Yulei Sui

Orcid: 0000-0002-9510-6574

According to our database1, Yulei Sui authored at least 112 papers between 2011 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
How About Bug-Triggering Paths? - Understanding and Characterizing Learning-Based Vulnerability Detectors.
IEEE Trans. Dependable Secur. Comput., 2024

Iterative Refinement of Project-Level Code Context for Precise Code Generation with Compiler Feedback.
CoRR, 2024

NL2Formula: Generating Spreadsheet Formulas from Natural Language Queries.
CoRR, 2024

Beyond Control: Exploring Novel File System Objects for Data-Only Attacks on Linux Systems.
CoRR, 2024

The Vulnerability Is in the Details: Locating Fine-grained Information of Vulnerable Code Identified by Graph-based Detectors.
CoRR, 2024

Deep Learning for Code Intelligence: Survey, Benchmark and Toolkit.
CoRR, 2024

NL2Formula: Generating Spreadsheet Formulas from Natural Language Queries.
Proceedings of the Findings of the Association for Computational Linguistics: EACL 2024, 2024

2023
RNNtcs: A test case selection method for Recurrent Neural Networks.
Knowl. Based Syst., November, 2023

Earning Extra Performance From Restrictive Feedbacks.
IEEE Trans. Pattern Anal. Mach. Intell., October, 2023

A Container-Usage-Pattern-Based Context Debloating Approach for Object-Sensitive Pointer Analysis.
Proc. ACM Program. Lang., October, 2023

Event-aware precise dynamic slicing for automatic debugging of Android applications.
J. Syst. Softw., April, 2023

Challenging Machine Learning-Based Clone Detectors via Semantic-Preserving Code Transformations.
IEEE Trans. Software Eng., 2023

An Empirical Study of Fault Triggers in Deep Learning Frameworks.
IEEE Trans. Dependable Secur. Comput., 2023

Recursive State Machine Guided Graph Folding for Context-Free Language Reachability.
Proc. ACM Program. Lang., 2023

A Tale of Two Cities: Data and Configuration Variances in Robust Deep Learning.
IEEE Internet Comput., 2023

New challenges in reinforcement learning: a survey of security and privacy.
Artif. Intell. Rev., 2023

A Hybrid Alias Analysis and Its Application to Global Variable Protection in the Linux Kernel.
Proceedings of the 32nd USENIX Security Symposium, 2023

Compatibility Issues in Deep Learning Systems: Problems and Opportunities.
Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2023

Two Birds with One Stone: Multi-Derivation for Fast Context-Free Language Reachability Analysis.
Proceedings of the 38th IEEE/ACM International Conference on Automated Software Engineering, 2023

Why Do Deep Learning Projects Differ in Compatible Framework Versions? An Exploratory Study.
Proceedings of the 34th IEEE International Symposium on Software Reliability Engineering, 2023

Scalable Compositional Static Taint Analysis for Sensitive Data Tracing on Industrial Micro-Services.
Proceedings of the 45th IEEE/ACM International Conference on Software Engineering: Software Engineering in Practice, 2023

Uncovering Limitations in Text-to-Image Generation: A Contrastive Approach with Structured Semantic Alignment.
Proceedings of the Findings of the Association for Computational Linguistics: EMNLP 2023, 2023

2022
Reinforcement-Learning-Guided Source Code Summarization Using Hierarchical Attention.
IEEE Trans. Software Eng., 2022

A Systematical Study on Application Performance Management Libraries for Apps.
IEEE Trans. Software Eng., 2022

Taming transitive redundancy for context-free language reachability.
Proc. ACM Program. Lang., 2022

Multi-triage: A multi-task learning framework for bug triage.
J. Syst. Softw., 2022

Cross-Language Binary-Source Code Matching with Intermediate Representations.
Proceedings of the IEEE International Conference on Software Analysis, 2022

You see what I want you to see: poisoning vulnerabilities in neural code search.
Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2022

Demystifying the underground ecosystem of account registration bots.
Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2022

MalWhiteout: Reducing Label Errors in Android Malware Detection.
Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering, 2022

