Jinsong Dong

Orcid: 0000-0002-6512-8326

Affiliations:
  • National University of Singapore (NUS), Department of Computing, Singapore
  • University of Queensland, Brisbane, QLD, Australia (PhD 1996)
  • CSIRO, Australia (1995-1998)


According to our database1, Jinsong Dong authored at least 76 papers between 2013 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
PiMRef: Detecting and Explaining Ever-evolving Spear Phishing Emails with Knowledge Base Invariants.
CoRR, July, 2025

On the Account Security Risks Posed by Password Strength Meters.
CoRR, May, 2025

F<sup>3</sup>Set: Towards Analyzing Fast, Frequent, and Fine-grained Events from Videos.
CoRR, April, 2025

Explainable and Transferable Adversarial Attack for ML-Based Network Intrusion Detectors.
IEEE Trans. Dependable Secur. Comput., 2025

GUIPilot: A Consistency-Based Mobile GUI Testing Approach for Detecting Application-Specific Bugs.
Proc. ACM Softw. Eng., 2025

ConTested: Consistency-Aided Tested Code Generation with LLM.
Proc. ACM Softw. Eng., 2025

Verification of Bit-Flip Attacks against Quantized Neural Networks.
Proc. ACM Program. Lang., 2025

Automated Program Refinement: Guide and Verify Code Large Language Model with Refinement Calculus.
Proc. ACM Program. Lang., 2025

Ignoring Directionality Leads to Compromised Graph Neural Network Explanations.
Proceedings of the 2025 IEEE Security and Privacy, 2025

On the Mistaken Assumption of Interchangeable Deep Reinforcement Learning Implementations.
Proceedings of the 47th IEEE/ACM International Conference on Software Engineering, 2025

F3Set: Towards Analyzing Fast, Frequent, and Fine-grained Events from Videos.
Proceedings of the Thirteenth International Conference on Learning Representations, 2025

2024
Continuous-Time Distributed Generalized Nash Equilibrium Seeking in Nonsmooth Fuzzy Aggregative Games.
IEEE Trans. Control. Netw. Syst., September, 2024

Defending LVLMs Against Vision Attacks through Partial-Perception Supervision.
CoRR, 2024

Forgetting Through Transforming: Enabling Federated Unlearning via Class-Aware Representation Transformation.
CoRR, 2024

LLM-based Abstraction and Concretization for GUI Test Migration.
CoRR, 2024

Contribution Evaluation of Heterogeneous Participants in Federated Learning via Prototypical Representations.
CoRR, 2024

Towards Large Language Model Aided Program Refinement.
CoRR, 2024

Towards Transferable Attacks Against Vision-LLMs in Autonomous Driving with Typography.
CoRR, 2024

CARE: Ensemble Adversarial Robustness Evaluation Against Adaptive Attackers for Security Applications.
CoRR, 2024

A Symbolic Rule Integration Framework with Logic Transformer for Inductive Relation Prediction.
Proceedings of the ACM on Web Conference 2024, 2024

PhishDecloaker: Detecting CAPTCHA-cloaked Phishing Websites via Hybrid Vision-based Interactive Models.
Proceedings of the 33rd USENIX Security Symposium, 2024

Less Defined Knowledge and More True Alarms: Reference-based Phishing Detection without a Pre-defined Reference List.
Proceedings of the 33rd USENIX Security Symposium, 2024

Detecting and Explaining Anomalies Caused by Web Tamper Attacks via Building Consistency-based Normality.
Proceedings of the 39th IEEE/ACM International Conference on Automated Software Engineering, 2024

Revisiting the Conflict-Resolving Problem from a Semantic Perspective.
Proceedings of the 39th IEEE/ACM International Conference on Automated Software Engineering, 2024

CoEdPilot: Recommending Code Edits with Learned Prior Edit Relevance, Project-wise Awareness, and Interactive Nature.
Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2024

2023
Formalizing UML State Machines for Automated Verification - A Survey.
ACM Comput. Surv., 2023

Knowledge Expansion and Counterfactual Interaction for Reference-Based Phishing Detection.
Proceedings of the 32nd USENIX Security Symposium, 2023

DeepDebugger: An Interactive Time-Travelling Debugging Approach for Deep Classifiers.
Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2023

On-the-Fly Adapting Code Summarization on Trainable Cost-Effective Language Models.
Proceedings of the Advances in Neural Information Processing Systems 36: Annual Conference on Neural Information Processing Systems 2023, 2023

Empower Post-hoc Graph Explanations with Information Bottleneck: A Pre-training and Fine-tuning Perspective.
Proceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2023

B<sup>2</sup>-Sampling: Fusing Balanced and Biased Sampling for Graph Contrastive Learning.
Proceedings of the 29th ACM SIGKDD Conference on Knowledge Discovery and Data Mining, 2023

DeepArc: Modularizing Neural Networks for the Model Maintenance.
Proceedings of the 45th IEEE/ACM International Conference on Software Engineering, 2023

Supervised Robustness-preserving Data-free Neural Network Pruning.
Proceedings of the 27th International Conference on Engineering of Complex Computer Systems, 2023

Sports Analytics Using Probabilistic Model Checking and Deep Learning.
Proceedings of the 27th International Conference on Engineering of Complex Computer Systems, 2023

Insight Analysis for Tennis Strategy and Tactics.
Proceedings of the IEEE International Conference on Data Mining, 2023

2022
Automatic Fairness Testing of Neural Classifiers Through Adversarial Sampling.
IEEE Trans. Software Eng., 2022

Stochastic Ghost Batch for Self-distillation with Dynamic Soft Label.
Knowl. Based Syst., 2022

Fast Automated Abstract Machine Repair Using Simultaneous Modifications and Refactoring.
Formal Aspects Comput., 2022

Adversarial Robustness of Deep Neural Networks: A Survey from a Formal Verification Perspective.
CoRR, 2022

A Prompting-based Approach for Adversarial Example Generation and Robustness Enhancement.
CoRR, 2022

Inferring Phishing Intention via Webpage Appearance and Dynamics: A Deep Vision Based Approach.
Proceedings of the 31st USENIX Security Symposium, 2022

RegMiner: mining replicable regression dataset from code repositories.
Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2022

Debugging and Explaining Metric Learning Approaches: An Influence Function Based Perspective.
Proceedings of the Advances in Neural Information Processing Systems 35: Annual Conference on Neural Information Processing Systems 2022, 2022

Repairing Failure-inducing Inputs with Input Reflection.
Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering, 2022

Are they Toeing the Line? Diagnosing Privacy Compliance Violations among Browser Extensions.
Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering, 2022

RegMiner: towards constructing a large regression dataset from code evolution history.
Proceedings of the ISSTA '22: 31st ACM SIGSOFT International Symposium on Software Testing and Analysis, Virtual Event, South Korea, July 18, 2022

Temporality Spatialization: A Scalable and Faithful Time-Travelling Visualization for Deep Classifier Training.
Proceedings of the Thirty-First International Joint Conference on Artificial Intelligence, 2022

gDefects4DL: A Dataset of General Real-World Deep Learning Program Defects.
Proceedings of the 44th IEEE/ACM International Conference on Software Engineering: Companion Proceedings, 2022

DeepVisualInsight: Time-Travelling Visualization for Spatio-Temporal Causality of Deep Classification Training.
Proceedings of the Thirty-Sixth AAAI Conference on Artificial Intelligence, 2022

2021
Explaining Regressions via Alignment Slicing and Mending.
IEEE Trans. Software Eng., 2021

Scrutinizing Implementations of Smart Home Integrations.
IEEE Trans. Software Eng., 2021

Adversarial Adaptive Neighborhood With Feature Importance-Aware Convex Interpolation.
IEEE Trans. Inf. Forensics Secur., 2021

Characterizing Cryptocurrency-themed Malicious Browser Extensions.
Proc. ACM Meas. Anal. Comput. Syst., 2021

Generalizing Neural Networks by Reflecting Deviating Data in Production.
CoRR, 2021

Constructing Regression Dataset from Code Evolution History.
CoRR, 2021

It's Not Just the Site, It's the Contents: Intra-domain Fingerprinting Social Media Websites Through CDN Bursts.
Proceedings of the WWW '21: The Web Conference 2021, 2021

Phishpedia: A Hybrid Deep Learning Based Approach to Visually Identify Phishing Webpages.
Proceedings of the 30th USENIX Security Symposium, 2021

Graph-based seed object synthesis for search-based unit testing.
Proceedings of the ESEC/FSE '21: 29th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2021

A First Look at the Effect of Deep Learning in Coverage-guided Fuzzing.
Proceedings of the 36th IEEE/ACM International Conference on Automated Software Engineering, 2021

Identifying privacy weaknesses from multi-party trigger-action integration platforms.
Proceedings of the ISSTA '21: 30th ACM SIGSOFT International Symposium on Software Testing and Analysis, 2021

Self-Checking Deep Neural Networks in Deployment.
Proceedings of the 43rd IEEE/ACM International Conference on Software Engineering, 2021

2020
Recovering fitness gradients for interprocedural Boolean flags in search-based testing.
Proceedings of the ISSTA '20: 29th ACM SIGSOFT International Symposium on Software Testing and Analysis, 2020

White-box fairness testing through adversarial sampling.
Proceedings of the ICSE '20: 42nd International Conference on Software Engineering, Seoul, South Korea, 27 June, 2020

RL: a Language for Formal Engineering.
Proceedings of the 25th International Conference on Engineering of Complex Computer Systems, 2020

2019
Smart Grid Metering Networks: A Survey on Security, Privacy and Open Research Issues.
IEEE Commun. Surv. Tutorials, 2019

LightSense: A Novel Side Channel for Zero-permission Mobile User Tracking.
Proceedings of the Information Security - 22nd International Conference, 2019

2018
Break the dead end of dynamic slicing: localizing data and control omission bug.
Proceedings of the 33rd ACM/IEEE International Conference on Automated Software Engineering, 2018

Verification of Strong Nash-equilibrium for Probabilistic BAR Systems.
Proceedings of the Formal Methods and Software Engineering, 2018

2017
Inferring Implicit Assumptions and Correct Usage of Mobile Payment Protocols.
Proceedings of the Security and Privacy in Communication Networks, 2017

A Framework for Formal Analysis of Privacy on SSO Protocols.
Proceedings of the Security and Privacy in Communication Networks, 2017

Mining implicit design templates for actionable code reuse.
Proceedings of the 32nd IEEE/ACM International Conference on Automated Software Engineering, 2017

Feedback-based debugging.
Proceedings of the 39th International Conference on Software Engineering, 2017

2016
From verified model to executable program: the PAT approach.
Innov. Syst. Softw. Eng., 2016

2014
Model checking approach to automated planning.
Formal Methods Syst. Des., 2014

Clonepedia: Summarizing Code Clones by Common Syntactic Context for Software Maintenance.
Proceedings of the 30th IEEE International Conference on Software Maintenance and Evolution, Victoria, BC, Canada, September 29, 2014

2013
Verifying Linearizability via Optimized Refinement Checking.
IEEE Trans. Software Eng., 2013


  Loading...