Yangfan Zhou

Orcid: 0000-0002-9184-7383

According to our database1, Yangfan Zhou authored at least 124 papers between 2005 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2024
Fine-MVO: Toward Fine-Grained Feature Enhancement for Self-Supervised Monocular Visual Odometry in Dynamic Environments.
IEEE Trans. Intell. Transp. Syst., October, 2024

rCanary: Detecting Memory Leaks Across Semi-Automated Memory Management Boundary in Rust.
IEEE Trans. Software Eng., September, 2024

A Memory-Disaggregated Radix Tree.
ACM Trans. Storage, August, 2024

Gaining Technological Autonomy and Soci-emotional Support: A Case Study of How and Why Chinese Older Adults Engage with a Semi-acquaintance Online Community.
Proc. ACM Hum. Comput. Interact., 2024

AUITestAgent: Automatic Requirements Oriented GUI Function Testing.
CoRR, 2024

Combating Missed Recalls in E-commerce Search: A CoT-Prompting Testing Approach.
CoRR, 2024

CHIME: A Cache-Efficient and High-Performance Hybrid Index on Disaggregated Memory.
Proceedings of the ACM SIGOPS 30th Symposium on Operating Systems Principles, 2024

Combating Missed Recalls in E-commerce Search: A CoT-Prompting Testing Approach.
Proceedings of the Companion Proceedings of the 32nd ACM International Conference on the Foundations of Software Engineering, 2024

Wapplique: Testing WebAssembly Runtime via Execution Context-Aware Bytecode Mutation.
Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2024

AutoConsis: Automatic GUI-driven Data Inconsistency Detection of Mobile Apps.
Proceedings of the 46th International Conference on Software Engineering: Software Engineering in Practice, 2024

Is unsafe an Achilles' Heel? A Comprehensive Study of Safety Requirements in Unsafe Rust Programming.
Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024

Lite-SVO: Towards A Lightweight Self-Supervised Semantic Visual Odometry Exploiting Multi-Feature Sharing Architecture.
Proceedings of the IEEE International Conference on Robotics and Automation, 2024

A General-Purpose Material Entity Extraction Method from Large Compound Corpora Using Fine Tuning of Character Features.
Proceedings of the Artificial Neural Networks and Machine Learning - ICANN 2024, 2024

Overcoming Barriers, Achieving Goals: A Case Study of an Older User's Technology Autonomy.
Proceedings of the Extended Abstracts of the CHI Conference on Human Factors in Computing Systems, 2024

Enhancing Smartphone Usability for Older Adults: A Voice-Assistant Approach.
Proceedings of the ACM Turing Award Celebration Conference 2024, 2024

2023
Adaptive Data Placement in Multi-Cloud Storage: A Non-Stationary Combinatorial Bandit Approach.
IEEE Trans. Parallel Distributed Syst., November, 2023

FastAdaBelief: Improving Convergence Rate for Belief-Based Adaptive Optimizers by Exploiting Strong Convexity.
IEEE Trans. Neural Networks Learn. Syst., September, 2023

SafeDrop: Detecting Memory Deallocation Bugs of Rust Programs via Static Data-flow Analysis.
ACM Trans. Softw. Eng. Methodol., July, 2023

Randomized block-coordinate adaptive algorithms for nonconvex optimization problems.
Eng. Appl. Artif. Intell., May, 2023

Towards Usable Neural Comment Generation via Code-Comment Linkage Interpretation: Method and Empirical Study.
IEEE Trans. Software Eng., April, 2023

Towards Faster Training Algorithms Exploiting Bandit Sampling From Convex to Strongly Convex Conditions.
IEEE Trans. Emerg. Top. Comput. Intell., April, 2023

GSL-VO: A Geometric-Semantic Information Enhanced Lightweight Visual Odometry in Dynamic Environments.
IEEE Trans. Instrum. Meas., 2023

A Markov random field based method for removing invalid unwrapping phase points in 3D reconstruction.
IET Image Process., 2023

rCanary: Detecting Memory Leaks Across Semi-automated Memory Management Boundary in Rust.
CoRR, 2023

Is unsafe an Achilles' Heel? A Comprehensive Study of Safety Requirements in Unsafe Rust Programming.
CoRR, 2023

FUSEE: A Fully Memory-Disaggregated Key-Value Store (Extended Version).
CoRR, 2023

Ditto: An Elastic and Adaptive Memory-Disaggregated Caching System.
Proceedings of the 29th Symposium on Operating Systems Principles, 2023

Appaction: Automatic GUI Interaction for Mobile Apps via Holistic Widget Perception.
Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2023

SMART: A High-Performance Adaptive Radix Tree for Disaggregated Memory.
Proceedings of the 17th USENIX Symposium on Operating Systems Design and Implementation, 2023