Path-sensitive code embedding via contrastive learning for software vulnerability detection.
Proceedings of the ISSTA '22: 31st ACM SIGSOFT International Symposium on Software Testing and Analysis, Virtual Event, South Korea, July 18, 2022

Enhancing Traceability Link Recovery with Unlabeled Data.
Proceedings of the IEEE 33rd International Symposium on Software Reliability Engineering, 2022

Field-Based Static Taint Analysis for Industrial Microservices.
Proceedings of the 44th IEEE/ACM International Conference on Software Engineering: Software Engineering in Practice, 2022

What Do They Capture? - A Structural Analysis of Pre-Trained Language Models for Source Code.
Proceedings of the 44th IEEE/ACM 44th International Conference on Software Engineering, 2022

NaturalCC: An Open-Source Toolkit for Code Intelligence.
Proceedings of the 44th IEEE/ACM International Conference on Software Engineering: Companion Proceedings, 2022

Path-sensitive and alias-aware typestate analysis for detecting OS bugs.
Proceedings of the ASPLOS '22: 27th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Lausanne, Switzerland, 28 February 2022, 2022

2021
A Comparative Study of Class Rebalancing Methods for Security Bug Report Classification.
IEEE Trans. Reliab., 2021

FCCA: Hybrid Code Representation for Functional Clone Detection Using Attention Networks.
IEEE Trans. Reliab., 2021

DeepWukong: Statically Detecting Software Vulnerabilities Using Deep Graph Neural Network.
ACM Trans. Softw. Eng. Methodol., 2021

Compacting points-to sets through object clustering.
Proc. ACM Program. Lang., 2021

A survey of Intel SGX and its applications.
Frontiers Comput. Sci., 2021

Beyond the virus: a first look at coronavirus-themed Android malware.
Empir. Softw. Eng., 2021

An exploratory study of autopilot software bugs in unmanned aerial vehicles.
Proceedings of the ESEC/FSE '21: 29th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2021

Hash Consed Points-To Sets.
Proceedings of the Static Analysis - 28th International Symposium, 2021

Runtime detection of memory errors with smart status.
Proceedings of the ISSTA '21: 30th ACM SIGSOFT International Symposium on Software Testing and Analysis, 2021

Nondeterministic Impact of CPU Multithreading on Training Deep Learning Systems.
Proceedings of the 32nd IEEE International Symposium on Software Reliability Engineering, 2021

Fix-Filter-Fix: Intuitively Connect Any Models for Effective Bug Fixing.
Proceedings of the 2021 Conference on Empirical Methods in Natural Language Processing, 2021

Object Versioning for Flow-Sensitive Pointer Analysis.
Proceedings of the IEEE/ACM International Symposium on Code Generation and Optimization, 2021

Disentangled Code Representation Learning for Multiple Programming Languages.
Proceedings of the Findings of the Association for Computational Linguistics: ACL/IJCNLP 2021, 2021

2020
Value-Flow-Based Demand-Driven Pointer Analysis for C and C++.
IEEE Trans. Software Eng., 2020

An Empirical Study of Regression Bug Chains in Linux.
IEEE Trans. Reliab., 2020

Familial Clustering for Weakly-Labeled Android Malware Using Hybrid Representation Learning.
IEEE Trans. Inf. Forensics Secur., 2020

Secure Metric Learning via Differential Pairwise Privacy.
IEEE Trans. Inf. Forensics Secur., 2020

Flow2Vec: value-flow-based precise code embedding.
Proc. ACM Program. Lang., 2020

PGFit: Static permission analysis of health and fitness apps in IoT programming frameworks.
J. Netw. Comput. Appl., 2020

Flow-Sensitive Type-Based Heap Cloning (Artifact).
Dagstuhl Artifacts Ser., 2020

NaturalCC: A Toolkit to Naturalize the Source Code Corpus.
CoRR, 2020

MUZZ: Thread-aware Grey-box Fuzzing for Effective Bug Hunting in Multithreaded Programs.
Proceedings of the 29th USENIX Security Symposium, 2020

All your app links are belong to us: understanding the threats of instant apps based attacks.
Proceedings of the ESEC/FSE '20: 28th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2020

PCA: memory leak detection using partial call-path analysis.
Proceedings of the ESEC/FSE '20: 28th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2020

Cross-Contract Static Analysis for Detecting Practical Reentrancy Vulnerabilities in Smart Contracts.
Proceedings of the 35th IEEE/ACM International Conference on Automated Software Engineering, 2020

A Literature Review of Automatic Traceability Links Recovery for Software Change Impact Analysis.
Proceedings of the ICPC '20: 28th International Conference on Program Comprehension, 2020

HINDBR: Heterogeneous Information Network Based Duplicate Bug Report Prediction.
Proceedings of the 31st IEEE International Symposium on Software Reliability Engineering, 2020

An Exploratory Study of Bugs in Extended Reality Applications on the Web.
Proceedings of the 31st IEEE International Symposium on Software Reliability Engineering, 2020

Fault Triggers in the TensorFlow Framework: An Experience Report.
Proceedings of the 31st IEEE International Symposium on Software Reliability Engineering, 2020

Clairvoyance: cross-contract static analysis for detecting practical reentrancy vulnerabilities in smart contracts.
Proceedings of the ICSE '20: 42nd International Conference on Software Engineering, Companion Volume, Seoul, South Korea, 27 June, 2020

Typestate-guided fuzzer for discovering use-after-free vulnerabilities.
Proceedings of the ICSE '20: 42nd International Conference on Software Engineering, Seoul, South Korea, 27 June, 2020

Perf-AL: Performance Prediction for Configurable Software through Adversarial Learning.
Proceedings of the ESEM '20: ACM / IEEE International Symposium on Empirical Software Engineering and Measurement, 2020

Flow-Sensitive Type-Based Heap Cloning.
Proceedings of the 34th European Conference on Object-Oriented Programming, 2020

An Empirical Study of Code Deobfuscations on Detecting Obfuscated Android Piggybacked Apps.
Proceedings of the 27th Asia-Pacific Software Engineering Conference, 2020

2019
Event trace reduction for effective bug replay of Android apps via differential GUI state analysis.
Proceedings of the ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, 2019

Per-Dereference Verification of Temporal Heap Safety via Adaptive Context-Sensitive Analysis.
Proceedings of the Static Analysis - 26th International Symposium, 2019

Fast and Precise Handling of Positive Weight Cycles for Field-Sensitive Pointer Analysis.
Proceedings of the Static Analysis - 26th International Symposium, 2019

Multi-modal Attention Network Learning for Semantic Source Code Retrieval.
Proceedings of the 34th IEEE/ACM International Conference on Automated Software Engineering, 2019

TCD: Statically Detecting Type Confusion Errors in C++ Programs.
Proceedings of the 30th IEEE International Symposium on Software Reliability Engineering, 2019

Precise Static Happens-Before Analysis for Detecting UAF Order Violations in Android.
Proceedings of the 12th IEEE Conference on Software Testing, Validation and Verification, 2019

Interactive Traceability Links Visualization using Hierarchical Trace Map.
Proceedings of the 2019 IEEE International Conference on Software Maintenance and Evolution, 2019

VFix: value-flow-guided precise program repair for null pointer dereferences.
Proceedings of the 41st International Conference on Software Engineering, 2019

Static Detection of Control-Flow-Related Vulnerabilities Using Graph Embedding.
Proceedings of the 24th International Conference on Engineering of Complex Computer Systems, 2019

2018
Loop-Oriented Pointer Analysis for Automatic SIMD Vectorization.
ACM Trans. Embed. Comput. Syst., 2018

Parallel construction of interprocedural memory SSA form.
J. Syst. Softw., 2018

Managing high-performance computing applications as an on-demand service on federated clouds.
Comput. Electr. Eng., 2018

Permission Analysis of Health and Fitness Apps in IoT Programming Frameworks.
Proceedings of the 17th IEEE International Conference On Trust, 2018

CoBOT: static C/C++ bug detection in the presence of incomplete code.
Proceedings of the 26th Conference on Program Comprehension, 2018

Launch-mode-aware context-sensitive activity transition analysis.
Proceedings of the 40th International Conference on Software Engineering, 2018

Spatio-temporal context reduction: a pointer-analysis-based static approach for detecting use-after-free vulnerabilities.
Proceedings of the 40th International Conference on Software Engineering, 2018

Live path control flow integrity.
Proceedings of the 40th International Conference on Software Engineering: Companion Proceeedings, 2018

Live Path CFI Against Control Flow Hijacking Attacks.
Proceedings of the Information Security and Privacy - 23rd Australasian Conference, 2018

2017
Demand-Driven Pointer Analysis with Strong Updates via Value-Flow Refinement.
CoRR, 2017

Incremental Analysis for Probabilistic Programs.
Proceedings of the Static Analysis - 24th International Symposium, 2017

Boosting the precision of virtual call integrity protection with partial pointer analysis for C++.
Proceedings of the 26th ACM SIGSOFT International Symposium on Software Testing and Analysis, Santa Barbara, CA, USA, July 10, 2017

Machine-Learning-Guided Typestate Analysis for Static Use-After-Free Detection.
Proceedings of the 33rd Annual Computer Security Applications Conference, 2017

2016
Eliminating Redundant Bounds Checks in Dynamic Buffer Overflow Detection Using Weakest Preconditions.
IEEE Trans. Reliab., 2016

On-demand strong update analysis via value-flow refinement.
Proceedings of the 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering, 2016

Automated memory leak fixing on value-flow slices for C programs.
Proceedings of the 31st Annual ACM Symposium on Applied Computing, 2016

Accelerating Dynamic Data Race Detection Using Static Thread Interference Analysis.
Proceedings of the 7th International Workshop on Programming Models and Applications for Multicores and Manycores, 2016

Loop-oriented array- and field-sensitive pointer analysis for automatic SIMD vectorization.
Proceedings of the 17th ACM SIGPLAN/SIGBED Conference on Languages, 2016

Sparse flow-sensitive pointer analysis for multithreaded programs.
Proceedings of the 2016 International Symposium on Code Generation and Optimization, 2016

SVF: interprocedural static value-flow analysis in LLVM.
Proceedings of the 25th International Conference on Compiler Construction, 2016

2015
Region-Based May-Happen-in-Parallel Analysis for C Programs.
Proceedings of the 44th International Conference on Parallel Processing, 2015

Contention-Aware Scheduling for Asymmetric Multicore Processors.
Proceedings of the 21st IEEE International Conference on Parallel and Distributed Systems, 2015

2014
Developing practical pointer analysis for large-scale software.
PhD thesis, 2014

Detecting Memory Leaks Statically with Full-Sparse Value-Flow Analysis.
IEEE Trans. Software Eng., 2014

Making context-sensitive inclusion-based pointer analysis practical for compilers using parameterised summarisation.
Softw. Pract. Exp., 2014

Region-Based Selective Flow-Sensitive Pointer Analysis.
Proceedings of the Static Analysis - 21st International Symposium, 2014

WPBOUND: Enforcing Spatial Memory Safety Efficiently at Runtime with Weakest Preconditions.
Proceedings of the 25th IEEE International Symposium on Software Reliability Engineering, 2014

Self-inferencing Reflection Resolution for Java.
Proceedings of the ECOOP 2014 - Object-Oriented Programming - 28th European Conference, Uppsala, Sweden, July 28, 2014

Accelerating Dynamic Detection of Uses of Undefined Values with Static Value-Flow Analysis.
Proceedings of the 12th Annual IEEE/ACM International Symposium on Code Generation and Optimization, 2014

2013
Query-directed adaptive heap cloning for optimizing compilers.
Proceedings of the 2013 IEEE/ACM International Symposium on Code Generation and Optimization, 2013

2012
Static memory leak detection using full-sparse value-flow analysis.
Proceedings of the International Symposium on Software Testing and Analysis, 2012

Automatic Parallelization of Tiled Loop Nests with Enhanced Fine-Grained Parallelism on GPUs.
Proceedings of the 41st International Conference on Parallel Processing, 2012

2011
SPAS: Scalable Path-Sensitive Pointer Analysis on Full-Sparse SSA.
Proceedings of the Programming Languages and Systems - 9th Asian Symposium, 2011


  Loading...