Publications

Filter by type:

. HateModerate: Testing Hate Speech Detectors against Content Moderation Policies. In NAACL, 2024.

PDF

. HawkEyes: Spotting and Evading Instruction Disalignments of LLMs. In LLM4Code, 2024.

PDF

. PPM: Automated Generation of Diverse Programming Problems for Benchmarking Code Generation Models. In FSE, 2024.

PDF Code

. DeciX: Explain Deep Learning Based Code Generation Applications. In FSE, 2024.

PDF

. IMPACT ANALYSIS OF INFERENCE TIME ATTACK OF PERCEPTION SENSORS ON AUTONOMOUS VEHICLES. In TRBAM, 2024.

PDF Code

. SlothSpeech: Denial-of-service Attack Against Speech Recognition Models. In INTERSPEECH, 2023.

PDF Code

. AntiNODE: Evaluating Efficiency Robustness of Neural ODEs. In ICCV-W, 2023.

PDF Code

. The Dark Side of Dynamic Routing Neural Networks: Towards Efficiency Backdoor Injection. In CVPR, 2023.

PDF Code

. Dynamic Transformers Provide a False Sense of Efficiency. In ACL, 2023.

PDF Code

. Contrastive Learning for Robust Android Malware Familial Classification. In TDSC, 2022.

PDF

. TestAug: A Framework for Augmenting Capability-based NLP Tests. In COLING, 2022.

PDF Code

. An Empirical Analysis of Compatibility Issues for Industrial Mobile Games. In ISSRE, 2022.

PDF Dataset

. NMTSloth: Understanding and Testing Efficiency Degradation of Neural Machine Translation Systems. In FSE, 2022.

PDF Code

. Learning to Reverse DNNs from AI Programs Automatically. In IJCAI, 2022.

PDF Dataset

. NICGSlowDown: Evaluating the Efficiency Robustness of Neural Image Caption Generation Models. In CVPR, 2022.

PDF Code

. CorrGAN:Input Transformation Technique Against Natural Corruptions. . In CVPR-W, 2022.

PDF

. EREBA: Black-box Energy Testing of Adaptive Neural Networks. In ICSE, 2022.

PDF Code Project

. Detecting Topology Attacks against Graph Neural Networks.
Best Paper Award RunnerUp.
In CIKM-W, 2022.

PDF Code

. VulCNN: An Image-inspired Scalable Vulnerability Detection System. In ICSE, 2022.

PDF Code

. Vet: Identifying and Avoiding UI Exploration Tarpits.
ACM SIGSOFT Distinguished Paper Award.
In FSE, 2021.

PDF Code

. GLIB: Towards Automated Test Oracle for Graphically-Rich Applications. In FSE, 2021.

PDF Code

. HomDroid: Detecting Android Covert Malware by Social-Network Homophily Analysis. In ISSTA, 2021.

PDF Code

. WebEvo: Taming Web Application Evolution via Detecting Semantic Structure Change. In ISSTA, 2021.

PDF Code

. An Empirical Analysis of UI-based Flaky Tests. In ICSE, 2021.

PDF Code Project

. IntDroid: Android Malware Detection Based on API Intimacy Analysis. In TOSEM, 2021.

PDF

. Database-Access Performance Antipatterns in Database-Backed Web Applications. In ICSME, 2020.

PDF

. SCDetector: Software Functional Clone Detection Based on Semantic Tokens Analysis. In ASE, 2020.

PDF Code

. DENAS: Automated Rule Generation by Knowledge Extraction from Neural Networks. In FSE, 2020.

PDF Code Video

. ILFO: Adversarial Attack on Adaptive Neural Networks. In CVPR, 2020.

PDF Code Project Video

. TextExerciser: Feedback-driven Text Input Exercising for Android Applications. In IEEE S&P, 2020.

PDF Project Video

. MalScan: Fast Market-Wide Mobile Malware Scanning by Social-Network Centrality Analysis. In ASE, 2019.

PDF Code

. Charting the Attack Surface of Trigger-Action IoT Platforms. In CCS, 2019.

PDF

. REINAM: Reinforcement Learning for Input-Grammar Inference. In FSE, 2019.

PDF Project

. Testing Untestable Neural Machine Translation: An Industrial Case. In ICSE, 2019.

PDF

. Detecting Failures of Neural Machine Translation in the Absence of Reference Translations. In DSN, 2019.

PDF

. SemRegex: A Semantics-Based Approach for Generating Regular Expressions from Natural Language Specifications. In EMNLP, 2018.

PDF

. Property Inference Attacks on Deep Neural Networks using Permutation Invariant Representations. In CCS, 2018.

PDF

. An Empirical Study of Android Test Generation Tools in Industrial Cases. In ASE, 2018.

PDF

. A Large-Scale Empirical Study on Android Runtime Permission Rationale Messages. In VL/HCC, 2018.

PDF

. Mining Android App Description for Permission Requirements Recommendation. In RE, 2018.

PDF

. EnMobile: Entity-based Characterization and Analysis of Mobile Malware. In ICSE, 2018.

PDF

. Generating Regular Expressions from Natural Language Specifications: Are We There Yet?. In AAAI-W, 2018.

PDF

. Automated Test Input Generation for Android: Towards Getting There in an Industrial Case. In ICSE, 2017.

PDF

. Towards Privacy-Preserving Mobile Apps: A Balancing Act. . In HotSoS, 2017.

PDF

. Free for All! Assessing User Data Exposure to Advertising Libraries on Android. In NDSS, 2016.

PDF

. Automated Test Input Generation for Android: Are We Really There Yet in an Industrial Case?. In FSE, 2016.

PDF

. Security Analytics for Mobile Apps: Achievements and Challenges.. In JCS, 2016.

PDF

. AppContext: Differentiating Malicious and Benign Mobile App Behaviors Using Context. In ICSE, 2015.

PDF

. Improving Mobile Application Security via Bridging User Expectations and Application Behaviors.. In HotSoS, 2014.

PDF

. WHYPER: Towards Automating Risk Assessment of Mobile Applications. In USENIX Security, 2013.

PDF