Userspace Bypass: Accelerating Syscall-intensive Applications.
Proceedings of the 17th USENIX Symposium on Operating Systems Design and Implementation, 2023

Revealing Performance Issues in Server-Side WebAssembly Runtimes Via Differential Testing.
Proceedings of the 38th IEEE/ACM International Conference on Automated Software Engineering, 2023

FUSEE: A Fully Memory-Disaggregated Key-Value Store.
Proceedings of the 21st USENIX Conference on File and Storage Technologies, 2023

2022
Decentralized Randomized Block-Coordinate Frank-Wolfe Algorithms for Submodular Maximization Over Networks.
IEEE Trans. Syst. Man Cybern. Syst., 2022

Memory-Safety Challenge Considered Solved? An In-Depth Study with All Rust CVEs.
ACM Trans. Softw. Eng. Methodol., 2022

Unveiling High-speed Follow-up Consultation for Chronic Disease Treatment: A Pediatric Hospital Case in China.
Proc. ACM Hum. Comput. Interact., 2022

How resource utilization influences UI responsiveness of Android software.
Inf. Softw. Technol., 2022

Hybrid Dynamic Bayesian network method for performance analysis of safety barriers considering multi-maintenance strategies.
Eng. Appl. Artif. Intell., 2022

LightAdam: Towards a Fast and Accurate Adaptive Momentum Online Algorithm.
Cogn. Comput., 2022

Muffin: Testing Deep Learning Libraries via Neural Architecture Fuzzing.
Proceedings of the 44th IEEE/ACM 44th International Conference on Software Engineering, 2022

2021
FastAdaBelief: Improving Convergence Rate for Belief-based Adaptive Optimizer by Strong Convexity.
CoRR, 2021

RULF: Rust Library Fuzzing via API Dependency Graph Traversal.
Proceedings of the 36th IEEE/ACM International Conference on Automated Software Engineering, 2021

Boosting symbolic execution via constraint solving time prediction (experience paper).
Proceedings of the ISSTA '21: 30th ACM SIGSOFT International Symposium on Software Testing and Analysis, 2021

Fast Outage Analysis of Large-scale Production Clouds with Service Correlation Mining.
Proceedings of the 43rd IEEE/ACM International Conference on Software Engineering, 2021

Defuse: A Dependency-Guided Function Scheduler to Mitigate Cold Starts on FaaS Platforms.
Proceedings of the 41st IEEE International Conference on Distributed Computing Systems, 2021

DAda-NC: A Decoupled Adaptive Online Training Algorithm for Deep Learning Under Non-convex Conditions.
Proceedings of the Cognitive Systems and Information Processing, 2021

A Scalable 3D Array Architecture for Accelerating Convolutional Neural Networks.
Proceedings of the Cognitive Systems and Information Processing, 2021

Detecting Deep Neural Network Defects with Data Flow Analysis.
Proceedings of the 51st Annual IEEE/IFIP International Conference on Dependable Systems and Networks Workshops, 2021

Exploring User Experience of Automatic Documentation Tools.
Proceedings of the CHI '21: CHI Conference on Human Factors in Computing Systems, 2021

2020
Benchmarking the Capability of Symbolic Execution Tools with Logic Bombs.
IEEE Trans. Dependable Secur. Comput., 2020

Information Summary for Chronic Disease Treatment: A Pediatric Hospital Case in China.
Proc. ACM Hum. Comput. Interact., 2020

A Randomized Block-Coordinate Adam online learning optimization algorithm.
Neural Comput. Appl., 2020

Online Learning for IoT Optimization: A Frank-Wolfe Adam-Based Algorithm.
IEEE Internet Things J., 2020

Layered obfuscation: a taxonomy of software obfuscation techniques for layered security.
Cybersecur., 2020

Memory-Safety Challenge Considered Solved? An Empirical Study with All Rust CVEs.
CoRR, 2020

Efficient customer incident triage via linking with system incidents.
Proceedings of the ESEC/FSE '20: 28th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2020

Efficient incident identification from multi-dimensional issue reports via meta-heuristic search.
Proceedings of the ESEC/FSE '20: 28th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2020

Towards intelligent incident management: why we need it and how we make it.
Proceedings of the ESEC/FSE '20: 28th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2020

2019
Component-based permission management of Android applications.
Softw. Pract. Exp., 2019

Sparse long short-term memory for information fusion in wireless sensor networks.
Int. J. Distributed Sens. Networks, 2019

Metro maps for efficient knowledge learning by summarizing massive electronic textbooks.
Int. J. Document Anal. Recognit., 2019

