Wei Yang

Orcid: 0000-0002-5338-7347

Affiliations:
  • University of Texas at Dallas, TX, USA
  • University of Illinois at Urbana-Champaign, Department of Computer Science, Urbana, IL, USA


According to our database1, Wei Yang authored at least 61 papers between 2013 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
WEFix: Intelligent Automatic Generation of Explicit Waits for Efficient Web End-to-End Flaky Tests.
CoRR, 2024

Uncertainty Awareness of Large Language Models Under Code Distribution Shifts: A Benchmark Study.
CoRR, 2024

PPM: Automated Generation of Diverse Programming Problems for Benchmarking Code Generation Models.
CoRR, 2024

2023
MIMONet: Multi-Input Multi-Output On-Device Deep Learning.
CoRR, 2023

SlothSpeech: Denial-of-service Attack Against Speech Recognition Models.
CoRR, 2023

RT-LM: Uncertainty-Aware Resource Management for Real-Time Inference of Language Models.
Proceedings of the IEEE Real-Time Systems Symposium, 2023

DyCL: Dynamic Neural Network Compilation Via Program Rewriting and Graph Optimization.
Proceedings of the 32nd ACM SIGSOFT International Symposium on Software Testing and Analysis, 2023

AntiNODE: Evaluating Efficiency Robustness of Neural ODEs.
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023

Dynamic Neural Network is All You Need: Understanding the Robustness of Dynamic Mechanisms in Neural Networks.
Proceedings of the IEEE/CVF International Conference on Computer Vision, 2023

The Dark Side of Dynamic Routing Neural Networks: Towards Efficiency Backdoor Injection.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2023

Dynamic Transformers Provide a False Sense of Efficiency.
Proceedings of the 61st Annual Meeting of the Association for Computational Linguistics (Volume 1: Long Papers), 2023

2022
Learning to Reverse DNNs from AI Programs Automatically.
CoRR, 2022

NMTSloth: understanding and testing efficiency degradation of neural machine translation systems.
Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2022

DeepPerform: An Efficient Approach for Performance Testing of Resource-Constrained Neural Networks.
Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering, 2022

An Empirical Analysis of Compatibility Issues for Industrial Mobile Games (Practical Experience Report).
Proceedings of the IEEE 33rd International Symposium on Software Reliability Engineering, 2022

Learn to Reverse DNNs from AI Programs Automatically.
Proceedings of the Thirty-First International Joint Conference on Artificial Intelligence, 2022

VulCNN: An Image-inspired Scalable Vulnerability Detection System.
Proceedings of the 44th IEEE/ACM 44th International Conference on Software Engineering, 2022

EREBA: Black-box Energy Testing of Adaptive Neural Networks.
Proceedings of the 44th IEEE/ACM 44th International Conference on Software Engineering, 2022

CorrGAN: Input Transformation Technique Against Natural Corruptions.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition Workshops, 2022

NICGSlowDown: Evaluating the Efficiency Robustness of Neural Image Caption Generation Models.
Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2022

TestAug: A Framework for Augmenting Capability-based NLP Tests.
Proceedings of the 29th International Conference on Computational Linguistics, 2022

2021
IntDroid: Android Malware Detection Based on API Intimacy Analysis.
ACM Trans. Softw. Eng. Methodol., 2021

Boosting the Capability of Intelligent Vulnerability Detection by Training in a Human-Learning Manner.
CoRR, 2021

Estimating Predictive Uncertainty Under Program Data Distribution Shift.
CoRR, 2021

Obfuscation-resilient Android Malware Analysis Based on Contrastive Learning.
CoRR, 2021

Speculating Ineffective UI Exploration via Trace Analysis.
CoRR, 2021

Vet: identifying and avoiding UI exploration tarpits.
Proceedings of the ESEC/FSE '21: 29th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2021

GLIB: towards automated test oracle for graphically-rich applications.
Proceedings of the ESEC/FSE '21: 29th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2021

HomDroid: detecting Android covert malware by social-network homophily analysis.
Proceedings of the ISSTA '21: 30th ACM SIGSOFT International Symposium on Software Testing and Analysis, 2021

WebEvo: taming web application evolution via detecting semantic structure changes.
Proceedings of the ISSTA '21: 30th ACM SIGSOFT International Symposium on Software Testing and Analysis, 2021

Acoustic fingerprint based smart mobiles indoor localization under dense NLOS environment.
Proceedings of the IEEE International Conference on Signal Processing, 2021

