Zijiang Yang

Orcid: 0009-0002-5437-0253

Affiliations:
  • Xi'an Jiaotong University, School of Computer Science, China
  • GuardStrike Inc., Xi'an, China
  • Western Michigan University, Kalamazoo, MI, USA (former)
  • University of Pennsylvania, PA, USA (PhD)


According to our database1, Zijiang Yang authored at least 120 papers between 2000 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
EASE: An Effort-aware Extension of Unsupervised Key Class Identification Approaches.
ACM Trans. Softw. Eng. Methodol., May, 2024

IconDM: Text-Guided Icon Set Expansion Using Diffusion Models.
Proceedings of the 32nd ACM International Conference on Multimedia, MM 2024, Melbourne, VIC, Australia, 28 October 2024, 2024

2023
Specification-Based Autonomous Driving System Testing.
IEEE Trans. Software Eng., June, 2023

Pride: Prioritizing Documentation Effort Based on a PageRank-Like Algorithm and Simple Filtering Rules.
IEEE Trans. Software Eng., March, 2023

LayoutPrompter: Awaken the Design Ability of Large Language Models.
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023

Identifying Key Classes for Initial Software Comprehension: Can We Do It Better?
Proceedings of the 45th IEEE/ACM International Conference on Software Engineering, 2023

LayoutFormer++: Conditional Graphic Layout Generation via Constraint Serialization and Decoding Space Restriction.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2023

Sound Predictive Fuzzing for Multi-threaded Programs.
Proceedings of the 47th IEEE Annual Computers, Software, and Applications Conference, 2023

2022
Comments on "Using $k$k-Core Decomposition on Class Dependency Networks to Improve Bug Prediction Model's Practical Performance".
IEEE Trans. Software Eng., 2022

ConcSpectre: Be Aware of Forthcoming Malware Hidden in Concurrent Programs.
IEEE Trans. Reliab., 2022

UniLayout: Taming Unified Sequence-to-Sequence Transformers for Graphic Layout Generation.
CoRR, 2022

LawBreaker: An Approach for Specifying Traffic Laws and Fuzzing Autonomous Vehicles.
Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering, 2022

Explanation-Guided Fairness Testing through Genetic Algorithm.
Proceedings of the 44th IEEE/ACM 44th International Conference on Software Engineering, 2022

2021
Explaining Regressions via Alignment Slicing and Mending.
IEEE Trans. Software Eng., 2021

ElementRank: Ranking Java Software Classes and Packages using a Multilayer Complex Network-Based Approach.
IEEE Trans. Software Eng., 2021

Semantic Learning and Emulation Based Cross-Platform Binary Vulnerability Seeker.
IEEE Trans. Software Eng., 2021

Detecting concurrency vulnerabilities based on partial orders of memory and thread events.
Proceedings of the ESEC/FSE '21: 29th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2021

sVerify: Verifying Smart Contracts Through Lazy Annotation and Learning.
Proceedings of the Leveraging Applications of Formal Methods, Verification and Validation, 2021

Chase: A Large-Scale and Pragmatic Chinese Dataset for Cross-Database Context-Dependent Text-to-SQL.
Proceedings of the 59th Annual Meeting of the Association for Computational Linguistics and the 11th International Joint Conference on Natural Language Processing, 2021

2020
Tell You a Definite Answer: Whether Your Data is Tainted During Thread Scheduling.
IEEE Trans. Software Eng., 2020

Relation-based test case prioritization for regression testing.
J. Syst. Softw., 2020

Automatic Buffer Overflow Warning Validation.
J. Comput. Sci. Technol., 2020

Scalable attack on graph data by injecting vicious nodes.
Data Min. Knowl. Discov., 2020

A Study on Testing Autonomous Driving Systems.
Proceedings of the 20th IEEE International Conference on Software Quality, 2020

Early Detection of Smart Ponzi Scheme Contracts Based on Behavior Forest Similarity.
Proceedings of the 20th IEEE International Conference on Software Quality, 2020

From Innovations to Prospects: What Is Hidden Behind Cryptocurrencies?
Proceedings of the MSR '20: 17th International Conference on Mining Software Repositories, 2020

ObjSim: efficient testing of cyber-physical systems.
Proceedings of the ISSTA '20: 29th ACM SIGSOFT International Symposium on Software Testing and Analysis, 2020

2019
Is deep learning better than traditional approaches in tag recommendation for software information sites?
Inf. Softw. Technol., 2019

Software defect prediction based on kernel PCA and weighted extreme learning machine.
Inf. Softw. Technol., 2019

CONVUL: An Effective Tool for Detecting Concurrency Vulnerabilities.
Proceedings of the 34th IEEE/ACM International Conference on Automated Software Engineering, 2019

Sara: self-replay augmented record and replay for Android in industrial cases.
Proceedings of the 28th ACM SIGSOFT International Symposium on Software Testing and Analysis, 2019

Engineering a Better Fuzzer with Synergically Integrated Optimizations.
Proceedings of the 30th IEEE International Symposium on Software Reliability Engineering, 2019

sCompile: Critical Path Identification and Analysis for Smart Contracts.
Proceedings of the Formal Methods and Software Engineering, 2019

2018
Data used in PackageRank: Ranking Software Packages for Maintenance based on Multilayer Software Networks.
Dataset, November, 2018

Eliminating Path Redundancy via Postconditioned Symbolic Execution.
IEEE Trans. Software Eng., 2018

Reviving Sequential Program Birthmarking for Multithreaded Software Plagiarism Detection.
IEEE Trans. Software Eng., 2018

Guest editorial: special issue on concurrent software quality.
Softw. Qual. J., 2018

Localizing multiple software faults based on evolution algorithm.
J. Syst. Softw., 2018

sCompile: Critical Path Identification and Analysis for Smart Contracts.
CoRR, 2018

FastTagRec: fast tag recommendation for software information sites.
Autom. Softw. Eng., 2018

Debugging Multithreaded Programs as if They Were Sequential.
IEEE Access, 2018

Automated localization for unreproducible builds.
Proceedings of the 40th International Conference on Software Engineering, 2018

Test Case Prioritization Based on Method Call Sequences.
Proceedings of the 2018 IEEE 42nd Annual Computer Software and Applications Conference, 2018

2017
Dependence Guided Symbolic Execution.
IEEE Trans. Software Eng., 2017

The Bayesian Network based program dependence graph and its application to fault localization.
J. Syst. Softw., 2017

A High-Level Rule-based Language for Software Defined Network Programming based on OpenFlow.
CoRR, 2017

Scalable tag recommendation for software information sites.
Proceedings of the IEEE 24th International Conference on Software Analysis, 2017

AtexRace: across thread and execution sampling for in-house race detection.
Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering, 2017

Memory Distance Measurement for Concurrent Programs.
Proceedings of the Languages and Compilers for Parallel Computing, 2017

Systematic reduction of GUI test sequences.
Proceedings of the 32nd IEEE/ACM International Conference on Automated Software Engineering, 2017

Learning from Imbalanced Data for Predicting the Number of Software Defects.
Proceedings of the 28th IEEE International Symposium on Software Reliability Engineering, 2017

Automated Testing of Definition-Use Data Flow for Multithreaded Programs.
Proceedings of the 2017 IEEE International Conference on Software Testing, 2017

What causes my test alarm?: automatic cause analysis for test alarms in system and integration testing.
Proceedings of the 39th International Conference on Software Engineering, 2017

2016
Improving Linguistic Pairwise Comparison Consistency via Linguistic Discrete Regions.
IEEE Trans. Fuzzy Syst., 2016

Exploiting thread-related system calls for plagiarism detection of multithreaded programs.
J. Syst. Softw., 2016

A Multi-Source Approach for Bug Triage.
Int. J. Softw. Eng. Knowl. Eng., 2016

Debugging Multithreaded Programs as if They Were Sequential.
Proceedings of the International Conference on Software Analysis, Testing and Evolution, 2016

GUICat: GUI testing as a service.
Proceedings of the 31st IEEE/ACM International Conference on Automated Software Engineering, 2016

Radius aware probabilistic testing of deadlocks with guarantees.
Proceedings of the 31st IEEE/ACM International Conference on Automated Software Engineering, 2016

Bayesian Network Based Program Dependence Graph for Fault Localization.
Proceedings of the 2016 IEEE International Symposium on Software Reliability Engineering Workshops, 2016

