conf.researchr.org / Yang Liu
Registered user since Sun 16 Jul 2017
Name:Yang Liu
Country:Singapore
Affiliation:Nanyang Technological University
Personal website: https://personal.ntu.edu.sg/yangliu
Research interests:Formal Methods, Software Engineering, Security
Contributions
2025
2030 Software Engineering
Mining Software Repositories
2024
ASE
- Author of Semantic-Enhanced Indirect Call Analysis with Large Language Models within the Research Papers-track
- Author of Attribution-guided Adversarial Code Prompt Generation for Code Completion Models within the Research Papers-track
- Author of SoVAR: Build Generalizable Scenarios from Accident Reports for Autonomous Driving Testing within the Research Papers-track
- Author of Efficient Detection of Toxic Prompts in Large Language Models within the Research Papers-track
- Author of The Software Genome Project: Unraveling Software Through Genetic Principles within the NIER Track-track
- Author of VulAdvisor: Natural Language Suggestion Generation for Software Vulnerability Repair within the Research Papers-track
ISSTA
- Author of DeFort: Automatic Detection and Analysis of Price Manipulation Attacks in DeFi Applications within the Technical Papers-track
- Author of PatchFinder: A Two-Phase Approach to Security Patch Tracing for Disclosed Vulnerabilities in Open-Source Software within the Technical Papers-track
- Author of Uncovering and Mitigating the Impact of Code Obfuscation on Dataset Annotation with Antivirus Engines within the Technical Papers-track
- Committee Member in Program Committee within the Technical Papers-track
- Author of How Effective Are They? Exploring Large Language Model Based Fuzz Driver Generation within the Technical Papers-track
2030 Software Engineering
ESEC/FSE
- Author of Static Application Security Testing (SAST) Tools for Smart Contracts: How Far Are We? within the Research Papers-track
- Author of Glitch Tokens in Large Language Models: Categorization Taxonomy and Effective Detection within the Research Papers-track
- Co-chair in Program Committee within the Student Research Competition-track
- Author of Shadows in the Interface: A Comprehensive Study on Dark Patterns within the Posters-track
- Author of Shadows in the Interface: A Comprehensive Study on Dark Patterns within the Research Papers-track
- Student Research Competition Co-Chair of Conference Closing, SRC awards, and FSE'25 Kick-off within the Plenary Events-track
- Author of CC2Vec: Combining Typed Tokens with Contrastive Learning for Effective Code Clone Detection within the Research Papers-track
- Author of Static Application Security Testing (SAST) Tools for Smart Contracts: How Far Are We? within the Posters-track
- Student Research Competition Co-Chair in Organizing Committee
- Author of Glitch Tokens in Large Language Models: Categorization Taxonomy and Effective Detection within the Posters-track
ICSE
- Author of Machine Learning is All You Need: A Simple Token-based Approach for Effective Code Clone Detection within the Research Track-track
- Author of An Empirical Study on Noisy Label Learning for Program Understanding within the Research Track-track
- Author of Demystifying Compiler Unstable Feature Usage and Impacts in the Rust Ecosystem within the Research Track-track
- Author of RUNNER: Responsible UNfair NEuron Repair for Enhancing Deep Neural Network Fairness within the Research Track-track
- Author of ModuleGuard: Understanding and Detecting Module Conflicts in Python Ecosystem within the Research Track-track
- Author of Demystifying Compiler Unstable Feature Usage and Impacts in the Rust Ecosystem within the Artifact Evaluation-track
- Author of Empirical Analysis of Vulnerabilities Life Cycle in Golang Ecosystem within the Research Track-track
- Author of Semantic-Enhanced Static Vulnerability Detection in Baseband Firmware within the Artifact Evaluation-track
- Committee Member in Research Track within the Research Track-track
- Author of On Extracting Specialized Code Abilities from Large Language Models: A Feasibility Study within the Research Track-track
- Author of Semantic-Enhanced Static Vulnerability Detection in Baseband Firmware within the Research Track-track
- Author of GPTScan: Detecting Logic Vulnerabilities in Smart Contracts by Combining GPT with Program Analysis within the Research Track-track
2023
ESEC/FSE
- Author of Software Composition Analysis for Vulnerability Detection: An Empirical Study on Java Projects within the Research Papers-track
- Author of Software Architecture Recovery with Information Fusion within the Research Papers-track
- Author of [Remote] Demystifying the Composition and Code Reuse in Solidity Smart Contracts within the Research Papers-track
- Author of [Remote] Gitor: Scalable Code Clone Detection by Building Global Sample Graph within the Research Papers-track
- Committee Member in Program Committee within the Industry Papers-track
- Author of [Remote] Comparison and Evaluation on Static Application Security Testing (SAST) Tools for Java within the Research Papers-track
ASE
- Author of Towards Robustness of Deep Program Processing Models -- Detection, Estimation and Enhancement within the Journal-first Papers-track
- Author of An Empirical Study on Fine-tuning Large Language Models of Code for Automated Program Repair within the Research Papers-track
- Author of Learning to Locate and Describe Vulnerabilities within the Research Papers-track
- Author of When Less is Enough: Positive and Unlabeled Learning Model for Vulnerability Detection within the Research Papers-track
- Author of Aster: Automatic Speech Recognition System Accessibility Testing for Stutterers within the Research Papers-track
- Author of LiSum: Open Source Software License Summarization with Multi-Task Learning within the Research Papers-track
- Author of Mitigating Persistence of Open-Source Vulnerabilities in Maven Ecosystem within the Research Papers-track
- Author of An Empirical Study of Malicious Code In PyPI Ecosystem within the Research Papers-track
- Author of Who is the Real Hero? Measuring Developer Contribution via Multi-dimensional Data Integration within the Research Papers-track
ISSTA
- Author of A Comprehensive Study on Quality Assurance Tools for Java within the Technical Papers-track
- Author of Beyond “Protected” and “Private”: An Empirical Security Analysis of Custom Function Modifiers in Smart Contracts within the Technical Papers-track
- Author of Detecting Condition-Related Bugs with Control Flow Graph Neural Network within the Technical Papers-track
ICSE
- Author of Compatible Remediation on Vulnerabilities from Third-Party Libraries for Java Projects within the Technical Track-track
- Author of ContraBERT: Enhancing Code Pre-trained Models via Contrastive Learning within the Technical Track-track
- Author of Comparison and Evaluation of Clone Detection Techniques with Different Code Representations within the Technical Track-track
- Author of OSSFP: Precise and Scalable C/C++ Third-Party Library Detection using Fingerprinting Functions within the Technical Track-track
2022
ESEC/FSE
ASE
- Committee Member in Program Committee within the Research Papers-track
- Author of MOREST: Industry Practice of Automatic RESTful API Testing within the Industry Showcase-track
- Author of Demystifying Performance Regressions in String Solvers within the Journal-first Papers-track
- Author of AUSERA: Automated Security Vulnerability Detection for Android Apps within the Tool Demonstrations-track
- Author of Towards Understanding the Faults of JavaScript-Based Deep Learning Systems within the Research Papers-track
- Author of Towards Understanding Third-party Library Dependency in C/C++ Ecosystem within the Research Papers-track
- Author of Has My Release Disobeyed Semantic Versioning? Static Detection Based On Semantic Differencing within the Research Papers-track
- Author of TransRepair: Context-aware Program Repair for Compilation Errors within the Research Papers-track
ISSTA
ICSE
- Author of Demystifying the Vulnerability Propagation and Its Evolution via Dependency Trees in the NPM Ecosystem within the Technical Track-track
- Author of MOREST: Model-based RESTful API Testing with Execution Feedback within the Technical Track-track
- Author of Modx: Binary Level Partial Imported Third-Party Library Detection through Program Modularization and Semantic Matching within the Technical Track-track
- Committee Member in Program Committee within the DS - Doctoral Symposium-track
- Author of WindRanger: A Directed Greybox Fuzzer driven by DeviationBasic Blocks within the Technical Track-track
Mining Software Repositories
2021
ASE
- Author of FirmGuide: Boosting the Capability of Rehosting Embedded Linux Kernels through Model-Guided Kernel Execution within the Research Papers-track
- Author of A First Look at the Effect of Deep Learning inCoverage-guided Fuzzing within the Late Breaking Results-track
- Author of Systematic Testing of Autonomous Driving Systems Using Map Topology-Based Scenario Classification within the NIER track-track
- Committee Member in Program Committee within the Research Papers-track
- Author of Automatic HMI Structure Exploration Via Curiosity-Based Reinforcement Learning within the Industry Showcase-track
- Author of BIFF: Practical Binary Fuzzing Framework for Programs of IoT and Mobile Devices within the Industry Showcase-track
ECOOP/ISSTA
ICSE
- Author of Why an Android App is Classified as Malware? Towards Malware Classification Interpretation within the Journal-First Papers-track
- Committee Member in Program Committee within the Technical Track-track
- Author of Automatic Web Testing using Curiosity-Driven Reinforcement Learning within the Technical Track-track
- Author of ATVHunter: Reliable Version Detection of Third-Party Libraries for Vulnerability Identification in Android Apps within the Technical Track-track
Mining Software Repositories
2020
ESEC/FSE
ASE
- Author of Audee: Automated Testing for Deep Learning Frameworks within the Research Papers-track
- Committee Member in Program Committee within the Research Papers-track
- Author of MARBLE: Model-Based Robustness Analysis of Stateful Deep Learning Systems within the Research Papers-track
- Author of Automated Third-party Library Detection for Android Applications: Are We There Yet? within the Research Papers-track
- Author of Cats Are Not Fish: Deep Learning Testing Calls for Out-Of-Distribution Awareness within the Research Papers-track
- Author of SADT: Syntax-Aware Differential Testing of Certificate Validation in SSL/TLS Implementions within the Research Papers-track
ISSTA
ICSE
- Author of Towards Characterizing Adversarial Defects of Deep Learning Software from the Lens of Uncertainty within the Technical Papers-track
- Programme Committee in Program Committee within the Software Engineering in Practice-track
- Author of Typestate-Guided Fuzzer for Discovering Use-after-Free Vulnerabilities within the Technical Papers-track
- Author of Explaining Regressions via Alignment Slicing and Mending within the Journal First-track
- Author of MemLock: Memory Usage Guided Fuzzing within the Technical Papers-track
- Author of An Empirical Assessment of Security Risks of Global Android Banking Apps within the Technical Papers-track
International Conference on Program Comprehension
2019
ASE
- Committee Member in Program Committee within the Journal First Presentations-track
- Author of Wuji: Automatic Online Combat Game Testing Using Evolutionary Deep Reinforcement Learning within the Research Papers-track
- Committee Member in Program Committee within the Late Breaking Results-track
- Committee Member in Program Committee within the Research Papers-track
- Author of An Empirical Study towards Characterizing Deep Learning Development and Deployment across Different Frameworks and Platforms within the Research Papers-track
- Author of DeepMutation++: a Mutation Testing Framework for Deep Learning Systems within the Demonstrations-track
- Author of DeepHunter: A Coverage-Guided Fuzzer for Deep Neural Networks within the Demonstrations-track
- Author of A Quantitative Analysis Framework for Recurrent Neural Network within the Demonstrations-track
ISSTA
ICSE
- Author of Superion: Grammar-Aware Greybox Fuzzing within the Technical Track-track
- Author of Localized or Architectural: An Empirical Study of Performance Issues Dichotomy within the Posters-track
- Author of StoryDroid: Automated Generation of Storyboard for Android Apps within the Technical Track-track
- Author of VULTRON: Catching Vulnerable Smart Contracts Once and for All within the New Ideas and Emerging Results-track
- Author of LEOPARD: Identifying Vulnerable Code for Vulnerability Assessment through Program Metrics within the Technical Track-track
- Author of ReCDroid: Automatically Reproducing Android Application Crashes from Bug Reports within the Technical Track-track
- Author of Large-scale Empirical Study on Industrial Fake Apps within the Software Engineering in Practice-track
Mining Software Repositories
2018
ESEC/FSE
ICSE
- Author of Poster T6: Detecting Missing Checks for Identifying Insufficient Attack Protections within the Posters -track
- Author of Large-Scale Analysis of Framework-Specific Exceptions in Android Apps within the Technical Papers -track
- Author of Speedoo: Prioritizing Performance Optimization Opportunities within the Technical Papers -track
- Author of From UI Design Image to GUI Skeleton: A Neural Machine Translator to Bootstrap Mobile GUI Implementation within the Technical Papers -track