Yun Lin

Orcid: 0000-0001-8255-0118

Affiliations:
  • Shanghai Jiao Tong University, China
  • National University of Singapore, School of Computing, Singapore (former)


According to our database1, Yun Lin authored at least 58 papers between 2014 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
A prompt-based approach to adversarial example generation and robustness enhancement.
Frontiers Comput. Sci., August, 2024

Forgetting Through Transforming: Enabling Federated Unlearning via Class-Aware Representation Transformation.
CoRR, 2024

LLM-based Abstraction and Concretization for GUI Test Migration.
CoRR, 2024

Contribution Evaluation of Heterogeneous Participants in Federated Learning via Prototypical Representations.
CoRR, 2024

Towards Large Language Model Aided Program Refinement.
CoRR, 2024

Towards Transferable Attacks Against Vision-LLMs in Autonomous Driving with Typography.
CoRR, 2024

A Symbolic Rule Integration Framework with Logic Transformer for Inductive Relation Prediction.
Proceedings of the ACM on Web Conference 2024, 2024

PhishDecloaker: Detecting CAPTCHA-cloaked Phishing Websites via Hybrid Vision-based Interactive Models.
Proceedings of the 33rd USENIX Security Symposium, 2024

Less Defined Knowledge and More True Alarms: Reference-based Phishing Detection without a Pre-defined Reference List.
Proceedings of the 33rd USENIX Security Symposium, 2024

C2D2: Extracting Critical Changes for Real-World Bugs with Dependency-Sensitive Delta Debugging.
Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2024

CoEdPilot: Recommending Code Edits with Learned Prior Edit Relevance, Project-wise Awareness, and Interactive Nature.
Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2024

2023
Demystifying Performance Regressions in String Solvers.
IEEE Trans. Software Eng., March, 2023

Knowledge Expansion and Counterfactual Interaction for Reference-Based Phishing Detection.
Proceedings of the 32nd USENIX Security Symposium, 2023

DeepDebugger: An Interactive Time-Travelling Debugging Approach for Deep Classifiers.
Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2023

API-Knowledge Aware Search-Based Software Testing: Where, What, and How.
Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2023

On-the-Fly Adapting Code Summarization on Trainable Cost-Effective Language Models.
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023

Empower Post-hoc Graph Explanations with Information Bottleneck: A Pre-training and Fine-tuning Perspective.
Proceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2023

B<sup>2</sup>-Sampling: Fusing Balanced and Biased Sampling for Graph Contrastive Learning.
Proceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2023

BugMiner: Automating Precise Bug Dataset Construction by Code Evolution History Mining.
Proceedings of the 38th IEEE/ACM International Conference on Automated Software Engineering, 2023

DeepArc: Modularizing Neural Networks for the Model Maintenance.
Proceedings of the 45th IEEE/ACM International Conference on Software Engineering, 2023

Sports Analytics Using Probabilistic Model Checking and Deep Learning.
Proceedings of the 27th International Conference on Engineering of Complex Computer Systems, 2023

Insight Analysis for Tennis Strategy and Tactics.
Proceedings of the IEEE International Conference on Data Mining, 2023

2022
Stochastic Ghost Batch for Self-distillation with Dynamic Soft Label.
Knowl. Based Syst., 2022

Vulpedia: Detecting vulnerable ethereum smart contracts via abstracted vulnerability signatures.
J. Syst. Softw., 2022

Adversarial Robustness of Deep Neural Networks: A Survey from a Formal Verification Perspective.
CoRR, 2022

A Prompting-based Approach for Adversarial Example Generation and Robustness Enhancement.
CoRR, 2022

Inferring Phishing Intention via Webpage Appearance and Dynamics: A Deep Vision Based Approach.
Proceedings of the 31st USENIX Security Symposium, 2022

RegMiner: mining replicable regression dataset from code repositories.
Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2022

Debugging and Explaining Metric Learning Approaches: An Influence Function Based Perspective.
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022

Repairing Failure-inducing Inputs with Input Reflection.
Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering, 2022

RegMiner: towards constructing a large regression dataset from code evolution history.
Proceedings of the ISSTA '22: 31st ACM SIGSOFT International Symposium on Software Testing and Analysis, Virtual Event, South Korea, July 18, 2022

