An approach to detecting duplicate bug reports using natural language and execution information X Wang, L Zhang, T Xie, J Anvik, J Sun Proceedings of the 30th international conference on Software engineering …, 2008 | 702 | 2008 |
A discriminative model approach for accurate duplicate bug report retrieval C Sun, D Lo, X Wang, J Jiang, SC Khoo Proceedings of the 32nd ACM/IEEE International Conference on Software …, 2010 | 401 | 2010 |
NetworkProfiler: Towards Automatic Fingerprinting of Android Apps S Dai, A Tongaonkar, X Wang, A Nucci, D Song INFOCOM, 2013 | 240 | 2013 |
Toward a framework for detecting privacy policy violations in android application code R Slavin, X Wang, MB Hosseini, J Hester, R Krishnan, J Bhatia, ... Proceedings of the 38th International Conference on Software Engineering, 25-36, 2016 | 197 | 2016 |
Identifying bug signatures using discriminative graph mining H Cheng, D Lo, Y Zhou, X Wang, X Yan Proceedings of the eighteenth international symposium on Software testing …, 2009 | 192 | 2009 |
A survey on bug-report analysis J Zhang, XY Wang, D Hao, B Xie, L Zhang, H Mei Science China Information Sciences 58 (2), 1-24, 2015 | 128 | 2015 |
A history-based matching approach to identification of framework evolution S Meng, X Wang, L Zhang, H Mei 2012 34th International Conference on Software Engineering (ICSE), 353-363, 2012 | 107 | 2012 |
Predicting consistency-maintenance requirement of code clonesat copy-and-paste time X Wang, Y Dang, L Zhang, D Zhang, E Lan, H Mei IEEE Transactions on Software Engineering 40 (8), 773-794, 2014 | 94* | 2014 |
Guileak: Tracing privacy policy claims on user input data for android applications X Wang, X Qin, MB Hosseini, R Slavin, TD Breaux, J Niu Proceedings of the 40th International Conference on Software Engineering, 37-47, 2018 | 82 | 2018 |
Test input reduction for result inspection to facilitate fault localization D Hao, T Xie, L Zhang, X Wang, J Sun, H Mei Automated software engineering 17, 5-31, 2010 | 81 | 2010 |
Hirebuild: An automatic approach to history-driven repair of build scripts F Hassan, X Wang Proceedings of the 40th international conference on software engineering …, 2018 | 70 | 2018 |
Extracting paraphrases of technical terms from noisy parallel software corpora X Wang, D Lo, J Jiang, L Zhang, H Mei Proceedings of the ACL-IJCNLP 2009 Conference Short Papers, 197-200, 2009 | 61 | 2009 |
Summary-based context-sensitive data-dependence analysis in presence of callbacks H Tang, X Wang, L Zhang, B Xie, L Zhang, H Mei Proceedings of the 42Nd Annual ACM SIGPLAN-SIGACT Symposium on Principles of …, 2015 | 60 | 2015 |
Matching dependence-related queries in the system dependence graph X Wang, D Lo, J Cheng, L Zhang, H Mei, JX Yu Proceedings of the IEEE/ACM international conference on Automated software …, 2010 | 60 | 2010 |
Automating Presentation Changes in Dynamic Web Applications via Collaborative Hybrid Analysis X Wang, L Zhang, T Xie, Y Xiong, H Mei Proc. FSE, 2012 | 58 | 2012 |
An empirical study on the usage of mocking frameworks in software testing S Mostafa, X Wang 2014 14th international conference on quality software, 127-132, 2014 | 56 | 2014 |
Perfranker: Prioritization of performance regression tests for collection-intensive software S Mostafa, X Wang, T Xie Proceedings of the 26th ACM SIGSOFT International Symposium on Software …, 2017 | 53 | 2017 |
Experience paper: a study on behavioral backward incompatibilities of Java software libraries S Mostafa, R Rodriguez, X Wang Proceedings of the 26th ACM SIGSOFT international symposium on software …, 2017 | 52* | 2017 |
Leveraging code generation to improve code retrieval and summarization via dual learning W Ye, R Xie, J Zhang, T Hu, X Wang, S Zhang Proceedings of The Web Conference 2020, 2309-2319, 2020 | 48 | 2020 |
How reliable is the crowdsourced knowledge of security implementation? M Chen, F Fischer, N Meng, X Wang, J Grossklags 2019 IEEE/ACM 41st International Conference on Software Engineering (ICSE …, 2019 | 48 | 2019 |