Xiao Cheng

Orcid: 0000-0001-5456-3827

Affiliations:
  • University of Technology Sydney, Australia


According to our database1, Xiao Cheng authored at least 15 papers between 2016 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Dynamic Transitive Closure-based Static Analysis through the Lens of Quantum Search.
ACM Trans. Softw. Eng. Methodol., June, 2024

Refining and Scaling Path-Sensitive Abstract Execution.
PhD thesis, 2024

How About Bug-Triggering Paths? - Understanding and Characterizing Learning-Based Vulnerability Detectors.
IEEE Trans. Dependable Secur. Comput., 2024

Fast Graph Simplification for Path-Sensitive Typestate Analysis through Tempo-Spatial Multi-Point Slicing.
Proc. ACM Softw. Eng., 2024

Precise Sparse Abstract Execution via Cross-Domain Interaction.
Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024

2023
Vulnerability Detection via Typestate-Guided Code Representation Learning.
Proceedings of the Formal Methods and Software Engineering, 2023

2022
Path-sensitive code embedding via contrastive learning for software vulnerability detection.
Proceedings of the ISSTA '22: 31st ACM SIGSOFT International Symposium on Software Testing and Analysis, Virtual Event, South Korea, July 18, 2022

2021
DeepWukong: Statically Detecting Software Vulnerabilities Using Deep Graph Neural Network.
ACM Trans. Softw. Eng. Methodol., 2021

2020
Flow2Vec: value-flow-based precise code embedding.
Proc. ACM Program. Lang., 2020

2019
Static Detection of Control-Flow-Related Vulnerabilities Using Graph Embedding.
Proceedings of the 24th International Conference on Engineering of Complex Computer Systems, 2019

2017
<i>CLCMiner</i>: Detecting Cross-Language Clones without Intermediates.
IEICE Trans. Inf. Syst., 2017

2016
Supporting Selective Undo for Refactoring.
Proceedings of the IEEE 23rd International Conference on Software Analysis, 2016

Mining revision histories to detect cross-language clones without intermediates.
Proceedings of the 31st IEEE/ACM International Conference on Automated Software Engineering, 2016

On the feasibility of detecting cross-platform code clones via identifier similarity.
Proceedings of the 5th International Workshop on Software Mining, 2016

Rule-directed code clone synchronization.
Proceedings of the 24th IEEE International Conference on Program Comprehension, 2016


  Loading...