default search action
Xusheng Xiao
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c60]Haodong Li, Guosheng Xu, Liu Wang, Xusheng Xiao, Xiapu Luo, Guoai Xu, Haoyu Wang:
MalCertain: Enhancing Deep Neural Network Based Android Malware Detection by Tackling Prediction Uncertainty. ICSE 2024: 150:1-150:13 - [c59]Shaofei Li, Feng Dong, Xusheng Xiao, Haoyu Wang, Fei Shao, Jiedong Chen, Yao Guo, Xiangqun Chen, Ding Li:
NODLINK: An Online System for Fine-Grained APT Attack Detection and Investigation. NDSS 2024 - [c58]Zhongyu Ouyang, Chunhui Zhang, Shifu Hou, Shang Ma, Chaoran Chen, Toby Li, Xusheng Xiao, Chuxu Zhang, Yanfang Ye:
Symbolic Prompt Tuning Completes the App Promotion Graph. ECML/PKDD (10) 2024: 183-198 - [i17]Shang Ma, Chaoran Chen, Shao Yang, Shifu Hou, Toby Jia-Jun Li, Xusheng Xiao, Tao Xie, Yanfang Ye:
Careful About What App Promotion Ads Recommend! Detecting and Explaining Malware Promotion via App Promotion Graph. CoRR abs/2410.07588 (2024) - 2023
- [j13]Yi Liu, Yun Ma, Xusheng Xiao, Tao Xie, Xuanzhe Liu:
LegoDroid: flexible Android app decomposition and instant installation. Sci. China Inf. Sci. 66(4) (2023) - [j12]Le Yu, Haoyu Wang, Xiapu Luo, Tao Zhang, Kang Liu, Jiachi Chen, Hao Zhou, Yutian Tang, Xusheng Xiao:
Towards Automatically Localizing Function Errors in Mobile Apps With User Reviews. IEEE Trans. Software Eng. 49(4): 1464-1486 (2023) - [c57]Feng Dong, Shaofei Li, Peng Jiang, Ding Li, Haoyu Wang, Liangyi Huang, Xusheng Xiao, Jiedong Chen, Xiapu Luo, Yao Guo, Xiangqun Chen:
Are we there yet? An Industrial Viewpoint on Provenance-based Endpoint Detection and Response Tools. CCS 2023: 2396-2410 - [c56]Pengcheng Fang, Zhenhua Zou, Xusheng Xiao, Zhuotao Liu:
iSyn: Semi-automated Smart Contract Synthesis from Legal Financial Agreements. ISSTA 2023: 727-739 - [c55]Shi Meng, Liu Wang, Shenao Wang, Kailong Wang, Xusheng Xiao, Guangdong Bai, Haoyu Wang:
Wemint:Tainting Sensitive Data Leaks in WeChat Mini-Programs. ASE 2023: 1403-1415 - [c54]Zhaohan Xi, Tianyu Du, Changjiang Li, Ren Pang, Shouling Ji, Xiapu Luo, Xusheng Xiao, Fenglong Ma, Ting Wang:
On the Security Risks of Knowledge Graph Reasoning. USENIX Security Symposium 2023: 3259-3276 - [c53]Feng Dong, Liu Wang, Xu Nie, Fei Shao, Haoyu Wang, Ding Li, Xiapu Luo, Xusheng Xiao:
DISTDET: A Cost-Effective Distributed Cyber Threat Detection System. USENIX Security Symposium 2023: 6575-6592 - [i16]Zhaohan Xi, Tianyu Du, Changjiang Li, Ren Pang, Shouling Ji, Xiapu Luo, Xusheng Xiao, Fenglong Ma, Ting Wang:
On the Security Risks of Knowledge Graph Reasoning. CoRR abs/2305.02383 (2023) - [i15]Feng Dong, Shaofei Li, Peng Jiang, Ding Li, Haoyu Wang, Liangyi Huang, Xusheng Xiao, Jiedong Chen, Xiapu Luo, Yao Guo, Xiangqun Chen:
Are we there yet? An Industrial Viewpoint on Provenance-based Endpoint Detection and Response Tools. CoRR abs/2307.08349 (2023) - [i14]Pengcheng Fang, Peng Gao, Yun Peng, Qingzhao Zhang, Tao Xie, Dawn Song, Prateek Mittal, Sanjeev R. Kulkarni, Zhuotao Liu, Xusheng Xiao:
CONTRACTFIX: A Framework for Automatically Fixing Vulnerabilities in Smart Contracts. CoRR abs/2307.08912 (2023) - [i13]Shaofei Li, Feng Dong, Xusheng Xiao, Haoyu Wang, Fei Shao, Jiedong Chen, Yao Guo, Xiangqun Chen, Ding Li:
NODLINK: An Online System for Fine-Grained APT Attack Detection and Investigation. CoRR abs/2311.02331 (2023) - 2022
- [j11]Zhuotao Liu, Yangxi Xiang, Jian Shi, Peng Gao, Haoyu Wang, Xusheng Xiao, Bihan Wen, Qi Li, Yih-Chun Hu:
Make Web3.0 Connected. IEEE Trans. Dependable Secur. Comput. 19(5): 2965-2981 (2022) - [c52]Liangyi Huang, Sophia Hall, Fei Shao, Arafath Nihar, Vipin Chaudhary, Yinghui Wu, Roger H. French, Xusheng Xiao:
System-Auditing, Data Analysis and Characteristics of Cyber Attacks for Big Data Systems. CIKM 2022: 4872-4876 - [c51]Shao Yang, Yuehan Wang, Yuan Yao, Haoyu Wang, Yanfang (Fanny) Ye, Xusheng Xiao:
DescribeCtx: Context-Aware Description Synthesis for Sensitive Behaviors in Mobile Apps. ICSE 2022: 685-697 - [c50]Changlin Liu, Hanlin Wang, Tianming Liu, Diandian Gu, Yun Ma, Haoyu Wang, Xusheng Xiao:
PROMAL: Precise Window Transition Graphs for Android via Synergy of Program Analysis and Machine Learning. ICSE 2022: 1755-1767 - [c49]Pengcheng Xia, Haoyu Wang, Bingyu Gao, Weihang Su, Zhou Yu, Xiapu Luo, Chao Zhang, Xusheng Xiao, Guoai Xu:
Trade or Trick?: Detecting and Characterizing Scam Tokens on Uniswap Decentralized Exchange. SIGMETRICS (Abstracts) 2022: 23-24 - [c48]Zikan Dong, Hongxuan Liu, Liu Wang, Xiapu Luo, Yao Guo, Guoai Xu, Xusheng Xiao, Haoyu Wang:
What did you pack in my app? a systematic analysis of commercial Android packers. ESEC/SIGSOFT FSE 2022: 1430-1440 - [c47]Zhiqiang Xu, Pengcheng Fang, Changlin Liu, Xusheng Xiao, Yu Wen, Dan Meng:
DEPCOMM: Graph Summarization on System Audit Logs for Attack Investigation. SP 2022: 540-557 - [c46]Pengcheng Fang, Peng Gao, Changlin Liu, Erman Ayday, Kangkook Jee, Ting Wang, Yanfang (Fanny) Ye, Zhuotao Liu, Xusheng Xiao:
Back-Propagating System Dependency Impact for Attack Investigation. USENIX Security Symposium 2022: 2461-2478 - [c45]Guosheng Xu, Siyi Li, Hao Zhou, Shucen Liu, Yutian Tang, Li Li, Xiapu Luo, Xusheng Xiao, Guoai Xu, Haoyu Wang:
Lie to Me: Abusing the Mobile Content Sharing Service for Fun and Profit. WWW 2022: 3327-3335 - 2021
- [j10]Pengcheng Xia, Haoyu Wang, Bingyu Gao, Weihang Su, Zhou Yu, Xiapu Luo, Chao Zhang, Xusheng Xiao, Guoai Xu:
Trade or Trick?: Detecting and Characterizing Scam Tokens on Uniswap Decentralized Exchange. Proc. ACM Meas. Anal. Comput. Syst. 5(3): 39:1-39:26 (2021) - [c44]Peng Gao, Fei Shao, Xiaoyuan Liu, Xusheng Xiao, Zheng Qin, Fengyuan Xu, Prateek Mittal, Sanjeev R. Kulkarni, Dawn Song:
Enabling Efficient Cyber Threat Hunting With Cyber Threat Intelligence. ICDE 2021: 193-204 - [c43]Peng Gao, Fei Shao, Xiaoyuan Liu, Xusheng Xiao, Haoyuan Liu, Zheng Qin, Fengyuan Xu, Prateek Mittal, Sanjeev R. Kulkarni, Dawn Song:
A System for Efficiently Hunting for Cyber Threats in Computer Systems Using Threat Intelligence. ICDE 2021: 2705-2708 - [c42]Yangyu Hu, Haoyu Wang, Tiantong Ji, Xusheng Xiao, Xiapu Luo, Peng Gao, Yao Guo:
CHAMP: Characterizing Undesired App Behaviors from User Comments based on Market Policies. ICSE 2021: 933-945 - [c41]Fei Shao, Rui Xu, Wasif Arman Haque, Jingwei Xu, Ying Zhang, Wei Yang, Yanfang Ye, Xusheng Xiao:
WebEvo: taming web application evolution via detecting semantic structure changes. ISSTA 2021: 16-28 - [i12]Peng Gao, Fei Shao, Xiaoyuan Liu, Xusheng Xiao, Haoyuan Liu, Zheng Qin, Fengyuan Xu, Prateek Mittal, Sanjeev R. Kulkarni, Dawn Song:
A System for Efficiently Hunting for Cyber Threats in Computer Systems Using Threat Intelligence. CoRR abs/2101.06761 (2021) - [i11]Yangyu Hu, Haoyu Wang, Tiantong Ji, Xusheng Xiao, Xiapu Luo, Peng Gao, Yao Guo:
CHAMP: Characterizing Undesired App Behaviors from User Comments based on Market Policies. CoRR abs/2103.00712 (2021) - [i10]Pengcheng Xia, Haoyu Wang, Bingyu Gao, Weihang Su, Zhou Yu, Xiapu Luo, Chao Zhang, Xusheng Xiao, Guoai Xu:
Demystifying Scam Tokens on Uniswap Decentralized Exchange. CoRR abs/2109.00229 (2021) - [i9]Zhaohan Xi, Ren Pang, Changjiang Li, Shouling Ji, Xiapu Luo, Xusheng Xiao, Ting Wang:
Towards Robust Reasoning over Knowledge Graphs. CoRR abs/2110.14693 (2021) - 2020
- [c40]Yiming Zhang, Yujie Fan, Shifu Hou, Yanfang Ye, Xusheng Xiao, Pan Li, Chuan Shi, Liang Zhao, Shouhuai Xu:
Cyber-guided Deep Neural Network for Malicious Repository Detection in GitHub. ICKG 2020: 458-465 - [c39]Jiaping Gui, Ding Li, Zhengzhang Chen, Junghwan Rhee, Xusheng Xiao, Mu Zhang, Kangkook Jee, Zhichun Li, Haifeng Chen:
APTrace: A Responsive System for Agile Enterprise Level Causality Analysis. ICDE 2020: 1701-1712 - [c38]Peng Gao, Xusheng Xiao, Ding Li, Kangkook Jee, Haifeng Chen, Sanjeev R. Kulkarni, Prateek Mittal:
Querying Streaming System Monitoring Data for Enterprise System Anomaly Detection. ICDE 2020: 1774-1777 - [c37]Yujie Fan, Yanfang Ye, Qian Peng, Jianfei Zhang, Yiming Zhang, Xusheng Xiao, Chuan Shi, Qi Xiong, Fudong Shao, Liang Zhao:
Metagraph Aggregated Heterogeneous Graph Neural Network for Illicit Traded Product Identification in Underground Market. ICDM 2020: 132-141 - [c36]Jian Liu, Xusheng Xiao, Lihua Xu, Liang Dou, Andy Podgurski:
DroidMutator: an effective mutation analysis tool for Android applications. ICSE (Companion Volume) 2020: 77-80 - [i8]Peng Gao, Fei Shao, Xiaoyuan Liu, Xusheng Xiao, Zheng Qin, Fengyuan Xu, Prateek Mittal, Sanjeev R. Kulkarni, Dawn Song:
Enabling Efficient Cyber Threat Hunting With Cyber Threat Intelligence. CoRR abs/2010.13637 (2020) - [i7]Zhuotao Liu, Yangxi Xiang, Jian Shi, Peng Gao, Haoyu Wang, Xusheng Xiao, Bihan Wen, Yih-Chun Hu:
HyperService: Interoperability and Programmability Across Heterogeneous Blockchains. IACR Cryptol. ePrint Arch. 2020: 578 (2020)
2010 – 2019
- 2019
- [j9]Shengqu Xi, Yuan Yao, Xusheng Xiao, Feng Xu, Jian Lu:
Bug Triaging Based on Tossing Sequence Modeling. J. Comput. Sci. Technol. 34(5): 942-956 (2019) - [j8]Peng Gao, Xusheng Xiao, Zhichun Li, Kangkook Jee, Fengyuan Xu, Sanjeev R. Kulkarni, Prateek Mittal:
A Query System for Efficiently Investigating Complex Attack Behaviors for Enterprise Security. Proc. VLDB Endow. 12(12): 1802-1805 (2019) - [c35]Jiaping Gui, Xusheng Xiao, Ding Li, Chung Hwan Kim, Haifeng Chen:
Progressive processing of system-behavioral query. ACSAC 2019: 378-389 - [c34]Zhuotao Liu, Yangxi Xiang, Jian Shi, Peng Gao, Haoyu Wang, Xusheng Xiao, Bihan Wen, Yih-Chun Hu:
HyperService: Interoperability and Programmability Across Heterogeneous Blockchains. CCS 2019: 549-566 - [c33]Shengqu Xi, Shao Yang, Xusheng Xiao, Yuan Yao, Yayuan Xiong, Fengyuan Xu, Haoyu Wang, Peng Gao, Zhuotao Liu, Feng Xu, Jian Lu:
DeepIntent: Deep Icon-Behavior Learning for Detecting Intention-Behavior Discrepancy in Mobile Apps. CCS 2019: 2421-2436 - [c32]Xusheng Xiao, Xiaoyin Wang, Zhihao Cao, Hanlin Wang, Peng Gao:
IconIntent: automatic identification of sensitive UI widgets based on icon classification for Android apps. ICSE 2019: 257-268 - [c31]Haoyu Wang, Hongxuan Liu, Xusheng Xiao, Guozhu Meng, Yao Guo:
Characterizing Android App Signing Issues. ASE 2019: 280-292 - [c30]Zhilei Ren, Changlin Liu, Xusheng Xiao, He Jiang, Tao Xie:
Root Cause Localization for Unreproducible Builds via Causality Analysis Over System Call Tracing. ASE 2019: 527-538 - [c29]Xusheng Xiao:
An Image-Inspired and CNN-Based Android Malware Detection Approach. ASE 2019: 1259-1261 - [c28]Xia Zhang, Xusheng Xiao, Liang He, Yun Ma, Yangyang Huang, Xuanzhe Liu, Wenyao Xu, Cong Liu:
PIFA: An Intelligent Phase Identification and Frequency Adjustment Framework for Time-Sensitive Mobile Computing. RTAS 2019: 54-64 - [c27]Yun Ma, Yangyang Huang, Ziniu Hu, Xusheng Xiao, Xuanzhe Liu:
Paladin: Automated Generation of Reproducible Test Cases for Android Apps. HotMobile 2019: 99-104 - [i6]Peng Gao, Xusheng Xiao, Ding Li, Zhichun Li, Kangkook Jee, Zhenyu Wu, Chung Hwan Kim, Sanjeev R. Kulkarni, Prateek Mittal:
A Stream-based Query System for Efficiently Detecting Abnormal System Behaviors for Enterprise Security. CoRR abs/1903.08159 (2019) - [i5]Zhuotao Liu, Yangxi Xiang, Jian Shi, Peng Gao, Haoyu Wang, Xusheng Xiao, Bihan Wen, Yih-Chun Hu:
HyperService: Interoperability and Programmability Across Heterogeneous Blockchains. CoRR abs/1908.09343 (2019) - 2018
- [j7]Patrick Morrison, Rahul Pandita, Xusheng Xiao, Ram Chillarege, Laurie A. Williams:
Are vulnerabilities discovered and resolved like other defects? Empir. Softw. Eng. 23(3): 1383-1421 (2018) - [c26]Yutao Tang, Ding Li, Zhichun Li, Mu Zhang, Kangkook Jee, Xusheng Xiao, Zhenyu Wu, Junghwan Rhee, Fengyuan Xu, Qun Li:
NodeMerge: Template Based Efficient Data Reduction For Big-Data Causality Analysis. CCS 2018: 1324-1337 - [c25]Angello Astorga, Siwakorn Srisakaokul, Xusheng Xiao, Tao Xie:
PreInfer: Automatic Inference of Preconditions via Symbolic Analysis. DSN 2018: 678-689 - [c24]Patrick J. Morrison, Rahul Pandita, Xusheng Xiao, Ram Chillarege, Laurie A. Williams:
Are vulnerabilities discovered and resolved like other defects? ICSE 2018: 498 - [c23]Shengqu Xi, Yuan Yao, Xusheng Xiao, Feng Xu, Jian Lu:
An Effective Approach for Routing the Bug Reports to the Right Fixers. Internetware 2018: 11:1-11:10 - [c22]Peng Gao, Xusheng Xiao, Zhichun Li, Fengyuan Xu, Sanjeev R. Kulkarni, Prateek Mittal:
AIQL: Enabling Efficient Attack Investigation from System Monitoring Data. USENIX ATC 2018: 113-126 - [c21]Peng Gao, Xusheng Xiao, Ding Li, Zhichun Li, Kangkook Jee, Zhenyu Wu, Chung Hwan Kim, Sanjeev R. Kulkarni, Prateek Mittal:
SAQL: A Stream-based Query System for Real-Time Abnormal System Behavior Detection. USENIX Security Symposium 2018: 639-656 - [c20]Jiayi Cao, Angello Astorga, Siwakorn Srisakaokul, Zhengkai Wu, Xueqing Liu, Xusheng Xiao, Tao Xie:
Visualizing Path Exploration to Assist Problem Diagnosis for Structural Test Generation. VL/HCC 2018: 323-325 - [i4]Peng Gao, Xusheng Xiao, Zhichun Li, Kangkook Jee, Fengyuan Xu, Sanjeev R. Kulkarni, Prateek Mittal:
AIQL: Enabling Efficient Attack Investigation from System Monitoring Data. CoRR abs/1806.02290 (2018) - [i3]Peng Gao, Xusheng Xiao, Ding Li, Zhichun Li, Kangkook Jee, Zhenyu Wu, Chung Hwan Kim, Sanjeev R. Kulkarni, Prateek Mittal:
SAQL: A Stream-based Query System for Real-Time Abnormal System Behavior Detection. CoRR abs/1806.09339 (2018) - [i2]Peng Gao, Xusheng Xiao, Zhichun Li, Kangkook Jee, Fengyuan Xu, Sanjeev R. Kulkarni, Prateek Mittal:
A Query Tool for Efficiently Investigating Risky Software Behaviors. CoRR abs/1810.03464 (2018) - 2017
- [c19]Zheng Dong, Yuchuan Liu, Husheng Zhou, Xusheng Xiao, Yu Gu, Lingming Zhang, Cong Liu:
An energy-efficient offloading framework with predictable temporal correctness. SEC 2017: 19:1-19:12 - [c18]Yujie Yuan, Lihua Xu, Xusheng Xiao, Andy Podgurski, Huibiao Zhu:
RunDroid: recovering execution call graphs for Android applications. ESEC/SIGSOFT FSE 2017: 949-953 - 2016
- [j6]Qing Gao, Jun Li, Yingfei Xiong, Dan Hao, Xusheng Xiao, Kunal Taneja, Lu Zhang, Tao Xie:
High-confidence software evolution. Sci. China Inf. Sci. 59(7): 071101:1-071101:19 (2016) - [j5]Xusheng Xiao, Jian-Guang Lou, Shan Lu, David C. Shepherd, Xin Peng, Qianxiang Wang:
Roundtable: Research Opportunities and Challenges for Large-Scale Software Systems. J. Comput. Sci. Technol. 31(5): 851-860 (2016) - [c17]Zhang Xu, Zhenyu Wu, Zhichun Li, Kangkook Jee, Junghwan Rhee, Xusheng Xiao, Fengyuan Xu, Haining Wang, Guofei Jiang:
High Fidelity Data Reduction for Big Data Security Dependency Analyses. CCS 2016: 504-516 - [c16]Sihan Li, Xusheng Xiao, Blake Bassett, Tao Xie, Nikolai Tillmann:
Measuring code behavioral similarity for programming and software engineering education. ICSE (Companion Volume) 2016: 501-510 - 2015
- [j4]Xusheng Xiao, Nikolai Tillmann, Manuel Fähndrich, Jonathan de Halleux, Michal Moskal, Tao Xie:
User-aware privacy control via extended static-information-flow analysis. Autom. Softw. Eng. 22(3): 333-366 (2015) - [j3]Bo Zong, Xusheng Xiao, Zhichun Li, Zhenyu Wu, Zhiyun Qian, Xifeng Yan, Ambuj K. Singh, Guofei Jiang:
Behavior Query Discovery in System-Generated Temporal Graphs. Proc. VLDB Endow. 9(4): 240-251 (2015) - [c15]Wei Yang, Xusheng Xiao, Benjamin Andow, Sihan Li, Tao Xie, William Enck:
AppContext: Differentiating Malicious and Benign Mobile App Behaviors Using Context. ICSE (1) 2015: 303-313 - [c14]Jianjun Huang, Zhichun Li, Xusheng Xiao, Zhenyu Wu, Kangjie Lu, Xiangyu Zhang, Guofei Jiang:
SUPOR: Precise and Scalable Sensitive User Input Detection for Android Apps. USENIX Security Symposium 2015: 977-992 - [i1]Bo Zong, Xusheng Xiao, Zhichun Li, Zhenyu Wu, Zhiyun Qian, Xifeng Yan, Ambuj K. Singh, Guofei Jiang:
Behavior Query Discovery in System-Generated Temporal Graphs. CoRR abs/1511.05911 (2015) - 2014
- [j2]Tao Xie, Lu Zhang, Xusheng Xiao, Yingfei Xiong, Dan Hao:
Cooperative Software Testing and Analysis: Advances and Challenges. J. Comput. Sci. Technol. 29(4): 713-723 (2014) - [c13]John Slankas, Xusheng Xiao, Laurie A. Williams, Tao Xie:
Relation extraction for inferring access control rules from natural language artifacts. ACSAC 2014: 366-375 - [c12]Wei Yang, Xusheng Xiao, Rahul Pandita, William Enck, Tao Xie:
Improving mobile application security via bridging user expectations and application behaviors. HotSoS 2014: 32 - [c11]Xusheng Xiao:
Context-sensitive delta inference for identifying workload-dependent performance bottlenecks (invited talk abstract). WODA+PERTEA@ISSTA 2014: 11 - [c10]Xusheng Xiao, Gogul Balakrishnan, Franjo Ivancic, Naoto Maeda, Aarti Gupta, Deepak Chhetri:
ARC++: effective typestate and lifetime dependency analysis. ISSTA 2014: 116-126 - 2013
- [c9]Xusheng Xiao, Shi Han, Dongmei Zhang, Tao Xie:
Context-sensitive delta inference for identifying workload-dependent performance bottlenecks. ISSTA 2013: 90-100 - [c8]Xusheng Xiao, Sihan Li, Tao Xie, Nikolai Tillmann:
Characteristic studies of loop problems for structural test generation via symbolic execution. ASE 2013: 246-256 - [c7]Rahul Pandita, Xusheng Xiao, Wei Yang, William Enck, Tao Xie:
WHYPER: Towards Automating Risk Assessment of Mobile Applications. USENIX Security Symposium 2013: 527-542 - 2012
- [j1]Xusheng Xiao, Suresh Thummalapenta, Tao Xie:
Advances on Improving Automation in Developer Testing. Adv. Comput. 85: 165-212 (2012) - [c6]Rahul Pandita, Xusheng Xiao, Hao Zhong, Tao Xie, Stephen Oney, Amit M. Paradkar:
Inferring method specifications from natural language API descriptions. ICSE 2012: 815-825 - [c5]Xusheng Xiao, Nikolai Tillmann, Manuel Fähndrich, Jonathan de Halleux, Michal Moskal:
User-aware privacy control via extended static-information-flow analysis. ASE 2012: 80-89 - [c4]Xusheng Xiao, Amit M. Paradkar, Suresh Thummalapenta, Tao Xie:
Automated extraction of security policies from natural-language software documents. SIGSOFT FSE 2012: 12 - 2011
- [c3]Xusheng Xiao, Tao Xie, Nikolai Tillmann, Jonathan de Halleux:
Precise identification of problems for structural test generation. ICSE 2011: 611-620 - [c2]Xusheng Xiao, Tao Xie, Nikolai Tillmann, Jonathan de Halleux:
Covana: precise identification of problems in pex. ICSE 2011: 1004-1006 - [c1]Xusheng Xiao:
Problem identification for structural test generation: first step towards cooperative developer testing. ICSE 2011: 1179-1181
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-12-05 21:41 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint