Xiaoyin Wang
Cited by
Cited by
An approach to detecting duplicate bug reports using natural language and execution information
X Wang, L Zhang, T Xie, J Anvik, J Sun
Proceedings of the 30th international conference on Software engineering …, 2008
A discriminative model approach for accurate duplicate bug report retrieval
C Sun, D Lo, X Wang, J Jiang, SC Khoo
Proceedings of the 32nd ACM/IEEE International Conference on Software …, 2010
NetworkProfiler: Towards Automatic Fingerprinting of Android Apps
S Dai, A Tongaonkar, X Wang, A Nucci, D Song
Toward a framework for detecting privacy policy violations in android application code
R Slavin, X Wang, MB Hosseini, J Hester, R Krishnan, J Bhatia, ...
Proceedings of the 38th International conference on software engineering, 25-36, 2016
Identifying bug signatures using discriminative graph mining
H Cheng, D Lo, Y Zhou, X Wang, X Yan
Proceedings of the eighteenth international symposium on Software testing …, 2009
A survey on bug-report analysis
J Zhang, XY Wang, D Hao, B Xie, L Zhang, H Mei
Science China Information Sciences 58 (2), 1-24, 2015
A history-based matching approach to identification of framework evolution
S Meng, X Wang, L Zhang, H Mei
2012 34th International Conference on Software Engineering (ICSE), 353-363, 2012
Guileak: Tracing privacy policy claims on user input data for android applications
X Wang, X Qin, MB Hosseini, R Slavin, TD Breaux, J Niu
Proceedings of the 40th International Conference on Software Engineering, 37-47, 2018
Predicting consistency-maintenance requirement of code clonesat copy-and-paste time
X Wang, Y Dang, L Zhang, D Zhang, E Lan, H Mei
IEEE Transactions on Software Engineering 40 (8), 773-794, 2014
Hirebuild: An automatic approach to history-driven repair of build scripts
F Hassan, X Wang
Proceedings of the 40th international conference on software engineering …, 2018
Test input reduction for result inspection to facilitate fault localization
D Hao, T Xie, L Zhang, X Wang, J Sun, H Mei
Automated software engineering 17, 5-31, 2010
Leveraging code generation to improve code retrieval and summarization via dual learning
W Ye, R Xie, J Zhang, T Hu, X Wang, S Zhang
Proceedings of The Web Conference 2020, 2309-2319, 2020
Summary-based context-sensitive data-dependence analysis in presence of callbacks
H Tang, X Wang, L Zhang, B Xie, L Zhang, H Mei
Proceedings of the 42Nd Annual ACM SIGPLAN-SIGACT Symposium on Principles of …, 2015
How reliable is the crowdsourced knowledge of security implementation?
M Chen, F Fischer, N Meng, X Wang, J Grossklags
2019 IEEE/ACM 41st International Conference on Software Engineering (ICSE …, 2019
An empirical study on the usage of mocking frameworks in software testing
S Mostafa, X Wang
2014 14th international conference on quality software, 127-132, 2014
Matching dependence-related queries in the system dependence graph
X Wang, D Lo, J Cheng, L Zhang, H Mei, JX Yu
Proceedings of the 25th IEEE/ACM International Conference on Automated …, 2010
Iconintent: automatic identification of sensitive ui widgets based on icon classification for android apps
X Xiao, X Wang, Z Cao, H Wang, P Gao
2019 IEEE/ACM 41st International Conference on Software Engineering (ICSE …, 2019
Extracting paraphrases of technical terms from noisy parallel software corpora
X Wang, D Lo, J Jiang, L Zhang, H Mei
Proceedings of the ACL-IJCNLP 2009 Conference Short Papers, 197-200, 2009
Perfranker: Prioritization of performance regression tests for collection-intensive software
S Mostafa, X Wang, T Xie
Proceedings of the 26th ACM SIGSOFT International Symposium on Software …, 2017
Experience paper: a study on behavioral backward incompatibilities of Java software libraries
S Mostafa, R Rodriguez, X Wang
Proceedings of the 26th ACM SIGSOFT international symposium on software …, 2017
The system can't perform the operation now. Try again later.
Articles 1–20