Yinxing Xue

Orcid: 0000-0002-2979-7151

According to our database1, Yinxing Xue authored at least 81 papers between 2009 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
sGuard+: Machine Learning Guided Rule-Based Automated Vulnerability Repair on Smart Contracts.
ACM Trans. Softw. Eng. Methodol., June, 2024

FedLC: Accelerating Asynchronous Federated Learning in Edge Computing.
IEEE Trans. Mob. Comput., May, 2024

Like Attracts Like: Personalized Federated Learning in Decentralized Edge Computing.
IEEE Trans. Mob. Comput., February, 2024

xFuzz: Machine Learning Guided Cross-Contract Fuzzing.
IEEE Trans. Dependable Secur. Comput., 2024

Making vulnerability prediction more practical: Prediction, categorization, and localization.
Inf. Softw. Technol., 2024

LeGEND: A Top-Down Approach to Scenario Generation of Autonomous Driving Systems Assisted by Large Language Models.
CoRR, 2024

Conformance Testing of Relational DBMS Against SQL Specifications.
CoRR, 2024

A Cross-Language Investigation into Jailbreak Attacks in Large Language Models.
CoRR, 2024

GenSeg: On Generating Unified Adversary for Segmentation.
Proceedings of the Thirty-Third International Joint Conference on Artificial Intelligence, 2024

Rust-lancet: Automated Ownership-Rule-Violation Fixing with Behavior Preservation.
Proceedings of the 46th IEEE/ACM International Conference on Software Engineering, 2024

2023
A Survey on Automated Driving System Testing: Landscapes and Trends.
ACM Trans. Softw. Eng. Methodol., September, 2023

CCStokener: Fast yet accurate code clone detection with semantic token.
J. Syst. Softw., May, 2023

Challenging Machine Learning-Based Clone Detectors via Semantic-Preserving Code Transformations.
IEEE Trans. Software Eng., 2023

Adaptive Batch Size for Federated Learning in Resource-Constrained Edge Computing.
IEEE Trans. Mob. Comput., 2023

Prediction of Vulnerability Characteristics Based on Vulnerability Description and Prompt Learning.
Proceedings of the IEEE International Conference on Software Analysis, 2023

From Collision to Verdict: Responsibility Attribution for Autonomous Driving Systems Testing.
Proceedings of the 34th IEEE International Symposium on Software Reliability Engineering, 2023

EvoScenario: Integrating Road Structures into Critical Scenario Generation for Autonomous Driving System Testing.
Proceedings of the 34th IEEE International Symposium on Software Reliability Engineering, 2023

Comparison and Evaluation of Clone Detection Techniques with Different Code Representations.
Proceedings of the 45th IEEE/ACM International Conference on Software Engineering, 2023

DeepArc: Modularizing Neural Networks for the Model Maintenance.
Proceedings of the 45th IEEE/ACM International Conference on Software Engineering, 2023

Read It, Don't Watch It: Captioning Bug Recordings Automatically.
Proceedings of the 45th IEEE/ACM International Conference on Software Engineering, 2023

2022
Vulpedia: Detecting vulnerable ethereum smart contracts via abstracted vulnerability signatures.
J. Syst. Softw., 2022

Multi-objective integer programming approaches to Next Release Problem - Enhancing exact methods for finding whole pareto front.
Inf. Softw. Technol., 2022

On the usage and development of deep learning compilers: an empirical study on TVM.
Empir. Softw. Eng., 2022

Unleashing the power of pseudo-code for binary code similarity analysis.
Cybersecur., 2022

PRCBERT: Prompt Learning for Requirement Classification using BERT-based Pretrained Language Models.
Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering, 2022

Message from the RAIS 2022 Chairs.
Proceedings of the IEEE International Symposium on Software Reliability Engineering Workshops, 2022

2021
Erratum to "Accurate and Scalable Cross-Architecture Cross-OS Binary Code Search With Emulation".
IEEE Trans. Software Eng., 2021

