Xiaoyin Wang

Orcid: 0000-0002-9079-5534

According to our database1, Xiaoyin Wang authored at least 110 papers between 2008 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Top-down: A better strategy for incremental covering array generation.
Inf. Softw. Technol., 2025

2024
An empirical study on the usage of mocking frameworks in Apache software foundation.
Empir. Softw. Eng., April, 2024

Build Issue Resolution from the Perspective of Non-Contributors.
CoRR, 2024

Automation Configuration in Smart Home Systems: Challenges and Opportunities.
CoRR, 2024

Validating LLM-Generated Programs with Metamorphic Prompt Testing.
CoRR, 2024

Towards Automatic Oracle Prediction for AR Testing: Assessing Virtual Object Placement Quality under Real-World Scenes.
Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2024

Improving Resource and Energy Efficiency for Cloud 3D through Excessive Rendering Reduction.
Proceedings of the Nineteenth European Conference on Computer Systems, 2024

2023
UniLoc: Unified Fault Localization of Continuous Integration Failures.
ACM Trans. Softw. Eng. Methodol., November, 2023

What's (Not) Working in Programmer User Studies?
ACM Trans. Softw. Eng. Methodol., September, 2023

DAISY: Dynamic-Analysis-Induced Source Discovery for Sensitive Data.
ACM Trans. Softw. Eng. Methodol., July, 2023

An empirical study on API usages from code search engine and local library.
Empir. Softw. Eng., June, 2023

An empirical study of ChatGPT-3.5 on question answering and code maintenance.
CoRR, 2023

Thorium: A Language for Bounded Verification of Dynamic Reactive Objects.
Proceedings of the 10th ACM SIGPLAN International Workshop on Reactive and Event-Based Languages and Systems, 2023

VRGuide: Efficient Testing of Virtual Reality Scenes via Dynamic Cut Coverage.
Proceedings of the 38th IEEE/ACM International Conference on Automated Software Engineering, 2023

PExReport-Maven: Creating Pruned Executable Cross-Project Failure Reports in Maven Build System.
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2023

PExReport: Automatic Creation of Pruned Executable Cross-Project Failure Reports.
Proceedings of the 45th IEEE/ACM International Conference on Software Engineering, 2023

Monkeypox Detection based on MIRNET-v2 and Transfer Learning.
Proceedings of the 6th International Conference on Artificial Intelligence and Pattern Recognition, 2023

2022
Inferring Bug Signatures to Detect Real Bugs.
IEEE Trans. Software Eng., 2022

A Theory of Pending Schemas in Combinatorial Testing.
IEEE Trans. Software Eng., 2022

Enhance Combinatorial Testing With Metamorphic Relations.
IEEE Trans. Software Eng., 2022

MOdel-Based SyntheTic Data-Driven Learning (MOST-DL): Application in Single-Shot T<sub>2</sub> Mapping With Severe Head Motion Using Overlapping-Echo Acquisition.
IEEE Trans. Medical Imaging, 2022

Single-shot multi-parametric mapping based on multiple overlapping-echo detachment (MOLED) imaging.
NeuroImage, 2022

Fix the leaking tap: A survey of Trigger-Action Programming (TAP) security issues, detection techniques and solutions.
Comput. Secur., 2022

Design of a location-based opportunistic geographic routing protocol.
Comput. Commun., 2022

A Lightweight Approach of Human-Like Playtest for Android Apps.
Proceedings of the IEEE International Conference on Software Analysis, 2022

How Do Injected Bugs Affect Deep Learning?
Proceedings of the IEEE International Conference on Software Analysis, 2022

PredART: Towards Automatic Oracle Prediction of Object Placements in Augmented Reality Testing.
Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering, 2022

VRTest: An Extensible Framework for Automatic Testing of Virtual Reality Scenes.
Proceedings of the 44th IEEE/ACM International Conference on Software Engineering: Companion Proceedings, 2022

COVID-19 Image Segmentation Algorithms Based on Conditional Generative Adversarial Network.
Proceedings of the 5th International Conference on Artificial Intelligence and Pattern Recognition, 2022

2021
Sais: Self-Adaptive Identification of Security Bug Reports.
IEEE Trans. Dependable Secur. Comput., 2021

The symptoms, causes, and repairs of bugs inside a deep learning library.
J. Syst. Softw., 2021

Analyzing privacy policies through syntax-driven semantic analysis of information types.
Inf. Softw. Technol., 2021

MIMO frequency domain system identification using matrix-valued orthonormal functions.
Autom., 2021

ConDySTA: Context-Aware Dynamic Supplement to Static Taint Analysis.
Proceedings of the 42nd IEEE Symposium on Security and Privacy, 2021

Accelerating Program Analyses in Datalog by Merging Library Facts.
Proceedings of the Static Analysis - 28th International Symposium, 2021

Understanding Execution Environment of File-Manipulation Scripts by Extracting Pre-Conditions.
Proceedings of the 29th IEEE/ACM International Conference on Program Comprehension, 2021

Automatic Extraction of Code Dependency in Virtual Reality Software.
Proceedings of the 29th IEEE/ACM International Conference on Program Comprehension, 2021

How Developers Optimize Virtual Reality Applications: A Study of Optimization Commits in Open Source Unity Projects.
Proceedings of the 43rd IEEE/ACM International Conference on Software Engineering, 2021

Topic Trends in Issue Tracking System of Extended Reality Frameworks.
Proceedings of the 28th Asia-Pacific Software Engineering Conference, 2021

An Exploration Study On the Dependency Among Vulnerabilities and Bugs.
Proceedings of the 28th Asia-Pacific Software Engineering Conference, 2021

2020
An Interleaving Approach to Combinatorial Testing and Failure-Inducing Interaction Identification.
IEEE Trans. Software Eng., 2020

Identifying Failure-Causing Schemas in the Presence of Multiple Faults.
IEEE Trans. Software Eng., 2020

Two-Dimensional Frequency-Domain System Identification.
IEEE Trans. Autom. Control., 2020

Leveraging Code Generation to Improve Code Retrieval and Summarization via Dual Learning.
Proceedings of the WWW '20: The Web Conference 2020, Taipei, Taiwan, April 20-24, 2020, 2020

Disambiguating Requirements Through Syntax-Driven Semantic Analysis of Information Types.
Proceedings of the Requirements Engineering: Foundation for Software Quality, 2020

How does misconfiguration of analytic services compromise mobile privacy?
Proceedings of the ICSE '20: 42nd International Conference on Software Engineering, Seoul, South Korea, 27 June, 2020

Taming behavioral backward incompatibilities via cross-project testing and analysis.
Proceedings of the ICSE '20: 42nd International Conference on Software Engineering, Seoul, South Korea, 27 June, 2020

An Empirical Study on Bugs Inside TensorFlow.
Proceedings of the Database Systems for Advanced Applications, 2020

2019
Toward Detection of Access Control Models from Source Code via Word Embedding.
Proceedings of the 24th ACM Symposium on Access Control Models and Technologies, 2019

Privacy Assurance for Android Augmented Reality Apps.
Proceedings of the 24th IEEE Pacific Rim International Symposium on Dependable Computing, 2019

Static Analysis of File Manipulation Scripts.
Proceedings of the 24th IEEE Pacific Rim International Symposium on Dependable Computing, 2019

TestMig: migrating GUI test cases from iOS to Android.
Proceedings of the 28th ACM SIGSOFT International Symposium on Software Testing and Analysis, 2019

IconIntent: automatic identification of sensitive UI widgets based on icon classification for Android apps.
Proceedings of the 41st International Conference on Software Engineering, 2019

How reliable is the crowdsourced knowledge of security implementation?
Proceedings of the 41st International Conference on Software Engineering, 2019

Taming web views in the detection of Android privacy leaks.
Proceedings of the 6th Annual Symposium on Hot Topics in the Science of Security, 2019

Toward a reliability measurement framework automated using deep learning.
Proceedings of the 6th Annual Symposium on Hot Topics in the Science of Security, 2019

CSOD: Context-Sensitive Overflow Detection.
Proceedings of the IEEE/ACM International Symposium on Code Generation and Optimization, 2019

2018
Toward A Code Pattern Based Vulnerability Measurement Model.
Proceedings of the 23nd ACM on Symposium on Access Control Models and Technologies, 2018

RUDSEA: recommending updates of Dockerfiles via software environment analysis.
Proceedings of the 33rd ACM/IEEE International Conference on Automated Software Engineering, 2018

Automatic Clone Recommendation for Refactoring Based on the Present and the Past.
Proceedings of the 2018 IEEE International Conference on Software Maintenance and Evolution, 2018

GUILeak: tracing privacy policy claims on user input data for Android applications.
Proceedings of the 40th International Conference on Software Engineering, 2018

Protecting remote controlling apps of smart-home-oriented IOT devices.
Proceedings of the 40th International Conference on Software Engineering: Companion Proceeedings, 2018

HireBuild: an automatic approach to history-driven repair of build scripts.
Proceedings of the 40th International Conference on Software Engineering, 2018

2017
Preface.
J. Comput. Sci. Technol., 2017

NTApps: A Network Traffic Analyzer of Android Applications.
Proceedings of the 22nd ACM on Symposium on Access Control Models and Technologies, 2017

Boosting complete-code tool for partial program.
Proceedings of the 32nd IEEE/ACM International Conference on Automated Software Engineering, 2017

NetDroid: summarizing network behavior of Android apps for network code maintenance.
Proceedings of the 25th International Conference on Program Comprehension, 2017

PerfRanker: prioritization of performance regression tests for collection-intensive software.
Proceedings of the 26th ACM SIGSOFT International Symposium on Software Testing and Analysis, Santa Barbara, CA, USA, July 10, 2017

Experience paper: a study on behavioral backward incompatibilities of Java software libraries.
Proceedings of the 26th ACM SIGSOFT International Symposium on Software Testing and Analysis, Santa Barbara, CA, USA, July 10, 2017

A study on behavioral backward incompatibility bugs in Java software libraries: poster.
Proceedings of the 39th International Conference on Software Engineering, 2017

Mining readme files to support automatic building of Java projects in software repositories: poster.
Proceedings of the 39th International Conference on Software Engineering, 2017

Conditional Dyck-CFL Reachability Analysis for Complete and Efficient Library Summarization.
Proceedings of the Programming Languages and Systems, 2017

An Empirical Study of Open Source Virtual Reality Software Projects.
Proceedings of the 2017 ACM/IEEE International Symposium on Empirical Software Engineering and Measurement, 2017

How Does Machine Translated User Interface Affect User Experience? A Study on Android Apps.
Proceedings of the 2017 ACM/IEEE International Symposium on Empirical Software Engineering and Measurement, 2017

Change-Aware Build Prediction Model for Stall Avoidance in Continuous Integration.
Proceedings of the 2017 ACM/IEEE International Symposium on Empirical Software Engineering and Measurement, 2017

Automatic Building of Java Projects in Software Repositories: A Study on Feasibility and Challenges.
Proceedings of the 2017 ACM/IEEE International Symposium on Empirical Software Engineering and Measurement, 2017

2016
PVDetector: a detector of privacy-policy violations for Android apps.
Proceedings of the International Conference on Mobile Software Engineering and Systems, 2016

Toward a framework for detecting privacy policy violations in android application code.
Proceedings of the 38th International Conference on Software Engineering, 2016

2015
A survey on bug-report analysis.
Sci. China Inf. Sci., 2015

A Empirical Study on the Status of Software Localization in Open Source Projects.
Proceedings of the 27th International Conference on Software Engineering and Knowledge Engineering, 2015

Summary-Based Context-Sensitive Data-Dependence Analysis in Presence of Callbacks.
Proceedings of the 42nd Annual ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, 2015

Experience report: how is dynamic symbolic execution different from manual testing? a study on KLEE.
Proceedings of the 2015 International Symposium on Software Testing and Analysis, 2015

2014
Predicting Consistency-Maintenance Requirement of Code Clonesat Copy-and-Paste Time.
IEEE Trans. Software Eng., 2014

Approach for malware identification using dynamic behaviour and outcome triggering.
IET Inf. Secur., 2014

An Empirical Study on the Usage of Mocking Frameworks in Software Testing.
Proceedings of the 2014 14th International Conference on Quality Software, 2014

2013
Locating Need-to-Externalize Constant Strings for Software Internationalization with Generalized String-Taint Analysis.
IEEE Trans. Software Eng., 2013

NetworkProfiler: Towards automatic fingerprinting of Android apps.
Proceedings of the IEEE INFOCOM 2013, Turin, Italy, April 14-19, 2013, 2013

An adaptive filtering mechanism for energy efficient data prefetching.
Proceedings of the 18th Asia and South Pacific Design Automation Conference, 2013

2012
Active Store Window: Enabling Far Store-Load Forwarding with Scalability and Complexity-Efficiency.
J. Comput. Sci. Technol., 2012

Automating presentation changes in dynamic web applications via collaborative hybrid analysis.
Proceedings of the 20th ACM SIGSOFT Symposium on the Foundations of Software Engineering (FSE-20), 2012

Reducing last level cache pollution through OS-level software-controlled region-based partitioning.
Proceedings of the ACM Symposium on Applied Computing, 2012

Can I clone this piece of code here?
Proceedings of the IEEE/ACM International Conference on Automated Software Engineering, 2012

A history-based matching approach to identification of framework evolution.
Proceedings of the 34th International Conference on Software Engineering, 2012

SOLE: Speculative one-cycle load execution with scalability, high-performance and energy-efficiency.
Proceedings of the 30th International IEEE Conference on Computer Design, 2012

S/DC: A storage and energy efficient data prefetcher.
Proceedings of the 2012 Design, Automation & Test in Europe Conference & Exhibition, 2012

2011
Checking enforcement of integrity constraints in database applications based on code patterns.
J. Syst. Softw., 2011

CGA: Combining cluster analysis with genetic algorithm for regression suite reduction of microprocessors.
Proceedings of the IEEE 24th International SoC Conference, SOCC 2011, Taipei, Taiwan, 2011

TAP prediction: Reusing conditional branch predictor for indirect branches with Target Address Pointers.
Proceedings of the IEEE 29th International Conference on Computer Design, 2011

Bug Signature Minimization and Fusion.
Proceedings of the 13th IEEE International Symposium on High-Assurance Systems Engineering, 2011

2010
Research Progress of UniCore CPUs and PKUnity SoCs.
J. Comput. Sci. Technol., 2010

Test input reduction for result inspection to facilitate fault localization.
Autom. Softw. Eng., 2010

Locating need-to-translate constant strings in web applications.
Proceedings of the 18th ACM SIGSOFT International Symposium on Foundations of Software Engineering, 2010

Matching dependence-related queries in the system dependence graph.
Proceedings of the ASE 2010, 2010

A discriminative model approach for accurate duplicate bug report retrieval.
Proceedings of the 32nd ACM/IEEE International Conference on Software Engineering, 2010

JDF: detecting duplicate bug reports in Jazz.
Proceedings of the 32nd ACM/IEEE International Conference on Software Engineering, 2010

2009
Identifying bug signatures using discriminative graph mining.
Proceedings of the Eighteenth International Symposium on Software Testing and Analysis, 2009

TranStrL: An automatic need-to-translate string locator for software internationalization.
Proceedings of the 31st International Conference on Software Engineering, 2009

Locating need-to-translate constant strings for software internationalization.
Proceedings of the 31st International Conference on Software Engineering, 2009

Extracting Paraphrases of Technical Terms from Noisy Parallel Software Corpora.
Proceedings of the ACL 2009, 2009

2008
An approach to detecting duplicate bug reports using natural language and execution information.
Proceedings of the 30th International Conference on Software Engineering (ICSE 2008), 2008


  Loading...