage knowledge.
Proceedings of the 35th IEEE/ACM International Conference on Automated Software Engineering Workshops, 2020

Symbolic verification of message passing interface programs.
Proceedings of the ICSE '20: 42nd International Conference on Software Engineering, Seoul, South Korea, 27 June, 2020

How Much Support Can API Recommendation Methods Provide for Component-Based Synthesis?
Proceedings of the 44th IEEE Annual Computers, Software, and Applications Conference, 2020

Synthesizing Cooperative Controllers from Global Tasks of Multi-robot Systems.
Proceedings of the 27th Asia-Pacific Software Engineering Conference, 2020

2019
Symbolic Verification of Regular Properties for Java Programs.
ACM SIGSOFT Softw. Eng. Notes, 2019

Deep Code-Comment Understanding and Assessment.
IEEE Access, 2019

Accelerating API-Based Program Synthesis via API Usage Pattern Mining.
IEEE Access, 2019

Fine-Grained Geolocalization of User-Generated Short Text Based on a Weight Probability Model.
IEEE Access, 2019

Parallel refinement for multi-threaded program verification.
Proceedings of the 41st International Conference on Software Engineering, 2019

Synthesizing Secure Reactive Controller for Unmanned Aerial System.
Proceedings of the 6th International Conference on Dependable Systems and Their Applications, 2019

2018
Expediting Binary Fuzzing with Symbolic Analysis.
Int. J. Softw. Eng. Knowl. Eng., 2018

Boosting the Robustness Verification of DNN by Identifying the Achilles's Heel.
CoRR, 2018

Combining Symbolic Execution and Model Checking to Verify MPI Programs.
CoRR, 2018

A True-Concurrency Encoding for BMC of Compositional Systems.
Comput. J., 2018

YOGAR-CBMC: CBMC with Scheduling Constraint Based Abstraction Refinement - (Competition Contribution).
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2018

Expediting Binary Fuzzing with Symbolic Analysis.
Proceedings of the 30th International Conference on Software Engineering and Knowledge Engineering, 2018

Evaluating and Integrating Diverse Bug Finders for Effective Program Analysis.
Proceedings of the Software Analysis, Testing, and Evolution, 2018

Automatic Exploit Generation for Buffer Overflow Vulnerabilities.
Proceedings of the 2018 IEEE International Conference on Software Quality, 2018

Guide Fuzzing with Multi-Factor Potential Analysis.
Proceedings of the 2018 IEEE International Conference on Software Quality, 2018

Scheduling constraint based abstraction refinement for weak memory models.
Proceedings of the 33rd ACM/IEEE International Conference on Automated Software Engineering, 2018

Symbolic verification of regular properties.
Proceedings of the 40th International Conference on Software Engineering, 2018

MC/DC coverage-oriented compiler optimization for symbolic execution.
Proceedings of the 40th International Conference on Software Engineering: Companion Proceeedings, 2018

User Identification with Spatio-Temporal Awareness across Social Networks.
Proceedings of the 27th ACM International Conference on Information and Knowledge Management, 2018

NotOnlyLog: Mining Patch-Log Associations from Software Evolution History to Enhance Failure Diagnosis Capability.
Proceedings of the 25th Asia-Pacific Software Engineering Conference, 2018

2017
基于语义补丁的Linux驱动程序后向移植技术 (Backporting of Linux Device Drivers Using Semantic Patch).
计算机科学, 2017

无人驾驶汽车决策系统的规则正确性验证 (Correctness Verification of Rules for Unmanned Vehicles' Decision System).
计算机科学, 2017

混源软件质量模型与度量方法研究 (Research on Mixed Source Software Quality Model and Measurement Method).
计算机科学, 2017

Scheduling Constraint Based Abstraction Refinement for Multi-Threaded Program Verification.
CoRR, 2017

RGSE: a regular property guided symbolic executor for Java.
Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering, 2017

Automatic Type Inference for Proactive Misconfiguration Prevention.
Proceedings of the 29th International Conference on Software Engineering and Knowledge Engineering, 2017

Optimizing Monitor Code Based on Patterns in Runtime Verification.
Proceedings of the 2017 IEEE International Conference on Software Quality, 2017

Monitor Synthesis for Parametric MTL Properties in Discrete Control Software.
Proceedings of the 2017 IEEE International Conference on Software Quality, 2017

2016
Static Analysis of Runtime Errors in Interrupt-Driven Programs via Sequentialization.
ACM Trans. Embed. Comput. Syst., 2016

ConfMapper: Automated Variable Finding for Configuration Items in Source Code.
Proceedings of the 2016 IEEE International Conference on Software Quality, 2016

Analyzing Math Library Functions via Summarization.
Proceedings of the 2016 IEEE International Conference on Software Quality, 2016

2015
Regular Property Guided Dynamic Symbolic Execution.
Proceedings of the 37th IEEE/ACM International Conference on Software Engineering, 2015

Poster: Symbolic Execution of MPI Programs.
Proceedings of the 37th IEEE/ACM International Conference on Software Engineering, 2015

MPISE: Symbolic Execution of MPI Programs.
Proceedings of the 16th IEEE International Symposium on High Assurance Systems Engineering, 2015