Temporality Spatialization: A Scalable and Faithful Time-Travelling Visualization for Deep Classifier Training.
Proceedings of the Thirty-First International Joint Conference on Artificial Intelligence, 2022

gDefects4DL: A Dataset of General Real-World Deep Learning Program Defects.
Proceedings of the 44th IEEE/ACM International Conference on Software Engineering: Companion Proceedings, 2022

DeepVisualInsight: Time-Travelling Visualization for Spatio-Temporal Causality of Deep Classification Training.
Proceedings of the Thirty-Sixth AAAI Conference on Artificial Intelligence, 2022

2021
Explaining Regressions via Alignment Slicing and Mending.
IEEE Trans. Software Eng., 2021

Adversarial Adaptive Neighborhood With Feature Importance-Aware Convex Interpolation.
IEEE Trans. Inf. Forensics Secur., 2021

Generalizing Neural Networks by Reflecting Deviating Data in Production.
CoRR, 2021

Constructing Regression Dataset from Code Evolution History.
CoRR, 2021

Phishpedia: A Hybrid Deep Learning Based Approach to Visually Identify Phishing Webpages.
Proceedings of the 30th USENIX Security Symposium, 2021

Graph-based seed object synthesis for search-based unit testing.
Proceedings of the ESEC/FSE '21: 29th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2021

A First Look at the Effect of Deep Learning in Coverage-guided Fuzzing.
Proceedings of the 36th IEEE/ACM International Conference on Automated Software Engineering, 2021

Self-Checking Deep Neural Networks in Deployment.
Proceedings of the 43rd IEEE/ACM International Conference on Software Engineering, 2021

2020
Cross-Contract Static Analysis for Detecting Practical Reentrancy Vulnerabilities in Smart Contracts.
Proceedings of the 35th IEEE/ACM International Conference on Automated Software Engineering, 2020

Recovering fitness gradients for interprocedural Boolean flags in search-based testing.
Proceedings of the ISSTA '20: 29th ACM SIGSOFT International Symposium on Software Testing and Analysis, 2020

Clairvoyance: cross-contract static analysis for detecting practical reentrancy vulnerabilities in smart contracts.
Proceedings of the ICSE '20: 42nd International Conference on Software Engineering, Companion Volume, Seoul, South Korea, 27 June, 2020

sFuzz: an efficient adaptive fuzzer for solidity smart contracts.
Proceedings of the ICSE '20: 42nd International Conference on Software Engineering, Seoul, South Korea, 27 June, 2020

CoinWatch: A Clone-Based Approach For Detecting Vulnerabilities in Cryptocurrencies.
Proceedings of the IEEE International Conference on Blockchain, 2020

2019
Doublade: Unknown Vulnerability Detection in Smart Contracts Via Abstract Signature Matching and Refined Detection Rules.
CoRR, 2019

Smart Grid Metering Networks: A Survey on Security, Privacy and Open Research Issues.
IEEE Commun. Surv. Tutorials, 2019

Locating vulnerabilities in binaries via memory layout recovering.
Proceedings of the ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2019

2018
Break the dead end of dynamic slicing: localizing data and control omission bug.
Proceedings of the 33rd ACM/IEEE International Conference on Automated Software Engineering, 2018

Towards optimal concolic testing.
Proceedings of the 40th International Conference on Software Engineering, 2018

2017
Mining implicit design templates for actionable code reuse.
Proceedings of the 32nd IEEE/ACM International Conference on Automated Software Engineering, 2017

Feedback-based debugging.
Proceedings of the 39th International Conference on Software Engineering, 2017

2016
Interactive and guided architectural refactoring with search-based recommendation.
Proceedings of the 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering, 2016

2015
Clone-based and interactive recommendation for modifying pasted code.
Proceedings of the 2015 10th Joint Meeting on Foundations of Software Engineering, 2015

2014
Clonepedia: Summarizing Code Clones by Common Syntactic Context for Software Maintenance.
Proceedings of the 30th IEEE International Conference on Software Maintenance and Evolution, Victoria, BC, Canada, September 29, 2014

Detecting differences across multiple instances of code clones.
Proceedings of the 36th International Conference on Software Engineering, 2014


  Loading...