Mingyang Li

Orcid: 0009-0008-7936-5593

Affiliations:
  • Chinese Academy of Sciences, Institute of Software, State Key Laboratory of Intelligent Game, Beijing, China


According to our database1, Mingyang Li authored at least 33 papers between 2018 and 2025.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2025
Diagnosing Failure Root Causes in Platform-Orchestrated Agentic Systems: Dataset, Taxonomy, and Benchmark.
CoRR, September, 2025

VulRTex: A Reasoning-Guided Approach to Identify Vulnerabilities from Rich-Text Issue Report.
CoRR, September, 2025

A Roadmap for Software Testing in Open-Collaborative and AI-Powered Era.
ACM Trans. Softw. Eng. Methodol., June, 2025

Joint-GCG: Unified Gradient-Based Poisoning Attacks on Retrieval-Augmented Generation Systems.
CoRR, June, 2025

AdInject: Real-World Black-Box Attacks on Web Agents via Advertising Delivery.
CoRR, May, 2025

One Shot Dominance: Knowledge Poisoning Attack on Retrieval-Augmented Generation Systems.
CoRR, May, 2025

One Sentence Can Kill the Bug: Auto-Replay Mobile App Crashes From One-Sentence Overviews.
IEEE Trans. Software Eng., April, 2025

From Allies to Adversaries: Manipulating LLM Tool-Calling through Adversarial Injection.
Proceedings of the 2025 Conference of the Nations of the Americas Chapter of the Association for Computational Linguistics: Human Language Technologies, 2025

Mimicking the Familiar: Dynamic Command Generation for Information Theft Attacks in LLM Tool-Learning System.
Proceedings of the 63rd Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers), 2025

2024
What External Knowledge is Preferred by LLMs? Characterizing and Exploring Chain of Evidence in Imperfect Context.
CoRR, 2024

CodePurify: Defend Backdoor Attacks on Neural Code Models via Entropy-based Purification.
CoRR, 2024

Adversarial Robustness of Open-source Text Classification Models and Fine-Tuning Chains.
CoRR, 2024

A Roadmap for Software Testing in Open Collaborative Development Environments.
CoRR, 2024

VEglue: Testing Visual Entailment Systems via Object-Aligned Joint Erasing.
CoRR, 2024

Adversarial Testing for Visual Grounding via Image-Aware Property Reduction.
CoRR, 2024

AutoLabel: Automated Textual Data Annotation Method Based on Active Learning and Large Language Model.
Proceedings of the Knowledge Science, Engineering and Management, 2024

Repairing Catastrophic-Neglect in Text-to-Image Diffusion Models via Attention-Guided Feature Enhancement.
Proceedings of the Findings of the Association for Computational Linguistics: EMNLP 2024, 2024

LD-DOC: Light-Weight Domain-Adaptive Document Layout Analysis.
Proceedings of the Document Analysis Systems - 16th IAPR International Workshop, 2024

Play Guessing Game with LLM: Indirect Jailbreak Attack with Implicit Clues.
Proceedings of the Findings of the Association for Computational Linguistics, 2024

2023
Context-aware Bug Reproduction for Mobile Apps.
Proceedings of the 45th IEEE/ACM International Conference on Software Engineering, 2023

Cross-Domain Requirements Linking via Adversarial-based Domain Adaptation.
Proceedings of the 45th IEEE/ACM International Conference on Software Engineering, 2023

2022
Detecting coreferent entities in natural language requirements.
Requir. Eng., 2022

Automated data function extraction from textual requirements by leveraging semi-supervised CRF and language model.
Inf. Softw. Technol., 2022

Putting them under microscope: a fine-grained approach for detecting redundant test cases in natural language.
Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2022

2021
Construction and application of knowledge graph of domestic operating system testing.
Proceedings of the CSSE 2021: 2021 4th International Conference on Computer Science and Software Engineering, Singapore, October 22, 2021

2020
Learning to extract transaction function from requirements: an industrial case on financial software.
Proceedings of the ESEC/FSE '20: 28th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2020

A Deep Context-wise Method for Coreference Detection in Natural Language Requirements.
Proceedings of the 28th IEEE International Requirements Engineering Conference, 2020

A Deep Multitask Learning Approach for Requirements Discovery and Annotation from Open Forum.
Proceedings of the 35th IEEE/ACM International Conference on Automated Software Engineering, 2020

Automated Extraction of Requirement Entities by Leveraging LSTM-CRF and Transfer Learning.
Proceedings of the IEEE International Conference on Software Maintenance and Evolution, 2020

Detection of hidden feature requests from massive chat messages via deep siamese network.
Proceedings of the ICSE '20: 42nd International Conference on Software Engineering, Seoul, South Korea, 27 June, 2020

2019
Images don't lie: Duplicate crowdtesting reports detection with screenshot information.
Inf. Softw. Technol., 2019

Are All Duplicates Value-Neutral? An Empirical Analysis of Duplicate Issue Reports.
Proceedings of the 19th IEEE International Conference on Software Quality, 2019

2018
Cutting Away the Confusion From Crowdtesting.
CoRR, 2018


  Loading...