2014
Counterexample-Preserving Reduction for Symbolic Model Checking.
J. Appl. Math., 2014

Robustness Analysis of Floating-Point Programs by Self-Composition.
J. Appl. Math., 2014

A Predictive Runtime Verification Framework for Cyber-Physical Systems.
Proceedings of the IEEE Eighth International Conference on Software Security and Reliability, 2014

A Runtime Verification Based Trace-Oriented Monitoring Framework for Cloud Systems.
Proceedings of the 25th IEEE International Symposium on Software Reliability Engineering Workshops, 2014

Synchronization Error Detection of MPI Programs by Symbolic Execution.
Proceedings of the 21st Asia-Pacific Software Engineering Conference, 2014

2013
Data Race Detection for Interrupt-Driven Programs via Bounded Model Checking.
Proceedings of the Seventh International Conference on Software Security and Reliability, 2013

Counterexample-Preserving Reduction for Symbolic Model Checking.
Proceedings of the Theoretical Aspects of Computing - ICTAC 2013, 2013

2012
Anticipatory active monitoring for safety- and security-critical software.
Sci. China Inf. Sci., 2012

Invalid Pointer Dereferences Detection for CPS Software Based on Extended Pointer Structures.
Proceedings of the Sixth International Conference on Software Security and Reliability, 2012

Runtime Verification with Predictive Semantics.
Proceedings of the NASA Formal Methods, 2012

2011
Security Goals Assurance Based on Software Active Monitoring.
Proceedings of the Fifth International Conference on Secure Software Integration and Reliability Improvement, 2011

An event pattern language for runtime monitoring based on AOP.
Proceedings of the 6th International Conference for Internet Technology and Secured Transactions, 2011

2010
Active Monitoring for Control Systems under Anticipatory Semantics.
Proceedings of the 10th International Conference on Quality Software, 2010

2009
Demand-Driven Memory Leak Detection Based on Flow- and Context-Sensitive Pointer Analysis.
J. Comput. Sci. Technol., 2009

2008
Computing Must and May Alias to Detect Null Pointer Dereference.
Proceedings of the Leveraging Applications of Formal Methods, 2008

Design of Some Artificial Immune Operators in Software Test Cases Generation.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

Implementation of String Recognition Algorithm Based on the Principle of Artificial Immunology.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

A Method to Generate Embedded Real-Time System Test Suites Based on Software Architecture Specifications.
Proceedings of the 9th International Conference for Young Computer Scientists, 2008

Automating Software FMEA via Formal Analysis of Dependence Relations.
Proceedings of the 32nd Annual IEEE International Computer Software and Applications Conference, 2008

Impartial Anticipation in Runtime-Verification.
Proceedings of the Automated Technology for Verification and Analysis, 2008

2007
Modelling and model checking suspendible business processes via statechart diagrams and CSP.
Sci. Comput. Program., 2007

Interface theory-based formalisation and verification of orchestration in BPEL4WS.
Int. J. Bus. Process. Integr. Manag., 2007

Shape Analysis by Refining on Abstract Evaluation Path.
Proceedings of the 1st International Workshop on Harnessing Theories for Tool Support in Software, 2007

Axiomatizing Extended Temporal Logic Fragments Via Instantiation.
Proceedings of the Theoretical Aspects of Computing, 2007

Compositional Verification of UML Dynamic Models.
Proceedings of the 14th Asia-Pacific Software Engineering Conference (APSEC 2007), 2007

2006
An Value Range Analysis Based on Abstract Interpretation and Generalized Monotone Data Flow Framework.
J. Comput. Res. Dev., 2006

A Contract-based Approach to Specifying and Verifying Safety Critical Systems.
Proceedings of the Workshop on Formal Foundations of Embedded Software and Component-Based Software Architectures, 2006

Model Checking Suspendible Business Processes via Statechart Diagrams and CSP.
Proceedings of the Modelling, 2006

Towards Formal Interfaces for Web Services with Transactions.
Proceedings of the Advanced Internet Based Systems and Applications, 2006

Verifying Choreographic Descriptions of Web Services Based on CSP.
Proceedings of the 2006 IEEE Services Computing Workshops (SCW 2006), 2006

An Interface Theory Based Approach to Verification of Web Services.
Proceedings of the 30th Annual International Computer Software and Applications Conference, 2006

2005
Contract-Based Formal Specification of Safety Critical Systems.
Proceedings of the 29th Annual International Computer Software and Applications Conference, 2005

Improvements Towards Formalizing UML State Diagrams in CSP.
Proceedings of the 12th Asia-Pacific Software Engineering Conference (APSEC 2005), 2005

2004
Property-Oriented Testing of Real-Time Systems.
Proceedings of the 11th Asia-Pacific Software Engineering Conference (APSEC 2004), 30 November, 2004

2002
Slicing Hierarchical Automata for Model Checking UML Statecharts.
Proceedings of the Formal Methods and Software Engineering, 2002

2001
Model Checking UML Statecharts.
Proceedings of the 8th Asia-Pacific Software Engineering Conference (APSEC 2001), 2001


  Loading...