Data Sanity Check for Deep Learning Systems via Learnt Assertions.
CoRR, 2019

Detecting Deep Neural Network Defects with Data Flow Analysis.
CoRR, 2019

MPCE: A Maximum Probability Based Cross Entropy Loss Function for Neural Network Classification.
IEEE Access, 2019

iFeedback: Exploiting User Feedback for Real-Time Issue Detection in Large-Scale Online Service Systems.
Proceedings of the 34th IEEE/ACM International Conference on Automated Software Engineering, 2019

Understanding I/O performance of IPFS storage: a client's perspective.
Proceedings of the International Symposium on Quality of Service, 2019

Textout: Detecting Text-Layout Bugs in Mobile Apps via Visualization-Oriented Learning.
Proceedings of the 30th IEEE International Symposium on Software Reliability Engineering, 2019

Let's Chat in Alipay: Understanding Social Function Usage in Task-oriented Apps.
Proceedings of the Extended Abstracts of the 2019 CHI Conference on Human Factors in Computing Systems, 2019

Concept Extraction and Prerequisite Relation Learning from Educational Data.
Proceedings of the Thirty-Third AAAI Conference on Artificial Intelligence, 2019

2018
Efficient Scheduling for Multi-Block Updates in Erasure Coding Based Storage Systems.
IEEE Trans. Computers, 2018

DeepObfuscation: Securing the Structure of Convolutional Neural Networks via Knowledge Distillation.
CoRR, 2018

Mobile Cloud-of-Clouds Storage Made Efficient: A Network Coding Based Approach.
Proceedings of the 37th IEEE Symposium on Reliable Distributed Systems, 2018

Manufacturing Resilient Bi-Opaque Predicates Against Symbolic Execution.
Proceedings of the 48th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2018

Efficient Memory Caching for Erasure Coding Based Key-Value Storage Systems.
Proceedings of the Big Data - 6th CCF Conference, 2018

2017
On Secure and Usable Program Obfuscation: A Survey.
CoRR, 2017

DeepProf: Performance Analysis for Deep Learning Applications via Mining GPU Execution Patterns.
CoRR, 2017

Boosting Collective Entity Linking via Type-Guided Semantic Embedding.
Proceedings of the Natural Language Processing and Chinese Computing, 2017

Perman: Fine-Grained Permission Management for Android Applications.
Proceedings of the 28th IEEE International Symposium on Software Reliability Engineering, 2017

IntelliAd: assisting mobile app developers in measuring ad costs automatically.
Proceedings of the 39th International Conference on Software Engineering, 2017

Concolic Execution on Small-Size Binaries: Challenges and Empirical Study.
Proceedings of the 47th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2017

2016
IntelliAd Understanding In-APP Ad Costs From Users Perspective.
CoRR, 2016

DiagDroid: Android performance diagnosis via anatomizing asynchronous executions.
Proceedings of the 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering, 2016

Bandwidth-aware delayed repair in distributed storage systems.
Proceedings of the 24th IEEE/ACM International Symposium on Quality of Service, 2016

Experience Report: Detecting Poor-Responsive UI in Android Applications.
Proceedings of the 27th IEEE International Symposium on Software Reliability Engineering, 2016

Cloud-of-Clouds Storage Made Efficient: A Pipeline-Based Approach.
Proceedings of the IEEE International Conference on Web Services, 2016

How does regression test prioritization perform in real-world software evolution?
Proceedings of the 38th International Conference on Software Engineering, 2016

N-version Obfuscation.
Proceedings of the 2nd ACM International Workshop on Cyber-Physical System Security, 2016

2015
Towards Operational Cost Minimization in Hybrid Clouds for Dynamic Resource Provisioning with Delay-Aware Optimization.
IEEE Trans. Serv. Comput., 2015

N-Version Obfuscation: Impeding Software Tampering Replication with Program Diversity.
CoRR, 2015

PersisDroid: Android Performance Diagnosis via Anatomizing Asynchronous Executions.
CoRR, 2015

A low power global shutter pixel with extended FD voltage swing range for large format high speed CMOS image sensor.
Sci. China Inf. Sci., 2015

AR-Tracker: Track the Dynamics of Mobile Apps via User Review Mining.
Proceedings of the 2015 IEEE Symposium on Service-Oriented System Engineering, 2015

SpyAware: Investigating the privacy leakage signatures in app execution traces.
Proceedings of the 26th IEEE International Symposium on Software Reliability Engineering, 2015

PAID: Prioritizing app issues for developers by tracking user reviews over versions.
Proceedings of the 26th IEEE International Symposium on Software Reliability Engineering, 2015

2014
An Automatic Framework for Detecting and Characterizing Performance Degradation of Software Systems.
IEEE Trans. Reliab., 2014

A high speed 1000 fps CMOS image sensor with low noise global shutter pixels.
Sci. China Inf. Sci., 2014

Towards Continuous and Passive Authentication via Touch Biometrics: An Experimental Study on Smartphones.
Proceedings of the Tenth Symposium on Usable Privacy and Security, 2014

Automatic Detecting Performance Bugs in Cloud Computing Systems via Learning Latency Specification Model.
Proceedings of the 8th IEEE International Symposium on Service Oriented System Engineering, 2014

Delay-Aware Cost Optimization for Dynamic Resource Provisioning in Hybrid Clouds.
Proceedings of the 2014 IEEE International Conference on Web Services, 2014

Granger Causality-Aware Prediction and Diagnosis of Software Degradation.
Proceedings of the IEEE International Conference on Services Computing, SCC 2014, Anchorage, AK, USA, June 27, 2014

2013
Toward Fine-Grained, Unsupervised, Scalable Performance Diagnosis for Production Cloud Computing Systems.
IEEE Trans. Parallel Distributed Syst., 2013

MDiag: Mobility-assisted diagnosis for wireless sensor networks.
J. Netw. Comput. Appl., 2013

An online service-oriented performance profiling tool for cloud computing systems.
Frontiers Comput. Sci., 2013

Scaling Service-Oriented Applications into Geo-distributed Clouds.
Proceedings of the Seventh IEEE International Symposium on Service-Oriented System Engineering, 2013

2012
Localizing root causes of performance anomalies in cloud computing systems by analyzing request trace logs.
Sci. China Inf. Sci., 2012

Online Protocol Verification in Wireless Sensor Networks via Non-intrusive Behavior Profiling.
Proceedings of the Wireless Algorithms, Systems, and Applications, 2012

P-Tracer: Path-Based Performance Profiling in Cloud Computing Systems.
Proceedings of the 36th Annual IEEE Computer Software and Applications Conference, 2012

2011
RealProct: Reliable Protocol Conformance Testing with Real Nodes for Wireless Sensor Networks.
Proceedings of the IEEE 10th International Conference on Trust, 2011

Design of four-transistor Pixel for high speed CMOS image.
Proceedings of the 2011 IEEE 9th International Conference on ASIC, 2011

Magnifier: Online Detection of Performance Problems in Large-Scale Cloud Computing Systems.
Proceedings of the IEEE International Conference on Services Computing, 2011

A User Experience-Based Cloud Service Redeployment Mechanism.
Proceedings of the IEEE International Conference on Cloud Computing, 2011

2010
A delay-aware reliable event reporting framework for wireless sensor-actuator networks.
Ad Hoc Networks, 2010

Sentomist: Unveiling Transient Sensor Network Bugs via Symptom Mining.
Proceedings of the 2010 International Conference on Distributed Computing Systems, 2010

Online Self-Reconfiguration with Performance Guarantee for Energy-Efficient Large-Scale Cloud Computing Data Centers.
Proceedings of the 2010 IEEE International Conference on Services Computing, 2010

2009
On Sensor Network Reconfiguration for Downtime-Free System Migration.
Mob. Networks Appl., 2009

Energy-efficient On-demand Active Contour Service for Sensor Networks.
Proceedings of the IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, 2009

Surviving Holes and Barriers in Geographic Data Reporting for Wireless Sensor Networks.
Proceedings of the IEEE 6th International Conference on Mobile Adhoc and Sensor Systems, 2009

2008
On sensor network reconfiguration for downtime-free system migrations.
Proceedings of the 5th International ICST Conference on Heterogeneous Networking for Quality, 2008

An Index-Based Sensor-Grouping Mechanism for Efficient Field-Coverage Wireless Sensor Networks.
Proceedings of IEEE International Conference on Communications, 2008

2007
POWER-SPEED: A Power-Controlled Real-Time Data Transport Protocol for Wireless Sensor-Actuator Networks.
Proceedings of the IEEE Wireless Communications and Networking Conference, 2007

LOFT: A Latency-Oriented Fault Tolerant Transport Protocol for Wireless Sensor-Actuator Networks.
Proceedings of the Global Communications Conference, 2007

2006
Reliable Reporting of Delay-Sensitive Events in Wireless Sensor-Actuator Networks.
Proceedings of the IEEE 3rd International Conference on Mobile Adhoc and Sensor Systems, 2006

A point-distribution index and its application to sensor-grouping in wireless sensor networks.
Proceedings of the International Conference on Wireless Communications and Mobile Computing, 2006

2005
On setting up energy-efficient paths with transmitter power control in wireless sensor networks.
Proceedings of the IEEE 2nd International Conference on Mobile Adhoc and Sensor Systems, 2005

PORT: A Price-Oriented Reliable Transport Protocol for Wireless Sensor Networks.
Proceedings of the 16th International Symposium on Software Reliability Engineering (ISSRE 2005), 2005


  Loading...