Machine Learning Guided Cross-Contract Fuzzing.
CoRR, 2021

APICraft: Fuzz Driver Generation for Closed-source SDK Libraries.
Proceedings of the 30th USENIX Security Symposium, 2021

An empirical study of GUI widget detection for industrial mobile games.
Proceedings of the ESEC/FSE '21: 29th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2021

A lightweight framework for function name reassignment based on large-scale stripped binaries.
Proceedings of the ISSTA '21: 30th ACM SIGSOFT International Symposium on Software Testing and Analysis, 2021

Issue Categorization and Analysis of an Open-Source Driving Assistant System.
Proceedings of the IEEE International Symposium on Software Reliability Engineering, 2021

2020
A Software Analysis Based Vulnerability Detection System For Smart Contracts.
Proceedings of the Integrating Research and Practice in Software Engineering, 2020

Ant Colony System With Sorting-Based Local Search for Coverage-Based Test Case Prioritization.
IEEE Trans. Reliab., 2020

Multi-objective Integer Programming Approaches for Solving the Multi-criteria Test-suite Minimization Problem: Towards Sound and Complete Solutions of a Particular Search-based Software-engineering Problem.
ACM Trans. Softw. Eng. Methodol., 2020

MUZZ: Thread-aware Grey-box Fuzzing for Effective Bug Hunting in Multithreaded Programs.
Proceedings of the 29th USENIX Security Symposium, 2020

CCGraph: a PDG-based code clone detector with approximate graph matching.
Proceedings of the 35th IEEE/ACM International Conference on Automated Software Engineering, 2020

Cross-Contract Static Analysis for Detecting Practical Reentrancy Vulnerabilities in Smart Contracts.
Proceedings of the 35th IEEE/ACM International Conference on Automated Software Engineering, 2020

How are Deep Learning Models Similar?: An Empirical Study on Clone Analysis of Deep Learning Software.
Proceedings of the ICPC '20: 28th International Conference on Program Comprehension, 2020

Clairvoyance: cross-contract static analysis for detecting practical reentrancy vulnerabilities in smart contracts.
Proceedings of the ICSE '20: 42nd International Conference on Software Engineering, Companion Volume, Seoul, South Korea, 27 June, 2020

An empirical assessment of security risks of global Android banking apps.
Proceedings of the ICSE '20: 42nd International Conference on Software Engineering, Seoul, South Korea, 27 June, 2020

2019
Accurate and Scalable Cross-Architecture Cross-OS Binary Code Search with Emulation.
IEEE Trans. Software Eng., 2019

Securing Android App Markets via Modeling and Predicting Malware Spread Between Markets.
IEEE Trans. Inf. Forensics Secur., 2019

Doublade: Unknown Vulnerability Detection in Smart Contracts Via Abstract Signature Matching and Refined Detection Rules.
CoRR, 2019

Cerebro: context-aware adaptive fuzzing for effective vulnerability detection.
Proceedings of the ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2019

Towards Automated Generation of Bug Benchmark for Smart Contracts.
Proceedings of the 2019 IEEE International Conference on Software Testing, 2019

2018
AUSERA: Large-Scale Automated Security Risk Assessment of Global Mobile Banking Apps.
CoRR, 2018

FOT: a versatile, configurable, extensible fuzzing framework.
Proceedings of the 2018 ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2018

Multi-objective integer programming approaches for solving optimal feature selection problem: a new perspective on multi-objective optimization problems in SBSE.
Proceedings of the 40th International Conference on Software Engineering, 2018

Hawkeye: Towards a Desired Directed Grey-box Fuzzer.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

2017
Auditing Anti-Malware Tools by Evolving Android Malware and Dynamic Loading Technique.
IEEE Trans. Inf. Forensics Secur., 2017

AndroVault: Constructing Knowledge Graph from Millions of Android Apps for Automated Analysis.
CoRR, 2017

Mining implicit design templates for actionable code reuse.
Proceedings of the 32nd IEEE/ACM International Conference on Automated Software Engineering, 2017

JSFox: integrating static and dynamic type analysis of JavaScript programs.
Proceedings of the 39th International Conference on Software Engineering, 2017

Feedback-based debugging.
Proceedings of the 39th International Conference on Software Engineering, 2017

2016
IBED: Combining IBEA and DE for optimal feature selection in software product line engineering.
Appl. Soft Comput., 2016

BinGo: cross-architecture cross-OS binary search.
Proceedings of the 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering, 2016

Semantic modelling of Android malware for effective malware comprehension, detection, and classification.
Proceedings of the 25th International Symposium on Software Testing and Analysis, 2016

Optimizing selection of competing services with probabilistic hierarchical refinement.
Proceedings of the 38th International Conference on Software Engineering, 2016

Mystique: Evolving Android Malware for Auditing Anti-Malware Tools.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

2015
Detection and classification of malicious JavaScript via attack behavior modelling.
Proceedings of the 2015 International Symposium on Software Testing and Analysis, 2015

Optimizing selection of competing features via feedback-directed evolutionary algorithms.
Proceedings of the 2015 International Symposium on Software Testing and Analysis, 2015

An Adaptive Markov Strategy for Effective Network Intrusion Detection.
Proceedings of the 27th IEEE International Conference on Tools with Artificial Intelligence, 2015

JSDC: A Hybrid Approach for JavaScript Malware Detection and Classification.
Proceedings of the 10th ACM Symposium on Information, 2015

2014
Practice and Evaluation of Pagelet-Based Client-Side Rendering Mechanism.
IEICE Trans. Inf. Syst., 2014

Detecting differences across multiple instances of code clones.
Proceedings of the 36th International Conference on Software Engineering, 2014

2013
Mashup Technology: Beyond Open Programming Interfaces.
Computer, 2013

Distilling useful clones by contextual differencing.
Proceedings of the 20th Working Conference on Reverse Engineering, 2013

A large scale Linux-kernel based benchmark for feature location research.
Proceedings of the 35th International Conference on Software Engineering, 2013

2012
Feature Location in a Collection of Product Variants.
Proceedings of the 19th Working Conference on Reverse Engineering, 2012

Client-Side Rendering Mechanism: A Double-Edged Sword for Browser-Based Web Applications.
Proceedings of the 24th International Conference on Software Engineering & Knowledge Engineering (SEKE'2012), 2012

2011
Scalability of Variability Management: An Example of Industrial Practice and Some Improvements.
Proceedings of the 23rd International Conference on Software Engineering & Knowledge Engineering (SEKE'2011), 2011

CloneDifferentiator: Analyzing clones by differentiation.
Proceedings of the 26th IEEE/ACM International Conference on Automated Software Engineering (ASE 2011), 2011

CloneDiff: semantic differencing of clones.
Proceedings of the Proceeding of the 5th ICSE International Workshop on Software Clones, 2011

Improving Product Line Architecture Design and Customization by Raising the Level of Variability Modeling.
Proceedings of the Top Productivity through Software Reuse, 2011

Reengineering legacy software products into software product line based on automatic variability analysis.
Proceedings of the 33rd International Conference on Software Engineering, 2011

2010
Understanding Feature Evolution in a Family of Product Variants.
Proceedings of the 17th Working Conference on Reverse Engineering, 2010

Are clones harmful for maintenance?
Proceedings of the Proceeding of the 4th ICSE International Workshop on Software Clones, 2010

2009
A Case Study of Variation Mechanism in an Industrial Product Line.
Proceedings of the Formal Foundations of Reuse and Domain Engineering, 2009

Increasing usability of preprocessing for feature management in product lines with queries.
Proceedings of the 31st International Conference on Software Engineering, 2009

Avoiding Some Common Preprocessing Pitfalls with Feature Queries.
Proceedings of the 16th Asia-Pacific Software Engineering Conference, 2009


  Loading...