The Impact of Feature Selection on Defect Prediction Performance: An Empirical Comparison.
Proceedings of the 27th IEEE International Symposium on Software Reliability Engineering, 2016

A new thread-aware birthmark for plagiarism detection of multithreaded programs.
Proceedings of the 38th International Conference on Software Engineering, 2016

2015
Software Plagiarism Detection with Birthmarks Based on Dynamic Key Instruction Sequences.
IEEE Trans. Software Eng., 2015

Explaining Software Failures by Cascade Fault Localization.
ACM Trans. Design Autom. Electr. Syst., 2015

Exploring community structure of software Call Graph and its applications in class cohesion measurement.
J. Syst. Softw., 2015

Policy analysis for administrative role based access control without separate administration.
J. Comput. Secur., 2015

Assertion guided symbolic execution of multithreaded programs.
Proceedings of the 2015 10th Joint Meeting on Foundations of Software Engineering, 2015

Postconditioned Symbolic Execution.
Proceedings of the 8th IEEE International Conference on Software Testing, 2015

A Synergistic Analysis Method for Explaining Failed Regression Tests.
Proceedings of the 37th IEEE/ACM International Conference on Software Engineering, 2015

2014
Reducing Test Cases with Causality Partitions.
Proceedings of the 26th International Conference on Software Engineering and Knowledge Engineering, 2014

Plagiarism detection for multithreaded software based on thread-aware software birthmarks.
Proceedings of the 22nd International Conference on Program Comprehension, 2014

Directed test suite augmentation via exploiting program dependency.
Proceedings of the 6th International Workshop on Constraints in Software Testing, 2014

2013
Trustworthy and Dynamic Mobile Task Scheduling in Data-Intensive Scientific Workflow Environments.
Int. J. Comput. Their Appl., 2013

Symbolic Analysis of Concurrency Errors in OpenMP Programs.
Proceedings of the 42nd International Conference on Parallel Processing, 2013

A discrete region-based approach to improve the consistency of pair-wise comparison matrix.
Proceedings of the FUZZ-IEEE 2013, 2013

Policy Analysis for Administrative Role Based Access Control without Separate Administration.
Proceedings of the Data and Applications Security and Privacy XXVII, 2013

2012
Deterministic replay for message-passing-based concurrent programs.
ACM Trans. Design Autom. Electr. Syst., 2012

Software structure evaluation based on the interaction and encapsulation of methods.
Sci. China Inf. Sci., 2012

2011
HEAT: a combined approach for thread escape analysis.
Int. J. Syst. Assur. Eng. Manag., 2011

Model Checking Approach to Secure Host Access Enforcement of Mobile Tasks in Scientific Workflows.
Int. J. Comput. Their Appl., 2011

Generating Data Race Witnesses by an SMT-Based Analysis.
Proceedings of the NASA Formal Methods, 2011

Deterministic replay for MCAPI programs.
Proceedings of the 9th Workshop on Parallel and Distributed Systems: Testing, 2011

SAM: Self-adaptive Dynamic Analysis for Multithreaded Programs.
Proceedings of the Hardware and Software: Verification and Testing, 2011

Offline symbolic analysis to infer Total Store Order.
Proceedings of the 17th International Conference on High-Performance Computer Architecture (HPCA-17 2011), 2011

2010
Information flow analysis of scientific workflows.
J. Comput. Syst. Sci., 2010

Opportunistic resource utilization networks - A new paradigm for specialized ad hoc networks.
Comput. Electr. Eng., 2010

Debugging support tool for MCAPI applications.
Proceedings of the 8th Workshop on Parallel and Distributed Systems: Testing, 2010

Trace-Driven Verification of Multithreaded Programs.
Proceedings of the Formal Methods and Software Engineering, 2010

CRI: Symbolic Debugger for MCAPI Applications.
Proceedings of the Automated Technology for Verification and Analysis, 2010

Message Race Detection for Web Services by an SMT-Based Analysis.
Proceedings of the Autonomic and Trusted Computing - 7th International Conference, 2010

2009
Model checking sequential software programs via mixed symbolic analysis.
ACM Trans. Design Autom. Electr. Syst., 2009

Offline symbolic analysis for multi-processor execution replay.
Proceedings of the 42st Annual IEEE/ACM International Symposium on Microarchitecture (MICRO-42 2009), 2009

Dynamic Path Reduction for Software Model Checking.
Proceedings of the Integrated Formal Methods, 7th International Conference, 2009

HAVE: Detecting Atomicity Violations via Integrated Dynamic and Static Analysis.
Proceedings of the Fundamental Approaches to Software Engineering, 2009

HEAT: An Integrated Static and Dynamic Approach for Thread Escape Analysis.
Proceedings of the 33rd Annual IEEE International Computer Software and Applications Conference, 2009

2008
Efficient SAT-based bounded model checking for software verification.
Theor. Comput. Sci., 2008

Bitwidth Reduction via Symbolic Interval Analysis for Software Model Checking.
IEEE Trans. Comput. Aided Des. Integr. Circuits Syst., 2008

Peephole Partial Order Reduction.
Proceedings of the Tools and Algorithms for the Construction and Analysis of Systems, 2008

2007
Disjunctive image computation for software verification.
ACM Trans. Design Autom. Electr. Syst., 2007

Opportunistic Networks for Emergency Applications and Their Standard Implementation Framework.
Proceedings of the 26th IEEE International Performance Computing and Communications Conference, 2007

Formal Modeling and Analysis of Scientific Workflows Using Hierarchical State Machines.
Proceedings of the Third International Conference on e-Science and Grid Computing, 2007

The MicroOppnet tool for Collaborative Computing experiments with class 2 opportunistic networks.
Proceedings of the 3rd International Conference on Collaborative Computing: Networking, 2007

Using Counterexamples for Improving the Precision of Reachability Computation with Polyhedra.
Proceedings of the Computer Aided Verification, 19th International Conference, 2007

Itinerary-Based Access Control for Mobile Tasks in Scientific Workflows.
Proceedings of the 21st International Conference on Advanced Information Networking and Applications (AINA 2007), 2007

2006
Efficient distributed SAT and SAT-based distributed Bounded Model Checking.
Int. J. Softw. Tools Technol. Transf., 2006

Mixed symbolic representations for model checking software programs.
Proceedings of the 4th ACM & IEEE International Conference on Formal Methods and Models for Co-Design (MEMOCODE 2006), 2006

Disjunctive image computation for embedded software verification.
Proceedings of the Conference on Design, Automation and Test in Europe, 2006

Runtime Security Verification for Itinerary-Driven Mobile Agents.
Proceedings of the Second International Symposium on Dependable Autonomic and Secure Computing (DASC 2006), 29 September, 2006

Whodunit? Causal Analysis for Counterexamples.
Proceedings of the Automated Technology for Verification and Analysis, 2006

PDC: Pattern discovery with confidence in DNA sequences.
Proceedings of the IASTED International Conference on Advances in Computer Science and Technology, 2006

2005
Model Checking C Programs Using F-SOFT.
Proceedings of the 23rd International Conference on Computer Design (ICCD 2005), 2005

F-Soft: Software Verification Platform.
Proceedings of the Computer Aided Verification, 17th International Conference, 2005

2004
Variable Reuse for Efficient Image Computation.
Proceedings of the Formal Methods in Computer-Aided Design, 5th International Conference, 2004

2003
Iterative Abstraction using SAT-based BMC with Proof Analysis.
Proceedings of the 2003 International Conference on Computer-Aided Design, 2003

Learning from BDDs in SAT-based bounded model checking.
Proceedings of the 40th Design Automation Conference, 2003

Abstraction and BDDs Complement SAT-Based BMC in DiVer.
Proceedings of the Computer Aided Verification, 15th International Conference, 2003

2002
Exploiting Behavioral Hierarchy for Efficient Model Checking.
Proceedings of the Computer Aided Verification, 14th International Conference, 2002

2001
Partition-Based Decision Heuristics for Image Computation Using SAT and BDDs.
Proceedings of the 2001 IEEE/ACM International Conference on Computer-Aided Design, 2001

Dynamic Detection and Removal of Inactive Clauses in SAT with Application in Image Computation.
Proceedings of the 38th Design Automation Conference, 2001

2000
SAT-Based Image Computation with Application in Reachability Analysis.
Proceedings of the Formal Methods in Computer-Aided Design, Third International Conference, 2000


  Loading...