conf.researchr.org / Hai Jin
Not registered as user
Name:Hai Jin
Country:China
Affiliation:Huazhong University of Science and Technology
Contributions
2024
ASE
- Author of Towards Understanding the Effectiveness of Large Language Models on Directed Test Input Generation within the Research Papers-track
- Author of Effective Vulnerable Function Identification based on CVE Description Empowered by Large Language Models within the Research Papers-track
- Author of Unveiling the Characteristics and Impact of Security Patch Evolution within the Research Papers-track
- Author of How Does Code Optimization Impact Third-party Library Detection for Android Applications? within the Research Papers-track
ISSTA
- Author of Maltracker: A Fine-Grained NPM Malware Tracker Copiloted by LLM-Enhanced Dataset within the Technical Papers-track
- Committee Member in Program Committee within the Technical Papers-track
- Author of Graph Neural Networks for Vulnerability Detection: A Counterfactual Explanation within the Technical Papers-track
ICSE
2023
ESEC/FSE
- Author of [Remote] An Extensive Study on Adversarial Attack against Pre-trained Models of Code within the Research Papers-track
- Author of Understanding the Bug Characteristics and Fix Strategies of Federated Learning Systems within the Research Papers-track
- Author of [Remote] Tritor: Detecting Semantic Code Clones by Building Social Network-based Triads Model within the Research Papers-track
ASE
ISSTA
- Author of Interpreters for GNN-Based Vulnerability Detection: Are We There Yet? within the Technical Papers-track
- Author of An Empirical Study on the Effects of Obfuscation on Static Machine Learning-Based Malicious JavaScript Detectors within the Technical Papers-track
- Author of Fine-Grained Code Clone Detection with Block-Based Splitting of Abstract Syntax Tree within the Technical Papers-track
- Author of Precise and Efficient Patch Presence Test for Android Applications against Code Obfuscation within the Technical Papers-track
ICSE
- Author of Enhancing Deep Learning-based Vulnerability Detection by Building Behavior Graph Model within the Technical Track-track
- Author of Validating SMT Solvers via Skeleton Enumeration Empowered by Historical Bug-Triggering Input within the Artifact Evaluation-track
- Author of Detecting JVM JIT Compiler Bugs via Exploring Two-Dimensional Input Spaces within the Technical Track-track
- Author of Validating SMT Solvers via Skeleton Enumeration Empowered by Historical Bug-Triggering Inputs within the Technical Track-track
- Author of Effective Isolation of Fault-Correlated Variables via Statistical and Mutation Analysis within the Journal-First Papers-track
- Author of Understanding the Threats of Upstream Vulnerabilities to Downstream Projects in the Maven Ecosystem within the Technical Track-track
- Author of Detecting JVM JIT Compiler Bugs via Exploring Two-Dimensional Input Spaces within the Artifact Evaluation-track
- Author of Understanding the Threats of Upstream Vulnerabilities to Downstream Projects in the Maven Ecosystem within the Artifact Evaluation-track
2022
ASE
ICSE
- Author of VulCNN: An Image-inspired Scalable Vulnerability Detection System within the Technical Track-track
- Author of What Do They Capture? - A Structural Analysis of Pre-Trained Language Models for Source Code within the Technical Track-track
- Author of NaturalCC: An Open-Source Toolkit for Code Intelligence within the DEMO - Demonstrations-track