UI-Based Flaky Tests Dataset.
Proceedings of the 43rd IEEE/ACM International Conference on Software Engineering: Companion Proceedings, 2021

An Empirical Analysis of UI-based Flaky Tests.
Proceedings of the 43rd IEEE/ACM International Conference on Software Engineering, 2021

2020
TextExerciser: Feedback-driven Text Input Exercising for Android Applications.
Proceedings of the 2020 IEEE Symposium on Security and Privacy, 2020

DENAS: automated rule generation by knowledge extraction from neural networks.
Proceedings of the ESEC/FSE '20: 28th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2020

SCDetector: Software Functional Clone Detection Based on Semantic Tokens Analysis.
Proceedings of the 35th IEEE/ACM International Conference on Automated Software Engineering, 2020

Database-Access Performance Antipatterns in Database-Backed Web Applications.
Proceedings of the IEEE International Conference on Software Maintenance and Evolution, 2020

ILFO: Adversarial Attack on Adaptive Neural Networks.
Proceedings of the 2020 IEEE/CVF Conference on Computer Vision and Pattern Recognition, 2020

2019
REINAM: reinforcement learning for input-grammar inference.
Proceedings of the ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2019

MalScan: Fast Market-Wide Mobile Malware Scanning by Social-Network Centrality Analysis.
Proceedings of the 34th IEEE/ACM International Conference on Automated Software Engineering, 2019

Testing untestable neural machine translation: an industrial case.
Proceedings of the 41st International Conference on Software Engineering: Companion Proceedings, 2019

Detecting Failures of Neural Machine Translation in the Absence of Reference Translations.
Proceedings of the 49th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2019

Charting the Attack Surface of Trigger-Action IoT Platforms.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
MULDEF: Multi-model-based Defense Against Adversarial Examples for Neural Networks.
CoRR, 2018

Oracle-free Detection of Translation Issue for Neural Machine Translation.
CoRR, 2018

A Large-Scale Empirical Study on Android Runtime-Permission Rationale Messages.
Proceedings of the 2018 IEEE Symposium on Visual Languages and Human-Centric Computing, 2018

Mining Android App Descriptions for Permission Requirements Recommendation.
Proceedings of the 26th IEEE International Requirements Engineering Conference, 2018

An empirical study of Android test generation tools in industrial cases.
Proceedings of the 33rd ACM/IEEE International Conference on Automated Software Engineering, 2018

EnMobile: entity-based characterization and analysis of mobile malware.
Proceedings of the 40th International Conference on Software Engineering, 2018

SemRegex: A Semantics-Based Approach for Generating Regular Expressions from Natural Language Specifications.
Proceedings of the 2018 Conference on Empirical Methods in Natural Language Processing, Brussels, Belgium, October 31, 2018

Property Inference Attacks on Fully Connected Neural Networks using Permutation Invariant Representations.
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications Security, 2018

Generating Regular Expressions from Natural Language Specifications: Are We There Yet?
Proceedings of the Workshops of the The Thirty-Second AAAI Conference on Artificial Intelligence, 2018

Telemade: A Testing Framework for Learning-Based Malware Detection Systems.
Proceedings of the Workshops of the The Thirty-Second AAAI Conference on Artificial Intelligence, 2018

2017
Automated Test Input Generation for Android: Towards Getting There in an Industrial Case.
Proceedings of the 39th IEEE/ACM International Conference on Software Engineering: Software Engineering in Practice Track, 2017

Malware Detection in Adversarial Settings: Exploiting Feature Evolutions and Confusions in Android Apps.
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017

2016
Automated test input generation for Android: are we really there yet in an industrial case?
Proceedings of the 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering, 2016

Free for All! Assessing User Data Exposure to Advertising Libraries on Android.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016

2015
AppContext: Differentiating Malicious and Benign Mobile App Behaviors Using Context.
Proceedings of the 37th IEEE/ACM International Conference on Software Engineering, 2015

2014
Improving mobile application security via bridging user expectations and application behaviors.
Proceedings of the 2014 Symposium and Bootcamp on the Science of Security, 2014

2013
WHYPER: Towards Automating Risk Assessment of Mobile Applications.
Proceedings of the 22th USENIX Security Symposium, Washington, DC, USA, August 14-16, 2013, 2013

A Grey-Box Approach for Automated GUI-Model Generation of Mobile Applications.
Proceedings of the Fundamental Approaches to Software Engineering, 2013


  Loading...