Selected Conference Publications

SCDetector Code Clone Detection by Centrality Analysis.
In ASE, 2020

DENAS Automated Heuristic Generation for Non-ML Systems via ML
In FSE, 2020

ILFO Adversarial Attack on Adaptive Neural Networks
In CVPR, 2020

TextExerciser Feedback-driven Text Input Exercising for Android Applications
In IEEE S&P, 2020

MalScan Malware Detection by Centrality Analysis.
In ASE, 2019

iRuler Detecting inter-rule vulnerabilities in IoT applications.
In CCS, 2019

REINAM Synthesizing high-coverage context-free program input grammars.
In FSE, 2019

SemRegex Synthesizing regex from natural language descriptions.
In EMNLP, 2018

PermuteInvariance Inferring private properties of neural networks.
In CCS, 2018

WCTester Android test generation for industrial mobile applications.
In ASE, 2018

EnMobile Detection of command & control behaviors in mobile applications.
In ICSE, 2018

Other Publications

More Publications

. Database-Access Performance Antipatterns in Database-Backed Web Applications. In ICSME, 2020.

PDF

. Detecting Failures of Neural Machine Translation in the Absence of Reference Translations. In DSN, 2019.

PDF

. Testing Untestable Neural Machine Translation: An Industrial Case. In ICSE, 2019.

PDF

. A Large-Scale Empirical Study on Android Runtime Permission Rationale Messages. In VL/HCC, 2018.

PDF

. Mining Android App Description for Permission Requirements Recommendation. In RE, 2018.

PDF

. Generating Regular Expressions from Natural Language Specifications: Are We There Yet?. In AAAI-W, 2018.

PDF

. Automated Test Input Generation for Android: Towards Getting There in an Industrial Case. In ICSE, 2017.

PDF

. Towards Privacy-Preserving Mobile Apps: A Balancing Act. . In HotSoS, 2017.

PDF

. Free for All! Assessing User Data Exposure to Advertising Libraries on Android. In NDSS, 2016.

PDF

. Automated Test Input Generation for Android: Are We Really There Yet in an Industrial Case?. In FSE, 2016.

PDF

. Security Analytics for Mobile Apps: Achievements and Challenges.. In JCS, 2016.

PDF

. AppContext: Differentiating Malicious and Benign Mobile App Behaviors Using Context. In ICSE, 2015.

PDF

. Improving Mobile Application Security via Bridging User Expectations and Application Behaviors.. In HotSoS, 2014.

PDF

. WHYPER: Towards Automating Risk Assessment of Mobile Applications. In USENIX Security, 2013.

PDF

Students


  1. co-advised with Cong Liu ^

Contact

  • wei.yang@utdallas.edu
  • (972) 883-4173
  • ECSS 4.225, 800 W. Campbell Rd., Richardson, TX 75080, USA.
  • email for appointment