Follow
Yulei Sui
Title
Cited by
Cited by
Year
SVF: interprocedural static value-flow analysis in LLVM
Y Sui, J Xue
Proceedings of the 25th international conference on compiler construction …, 2016
3942016
Multi-modal attention network learning for semantic source code retrieval
Y Wan, J Shu, Y Sui, G Xu, Z Zhao, J Wu, P Yu
2019 34th IEEE/ACM International Conference on Automated Software …, 2019
1662019
Static memory leak detection using full-sparse value-flow analysis
Y Sui, D Ye, J Xue
Proceedings of the 2012 International Symposium on Software Testing and …, 2012
1632012
Deepwukong: Statically detecting software vulnerabilities using deep graph neural network
X Cheng, H Wang, J Hua, G Xu, Y Sui
ACM Transactions on Software Engineering and Methodology (TOSEM) 30 (3), 1-33, 2021
1552021
Detecting memory leaks statically with full-sparse value-flow analysis
Y Sui, D Ye, J Xue
IEEE Transactions on Software Engineering 40 (2), 107-122, 2014
1282014
Typestate-guided fuzzer for discovering use-after-free vulnerabilities
H Wang, X Xie, Y Li, C Wen, Y Li, Y Liu, S Qin, H Chen, Y Sui
Proceedings of the ACM/IEEE 42nd International Conference on Software …, 2020
1072020
Reinforcement-learning-guided source code summarization using hierarchical attention
W Wang, Y Zhang, Y Sui, Y Wan, Z Zhao, J Wu, SY Philip, G Xu
IEEE Transactions on software Engineering 48 (1), 102-119, 2020
992020
Flow2vec: Value-flow-based precise code embedding
Y Sui, X Cheng, G Zhang, H Wang
Proceedings of the ACM on Programming Languages 4 (OOPSLA), 1-27, 2020
942020
{MUZZ}: Thread-aware grey-box fuzzing for effective bug hunting in multithreaded programs
H Chen, S Guo, Y Xue, Y Sui, C Zhang, Y Li, H Wang, Y Liu
29th USENIX Security Symposium (USENIX Security 20), 2325-2342, 2020
912020
On-demand strong update analysis via value-flow refinement
Y Sui, J Xue
Proceedings of the 2016 24th ACM SIGSOFT international symposium on …, 2016
882016
Fcca: Hybrid code representation for functional clone detection using attention networks
W Hua, Y Sui, Y Wan, G Liu, G Xu
IEEE Transactions on Reliability 70 (1), 304-318, 2020
772020
Spatio-temporal context reduction: A pointer-analysis-based static approach for detecting use-after-free vulnerabilities
H Yan, Y Sui, S Chen, J Xue
Proceedings of the 40th International Conference on Software Engineering …, 2018
772018
A comparative study of class rebalancing methods for security bug report classification
W Zheng, Y Xun, X Wu, Z Deng, X Chen, Y Sui
IEEE Transactions on Reliability 70 (4), 1658-1670, 2021
762021
What do they capture? a structural analysis of pre-trained language models for source code
Y Wan, W Zhao, H Zhang, Y Sui, G Xu, H Jin
Proceedings of the 44th international conference on software engineering …, 2022
732022
Self-inferencing reflection resolution for Java
Y Li, T Tan, Y Sui, J Xue
ECOOP 2014–Object-Oriented Programming: 28th European Conference, Uppsala …, 2014
692014
Familial clustering for weakly-labeled android malware using hybrid representation learning
Y Zhang, Y Sui, S Pan, Z Zheng, B Ning, I Tsang, W Zhou
IEEE Transactions on Information Forensics and Security 15, 3401-3414, 2019
672019
Cross-contract static analysis for detecting practical reentrancy vulnerabilities in smart contracts
Y Xue, M Ma, Y Lin, Y Sui, J Ye, T Peng
Proceedings of the 35th IEEE/ACM International Conference on Automated …, 2020
652020
Sparse flow-sensitive pointer analysis for multithreaded programs
Y Sui, P Di, J Xue
Proceedings of the 2016 International Symposium on Code Generation and …, 2016
622016
SPAS: Scalable Path-Sensitive Pointer Analysis on Full-Sparse SSA
Y Sui, S Ye, J Xue, PC Yew
Programming Languages and Systems, 155-171, 2011
602011
Path-sensitive code embedding via contrastive learning for software vulnerability detection
X Cheng, G Zhang, H Wang, Y Sui
Proceedings of the 31st ACM SIGSOFT International Symposium on Software …, 2022
562022
The system can't perform the operation now. Try again later.
Articles 1–20