default search action
Yanjie Zhao
This is just a disambiguation page, and is not intended to be the bibliography of an actual person. Any publication listed on this page has not been assigned to an actual author yet. If you know the true author of one of the publications listed below, you are welcome to contact us.
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j16]Xue Li, Xiaomei Yu, Guanlin Liu, Xingxu Fan, Fengru Ge, Yanjie Zhao, Xiangwei Zheng:
Transformer-based medication recommendation with a multiple graph augmentation strategy. Expert Syst. Appl. 257: 125091 (2024) - [j15]Juncai Guo, Jin Liu, Xiao Liu, Yao Wan, Yanjie Zhao, Li Li, Kui Liu, Jacques Klein, Tegawendé F. Bissyandé:
PyScribe-Learning to describe python code. Softw. Pract. Exp. 54(3): 501-527 (2024) - [j14]Tianle Zhang, Zhen Liu, Jianqiang Yi, Shiguang Wu, Zhiqiang Pu, Yanjie Zhao:
Multiexperience-Assisted Efficient Multiagent Reinforcement Learning. IEEE Trans. Neural Networks Learn. Syst. 35(9): 12678-12692 (2024) - [j13]Pei Liu, Yanjie Zhao, Mattia Fazzini, Haipeng Cai, John Grundy, Li Li:
Automatically Detecting Incompatible Android APIs. ACM Trans. Softw. Eng. Methodol. 33(1): 15:1-15:33 (2024) - [c27]Kai Ma, Zhuo Wang, Yanjie Zhao, Haoyu Wang:
Decoding Web3: In-depth Analysis of the Third-Party Package Supply Chain. Internetware 2024 - [c26]Chao Wang, Tianming Liu, Yanjie Zhao, Lin Zhang, Xiaoning Du, Li Li, Haoyu Wang:
Towards Demystifying Android Adware: Dataset and Payload Location. ASE Workshops 2024: 167-175 - [c25]Liangxuan Wu, Yanjie Zhao, Chao Wang, Tianming Liu, Haoyu Wang:
A First Look at LLM-powered Smartphones. ASE Workshops 2024: 208-217 - [c24]Liangxuan Wu, Yanjie Zhao, Xinyi Hou, Tianming Liu, Haoyu Wang:
ChatGPT Chats Decoded: Uncovering Prompt Patterns for Superior Solutions in Software Development Lifecycle. MSR 2024: 142-146 - [i25]Shenao Wang, Yanjie Zhao, Xinyi Hou, Haoyu Wang:
Large Language Model Supply Chain: A Research Agenda. CoRR abs/2404.12736 (2024) - [i24]Yanjie Zhao, Xinyi Hou, Shenao Wang, Haoyu Wang:
LLM App Store Analysis: A Vision and Roadmap. CoRR abs/2404.12737 (2024) - [i23]Hanxiang Xu, Shenao Wang, Ningke Li, Kailong Wang, Yanjie Zhao, Kai Chen, Ting Yu, Yang Liu, Haoyu Wang:
Large Language Models for Cyber Security: A Systematic Literature Review. CoRR abs/2405.04760 (2024) - [i22]Dongxun Su, Yanjie Zhao, Xinyi Hou, Shenao Wang, Haoyu Wang:
GPT Store Mining and Analysis. CoRR abs/2405.10210 (2024) - [i21]Wangchenlu Huang, Shenao Wang, Yanjie Zhao, Guosheng Xu, Haoyu Wang:
Seeing is (Not) Believing: Practical Phishing Attacks Targeting Social Media Sharing Cards. CoRR abs/2405.10758 (2024) - [i20]Xinyi Hou, Yanjie Zhao, Shenao Wang, Haoyu Wang:
GPTZoo: A Large-scale Dataset of GPTs for the Research Community. CoRR abs/2405.15630 (2024) - [i19]Zikan Dong, Yanjie Zhao, Tianming Liu, Chao Wang, Guosheng Xu, Guoai Xu, Haoyu Wang:
Same App, Different Behaviors: Uncovering Device-specific Behaviors in Android Apps. CoRR abs/2406.09807 (2024) - [i18]Xinyu She, Yanjie Zhao, Haoyu Wang:
WaDec: Decompile WebAssembly Using Large Language Model. CoRR abs/2406.11346 (2024) - [i17]Dianshu Liao, Shidong Pan, Siyuan Yang, Yitong Wang, Yanjie Zhao, Zhenchang Xing, Xiaoyu Sun:
Automatically Analyzing Performance Issues in Android Apps: How Far Are We? CoRR abs/2407.05090 (2024) - [i16]Daihang Chen, Yonghui Liu, Mingyi Zhou, Yanjie Zhao, Haoyu Wang, Shuai Wang, Xiao Chen, Tegawendé F. Bissyandé, Jacques Klein, Li Li:
LLM for Mobile: An Initial Roadmap. CoRR abs/2407.06573 (2024) - [i15]Xinyi Hou, Yanjie Zhao, Haoyu Wang:
On the (In)Security of LLM App Stores. CoRR abs/2407.08422 (2024) - [i14]Xinyi Hou, Yanjie Zhao, Haoyu Wang:
Voices from the Frontier: A Comprehensive Analysis of the OpenAI Developer Forum. CoRR abs/2408.01687 (2024) - [i13]Ziwei Yan, Yanjie Zhao, Haoyu Wang:
VoiceWukong: Benchmarking Deepfake Voice Detection. CoRR abs/2409.06348 (2024) - [i12]Xinyi Zheng, Chen Wei, Shenao Wang, Yanjie Zhao, Peiming Gao, Yuanchao Zhang, Kailong Wang, Haoyu Wang:
Towards Robust Detection of Open Source Software Supply Chain Poisoning Attacks in Industry Environments. CoRR abs/2409.09356 (2024) - [i11]Jian Zhao, Shenao Wang, Yanjie Zhao, Xinyi Hou, Kailong Wang, Peiming Gao, Yuanchao Zhang, Chen Wei, Haoyu Wang:
Models Are Codes: Towards Measuring Malicious Code Poisoning Attacks on Pre-trained Model Hubs. CoRR abs/2409.09368 (2024) - [i10]Ting Zhou, Yanjie Zhao, Xinyi Hou, Xiaoyu Sun, Kai Chen, Haoyu Wang:
Bridging Design and Development with Automated Declarative UI Code Generation. CoRR abs/2409.11667 (2024) - [i9]Shidong Pan, Litian Wang, Tianyi Zhang, Zhenchang Xing, Yanjie Zhao, Qinghua Lu, Xiaoyu Sun:
"I Don't Use AI for Everything": Exploring Utility, Attitude, and Responsibility of AI-empowered Tools in Software Development. CoRR abs/2409.13343 (2024) - [i8]Zhihao Lin, Wei Ma, Mingyi Zhou, Yanjie Zhao, Haoyu Wang, Yang Liu, Jun Wang, Li Li:
PathSeeker: Exploring LLM Security Vulnerabilities with a Reinforcement Learning-Based Jailbreak Approach. CoRR abs/2409.14177 (2024) - 2023
- [j12]Yanjie Zhao, Huicheng Lai, Guxue Gao:
HATFNet: Hierarchical adaptive trident fusion network for RGBT tracking. Appl. Intell. 53(20): 24187-24201 (2023) - [j11]Xiaopeng Wen, Huicheng Lai, Guxue Gao, Yanjie Zhao:
Video abnormal behaviour detection based on pseudo-3D encoder and multi-cascade memory mechanism. IET Image Process. 17(3): 709-721 (2023) - [j10]Yanjie Zhao, Jin Cheng, Shaohua Wang, Lei Qin, Xueyan Zhang:
Spatiotemporal Analytics of Environmental Sounds and Influencing Factors Based on Urban Sensor Network Data. ISPRS Int. J. Geo Inf. 12(9): 386 (2023) - [j9]Yanjie Zhao, Li Li, Haoyu Wang, Qiang He, John C. Grundy:
APIMatchmaker: Matching the Right APIs for Supporting the Development of Android Apps. IEEE Trans. Software Eng. 49(1): 113-130 (2023) - [c23]Haonan Hu, Yue Liu, Yanjie Zhao, Yonghui Liu, Xiaoyu Sun, Chakkrit Tantithamthavorn, Li Li:
Detecting Temporal Inconsistency in Biased Datasets for Android Malware Detection. ASEW 2023: 17-23 - [c22]Tianzhi Ma, Yanjie Zhao, Li Li, Liang Liu:
CiD4HMOS: A Solution to HarmonyOS Compatibility Issues. ASE 2023: 2006-2017 - [c21]Shenao Wang, Yanjie Zhao, Kailong Wang, Haoyu Wang:
On the Usage-scenario-based Data Minimization in Mini Programs. SaTS@CCS 2023: 29-32 - [c20]Yanjie Zhao, Yue Zhang, Haoyu Wang:
Potential Risks Arising from the Absence of Signature Verification in Miniapp Plugins. SaTS@CCS 2023: 59-64 - [c19]Yanjie Zhao, Tianming Liu, Haoyu Wang, Yepang Liu, John C. Grundy, Li Li:
Are Mobile Advertisements in Compliance with App's Age Group? WWW 2023: 3132-3141 - [i7]Xinyi Hou, Yanjie Zhao, Yue Liu, Zhou Yang, Kailong Wang, Li Li, Xiapu Luo, David Lo, John C. Grundy, Haoyu Wang:
Large Language Models for Software Engineering: A Systematic Literature Review. CoRR abs/2308.10620 (2023) - [i6]Xinyu She, Yue Liu, Yanjie Zhao, Yiling He, Li Li, Chakkrit Tantithamthavorn, Zhan Qin, Haoyu Wang:
Pitfalls in Language Models for Code Intelligence: A Taxonomy and Survey. CoRR abs/2310.17903 (2023) - 2022
- [j8]Yanjie Zhao, Chengdong Peng, Shaofang Wang, Xinyue Liang, Xiaoyan Meng:
The feasibility investigation of AI -assisted compressed sensing in kidney MR imaging: an ultra-fast T2WI imaging technology. BMC Medical Imaging 22(1): 119 (2022) - [j7]Ying Shang, Maocheng Sun, Chen Wang, Jian Yang, Yuankai Du, Jichao Yi, Wenan Zhao, Yingying Wang, Yanjie Zhao, Jiasheng Ni:
Research Progress in Distributed Acoustic Sensing Techniques. Sensors 22(16): 6060 (2022) - [c18]Yinteng Huang, Yanjie Zhao, Liudan Zhu, Bingshuang Han, Zhiguo Li:
Challenges and Reflections on Vocational Education in 6G Era. 6GN (2) 2022: 342-353 - [c17]Yanjie Zhao, Li Li, Xiaoyu Sun, Pei Liu, John Grundy:
Code Implementation Recommendation for Android GUI Components. ICSE-Companion 2022: 31-35 - [c16]Yanjie Zhao, Li Li, Kui Liu, John C. Grundy:
Towards Automatically Repairing Compatibility Issues in Published Android Apps. ICSE 2022: 2142-2153 - [c15]Pei Liu, Yanjie Zhao, Haipeng Cai, Mattia Fazzini, John C. Grundy, Li Li:
Automatically detecting API-induced compatibility issues in Android apps: a comparative analysis (replicability study). ISSTA 2022: 617-628 - [c14]Xiaoyu Sun, Xiao Chen, Yanjie Zhao, Pei Liu, John Grundy, Li Li:
Mining Android API Usage to Generate Unit Test Cases for Pinpointing Compatibility Issues. ASE 2022: 70:1-70:13 - [c13]Pei Liu, Xiaoyu Sun, Yanjie Zhao, Yonghui Liu, John Grundy, Li Li:
A First Look at CI/CD Adoptions in Open-Source Android Apps. ASE 2022: 201:1-201:6 - [i5]Pei Liu, Yanjie Zhao, Haipeng Cai, Mattia Fazzini, John C. Grundy, Li Li:
Automatically Detecting API-induced Compatibility Issues in Android Apps: A Comparative Analysis (Replicability Study). CoRR abs/2205.15561 (2022) - [i4]Xiaoyu Sun, Xiao Chen, Yanjie Zhao, Pei Liu, John C. Grundy, Li Li:
Mining Android API Usage to Generate Unit Test Cases for Pinpointing Compatibility Issues. CoRR abs/2208.13417 (2022) - [i3]Pei Liu, Xiaoyu Sun, Yanjie Zhao, Yonghui Liu, John C. Grundy, Li Li:
A First Look at CI/CD Adoptions in Open-Source Android Apps. CoRR abs/2210.12581 (2022) - 2021
- [j6]Pingfan Kong, Li Li, Jun Gao, Timothée Riom, Yanjie Zhao, Tegawendé F. Bissyandé, Jacques Klein:
ANCHOR: locating android framework-specific crashing faults. Autom. Softw. Eng. 28(2): 10 (2021) - [j5]Yanjie Zhao, Li Li, Xiaoyu Sun, Pei Liu, John C. Grundy:
Icon2Code: Recommending code implementations for Android GUI components. Inf. Softw. Technol. 138: 106619 (2021) - [j4]Yanjie Zhao, Li Li, Haoyu Wang, Haipeng Cai, Tegawendé F. Bissyandé, Jacques Klein, John C. Grundy:
On the Impact of Sample Duplication in Machine-Learning-Based Android Malware Detection. ACM Trans. Softw. Eng. Methodol. 30(3): 40:1-40:38 (2021) - [c12]Yang Liu, Yating Li, Yanjie Zhao, Xitai Na:
Image Classification and Recognition of Medicinal Plants Based on Convolutional Neural Network. ICCT 2021: 1128-1133 - [c11]Yanjie Zhao:
Design of the NAT Simulation Experiment based on Inquiry Teaching. ICEMT 2021: 73-79 - [c10]Ryan Price, Mahnoosh Mehrabani, Narendra Gupta, Yeon-Jun Kim, Shahab Jalalvand, Minhua Chen, Yanjie Zhao, Srinivas Bangalore:
A Hybrid Approach to Scalable and Robust Spoken Language Understanding in Enterprise Virtual Agents. NAACL-HLT (Industry Papers) 2021: 63-71 - 2020
- [j3]Wanmai Yuan, Nuwan Ganganath, Chi-Tsun Cheng, Qing Guo, Francis C. M. Lau, Yanjie Zhao:
Path-Planning-Enabled Semiflocking Control for Multitarget Monitoring in Mobile Sensor Networks. IEEE Trans. Ind. Informatics 16(7): 4778-4787 (2020) - [c9]Pei Liu, Li Li, Yanjie Zhao, Xiaoyu Sun, John Grundy:
AndroZooOpen: Collecting Large-scale Open Source Android Apps for the Research Community. MSR 2020: 548-552 - [i2]Pingfan Kong, Li Li, Jun Gao, Timothée Riom, Yanjie Zhao, Tegawendé F. Bissyandé, Jacques Klein:
Anchor: Locating Android Framework-specific Crashing Faults. CoRR abs/2008.01676 (2020)
2010 – 2019
- 2019
- [j2]Jiatong Li, Yanjie Zhao, Zhiguo Jiang:
Correlation-guided multi-object tracking with correlation feature transfer. IET Comput. Vis. 13(2): 139-145 (2019) - [c8]Yanjie Zhao, Haoyu Wang, Lei Ma, Yuxin Liu, Li Li, John Grundy:
Knowledge Graphing Git Repositories: A Preliminary Study. SANER 2019: 599-603 - [i1]Jianwei Zhao, Qi Dong, Yanjie Zhao, Bolei Wang, Feifei Gao:
Time Varying Channel Tracking for Multi-UAV Wideband Communications with Beam Squint. CoRR abs/1911.09433 (2019) - 2017
- [c7]Wietske van Osch, Charles Steinfield, Yanjie Zhao:
Spanning the Boundary: Measuring the Realized and Lifecycle Impact of Distinct Boundary Spanning Activities on Project Success and Completion. HICSS 2017: 1-10 - 2016
- [j1]Xiaoquan Yang, Yang Zhang, Kai Zhao, Yanjie Zhao, Yanyan Liu, Hui Gong, Qingming Luo, Dan Zhu:
Skull Optical Clearing Solution for Enhancing Ultrasonic and Photoacoustic Imaging. IEEE Trans. Medical Imaging 35(8): 1903-1906 (2016) - [c6]Wietske van Osch, Charles Steinfield, Yanjie Zhao:
Towards Behavioral Measures of boundary Spanning Success: the Effectiveness and Efficiency of Team boundary Spanning in Enterprise Social Media. ECIS 2016: Research Paper 161 - [c5]Wietske van Osch, Charles Steinfield, Yanjie Zhao:
Team Boundary Spanning through Enterprise Social Media: Exploring the Effects of Group-Level Diversity Using a Data Science Approach. HICSS 2016: 2176-2185 - [c4]Yanjie Zhao:
Network intrusion detection system model based on data mining. SNPD 2016: 155-160 - 2015
- [c3]Charles Steinfield, Wietske van Osch, Yanjie Zhao:
Intra-Organizational Boundary Spanning: A Machine Learning Approach. AMCIS 2015
2000 – 2009
- 2003
- [c2]Yanjie Zhao:
Developing Pattern Implementation Knowledge for Reinforcing Software Design Patterns. Applied Informatics 2003: 967-972
1990 – 1999
- 1996
- [c1]Yanjie Zhao, Tetsuya Sakurai, Hiroshi Sugiura, Tatsuo Torii:
A Methodology of Parsing Mathematical Notation for Mathematical Computation. ISSAC 1996: 292-300
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-07 20:31 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint