Smart Grid Metering Networks: A Survey on Security, Privacy and Open Research Issues P Kumar, Y Lin, G Bai, J Dong, A Martin IEEE Communications Surveys & Tutorials, 2019 | 217 | 2019 |
sFuzz: An Efficient Adaptive Fuzzer for Solidity Smart Contracts TD Nguyen, LH Pham, J Sun, Y Lin, QT Minh The 42nd International Conference on Software Engineering, 2020 | 136 | 2020 |
Interactive and guided architectural refactoring with search-based recommendation Y Lin, X Peng, Y Cai, D Dig, D Zheng, W Zhao Proceedings of the 2016 24th ACM SIGSOFT International Symposium on …, 2016 | 84 | 2016 |
Detecting differences across multiple instances of code clones Y Lin, Z Xing, Y Xue, Y Liu, X Peng, J Sun, W Zhao Proceedings of the 36th International Conference on Software Engineering …, 2014 | 68 | 2014 |
Towards Optimal Concolic Testing X Wang, J Sun, Z Chen, P Zhang, J Wang, Y Lin Proceedings of the 40th International Conference on Software Engineering …, 2018 | 65 | 2018 |
Phishpedia: A Hybrid Deep Learning Based Approach to Visually Identify Phishing Webpages Y Lin, R Liu, DM Divakaran, JY Ng, QZ Chan, Y Lu, Y Si, F Zhang, ... The 30th USENIX Security Symposium, 2021 | 55* | 2021 |
Feedback-based Debugging Y Lin, J Sun, Y Xue, Y Liu, JS Dong 2017 IEEE/ACM 39th International Conference on Software Engineering, 393--403, 2017 | 54 | 2017 |
Clone-based and interactive recommendation for modifying pasted code Y Lin, X Peng, Z Xing, D Zheng, W Zhao Proceedings of the 2015 10th Joint Meeting on Foundations of Software …, 2015 | 34 | 2015 |
Cross-Contract Static Analysis for Detecting Practical Reentrancy Vulnerabilities in Smart Contracts Y Xue, M Ma, Y Lin, Y Sui, J Ye, T Peng The 35th IEEE/ACM International Conference on Automated Software Engineering, 2020 | 33 | 2020 |
Break the Dead End of Dynamic Slicing: Localizing Data and Control Omission Bug Y Lin, J Sun, L Tran, G Bai, H Wang, JS Dong The 33rd IEEE/ACM International Conference on Automated Software Engineering …, 2018 | 28 | 2018 |
Clonepedia: Summarizing Code Clones by Common Syntactic Context for Software Maintenance Y Lin, Z Xing, X Peng, Y Liu, J Sun, W Zhao, JS Dong Software Maintenance and Evolution (ICSME), 2014 IEEE International …, 2014 | 25 | 2014 |
Mining Implicit Design Templates for Actionable Code Reuse Y Lin, G Meng, Y Xue, Z Xing, J Sun, X Peng, Y Liu, W Zhao, JS Dong The 32nd IEEE/ACM International Conference on Automated Software Engineering …, 2017 | 23 | 2017 |
Determining the benefit of human input in human-in-the-loop robotic systems C Bringes, Y Lin, Y Sun, R Alqasemi 2013 Ieee Ro-Man, 210-215, 2013 | 23 | 2013 |
Recovering Fitness Gradients for Interprocedural Boolean Flags in Search-Based Testing Y Lin, J Sun, G Fraser, Z Xiu, T Liu, JS Dong The ACM SIGSOFT International Symposium on Software Testing and Analysis …, 2020 | 16 | 2020 |
Locating Vulnerabilities in Binaries via Memory Layout Recovering H Wang, X Xie, SW Lin, Y Lin, Y Li, S Qin, Y Liu, T Liu The 27th ACM Joint European Software Engineering Conference and Symposium on …, 2019 | 15 | 2019 |
Explaining Regressions via Alignment Slicing and Mending H Wang, Y Lin, Z Yang, J Sun, Y Liu, JS Dong, Q Zheng, T Liu IEEE Transactions on Software Engineering, 2019 | 15 | 2019 |
Self-Checking Deep Neural Networks in Deployment Y Xiao, I Beschastnikh, DS Rosenblum, C Sun, S Elbaum, Y Lin, JS Dong The 43rd International Conference on Software Engineering, 2021 | 12 | 2021 |
Clairvoyance: Cross-contract static analysis for detecting practical reentrancy vulnerabilities in smart contracts J Ye, M Ma, Y Lin, Y Sui, Y Xue Proceedings of the ACM/IEEE 42nd International Conference on Software …, 2020 | 12 | 2020 |
Inferring Phishing Intention via Webpage Appearance and Dynamics: A Deep Vision Based Approach R Liu, Y Lin, X Yang, SH Ng, DM Divakaran, JS Dong The 31st USENIX Security Symposium, 2022 | 11 | 2022 |
Adversarial Adaptive Neighborhood with Feature Importance-Aware Convex Interpolation Q Li, Y Qi, Q Hu, Y Lin, JS Dong IEEE Transactions on Information Forensics and Security, 2021 | 11 | 2021 |