var bibbase_data = {"data":"\"Loading..\"\n\n
\n\n \n\n \n\n \n \n\n \n\n \n \n\n \n\n \n
\n generated by\n \n \"bibbase.org\"\n\n \n
\n \n\n
\n\n \n\n\n
\n\n Excellent! Next you can\n create a new website with this list, or\n embed it in an existing web page by copying & pasting\n any of the following snippets.\n\n
\n JavaScript\n (easiest)\n
\n \n <script src=\"https://bibbase.org/show?bib=chapering.github.io/pubs/hcaipub.bib&jsonp=1&nocache=1&fullnames=1&commas=true&theme=dividers&jsonp=1\"></script>\n \n
\n\n PHP\n
\n \n <?php\n $contents = file_get_contents(\"https://bibbase.org/show?bib=chapering.github.io/pubs/hcaipub.bib&jsonp=1&nocache=1&fullnames=1&commas=true&theme=dividers\");\n print_r($contents);\n ?>\n \n
\n\n iFrame\n (not recommended)\n
\n \n <iframe src=\"https://bibbase.org/show?bib=chapering.github.io/pubs/hcaipub.bib&jsonp=1&nocache=1&fullnames=1&commas=true&theme=dividers\"></iframe>\n \n
\n\n

\n For more details see the documention.\n

\n
\n
\n\n
\n\n This is a preview! To use this list on your own web site\n or create a new web site from it,\n create a free account. The file will be added\n and you will be able to edit it in the File Manager.\n We will show you instructions once you've created your account.\n
\n\n
\n\n

To the site owner:

\n\n

Action required! Mendeley is changing its\n API. In order to keep using Mendeley with BibBase past April\n 14th, you need to:\n

    \n
  1. renew the authorization for BibBase on Mendeley, and
  2. \n
  3. update the BibBase URL\n in your page the same way you did when you initially set up\n this page.\n
  4. \n
\n

\n\n

\n \n \n Fix it now\n

\n
\n\n
\n\n\n
\n \n \n
\n
\n  \n 2024\n \n \n (8)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Learning to Detect and Localize Multilingual Bugs.\n \n \n \n \n\n\n \n Haoran Yang, Yu Nong, Tao Zhang, Xiapu Luo, & Haipeng Cai.\n\n\n \n\n\n\n In ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE), pages 24, 2024. \n \n\n\n\n
\n\n\n\n \n \n \"Learning pdf\n  \n \n \n \"Learning project\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 11 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n\n\n\n
\n
@InProceedings{haoran24fse,\r\n  title={Learning to Detect and Localize Multilingual Bugs},\r\n  author={Haoran Yang and Yu Nong and Tao Zhang and Xiapu Luo and Haipeng Cai},\r\n  booktitle={ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE)},\r\n  url_pdf = {http://chapering.github.io/pubs/fse24haoran.pdf},\r\n  url_project = {https://figshare.com/s/f0a7d357b148fc262a40},\r\n  year={2024},\r\n  doi={xxx},\r\n  pages = {24},\r\n  Keywords = {cross-language program analysis, multi-language software, fault localization}\r\n}\r\n\r\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n VinJ: An Automated Tool for Large-Scale Software Vulnerability Data Generation.\n \n \n \n \n\n\n \n Yu Nong, Haoran Yang, Feng Chen, & Haipeng Cai.\n\n\n \n\n\n\n In ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE), Tool Demos, 2024. \n \n\n\n\n
\n\n\n\n \n \n \"VinJ: pdf\n  \n \n \n \"VinJ: project\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 4 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n\n\n\n
\n
@InProceedings{nong24fsetool,\r\n\ttitle={{VinJ}: An Automated Tool for Large-Scale Software Vulnerability Data Generation},\r\n\tauthor={Yu Nong and Haoran Yang and Feng Chen and Haipeng Cai},\r\n\tbooktitle={ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE), Tool Demos},\r\n\tKeywords = {program generation, vulnerability analysis, software security},\r\n\turl_pdf = {http://chapering.github.io/pubs/nong24fsetool.pdf},\r\n\turl_project = {https://figshare.com/s/faf2c8a24410b34b7e70},\r\n\tdoi={xxx},\r\n\tyear={2024}\r\n}\r\n\r\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Towards Smart Contract Fuzzing on GPU.\n \n \n \n \n\n\n \n Weimin Chen, Xiapu Luo, Haipeng Cai, & Haoyu Wang.\n\n\n \n\n\n\n In IEEE Symposium on Security and Privacy (S&P), pages 15, 2024. \n \n\n\n\n
\n\n\n\n \n \n \"Towards pdf\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 8 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@InProceedings{weimin24sp,\r\n\ttitle={Towards Smart Contract Fuzzing on GPU},\r\n\tauthor={Weimin Chen and Xiapu Luo and Haipeng Cai and Haoyu Wang},\r\n\tbooktitle={IEEE Symposium on Security and Privacy (S&P)},\r\n\turl_pdf = {http://chapering.github.io/pubs/weimin24sp.pdf},\r\n\tKeywords = {smart contract, software security, fuzzing, GPU},\r\n\tpages = {15},\r\n\tyear={2024}\r\n}\r\n\r\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Understanding GDPR Non-Compliance in Privacy Policies of Alexa Skills in European Marketplaces.\n \n \n \n \n\n\n \n Song Liao, Mohammed Aldeen, Jingwen Yan, Long Cheng, Xiapu Luo, Haipeng Cai, & Hongxin Hu.\n\n\n \n\n\n\n In The Web Conference (WWW), pages 11, 2024. \n \n\n\n\n
\n\n\n\n \n \n \"Understanding pdf\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n\n\n\n
\n
@InProceedings{song24www,\r\n\ttitle={Understanding GDPR Non-Compliance in Privacy Policies of Alexa Skills in European Marketplaces},\r\n\tauthor={Song Liao and Mohammed Aldeen and Jingwen Yan and Long Cheng and Xiapu Luo and Haipeng Cai and Hongxin Hu},\r\n\tbooktitle={The Web Conference (WWW)},\r\n\turl_pdf = {http://chapering.github.io/pubs/song24www.pdf},\r\n\tKeywords = {Voice application, IoT, privacy},\r\n\tpages = {11},\r\n\tyear={2024}\r\n}\r\n\r\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Applying Generative Machine Learning to Intrusion Detection: A Systematic Mapping Study and Review.\n \n \n \n \n\n\n \n James Halvorsen, Clemente Izurieta, Haipeng Cai, & Assefaw Gebremedhin.\n\n\n \n\n\n\n ACM Computing Surveys (CSUR), 0(0): 1–32. 2024.\n (impact factor: 16.6)\n\n\n\n
\n\n\n\n \n \n \"Applying pdf\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n\n\n\n
\n
@article{james24csur,\r\n\tauthor = \t {James Halvorsen and Clemente Izurieta and Haipeng Cai and Assefaw Gebremedhin},\r\n\ttitle = \t {Applying Generative Machine Learning to Intrusion Detection: A Systematic Mapping Study and Review},\r\n\tjournal =  {ACM Computing Surveys (CSUR)},\r\n\tdoi={xxx},\r\n\tvolume = {0},\r\n\tnumber = {0},\r\n\tpages = {1--32},\r\n\tyear = \t {2024},\r\n\turl_pdf = {http://chapering.github.io/pubs/james24csur.pdf},\r\n\tKeywords = {survey, intrusion detection, generative learning},\r\n\tnote = {(impact factor: 16.6)}\r\n}\r\n\r\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Multi-Language Software Development: Issues, Challenges, and Solutions.\n \n \n \n \n\n\n \n Haoran Yang, Yu Nong, Shaowei Wang, & Haipeng Cai.\n\n\n \n\n\n\n IEEE Transactions on Software Engineering (TSE), 0(0): 1–21. 2024.\n (impact factor: 7.4)\n\n\n\n
\n\n\n\n \n \n \"Multi-Language project\n  \n \n \n \"Multi-Language pdf\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 4 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n\n\n\n
\n
@article{haoran24tse,\r\n\tauthor = \t {Haoran Yang and Yu Nong and Shaowei Wang and Haipeng Cai},\r\n\ttitle = \t {Multi-Language Software Development: Issues, Challenges, and Solutions},\r\n\tjournal =  {IEEE Transactions on Software Engineering (TSE)},\r\n\tdoi={10.1109/TSE.2024.3358258},\r\n\tvolume = {0},\r\n\tnumber = {0},\r\n\tpages = {1--21},\r\n\tyear = \t {2024},\r\n\turl_project = {https://bitbucket.org/hcailab/somlstudy},\r\n\turl_pdf = {http://chapering.github.io/pubs/tse24haoran.pdf},\r\n\tKeywords = {multi-language software, empirical study},\r\n\tnote = {(impact factor: 7.4)}\r\n}\r\n\r\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Beyond the Surface: Uncovering the Unprotected Components of Android Against Overlay Attack.\n \n \n \n \n\n\n \n Hao Zhou, Shuohan Wu, Chenxiong Qian, Xiapu Luo, Haipeng Cai, & Chao Zhang.\n\n\n \n\n\n\n In The Network and Distributed System Security Symposium (NDSS), pages 16, 2024. \n \n\n\n\n
\n\n\n\n \n \n \"Beyond pdf\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 44 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@InProceedings{hao24ndss,\r\n\ttitle={Beyond the Surface: Uncovering the Unprotected Components of Android Against Overlay Attack},\r\n\tauthor={Hao Zhou and Shuohan Wu and Chenxiong Qian and Xiapu Luo and Haipeng Cai and Chao Zhang},\r\n\tbooktitle={The Network and Distributed System Security Symposium (NDSS)},\r\n\turl_pdf = {http://chapering.github.io/pubs/ndss24hao.pdf},\r\n\tKeywords = {Android, software security, systems security, overlay attack},\r\n\tpages = {16},\r\n\tyear={2024}\r\n}\r\n\r\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n VGX: Large-Scale Sample Generation for Boosting Learning-Based Software Vulnerability Analyses.\n \n \n \n \n\n\n \n Yu Nong, Richard Fang, Guangbei Yi, Kunsong Zhao, Xiapu Luo, Feng Chen, & Haipeng Cai.\n\n\n \n\n\n\n In IEEE/ACM International Conference on Software Engineering (ICSE), pages 13, 2024. \n \n\n\n\n
\n\n\n\n \n \n \"VGX: pdf\n  \n \n \n \"VGX: project\n  \n \n \n \"VGX: arxiv\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 59 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n\n\n\n
\n
@InProceedings{nong24icse,\r\n\ttitle={{VGX}: Large-Scale Sample Generation for Boosting Learning-Based Software Vulnerability Analyses},\r\n\tauthor={Yu Nong and Richard Fang and Guangbei Yi and Kunsong Zhao and Xiapu Luo and Feng Chen and Haipeng Cai},\r\n\tbooktitle={IEEE/ACM International Conference on Software Engineering (ICSE)},\r\n\turl_pdf = {http://chapering.github.io/pubs/icse24yu.pdf},\r\n\turl_project = {https://figshare.com/s/de1a7ca036bdc38d6a19},\r\n\turl_arxiv = {https://arxiv.org/abs/2310.15436},\r\n\tKeywords = {program generation, vulnerability analysis, software security},\r\n\tpages = {13},\r\n\tyear={2024}\r\n}\r\n\r\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2023\n \n \n (10)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n How are Multilingual Systems Constructed: Characterizing Language Use and Selection in Open-Source Multilingual Software.\n \n \n \n \n\n\n \n Wen Li, Austin Marino, Haoran Yang, Na Meng, Li LI, & Haipeng Cai.\n\n\n \n\n\n\n ACM Transactions on Software Engineering and Methodology (TOSEM),45. 2023.\n (impact factor: 4.267; journal-first paper)\n\n\n\n
\n\n\n\n \n \n \"How pdf\n  \n \n \n \"How project\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 21 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n\n\n\n
\n
@article{wen23tosem,\r\n\tauthor = \t {Wen Li and Austin Marino and Haoran Yang and Na Meng and Li LI and Haipeng Cai},\r\n\ttitle = \t {How are Multilingual Systems Constructed: Characterizing Language Use and Selection in Open-Source Multilingual Software},\r\n\tyear = \t {2023},\r\n\turl_pdf = {http://chapering.github.io/pubs/tosem23wen.pdf},\r\n\turl_project = {https://bitbucket.org/wsucailab/multilangstudy/},\r\n\tjournal =  {ACM Transactions on Software Engineering and Methodology (TOSEM)},\r\n\tKeywords = {empirical study, multi-language software},\r\n\tpages = {45},\r\n\tnote = {(impact factor: 4.267; journal-first paper)}\r\n}\r\n\r\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Do Pre-trained Language Models Indeed Understand Software Engineering Tasks?.\n \n \n \n \n\n\n \n Yao Li, Tao Zhang, Xiapu Luo, Haipeng Cai, Sen Fang, & Dawei Yuan.\n\n\n \n\n\n\n IEEE Transactions on Software Engineering (TSE), 49(10): 4639–4655. 2023.\n (impact factor: 7.4; journal-first paper)\n\n\n\n
\n\n\n\n \n \n \"Do pdf\n  \n \n \n \"Do arxiv\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 11 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n\n\n\n
\n
@article{yao23tse,\r\n\tauthor = \t {Yao Li and Tao Zhang and Xiapu Luo and Haipeng Cai and Sen Fang and Dawei Yuan},\r\n\ttitle = \t {Do Pre-trained Language Models Indeed Understand Software Engineering Tasks?},\r\n\tjournal =  {IEEE Transactions on Software Engineering (TSE)},\r\n\tdoi={10.1109/TSE.2023.3308952},\r\n\tvolume = {49},\r\n\tnumber = {10},\r\n\tpages = {4639--4655},\r\n\tyear = \t {2023},\r\n\turl_pdf = {http://chapering.github.io/pubs/tse23yao.pdf},\r\n\turl_arxiv = {https://arxiv.org/abs/2211.10623},\r\n\tKeywords = {Overinterpretation, deep learning, pre-trained language model},\r\n\tnote = {(impact factor: 7.4; journal-first paper)}\r\n}\r\n\r\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n PyRTFuzz: Detecting Bugs in Python Runtimes via Two-Level Collaborative Fuzzing.\n \n \n \n \n\n\n \n Wen Li, Haoran Yang, Xiapu Luo, Long Cheng, & Haipeng Cai.\n\n\n \n\n\n\n In ACM Conference on Computer and Communications Security (CCS), pages 1645–-1659, 2023. \n (artifact evaluated; badges: Available, Functional, Reproduced)\n\n\n\n
\n\n\n\n \n \n \"PyRTFuzz: pdf\n  \n \n \n \"PyRTFuzz: project\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 83 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@InProceedings{wen23ccs,\r\n  title={{PyRTFuzz}: Detecting Bugs in Python Runtimes via Two-Level Collaborative Fuzzing},\r\n  author={Wen Li and Haoran Yang and Xiapu Luo and Long Cheng and Haipeng Cai},\r\n  booktitle={ACM Conference on Computer and Communications Security (CCS)},\r\n  url_pdf = {http://chapering.github.io/pubs/ccs23wen.pdf},\r\n  url_project = {https://bitbucket.org/wsucailab/pyrtfuzz},\r\n  year={2023},\r\n  doi={10.1145/3576915.3623166},\r\n  note = {(artifact evaluated; badges: Available, Functional, Reproduced)},\r\n  Keywords = {Software security, systems security, language runtime, compiler testing},\r\n  pages = {1645–-1659}\r\n}\r\n\r\n\r\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n SkillScanner: Detecting Policy-Violating Voice Applications Through Static Analysis at the Development Phase.\n \n \n \n \n\n\n \n Song Liao, Long Cheng, Haipeng Cai, Linke Guo, & Hongxin Hu.\n\n\n \n\n\n\n In ACM Conference on Computer and Communications Security (CCS), pages 2321–-2335, 2023. \n (artifact evaluated; badges: Available, Functional)\n\n\n\n
\n\n\n\n \n \n \"SkillScanner: pdf\n  \n \n \n \"SkillScanner: arxiv\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 32 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n\n\n\n
\n
@InProceedings{song23ccs,\r\n  title={{SkillScanner}: Detecting Policy-Violating Voice Applications Through Static Analysis at the Development Phase},\r\n  author={Song Liao and Long Cheng and Haipeng Cai and Linke Guo and Hongxin Hu},\r\n  booktitle={ACM Conference on Computer and Communications Security (CCS)},\r\n  url_pdf = {http://chapering.github.io/pubs/ccs23song.pdf},\r\n  url_arxiv = {https://arxiv.org/abs/2309.05867},\r\n  year={2023},\r\n  doi={10.1145/3576915.3616650},\r\n  note = {(artifact evaluated; badges: Available, Functional)},\r\n  Keywords = {Voice application, software security, static analysis},\r\n  pages = {2321–-2335}\r\n}\r\n\r\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Automatically Detecting Incompatible Android APIs.\n \n \n \n \n\n\n \n Pei Liu, Yanjie Zhao, Mattia Fazzini, Haipeng Cai, John Grundy, & Li LI.\n\n\n \n\n\n\n ACM Transactions on Software Engineering and Methodology (TOSEM),1–33. 2023.\n (impact factor: 4.267)\n\n\n\n
\n\n\n\n \n \n \"Automatically pdf\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 30 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n\n\n\n
\n
@article{pei23tosem,\r\n\tauthor = \t {Pei Liu and Yanjie Zhao and Mattia Fazzini and Haipeng Cai and John Grundy and Li LI},\r\n\ttitle = \t {Automatically Detecting Incompatible Android APIs},\r\n\turl_pdf = {http://chapering.github.io/pubs/tosem23pei.pdf},\r\n\tjournal =  {ACM Transactions on Software Engineering and Methodology (TOSEM)},\r\n\tKeywords = {Android, mobile software engineering, compatibility},\r\n\tissn = {1049-331X},\r\n\tdoi = {10.1145/3624737},\r\n\tyear = \t {2023},\r\n\tpages = {1--33},\r\n\tnote = {(impact factor: 4.267)}\r\n}\r\n\r\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Demystifying Issues, Challenges, and Solutions for Multilingual Software Development.\n \n \n \n \n\n\n \n Haoran Yang, Weile Lian, Shaowei Wang, & Haipeng Cai.\n\n\n \n\n\n\n In IEEE/ACM International Conference on Software Engineering (ICSE), pages 1840–1852, 2023. \n (artifact evaluated; badges: Available, Functional, Reusable)\n\n\n\n
\n\n\n\n \n \n \"Demystifying project\n  \n \n \n \"Demystifying pdf\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 102 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{haoran23icse,\r\n\ttitle={Demystifying Issues, Challenges, and Solutions for Multilingual Software Development},\r\n\tauthor={Haoran Yang and Weile Lian and Shaowei Wang and Haipeng Cai},\r\n\tbooktitle={IEEE/ACM International Conference on Software Engineering (ICSE)},\r\n\tKeywords = {multi-language software, empirical study},\r\n\turl_project = {https://bitbucket.org/hcailab/somlstudy},\r\n\turl_pdf = {http://chapering.github.io/pubs/icse23haoran.pdf},\r\n\tnote = {(artifact evaluated; badges: Available, Functional, Reusable)},\r\n\tdoi={10.1109/ICSE48619.2023.00157},\r\n\tpages = {1840--1852},\r\n\tyear={2023}\r\n}\r\n\r\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n VulGen: Realistic Vulnerable Sample Generation via Pattern Mining and Deep Learning.\n \n \n \n \n\n\n \n Yu Nong, Yuzhe Ou, Michael Pradel, Feng Chen, & Haipeng Cai.\n\n\n \n\n\n\n In IEEE/ACM International Conference on Software Engineering (ICSE), pages 2527–2539, 2023. \n (artifact evaluated; badges: Available, Functional, Reusable)\n\n\n\n
\n\n\n\n \n \n \"VulGen: pdf\n  \n \n \n \"VulGen: project\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 85 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n\n\n\n
\n
@InProceedings{nong23icse,\r\n\ttitle={{VulGen}: Realistic Vulnerable Sample Generation via Pattern Mining and Deep Learning},\r\n\tauthor={Yu Nong and Yuzhe Ou and Michael Pradel and Feng Chen and Haipeng Cai},\r\n\tbooktitle={IEEE/ACM International Conference on Software Engineering (ICSE)},\r\n\tKeywords = {program generation, vulnerability analysis, software security},\r\n\turl_pdf = {http://chapering.github.io/pubs/icse23yu.pdf},\r\n\turl_project = {https://figshare.com/s/faf2c8a24410b34b7e70},\r\n\tnote = {(artifact evaluated; badges: Available, Functional, Reusable)},\r\n\tdoi={10.1109/ICSE48619.2023.00211},\r\n\tpages = {2527--2539},\r\n\tyear={2023}\r\n}\r\n\r\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n PolyFuzz: Holistic Greybox Fuzzing of Multi-Language Systems.\n \n \n \n \n\n\n \n Wen Li, Jinyang Ruan, Guangbei Yi, Long Cheng, Xiapu Luo, & Haipeng Cai.\n\n\n \n\n\n\n In 32nd USENIX Security Symposium (USENIX Security 23), pages 1379–1396, Anaheim, CA, August 2023. USENIX Association\n (artifact evaluated; badges: Available)\n\n\n\n
\n\n\n\n \n \n \"PolyFuzz:Paper\n  \n \n \n \"PolyFuzz: project\n  \n \n \n \"PolyFuzz: pdf\n  \n \n \n \"PolyFuzz: cves\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 86 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{wen23usenixsecurity,\r\n\tauthor = {Wen Li and Jinyang Ruan and Guangbei Yi and Long Cheng and Xiapu Luo and Haipeng Cai},\r\n\ttitle = {{PolyFuzz}: Holistic Greybox Fuzzing of {Multi-Language} Systems},\r\n\tbooktitle = {32nd USENIX Security Symposium (USENIX Security 23)},\r\n\tisbn = {978-1-939133-37-3},\r\n\taddress = {Anaheim, CA},\r\n\tpages = {1379--1396},\r\n\turl = {https://www.usenix.org/conference/usenixsecurity23/presentation/li-wen},\r\n\tpublisher = {USENIX Association},\r\n\tmonth = aug,\r\n\tKeywords = {cross-language program analysis, multi-language software, software security},\r\n\turl_project = {https://bitbucket.org/wsucailab/polyfuzz/},\r\n\turl_pdf = {http://chapering.github.io/pubs/sec23.pdf},\r\n\turl_CVEs = {https://bitbucket.org/wsucailab/polyfuzz/src/main/Vulnerability/NewVulnerabilities.pdf},\r\n\tyear={2023},\r\n\tnote = {(artifact evaluated; badges: Available)}\r\n}\r\n\r\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Generating Vulnerable Code via Learning-Based Program Transformations.\n \n \n \n \n\n\n \n Haipeng Cai, Yu Nong, Yuzhe Ou, & Feng Chen.\n\n\n \n\n\n\n In Cliff Wang, S.S. Iyengar, & Kun Sun., editor(s), AI Embedded Assurance for Cyber Systems, pages 123–138. Springer International Publishing, Cham, 2023.\n \n\n\n\n
\n\n\n\n \n \n \"GeneratingPaper\n  \n \n \n \"Generating pdf\n  \n \n \n \"Generating project\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n  \n \n abstract \n \n\n \n  \n \n 6 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n\n\n\n
\n
@incollection{cai23chapter,\r\n\tauthor="Cai, Haipeng and Nong, Yu and Ou, Yuzhe and Chen, Feng",\r\n\teditor="Wang, Cliff and Iyengar, S.S. and Sun, Kun",\r\n\ttitle="Generating Vulnerable Code via Learning-Based Program Transformations",\r\n\tbookTitle="AI Embedded Assurance for Cyber Systems",\r\n\tyear="2023",\r\n\tpublisher="Springer International Publishing",\r\n\taddress="Cham",\r\n\tpages="123--138",\r\n\tabstract="Software vulnerabilities are a major source of cybersecurity threats. Therefore, it is of paramount importance to defend against (e.g., detect and repair) them. Data-driven approaches, especially those based on machine/deep learning (ML/DL), have demonstrated a great potential to that end. To achieve practical efficacy, these approaches rely on a large number of training samples. However, currently such samples, especially those that are known as vulnerable, are not richly available, immediately impeding ML/DL applications for software vulnerability analysis. Moreover, these samples would also meet the critical need for making scientific progress in software assurance through objective benchmarking of existing techniques and tools.",\r\n\tisbn="978-3-031-42637-7",\r\n\tdoi="10.1007/978-3-031-42637-7_7",\r\n\turl="https://doi.org/10.1007/978-3-031-42637-7_7",\r\n\tKeywords = {program generation, vulnerability analysis, software security},\r\n\turl_pdf = {http://chapering.github.io/pubs/chapter23cai.pdf},\r\n\turl_project = {https://figshare.com/s/faf2c8a24410b34b7e70},\r\n}\r\n\r\n
\n
\n\n\n
\n Software vulnerabilities are a major source of cybersecurity threats. Therefore, it is of paramount importance to defend against (e.g., detect and repair) them. Data-driven approaches, especially those based on machine/deep learning (ML/DL), have demonstrated a great potential to that end. To achieve practical efficacy, these approaches rely on a large number of training samples. However, currently such samples, especially those that are known as vulnerable, are not richly available, immediately impeding ML/DL applications for software vulnerability analysis. Moreover, these samples would also meet the critical need for making scientific progress in software assurance through objective benchmarking of existing techniques and tools.\n
\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n A Control-Theoretic Approach to Auto-Tuning Dynamic Analysis for Distributed Services.\n \n \n \n \n\n\n \n Chandan Dhal, Xiaoqin Fu, & Haipeng Cai.\n\n\n \n\n\n\n In IEEE/ACM International Conference on Software Engineering (ICSE), Poster (invited), pages 330-331, 2023. \n \n\n\n\n
\n\n\n\n \n \n \"A pdf\n  \n \n \n \"A project\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 12 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{chandan23icseposter,\r\n  author = \t {Chandan Dhal and Xiaoqin Fu and Haipeng Cai},\r\n  title = \t {A Control-Theoretic Approach to Auto-Tuning Dynamic Analysis for Distributed Services},\r\n  booktitle = {IEEE/ACM International Conference on Software Engineering (ICSE), Poster (invited)},\r\n  year = \t {2023},\r\n  pages = {330-331},\r\n  doi={10.1109/ICSE-Companion58688.2023.00092},\r\n  url_pdf = {http://chapering.github.io/pubs/icse23-poster.pdf},\r\n  url_project={https://bitbucket.org/wsucailab/distodd},\r\n  Keywords = {distributed systems, dynamic analysis, self-adaptive program analysis}\r\n}\r\n\r\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2022\n \n \n (13)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Demystifying Hidden Sensitive Operations in Android apps.\n \n \n \n \n\n\n \n Xiaoyu Sun, Xiao Chen, Li LI, Haipeng Cai, John Grundy, Jordan Samhi, Tegawende Bissyande, & Jacques Klein.\n\n\n \n\n\n\n ACM Transactions on Software Engineering and Methodology (TOSEM), 32(2). 2022.\n (impact factor: 2.674; journal-first paper)\n\n\n\n
\n\n\n\n \n \n pdf\n  \n \n \n arxiv\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 21 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n\n\n\n
\n
@article{xiaoyu22tosem,\r\n\tauthor = \t {Xiaoyu Sun and Xiao Chen and Li LI and Haipeng Cai and John Grundy and Jordan Samhi and Tegawende Bissyande and Jacques Klein},\r\n\ttitle = \t {Demystifying Hidden Sensitive Operations in Android apps},\r\n\tyear = \t {2022},\r\n\turl_pdf = {http://chapering.github.io/pubs/tosem22.pdf},\r\n\turl_arxiv = {https://doi.org/10.48550/arXiv.2210.10997},\r\n\tjournal =  {ACM Transactions on Software Engineering and Methodology (TOSEM)},\r\n\tdoi={10.1145/3574158},\r\n\tvolume = {32},\r\n\tnumber = {2},\r\n\tissn = {1049-331X},\r\n\tKeywords = {Android, mobile security, software security},\r\n\tarticleno = {50},\r\n\tnumpages = {30},\r\n\tnote = {(impact factor: 2.674; journal-first paper)}\r\n}\r\n\r\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Open Science in Software Engineering: A Study on Deep Learning-Based Vulnerability Detection.\n \n \n \n \n\n\n \n Yu Nong, Rainy Sharma, Wahab Hamou-Lhadj, Xiapu Luo, & Haipeng Cai.\n\n\n \n\n\n\n IEEE Transactions on Software Engineering (TSE), 49(4): 1983–2005. 2022.\n (impact factor: 9.322; journal-first paper)\n\n\n\n
\n\n\n\n \n \n \"Open pdf\n  \n \n \n \"Open project\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 39 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n\n\n\n
\n
@article{yu22tse,\r\n\tauthor = \t {Yu Nong and Rainy Sharma and Wahab Hamou-Lhadj and Xiapu Luo and Haipeng Cai},\r\n\ttitle = \t {Open Science in Software Engineering: A Study on Deep Learning-Based Vulnerability Detection},\r\n\tyear = \t {2022},\r\n\turl_pdf = {http://chapering.github.io/pubs/tse22.pdf},\r\n\turl_project = {https://figshare.com/s/e048fa191503393275a1},\r\n\tjournal =  {IEEE Transactions on Software Engineering (TSE)},\r\n\tdoi={10.1109/TSE.2022.3207149},\r\n\tvolume = {49},\r\n\tnumber = {4},\r\n\tpages = {1983--2005},\r\n\tKeywords = {empirical study, vulnerability analysis, deep learning for security},\r\n\tnote = {(impact factor: 9.322; journal-first paper)}\r\n}\r\n\r\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n PolyFax: A Toolkit for Characterizing Multi-Language Software.\n \n \n \n \n\n\n \n Wen Li, Li LI, & Haipeng Cai.\n\n\n \n\n\n\n In ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE), Tool Demos, pages 1662–1666, 2022. \n \n\n\n\n
\n\n\n\n \n \n \"PolyFax: pdf\n  \n \n \n \"PolyFax: project\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 21 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n\n\n\n
\n
@InProceedings{wen22fsetool,\r\n  title={{PolyFax}: A Toolkit for Characterizing Multi-Language Software},\r\n  author={Wen Li and Li LI and Haipeng Cai},\r\n  booktitle={ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE), Tool Demos},\r\n  year={2022},\r\n  doi={10.1145/3540250.3558925},\r\n  pages={1662--1666},\r\n  url_pdf = {http://chapering.github.io/pubs/fse22-polyfax.pdf},\r\n  url_project={https://bitbucket.org/wsucailab/polyfax},\r\n  Keywords = {multi-language software, cross-language analysis}\r\n}\r\n\r\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Language-Agnostic Dynamic Analysis of Multilingual Code: Promises, Pitfalls, and Prospects.\n \n \n \n \n\n\n \n Haoran Yang, Wen Li, & Haipeng Cai.\n\n\n \n\n\n\n In ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE), Ideas, Visions and Reflections, pages 1621–1626, 2022. \n \n\n\n\n
\n\n\n\n \n \n \"Language-Agnostic pdf\n  \n \n \n \"Language-Agnostic project\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 28 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n\n\n\n
\n
@InProceedings{haoran22fsenier,\r\n  title={Language-Agnostic Dynamic Analysis of Multilingual Code: Promises, Pitfalls, and Prospects},\r\n  author={Haoran Yang and Wen Li and Haipeng Cai},\r\n  booktitle={ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE), Ideas, Visions and Reflections},\r\n  url_pdf = {http://chapering.github.io/pubs/fsenier22haoran.pdf},\r\n  url_project = {https://bitbucket.org/hcailab/dyncrosslangstudy},\r\n  doi={10.1145/3540250.3560880},\r\n  year={2022},\r\n  pages={1621--1626},\r\n  Keywords = {cross-language program analysis, multi-language software, dynamic analysis}\r\n}\r\n\r\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Uncovering Intent based Leak of Sensitive Data in Android Framework.\n \n \n \n \n\n\n \n Hao Zhou, Xiapu Luo, Haoyu Wang, & Haipeng Cai.\n\n\n \n\n\n\n In ACM Conference on Computer and Communications Security (CCS), pages 3239–3252, 2022. \n \n\n\n\n
\n\n\n\n \n \n \"Uncovering pdf\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 48 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@InProceedings{hao22ccs,\r\n  title={Uncovering Intent based Leak of Sensitive Data in {Android} Framework},\r\n  author={Hao Zhou and Xiapu Luo and Haoyu Wang and Haipeng Cai},\r\n  booktitle={ACM Conference on Computer and Communications Security (CCS)},\r\n  url_pdf = {http://chapering.github.io/pubs/ccs22hao.pdf},\r\n  doi={10.1145/3548606.3560601},\r\n  year={2022},\r\n  pages={3239--3252},\r\n  Keywords = {Android, software security, systems security, data leak}\r\n}\r\n\r\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Generating Realistic Vulnerabilities via Neural Code Editing: An Empirical Study.\n \n \n \n \n\n\n \n Yu Nong, Yuzhe Ou, Michael Pradel, Feng Chen, & Haipeng Cai.\n\n\n \n\n\n\n In ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE), pages 1097–1109, 2022. \n (artifact evaluated; badges: Available, Functional)\n\n\n\n
\n\n\n\n \n \n \"Generating pdf\n  \n \n \n \"Generating project\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 42 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n\n\n\n
\n
@InProceedings{yu22fse,\r\n  title={Generating Realistic Vulnerabilities via Neural Code Editing: An Empirical Study},\r\n  author={Yu Nong and Yuzhe Ou and Michael Pradel and Feng Chen and Haipeng Cai},\r\n  booktitle={ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE)},\r\n  url_pdf = {http://chapering.github.io/pubs/fse22yu.pdf},\r\n  url_project = {https://figshare.com/s/f0a7d357b148fc262a40},\r\n  year={2022},\r\n  doi={10.1145/3540250.3549128},\r\n  pages = {1097--1109},\r\n  Keywords = {empirical study, vulnerability analysis, deep learning for security},\r\n  note = {(artifact evaluated; badges: Available, Functional)}\r\n}\r\n\r\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n On the Vulnerability Proneness of Multilingual Code.\n \n \n \n \n\n\n \n Wen Li, Li LI, & Haipeng Cai.\n\n\n \n\n\n\n In ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE), pages 847–859, 2022. \n (artifact evaluated; badges: Available, Functional, Reusable)\n\n\n\n
\n\n\n\n \n \n \"On pdf\n  \n \n \n \"On project\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 55 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@InProceedings{wen22fse,\r\n  title={On the Vulnerability Proneness of Multilingual Code},\r\n  author={Wen Li and Li LI and Haipeng Cai},\r\n  booktitle={ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE)},\r\n  url_pdf = {http://chapering.github.io/pubs/fse22wen.pdf},\r\n  url_project = {https://figshare.com/s/f56fd5f5319bbfa5250a},\r\n  year={2022},\r\n  doi={10.1145/3540250.3549173},\r\n  pages = {847--859},\r\n  Keywords = {vulnerability analysis, cross-language analysis, multi-language software, software security},\r\n  note = {(artifact evaluated; badges: Available, Functional, Reusable)}\r\n}\r\n\r\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n WASAI: Uncovering Vulnerabilities in Wasm Smart Contracts.\n \n \n \n \n\n\n \n Weimin Chen, Zihan Sun, Haoyu Wang, Xiapu Luo, Haipeng Cai, & Lei Wu.\n\n\n \n\n\n\n In ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA), pages 703–715, 2022. \n (artifact evaluated; badges: Available)\n\n\n\n
\n\n\n\n \n \n \"WASAI: pdf\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 23 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{weimin22issta,\r\n  title={{WASAI}: Uncovering Vulnerabilities in Wasm Smart Contracts},\r\n  author={Weimin Chen and Zihan Sun and Haoyu Wang and Xiapu Luo and Haipeng Cai and Lei Wu},\r\n  booktitle={ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA)},\r\n  Keywords = {Smart contract, software security},\r\n  url_pdf = {http://chapering.github.io/pubs/issta22weimin.pdf},\r\n  pages={703--715},\r\n  doi={10.1145/3533767.3534218},\r\n  year={2022},\r\n  note = {(artifact evaluated; badges: Available)}\r\n}\r\n\r\n\r\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n NCScope: Hardware-Assisted Analyzer for Native Code in Android Apps.\n \n \n \n \n\n\n \n Hao Zhou, Shuohan Wu, Xiapu Luo, Ting Wang, Yajin Zhou, Chao Zhang, & Haipeng Cai.\n\n\n \n\n\n\n In ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA), pages 629–641, 2022. \n (artifact evaluated; badges: Available); [ACM SIGSOFT Distinguished Paper Award]\n\n\n\n
\n\n\n\n \n \n \"NCScope: pdf\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 34 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{hao22issta,\r\n  title={{NCScope}: Hardware-Assisted Analyzer for Native Code in Android Apps},\r\n  author={Hao Zhou and Shuohan Wu and Xiapu Luo and Ting Wang and Yajin Zhou and Chao Zhang and Haipeng Cai},\r\n  booktitle={ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA)},\r\n  Keywords = {Android, software security, malware, dynamic analysis},\r\n  url_pdf = {http://chapering.github.io/pubs/issta22hao.pdf},\r\n  pages={629--641},\r\n  year={2022},\r\n  doi={10.1145/3533767.3534410},\r\n  note={(artifact evaluated; badges: Available); [ACM SIGSOFT Distinguished Paper Award]}\r\n}\r\n\r\n\r\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Automatically Detecting API-induced Compatibility Issues in Android Apps: A Comparative Analysis (Replicability Study).\n \n \n \n \n\n\n \n Pei Liu, Yanjie Zhao, Haipeng Cai, Mattia Fazzini, John Grundy, & Li LI.\n\n\n \n\n\n\n In ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA), pages 617–628, 2022. \n (artifact evaluated; badges: Available, Functional)\n\n\n\n
\n\n\n\n \n \n \"Automatically pdf\n  \n \n \n \"Automatically arxiv\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 13 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{pei22issta,\r\n  title={Automatically Detecting API-induced Compatibility Issues in Android Apps: A Comparative Analysis (Replicability Study)},\r\n  author={Pei Liu and Yanjie Zhao and Haipeng Cai and Mattia Fazzini and John Grundy and Li LI},\r\n  booktitle={ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA)},\r\n  Keywords = {Android, mobile software engineering, compatibility},\r\n  url_pdf = {http://chapering.github.io/pubs/issta22pei.pdf},\r\n  url_arxiv = {https://doi.org/10.48550/arXiv.2205.15561},\r\n  pages={617--628},\r\n  doi={10.1145/3533767.3534407},\r\n  year={2022},\r\n  note = {(artifact evaluated; badges: Available, Functional)}\r\n}\r\n\r\n\r\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n PolyCruise: A Cross-Language Dynamic Information Flow Analysis.\n \n \n \n \n\n\n \n Wen Li, Jiang Ming, Xiapu Luo, & Haipeng Cai.\n\n\n \n\n\n\n In 31st USENIX Security Symposium (USENIX Security 22), pages 2513–2530, Boston, MA, August 2022. USENIX Association\n (artifact evaluated; badges: Available, Functional)\n\n\n\n
\n\n\n\n \n \n \"PolyCruise: project\n  \n \n \n \"PolyCruise: pdf\n  \n \n \n \"PolyCruise: cves\n  \n \n \n \"PolyCruise:Paper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 48 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{wen22usenixsecurity,\r\n  title={{PolyCruise}: A Cross-Language Dynamic Information Flow Analysis},\r\n  author={Wen Li and Jiang Ming and Xiapu Luo and Haipeng Cai},\r\n  booktitle={31st {USENIX} Security Symposium ({USENIX} Security 22)},\r\n  Keywords = {cross-language program analysis, multi-language software, software security},\r\n  url_project = {https://bitbucket.org/wsucailab/polycruise/},\r\n  url_pdf = {http://chapering.github.io/pubs/sec22.pdf},\r\n  url_CVEs = {https://bitbucket.org/wsucailab/polycruise/src/master/Experiments/PoC/AllVulnerabilities.pdf},\r\n  isbn = {978-1-939133-31-1},\r\n  address = {Boston, MA},\r\n  pages = {2513--2530},\r\n  url = {https://www.usenix.org/conference/usenixsecurity22/presentation/li-wen},\r\n  publisher = {USENIX Association},\r\n  month = aug,\r\n  year={2022},\r\n  note = {(artifact evaluated; badges: Available, Functional)}\r\n}\r\n\r\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n A Lightweight Approach of Human-Like Playtest for Android Apps.\n \n \n \n \n\n\n \n Yan Zhao, Enyi Tang, Haipeng Cai, Xi Guo, Xiaoyin Wang, & Na Meng.\n\n\n \n\n\n\n In International Conference on Software Analysis, Evolution, and Reengineering (SANER), pages 309–320, 2022. \n \n\n\n\n
\n\n\n\n \n \n \"A pdf\n  \n \n \n \"A arxiv\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 27 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{yan22saner,\r\n  author = \t {Yan Zhao and Enyi Tang and Haipeng Cai and Xi Guo and Xiaoyin Wang and Na Meng},\r\n  title = \t {A Lightweight Approach of Human-Like Playtest for Android Apps},\r\n  booktitle =  {International Conference on Software Analysis, Evolution, and Reengineering (SANER)},\r\n  Keywords = {Android, testing},\r\n  url_pdf = {http://chapering.github.io/pubs/saner22.pdf},\r\n  url_arxiv = {https://arxiv.org/abs/2102.13026},\r\n  doi={10.1109/SANER53432.2022.00047},\r\n  pages={309--320},\r\n  year = \t {2022}\r\n}\r\n\r\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n DistFax: A Toolkit for Measuring Interprocess Communications and Quality of Distributed Systems.\n \n \n \n \n\n\n \n Xiaoqin Fu, Boxiang Lin, & Haipeng Cai.\n\n\n \n\n\n\n In IEEE/ACM International Conference on Software Engineering (ICSE), Tool Demos, pages 51–55, 2022. \n \n\n\n\n
\n\n\n\n \n \n \"DistFax: pdf\n  \n \n \n \"DistFax: project\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 27 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{xqfu22icsedemo,\r\n  author = \t {Xiaoqin Fu and Boxiang Lin and Haipeng Cai},\r\n  title = \t {{DistFax}: A Toolkit for Measuring Interprocess Communications and Quality of Distributed Systems},\r\n  booktitle = {IEEE/ACM International Conference on Software Engineering (ICSE), Tool Demos},\r\n  year = \t {2022},\r\n  doi={10.1145/3510454.3516859},\r\n  url_pdf = {http://chapering.github.io/pubs/icse22demo.pdf},\r\n  url_project={https://bitbucket.org/wsucailab/distfax/},\r\n  pages={51--55},\r\n  Keywords = {distributed systems, software measurement, software quality}\r\n}\r\n\r\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2021\n \n \n (8)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n D$^2$ABS: A Framework for Dynamic Dependence Analysis of Distributed Programs.\n \n \n \n \n\n\n \n Haipeng Cai, & Xiaoqin Fu.\n\n\n \n\n\n\n IEEE Transactions on Software Engineering (TSE), 48(12): 4733–4761. 2021.\n (impact factor: 6.226)\n\n\n\n
\n\n\n\n \n \n \"D$^2$ABS: pdf\n  \n \n \n \"D$^2$ABS: project\n  \n \n \n \"D$^2$ABS: arxiv\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 47 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@article{cai21tse,\r\n  author = \t {Haipeng Cai and Xiaoqin Fu},\r\n  title = \t {{D$^2$ABS}: A Framework for Dynamic Dependence Analysis of Distributed Programs},\r\n  year = \t {2021},\r\n  journal =  {IEEE Transactions on Software Engineering (TSE)},\r\n  url_pdf = {http://chapering.github.io/pubs/tse21.pdf},\r\n  url_project={https://bitbucket.org/wsucailab/d2abs/src/master/},\r\n  url_arxiv = {https://arxiv.org/abs/2111.04837},\r\n  doi={10.1109/TSE.2021.3124795},\r\n  volume={48},\r\n  number={12},\r\n  pages={4733--4761},\r\n  Keywords = {distributed systems, dynamic analysis, dependence analysis, dependence abstraction},\r\n  note = {(impact factor: 6.226)}\r\n}\r\n\r\n\r\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n FlowDist: Multi-Staged Refinement-Based Dynamic Information Flow Analysis for Distributed Software Systems.\n \n \n \n \n\n\n \n Xiaoqin Fu, & Haipeng Cai.\n\n\n \n\n\n\n In 30th USENIX Security Symposium (USENIX Security 21), pages 2093–2110, August 2021. USENIX Association\n \n\n\n\n
\n\n\n\n \n \n \"FlowDist: project\n  \n \n \n \"FlowDist: pdf\n  \n \n \n \"FlowDist:Paper\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 79 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{xqfu21usenixsecurity,\r\n  title={{FlowDist}: Multi-Staged Refinement-Based Dynamic Information Flow Analysis for Distributed Software Systems},\r\n  author={Xiaoqin Fu and Haipeng Cai},\r\n  booktitle={30th {USENIX} Security Symposium ({USENIX} Security 21)},\r\n  url_project = {https://bitbucket.org/wsucailab/flowdist},\r\n  url_pdf = {http://chapering.github.io/pubs/sec21.pdf},\r\n  Keywords = {software security, distributed systems, taint analysis, dynamic analysis},\r\n  isbn = {978-1-939133-24-3},\r\n  pages = {2093--2110},\r\n  url = {https://www.usenix.org/conference/usenixsecurity21/presentation/fu-xiaoqin},\r\n  publisher = {USENIX Association},\r\n  month = aug,\r\n  year={2021}\r\n}\r\n\r\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Evaluating and Comparing Memory Error Vulnerability Detectors.\n \n \n \n \n\n\n \n Yu Nong, Haipeng Cai, Pengfei Ye, Li LI, & Feng Chen.\n\n\n \n\n\n\n Information and Software Technology (IST), 137: 106614. 2021.\n (impact factor 2.726)\n\n\n\n
\n\n\n\n \n \n \"Evaluating pdf\n  \n \n \n \"Evaluating project\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 20 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n\n\n\n
\n
@article{nong21ist,\r\n  title={Evaluating and Comparing Memory Error Vulnerability Detectors},\r\n  author={Yu Nong and Haipeng Cai and Pengfei Ye and Li LI and Feng Chen},\r\n  journal={Information and Software Technology (IST)},\r\n  doi = {10.1016/j.infsof.2021.106614},\r\n  volume={137},\r\n  pages={106614},\r\n  year={2021},\r\n  Keywords = {software security, vulnerability, empirical study},\r\n  url_pdf = {http://chapering.github.io/pubs/ist21.pdf},\r\n  url_project = {https://bitbucket.org/hcailab/svstudy},\r\n  note = {(impact factor 2.726)}\r\n}\r\n\r\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Exploitation Techniques for Data-Oriented Attacks with Existing and Potential Defense Approaches.\n \n \n \n \n\n\n \n Long Cheng, Salman Ahmed, Hans Liljestrand, Thomas Nyman, Haipeng Cai, Trent Jaeger, Nadarajah Asokan, & Danfeng Yao.\n\n\n \n\n\n\n ACM Transactions on Privacy and Security (TOPS), 24(4): 1–36. 2021.\n (impact factor: 1.974)\n\n\n\n
\n\n\n\n \n \n \"Exploitation pdf\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 13 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@article{lcheng21tops,\r\n\tauthor = \t {Long Cheng and Salman Ahmed and Hans Liljestrand and Thomas Nyman and Haipeng Cai and Trent Jaeger and Nadarajah Asokan and Danfeng Yao},\r\n\ttitle = \t {Exploitation Techniques for Data-Oriented Attacks with Existing and Potential Defense Approaches},\r\n\tyear = \t {2021},\r\n\tvolume={24},\r\n\tnumber={4},\r\n\tpages={1--36},\r\n\tdoi = {10.1145/3462699},\r\n\turl_pdf = {http://chapering.github.io/pubs/tops21-dop.pdf},\r\n\tjournal =  {ACM Transactions on Privacy and Security (TOPS)},\r\n\tKeywords = {software security, data-oriented attacks, DOP, BOP, branch correlation, frequency anomaly},\r\n\tnote = {(impact factor: 1.974)}\r\n}\r\n\r\n\r\n%%%%%%%%%%%%%%%%%%%%%%%%%%%%%\r\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n AndroCT: Ten Years of App Call Traces in Android.\n \n \n \n \n\n\n \n Wen Li, Xiaoqin Fu, & Haipeng Cai.\n\n\n \n\n\n\n In IEEE/ACM Working Conference on Mining Software Repository (MSR), Data showcase, pages 570–574, 2021. \n \n\n\n\n
\n\n\n\n \n \n \"AndroCT: pdf\n  \n \n \n \"AndroCT: project\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 33 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{wen21msrdata,\r\n  author = \t {Wen Li and Xiaoqin Fu and Haipeng Cai},\r\n  title = \t {{AndroCT}: Ten Years of App Call Traces in Android},\r\n  year = \t {2021},\r\n  pages = {570--574},\r\n  doi = {10.1109/MSR52588.2021.00076},\r\n  booktitle = {IEEE/ACM Working Conference on Mining Software Repository (MSR), Data showcase},\r\n  url_pdf = {http://chapering.github.io/pubs/msr21.pdf},\r\n  url_project = {https://zenodo.org/record/4470320},\r\n  Keywords = {Android, dataset, profiling, tracing}\r\n}\r\n\r\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n EnHMM: On the Use of Ensemble HMMs and Stack Traces To Predict the Reassignment of Bug Report Fields.\n \n \n \n \n\n\n \n Md. Shariful Islam, Abdelwahab Hamou-Lhadj, Korosh Koochekian-Sabor, Mohammad Hamdaqa, & Haipeng Cai.\n\n\n \n\n\n\n In International Conference on Software Analysis, Evolution, and Reengineering (SANER), pages 411–421, 2021. \n \n\n\n\n
\n\n\n\n \n \n \"EnHMM: pdf\n  \n \n \n \"EnHMM: arxiv\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 11 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{islam21saner,\r\n  author = \t {Md. Shariful Islam and Abdelwahab Hamou-Lhadj and Korosh Koochekian-Sabor and Mohammad Hamdaqa and Haipeng Cai},\r\n  title = \t {{EnHMM}: On the Use of Ensemble HMMs and Stack Traces To Predict the Reassignment of Bug Report Fields},\r\n  booktitle = {International Conference on Software Analysis, Evolution, and Reengineering (SANER)},\r\n  year = \t {2021},\r\n  pages = {411--421},\r\n  doi={10.1109/SANER50967.2021.00045},\r\n  url_pdf = {http://chapering.github.io/pubs/saner21.pdf},\r\n  url_arxiv = {https://arxiv.org/abs/2103.08083},\r\n  Keywords = {defect prediction, tracing, maintenance}\r\n}\r\n\r\n\r\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n On the Impact of Sample Duplication in Machine Learning based Android Malware Detection.\n \n \n \n \n\n\n \n Yanjie Zhao, Li LI, Haoyu Wang, Haipeng Cai, Tegawende Bissyande, Jacques Klein, & John Grundy.\n\n\n \n\n\n\n ACM Transactions on Software Engineering and Methodology (TOSEM), 30(3): 1–38. 2021.\n (impact factor 2.5; journal-first paper)\n\n\n\n
\n\n\n\n \n \n \"On pdf\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 19 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@article{yanjie21tosem,\r\n   author = \t {Yanjie Zhao and Li LI and Haoyu Wang and Haipeng Cai and Tegawende Bissyande and Jacques Klein and John Grundy},\r\n   title = {On the Impact of Sample Duplication in Machine Learning based Android Malware Detection},\r\n   year = {2021},\r\n   volume = {30},\r\n   number = {3},\r\n   articleno = {40},\r\n   numpages = {38},\r\n   pages = {1--38},\r\n   doi = {10.1145/3446905},\r\n   journal = {ACM Transactions on Software Engineering and Methodology (TOSEM)},\r\n   url_pdf = {http://chapering.github.io/pubs/tosem21impact.pdf},\r\n   Keywords = {Android, malware detection, machine learning, dataset, data duplication},\r\n   note = {(impact factor 2.5; journal-first paper)}\r\n}\r\n\r\n\r\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Understanding Language Selection in Multi-Language Software Projects on GitHub.\n \n \n \n \n\n\n \n Wen Li, Na Meng, Li LI, & Haipeng Cai.\n\n\n \n\n\n\n In IEEE/ACM International Conference on Software Engineering (ICSE), Poster (invited), pages 256–257, 2021. \n \n\n\n\n
\n\n\n\n \n \n \"Understanding pdf\n  \n \n \n \"Understanding project\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 25 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{wen21icseposter,\r\n  author = \t {Wen Li and Na Meng and Li LI and Haipeng Cai},\r\n  title = \t {Understanding Language Selection in Multi-Language Software Projects on GitHub},\r\n  booktitle = {IEEE/ACM International Conference on Software Engineering (ICSE), Poster (invited)},\r\n  year = \t {2021},\r\n  pages = {256--257},\r\n  doi={10.1109/ICSE-Companion52605.2021.00119},\r\n  url_pdf = {http://chapering.github.io/pubs/icse21-poster.pdf},\r\n  url_project={https://bitbucket.org/wsucailab/multilangstudy/},\r\n  Keywords = {empirical study, multi-language software}\r\n}\r\n\r\n\r\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2020\n \n \n (13)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n PCA: Memory Leak Detection using Partial Call-Path Analysis.\n \n \n \n \n\n\n \n Wen Li, Haipeng Cai, Yulei Sui, & David Manz.\n\n\n \n\n\n\n In ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE), Tool Demos, pages 1621–1625, 2020. \n \n\n\n\n
\n\n\n\n \n \n \"PCA: pdf\n  \n \n \n \"PCA: project\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 67 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@InProceedings{wen20fsetool,\r\n  title={{PCA}: Memory Leak Detection using Partial Call-Path Analysis},\r\n  author={Wen Li and Haipeng Cai and Yulei Sui and David Manz},\r\n  booktitle={ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE), Tool Demos},\r\n  year={2020},\r\n  pages     = {1621--1625},\r\n  doi={10.1145/3368089.3417923},\r\n  url_pdf = {http://chapering.github.io/pubs/fse20-pca.pdf},\r\n  url_project={https://github.com/Daybreak2019/PCA},\r\n  Keywords = {static analysis, vulnerability, software security, LLVM}\r\n}\r\n\r\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Dads: Dynamic Slicing Continuously-Running Distributed Programs with Budget Constraints.\n \n \n \n \n\n\n \n Xiaoqin Fu, Haipeng Cai, & Li LI.\n\n\n \n\n\n\n In ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE), Tool Demos, pages 1566–1570, 2020. \n \n\n\n\n
\n\n\n\n \n \n \"Dads: pdf\n  \n \n \n \"Dads: project\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 51 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n\n\n\n
\n
@InProceedings{xqfu20fsetool,\r\n  title={{Dads}: Dynamic Slicing Continuously-Running Distributed Programs with Budget Constraints},\r\n  author={Xiaoqin Fu and Haipeng Cai and Li LI},\r\n  booktitle={ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE), Tool Demos},\r\n  url_pdf = {http://chapering.github.io/pubs/fse20-dads.pdf},\r\n  url_project={https://bitbucket.org/wsucailab/seads/src/master/dads/},\r\n  year={2020},\r\n  pages     = {1566--1570},\r\n  doi={10.1145/3368089.3417920},\r\n  Keywords = {distributed systems, dynamic analysis, slicing}\r\n}\r\n\r\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Towards Learning Visual Semantics.\n \n \n \n \n\n\n \n Haipeng Cai, Shiv Raj Pant, & Wen Li.\n\n\n \n\n\n\n In ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE), Visions and Reflections, pages 1537–1540, 2020. \n \n\n\n\n
\n\n\n\n \n \n \"Towards pdf\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 44 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n\n\n\n
\n
@InProceedings{cai2020fsevision,\r\n  title={Towards Learning Visual Semantics},\r\n  author={Haipeng Cai and Shiv Raj Pant and Wen Li},\r\n  booktitle={ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE), Visions and Reflections},\r\n  url_pdf = {http://chapering.github.io/pubs/fse20-vissemantics.pdf},\r\n  year={2020},\r\n  pages     = {1537--1540},\r\n  doi={10.1145/3368089.3417040},\r\n  Keywords = {program understanding, visual semantics, computer vision}\r\n}\r\n\r\n\r\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Seads: Scalable and Cost-Effective Dynamic Dependence Analysis of Distributed Systems via Reinforcement Learning.\n \n \n \n \n\n\n \n Xiaoqin Fu, Haipeng Cai, Wen Li, & Li LI.\n\n\n \n\n\n\n ACM Transactions on Software Engineering and Methodology (TOSEM), 30(1): 1–45. 2020.\n (impact factor 2.5; journal-first paper)\n\n\n\n
\n\n\n\n \n \n \"Seads: pdf\n  \n \n \n \"Seads: project\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 52 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@article{xqfu20tosem,\r\n   author = \t {Xiaoqin Fu and Haipeng Cai and Wen Li and Li LI},\r\n   title = {{Seads}: Scalable and Cost-Effective Dynamic Dependence Analysis of Distributed Systems via Reinforcement Learning},\r\n   year = {2020},\r\n   volume = {30},\r\n   number = {1},\r\n   pages = {1--45},\r\n   doi={10.1145/3379345},\r\n   journal = {ACM Transactions on Software Engineering and Methodology (TOSEM)},\r\n   url_pdf = {http://chapering.github.io/pubs/tosem20seads.pdf},\r\n   url_project={https://bitbucket.org/wsucailab/seads},\r\n   Keywords = {distributed systems, dependence analysis, dynamic analysis, variable cost-effectiveness},\r\n   note = {(impact factor 2.5; journal-first paper)}\r\n}\r\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Exploring How Deprecated Python Library APIs are (Not) Handled.\n \n \n \n \n\n\n \n Jiawei Wang, Li LI, Kui Liu, & Haipeng Cai.\n\n\n \n\n\n\n In ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE), pages 233–244, 2020. \n \n\n\n\n
\n\n\n\n \n \n \"Exploring pdf\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 22 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n\n\n\n
\n
@InProceedings{wang2020fse,\r\n  title={Exploring How Deprecated Python Library APIs are (Not) Handled},\r\n  author={Jiawei Wang and Li LI and Kui Liu and Haipeng Cai},\r\n  booktitle={ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE)},\r\n  url_pdf = {http://chapering.github.io/pubs/fse20-pythonstudy.pdf},\r\n  year={2020},\r\n  pages     = {233--244},\r\n  doi={10.1145/3368089.3409735},\r\n  Keywords = {empirical study, API misuse, library use}\r\n}\r\n\r\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Scaling Application-Level Dynamic Taint Analysis to Enterprise-Scale Distributed Systems.\n \n \n \n \n\n\n \n Xiaoqin Fu, & Haipeng Cai.\n\n\n \n\n\n\n In IEEE/ACM International Conference on Software Engineering (ICSE), Poster (invited), pages 270–271, 2020. \n \n\n\n\n
\n\n\n\n \n \n \"Scaling pdf\n  \n \n \n \"Scaling project\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 15 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{xqfu20icseposter,\r\n  author = \t {Xiaoqin Fu and Haipeng Cai},\r\n  title = \t {Scaling Application-Level Dynamic Taint Analysis to Enterprise-Scale Distributed Systems},\r\n  year = \t {2020},\r\n  pages     = {270--271},\r\n  doi={10.1145/3377812.3390910},\r\n  booktitle = {IEEE/ACM International Conference on Software Engineering (ICSE), Poster (invited)},\r\n  url_pdf = {http://chapering.github.io/pubs/icse20-poster.pdf},\r\n  url_project={https://bitbucket.org/wsucailab/disttaint},\r\n  Keywords = {distributed systems, taint analysis, dynamic analysis, software security}\r\n}\r\n\r\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n A Study of Run-time Behavioral Evolution of Benign versus Malicious Apps in Android.\n \n \n \n \n\n\n \n Haipeng Cai, Xiaoqin Fu, & Abdelwahab Hamou-Lhadj.\n\n\n \n\n\n\n Information and Software Technology (IST), 122: 106291. 2020.\n (impact factor 2.726; journal-first paper, presented at ICSME 2020)\n\n\n\n
\n\n\n\n \n \n \"A pdf\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 22 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@article{cai20ist,\r\n  author = {Haipeng Cai and Xiaoqin Fu and Abdelwahab Hamou-Lhadj},\r\n  title = {A Study of Run-time Behavioral Evolution of Benign versus Malicious Apps in {Android}},\r\n  year = {2020},\r\n  volume    = {122},\r\n  pages     = {106291},\r\n  doi={10.1016/j.infsof.2020.106291},\r\n  url_pdf = {http://chapering.github.io/pubs/ist20runtime.pdf},\r\n  journal = {Information and Software Technology (IST)},\r\n  Keywords = {Android, empirical study, mobile software engineering, software security},\r\n  note = {(impact factor 2.726; journal-first paper, presented at ICSME 2020)}\r\n}\r\n\r\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n A Longitudinal Study of Application Structure and Behaviors in Android.\n \n \n \n \n\n\n \n Haipeng Cai, & Barbara Ryder.\n\n\n \n\n\n\n IEEE Transactions on Software Engineering (TSE), 47(12): 2934–2955. 2020.\n (impact factor 6.11)\n\n\n\n
\n\n\n\n \n \n \"A pdf\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 36 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@article{cai20tse,\r\n  author = {Haipeng Cai and Barbara Ryder},\r\n  title = {A Longitudinal Study of Application Structure and Behaviors in {Android}},\r\n  year = {2020},\r\n  journal = {IEEE Transactions on Software Engineering (TSE)},\r\n  url_pdf = {http://chapering.github.io/pubs/tse20androevo.pdf},\r\n  Keywords = {Android, characterization, mobile software engineering, software security},\r\n  doi = {10.1109/TSE.2020.2975176},\r\n  volume    = {47},\r\n  number    = {12},\r\n  pages     = {2934--2955},\r\n  note = {(impact factor 6.11)}\r\n}\r\n\r\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n MobiLogLeak: A Preliminary Study on Data Leakage Caused by Poor Logging Practices.\n \n \n \n \n\n\n \n Rui Zhou, Mohammad Hamdaqa, Haipeng Cai, & Abdelwahab Hamou-Lhadj.\n\n\n \n\n\n\n In IEEE International Conference on Software Analysis, Evolution, and Reengineering (SANER), Early Research Achievements, pages 577–581, 2020. \n \n\n\n\n
\n\n\n\n \n \n \"MobiLogLeak: pdf\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 4 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n\n\n\n
\n
@InProceedings{zhou20saner,\r\n  author = \t {Rui Zhou and Mohammad Hamdaqa and Haipeng Cai and Abdelwahab Hamou-Lhadj},\r\n  title = \t {{MobiLogLeak}: A Preliminary Study on Data Leakage Caused by Poor Logging Practices},\r\n  year = \t {2020},\r\n  pages     = {577--581},\r\n  doi={10.1109/SANER48275.2020.9054831},\r\n  booktitle = {IEEE International Conference on Software Analysis, Evolution, and Reengineering (SANER), Early Research Achievements},\r\n  url_pdf = {http://chapering.github.io/pubs/saner20-c.pdf},\r\n  Keywords = {Android, logging, software security}\r\n}\r\n\r\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Embracing Mobile App Evolution via Continuous Ecosystem Mining and Characterization.\n \n \n \n \n\n\n \n Haipeng Cai.\n\n\n \n\n\n\n In IEEE/ACM International Conference on Mobile Software Engineering and Systems (MobileSoft), Vision, pages 31–35, 2020. \n \n\n\n\n
\n\n\n\n \n \n \"Embracing pdf\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 7 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n\n\n\n
\n
@InProceedings{cai20mobilesoft,\r\n  author = \t {Haipeng Cai},\r\n  title = \t {Embracing Mobile App Evolution via Continuous Ecosystem Mining and Characterization},\r\n  year = \t {2020},\r\n  pages     = {31--35},\r\n  doi={10.1145/3387905.3388612},\r\n  booktitle = {IEEE/ACM International Conference on Mobile Software Engineering and Systems (MobileSoft), Vision},\r\n  url_pdf = {http://chapering.github.io/pubs/mobilesoft20-vision.pdf},\r\n  Keywords = {Android, mobile software engineering, software security}\r\n}\r\n\r\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n A Preliminary Study on Open-Source Memory Vulnerability Detectors.\n \n \n \n \n\n\n \n Yu Nong, & Haipeng Cai.\n\n\n \n\n\n\n In IEEE International Conference on Software Analysis, Evolution, and Reengineering (SANER), Early Research Achievements, pages 557–561, 2020. \n \n\n\n\n
\n\n\n\n \n \n \"A pdf\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 13 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n\n\n\n
\n
@InProceedings{nong20saner,\r\n  author = \t {Yu Nong and Haipeng Cai},\r\n  title = \t {A Preliminary Study on Open-Source Memory Vulnerability Detectors},\r\n  year = \t {2020},\r\n  pages     = {557--561},\r\n  doi={10.1109/SANER48275.2020.9054851},\r\n  booktitle = {IEEE International Conference on Software Analysis, Evolution, and Reengineering (SANER), Early Research Achievements},\r\n  url_pdf = {http://chapering.github.io/pubs/saner20-a.pdf},\r\n  Keywords = {software security, vulnerability, empirical study}\r\n}\r\n\r\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n A Reflection on the Predictive Accuracy of Dynamic Impact Analysis.\n \n \n \n \n\n\n \n Haipeng Cai.\n\n\n \n\n\n\n In International Conference on Software Analysis, Evolution, and Reengineering (SANER), Reflection, pages 562–566, 2020. \n \n\n\n\n
\n\n\n\n \n \n \"A pdf\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 9 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n\n\n\n
\n
@InProceedings{cai20saner,\r\n  author = \t {Haipeng Cai},\r\n  title = \t {A Reflection on the Predictive Accuracy of Dynamic Impact Analysis},\r\n  year = \t {2020},\r\n  pages     = {562--566},\r\n  doi={10.1109/SANER48275.2020.9054806},\r\n  booktitle = {International Conference on Software Analysis, Evolution, and Reengineering (SANER), Reflection},\r\n  url_pdf = {http://chapering.github.io/pubs/saner20-b.pdf},\r\n  Keywords = {change impact analysis, dynamic analysis}\r\n}\r\n\r\n\r\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Assessing and Improving Malware Detection Sustainability through App Evolution Studies.\n \n \n \n \n\n\n \n Haipeng Cai.\n\n\n \n\n\n\n ACM Transactions on Software Engineering and Methodology (TOSEM), 29(2): 8:1–8:28. 2020.\n (impact factor 2.5; journal-first paper, presented at ESEC/FSE 2020)\n\n\n\n
\n\n\n\n \n \n \"Assessing pdf\n  \n \n \n \"Assessing project\n  \n \n \n \"Assessing arxiv\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 11 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n\n\n\n
\n
@article{cai19tosem,\r\n   author = {Haipeng Cai},\r\n   title = {Assessing and Improving Malware Detection Sustainability through App Evolution Studies},\r\n   year = {2020},\r\n   volume    = {29},\r\n   number    = {2},\r\n   pages     = {8:1--8:28},\r\n   doi={10.1145/3371924},\r\n   journal = {ACM Transactions on Software Engineering and Methodology (TOSEM)},\r\n   url_pdf= {http://chapering.github.io/pubs/tosem19.pdf},\r\n   url_project = {https://bitbucket.org/haipeng_cai/droidspan},\r\n   url_arxiv = {https://arxiv.org/abs/1807.08221},\r\n   Keywords = {Android, malware, software security},\r\n   note = {(impact factor 2.5; journal-first paper, presented at ESEC/FSE 2020)}\r\n}\r\n\r\n\r\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2019\n \n \n (9)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n From Theory to Code: Identifying Logical Flaws in Cryptographic Implementations in C/C++.\n \n \n \n \n\n\n \n Sazzadur Rahaman, Haipeng Cai, Omar Chowdhury, & Danfeng Yao.\n\n\n \n\n\n\n IEEE Transactions on Dependable and Secure Computing (TDSC), 19(6): 3790–3803. 2019.\n (impact factor 6.4)\n\n\n\n
\n\n\n\n \n \n \"From pdf\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 6 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n\n\n\n
\n
@article{saddazur19tdsc,\r\n   author = {Sazzadur Rahaman and Haipeng Cai and Omar Chowdhury and Danfeng Yao},\r\n   title = {From Theory to Code: Identifying Logical Flaws in Cryptographic Implementations in {C/C++}},\r\n   year = {2019},\r\n   journal = {IEEE Transactions on Dependable and Secure Computing (TDSC)},\r\n   Keywords = {software security, vulnerability, API misuse},\r\n   doi={10.1109/TDSC.2021.3108031},\r\n   url_pdf= {http://chapering.github.io/pubs/tdsc19.pdf},\r\n   volume = {19},\r\n   number = {6},\r\n   pages = {3790--3803},\r\n   note = {(impact factor 6.4)}\r\n}\r\n\r\n\r\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n A Dynamic Taint Analyzer for Distributed Systems.\n \n \n \n \n\n\n \n Xiaoqin Fu, & Haipeng Cai.\n\n\n \n\n\n\n In ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE), Tool Demos, pages 1115–1119, 2019. \n \n\n\n\n
\n\n\n\n \n \n \"A pdf\n  \n \n \n \"A project\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 16 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{xqfu19fsetool,\r\n  author = \t {Xiaoqin Fu and Haipeng Cai},\r\n  title = \t {A Dynamic Taint Analyzer for Distributed Systems},\r\n  year = \t {2019},\r\n  pages     = {1115--1119},\r\n  doi={10.1145/3338906.3341179},\r\n  booktitle = {ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC/FSE), Tool Demos},\r\n  url_pdf = {http://chapering.github.io/pubs/fse19demo.pdf},\r\n  url_project = {https://bitbucket.org/wsucailab/disttaint},\r\n  Keywords = {software security, distributed systems, taint analysis, dynamic analysis}\r\n}\r\n\r\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n An Empirical Comparison between Monkey Testing and Human Testing.\n \n \n \n \n\n\n \n Mostafa Mohammed, Haipeng Cai, & Na Meng.\n\n\n \n\n\n\n In ACM SIGPLAN/SIGBED International Conference on Languages, Compilers, and Tools for Embedded Systems (LCTES), Work In Progress, pages 188–192, 2019. \n \n\n\n\n
\n\n\n\n \n \n \"An pdf\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{mostafa19lctes,\r\n  author = \t {Mostafa Mohammed and Haipeng Cai and Na Meng},\r\n  title = \t {An Empirical Comparison between {Monkey} Testing and Human Testing},\r\n  year = \t {2019},\r\n  pages     = {188--192},\r\n  doi={10.1145/3316482.3326342},\r\n  booktitle = {ACM SIGPLAN/SIGBED International Conference on Languages, Compilers, and Tools for Embedded Systems (LCTES), Work In Progress},\r\n  url_pdf = {http://chapering.github.io/pubs/lctes19.pdf},\r\n  Keywords = {Android, mobile software engineering, testing, empirical study}\r\n}\r\n\r\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n A Large-Scale Study of Application Incompatibilities in Android.\n \n \n \n \n\n\n \n Haipeng Cai, Ziyi Zhang, Li LI, & Xiaoqin Fu.\n\n\n \n\n\n\n In ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA), pages 216–227, 2019. \n (artifact evaluated; badges: Available, Functional)\n\n\n\n
\n\n\n\n \n \n \"A pdf\n  \n \n \n \"A project\n  \n \n \n \"A artifact\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 51 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{cai19issta,\r\n  author = \t {Haipeng Cai and Ziyi Zhang and Li LI and Xiaoqin Fu},\r\n  title = \t {A Large-Scale Study of Application Incompatibilities in {Android}},\r\n  year = \t {2019},\r\n  booktitle = {ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA)},\r\n  pages     = {216--227},\r\n  doi={10.1145/3339065},\r\n  url_pdf = {http://chapering.github.io/pubs/issta19.pdf},\r\n  url_project = {https://bitbucket.org/wsucailab/compat-tools/},\r\n  url_artifact = {https://eecs.wsu.edu/~hcai/appCompatAE/},\r\n  Keywords = {Android, mobile software engineering, compatibility},\r\n  note = {(artifact evaluated; badges: Available, Functional)}\r\n}\r\n\r\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Measuring Interprocess Communications in Distributed Systems.\n \n \n \n \n\n\n \n Xiaoqin Fu, & Haipeng Cai.\n\n\n \n\n\n\n In IEEE/ACM International Conference on Program Comprehension (ICPC), pages 323–334, 2019. \n \n\n\n\n
\n\n\n\n \n \n \"Measuring pdf\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 15 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{xqfu19icpc,\r\n  author = \t {Xiaoqin Fu and Haipeng Cai},\r\n  title = \t {Measuring Interprocess Communications in Distributed Systems},\r\n  year = \t {2019},\r\n  booktitle = {IEEE/ACM International Conference on Program Comprehension (ICPC)},\r\n  pages = {323--334},\r\n  doi={10.1109/ICPC.2019.00051},\r\n  url_pdf = {http://chapering.github.io/pubs/icpc19.pdf},\r\n  Keywords = {distributed systems, software measurement}\r\n}\r\n\r\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n A Look Into Developer Intentions for App Compatibility in Android.\n \n \n \n \n\n\n \n Ziyi Zhang, & Haipeng Cai.\n\n\n \n\n\n\n In IEEE/ACM International Conference on Mobile Software Engineering and Systems (MobileSoft), pages 40–44, 2019. \n \n\n\n\n
\n\n\n\n \n \n \"A pdf\n  \n \n \n \"A project\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 5 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{ziyi19mobilesoft,\r\n  author = \t {Ziyi Zhang and Haipeng Cai},\r\n  title = \t {A Look Into Developer Intentions for App Compatibility in {Android}},\r\n  year = \t {2019},\r\n  pages     = {40--44},\r\n  doi={10.1109/MOBILESoft.2019.00016},\r\n  booktitle = {IEEE/ACM International Conference on Mobile Software Engineering and Systems (MobileSoft)},\r\n  url_pdf = {http://chapering.github.io/pubs/mobilesoft19.pdf},\r\n  url_project = {https://bitbucket.org/wsucailab/compat-tools/},\r\n  Keywords = {Android, mobile software engineering, compatibility}\r\n}\r\n\r\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n On the Deterioration of Learning-Based Malware Detectors for Android.\n \n \n \n \n\n\n \n Xiaoqin Fu, & Haipeng Cai.\n\n\n \n\n\n\n In IEEE/ACM International Conference on Software Engineering (ICSE), Poster (invited), pages 272–273, 2019. \n \n\n\n\n
\n\n\n\n \n \n \"On pdf\n  \n \n \n \"On project\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 4 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{xqfu19icseposter,\r\n  author = \t {Xiaoqin Fu and Haipeng Cai},\r\n  title = \t {On the Deterioration of Learning-Based Malware Detectors for {Android}},\r\n  year = \t {2019},\r\n  doi={10.1109/ICSE-Companion.2019.00110},\r\n  booktitle = {IEEE/ACM International Conference on Software Engineering (ICSE), Poster (invited)},\r\n  pages = {272--273},\r\n  url_pdf = {http://chapering.github.io/pubs/icse19-poster.pdf},\r\n  url_project = {https://bitbucket.org/haipeng_cai/droidspan},\r\n  Keywords = {Android, malware, software security}\r\n}\r\n\r\n\r\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n DroidCat: Effective Android Malware Detection and Categorization via App-Level Profiling.\n \n \n \n \n\n\n \n Haipeng Cai, Na Meng, Barbara Ryder, & Danfeng Yao.\n\n\n \n\n\n\n IEEE Transactions on Information Forensics and Security (TIFS), 14(6): 1455–1470. 2019.\n (impact factor 6.2; journal-first paper)\n\n\n\n
\n\n\n\n \n \n \"DroidCat: pdf\n  \n \n \n \"DroidCat: project\n  \n \n \n \"DroidCat: techreport\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 51 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n\n\n\n
\n
@article{tifs18droidcat,\r\n  author = \t {Haipeng Cai and Na Meng and Barbara Ryder and Danfeng Yao},\r\n  title = \t {DroidCat: Effective {Android} Malware Detection and Categorization via App-Level Profiling},\r\n  year = \t {2019},\r\n  journal = {IEEE Transactions on Information Forensics and Security (TIFS)},\r\n  volume = {14},\r\n  number = {6},\r\n  pages = {1455--1470},\r\n  doi = {10.1109/TIFS.2018.2879302},\r\n  url_pdf = {http://chapering.github.io/pubs/tifs18.pdf},\r\n  url_project = {http://chapering.github.io/projects/droidcat},\r\n  url_techreport = {https://vtechworks.lib.vt.edu/handle/10919/77523},\r\n  Keywords = {Android, malware, software security},\r\n  note = {(impact factor 6.2; journal-first paper)}\r\n}\r\n\r\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Exploiting Parts-of-Speech for Effective Automated Requirements Traceability.\n \n \n \n \n\n\n \n Nasir Ali, Haipeng Cai, Abdelwahab Hamou-Lhadj, & Jameleddine Hassine.\n\n\n \n\n\n\n Information and Software Technology (IST), 106: 126–141. 2019.\n (impact factor 2.627; journal-first paper)\n\n\n\n
\n\n\n\n \n \n \"Exploiting pdf\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 13 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n\n\n\n
\n
@article{ist18conpos,\r\n  author = \t {Nasir Ali and Haipeng Cai and Abdelwahab Hamou-Lhadj and Jameleddine Hassine},\r\n  title = \t {Exploiting Parts-of-Speech for Effective Automated Requirements Traceability},\r\n  year = \t {2019},\r\n  volume = {106},\r\n  pages = {126--141},\r\n  doi = {10.1016/j.infsof.2018.09.009},\r\n  journal =  {Information and Software Technology (IST)},\r\n  url_pdf = {http://chapering.github.io/pubs/ist18.pdf},\r\n  Keywords = {requirements engineering, natural language processing, traceability},\r\n  note = {(impact factor 2.627; journal-first paper)}\r\n}\r\n\r\n\r\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2018\n \n \n (6)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Identifying Mobile Inter-App Communication Risks.\n \n \n \n \n\n\n \n Karim Elish, Haipeng Cai, Daniel Barton, Danfeng Yao, & Barbara Ryder.\n\n\n \n\n\n\n IEEE Transactions on Mobile Computing (TMC), 19(1): 90–102. 2018.\n (impact factor 4.8)\n\n\n\n
\n\n\n\n \n \n \"Identifying pdf\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 4 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n\n\n\n
\n
@article{tmc18interapp,\r\n   author = {Karim Elish and Haipeng Cai and Daniel Barton and Danfeng Yao and Barbara Ryder},\r\n   title = {Identifying Mobile Inter-App Communication Risks},\r\n   year = {2018},\r\n   journal = {IEEE Transactions on Mobile Computing (TMC)},\r\n  volume = {19},\r\n  number = {1},\r\n  pages = {90--102},\r\n  doi = {10.1109/TMC.2018.2889495},\r\n   url_pdf = {http://chapering.github.io/pubs/tmc18.pdf},\r\n   Keywords = {Android, software security},\r\n   note = {(impact factor 4.8)}\r\n}\r\n\r\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Leveraging Historical Versions of Android Apps for Efficient and Precise Taint Analysis.\n \n \n \n \n\n\n \n Haipeng Cai, & John Jenkins.\n\n\n \n\n\n\n In IEEE/ACM Working Conference on Mining Software Repository (MSR), pages 265–269, 2018. \n \n\n\n\n
\n\n\n\n \n \n \"Leveraging pdf\n  \n \n \n \"Leveraging project\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 19 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{msr18evotaint,\r\n  author = \t {Haipeng Cai and John Jenkins},\r\n  title = \t {Leveraging Historical Versions of {Android} Apps for Efficient and Precise Taint Analysis},\r\n  year = \t {2018},\r\n  pages = \t{265--269},\r\n  doi={10.1145/3196398.3196433},\r\n  booktitle = {IEEE/ACM Working Conference on Mining Software Repository (MSR)},\r\n  url_pdf = {http://chapering.github.io/pubs/msr18.pdf},\r\n  url_project = {https://bitbucket.org/wsucailab/iterative-taint-analysis},\r\n  Keywords = {Android, software security, taint analysis, incremental analysis}\r\n}\r\n\r\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n ICC-Inspect: Supporting Runtime Inspection of Android Inter-Component Communications.\n \n \n \n \n\n\n \n John Jenkins, & Haipeng Cai.\n\n\n \n\n\n\n In IEEE/ACM International Conference on Mobile Software Engineering and Systems (MobileSoft), Tool, pages 80–83, 2018. \n \n\n\n\n
\n\n\n\n \n \n \"ICC-Inspect: pdf\n  \n \n \n \"ICC-Inspect: project\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 2 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{mobsoft18iccvis,\r\n  author = \t {John Jenkins and Haipeng Cai},\r\n  title = \t {{ICC-Inspect}: Supporting Runtime Inspection of {Android} Inter-Component Communications},\r\n  year = \t {2018},\r\n  pages = {80--83},\r\n  doi={10.1145/3197231.3197233},\r\n  booktitle = {IEEE/ACM International Conference on Mobile Software Engineering and Systems (MobileSoft), Tool},\r\n  url_pdf = {http://chapering.github.io/pubs/mobilesoft18-tool.pdf},\r\n  url_project = {https://bitbucket.org/wsucailab/icc-visualizer-with-graphstream/src/master/},\r\n  Keywords = {Android, program understanding, mobile software engineering}\r\n}\r\n\r\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Automated Detection and Repair of Incompatible Uses of Runtime Permissions in Android Apps.\n \n \n \n \n\n\n \n Malinda Dilhara, Haipeng Cai, & John Jenkins.\n\n\n \n\n\n\n In IEEE/ACM International Conference on Mobile Software Engineering and Systems (MobileSoft), pages 67–71, 2018. \n \n\n\n\n
\n\n\n\n \n \n \"Automated pdf\n  \n \n \n \"Automated project\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 2 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{mobsoft18arp,\r\n  author = \t {Malinda Dilhara and Haipeng Cai and John Jenkins},\r\n  title = \t {Automated Detection and Repair of Incompatible Uses of Runtime Permissions in {Android} Apps},\r\n  year = \t {2018},\r\n  pages = {67--71},\r\n  doi={10.1145/3197231.3197255},\r\n  booktitle = {IEEE/ACM International Conference on Mobile Software Engineering and Systems (MobileSoft)},\r\n  url_pdf = {http://chapering.github.io/pubs/mobilesoft18.pdf},\r\n  url_project = {https://bitbucket.org/wsucailab/arpdroid/src/master/},\r\n  Keywords = {Android, compatibility, mobile software engineering, static analysis, code repair}\r\n}\r\n\r\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Towards Sustainable Android Malware Detection.\n \n \n \n \n\n\n \n Haipeng Cai, & John Jenkins.\n\n\n \n\n\n\n In IEEE/ACM International Conference on Software Engineering (ICSE), Poster (invited), pages 350–351, 2018. \n \n\n\n\n
\n\n\n\n \n \n \"Towards pdf\n  \n \n \n \"Towards project\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 1 download\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{icse18-poster,\r\n  author = \t {Haipeng Cai and John Jenkins},\r\n  title =    {Towards Sustainable {Android} Malware Detection},\r\n  booktitle = {IEEE/ACM International Conference on Software Engineering (ICSE), Poster (invited)},\r\n  year = {2018},\r\n  pages = {350--351},\r\n  doi={10.1145/3183440.3195004},\r\n  url_pdf = {http://chapering.github.io/pubs/icse18-poster.pdf},\r\n  url_project = {https://bitbucket.org/haipeng_cai/droidspan},\r\n  Keywords = {Android, malware, software security}\r\n}\r\n\r\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Hybrid Program Dependence Approximation for Effective Dynamic Impact Prediction.\n \n \n \n \n\n\n \n Haipeng Cai.\n\n\n \n\n\n\n IEEE Transactions on Software Engineering (TSE), 44(4): 334–364. 2018.\n (impact factor 6.11)\n\n\n\n
\n\n\n\n \n \n \"Hybrid pdf\n  \n \n \n \"Hybrid project\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 16 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n\n\n\n
\n
@article{cai15diverjournal,\r\n  author = \t {Haipeng Cai},\r\n  title = \t {Hybrid Program Dependence Approximation for Effective Dynamic Impact Prediction},\r\n  year = \t {2018},\r\n  journal =  {IEEE Transactions on Software Engineering (TSE)},\r\n  volume = {44},\r\n  number = {4},\r\n  pages = {334--364},\r\n  doi={10.1109/TSE.2017.2692783},\r\n  url_pdf = {http://chapering.github.io/pubs/tse17.pdf},\r\n  url_project = {http://chapering.github.io/projects/diver/},\r\n  Keywords = {change impact analysis, dynamic impact analysis, dependence analysis},\r\n  note = {(impact factor 6.11)}\r\n}\r\n\r\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2017\n \n \n (8)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Dissecting Android Inter-Component Communications via Interactive Visual Explorations.\n \n \n \n \n\n\n \n John Jenkins, & Haipeng Cai.\n\n\n \n\n\n\n In International Conference on Software Maintenance and Evolution (ICSME), New Ideas and Emerging Results, pages 519–523, 2017. \n \n\n\n\n
\n\n\n\n \n \n \"Dissecting pdf\n  \n \n \n \"Dissecting project\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 2 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{john17iccvis-nier,\r\n  author = \t {John Jenkins and Haipeng Cai},\r\n  title = \t {Dissecting {Android} Inter-Component Communications via Interactive Visual Explorations},\r\n  year = \t {2017},\r\n  pages     = {519--523},\r\n  doi={10.1109/ICSME.2017.74},\r\n  booktitle = {International Conference on Software Maintenance and Evolution (ICSME), New Ideas and Emerging Results},\r\n  url_pdf = {http://chapering.github.io/pubs/icsme17-iccvis.pdf},\r\n  url_project = {https://bitbucket.org/wsucailab/icc-visualizer-with-graphstream/overview},\r\n  Keywords = {Android, program understanding, mobile software engineering}\r\n}\r\n\r\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Artifacts for Dynamic Analysis of Android Apps.\n \n \n \n \n\n\n \n Haipeng Cai, & Barbara Ryder.\n\n\n \n\n\n\n In International Conference on Software Maintenance and Evolution (ICSME), Artifacts, pages 659, 2017. \n \n\n\n\n
\n\n\n\n \n \n \"Artifacts pdf\n  \n \n \n \"Artifacts project\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 11 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{hcai17droidfax-artifacts,\r\n  author = \t {Haipeng Cai and Barbara Ryder},\r\n  title = \t {Artifacts for Dynamic Analysis of {Android} Apps},\r\n  year = \t {2017},\r\n  pages     = {659},\r\n  doi={10.1109/ICSME.2017.36},\r\n  booktitle = {International Conference on Software Maintenance and Evolution (ICSME), Artifacts},\r\n  url_pdf = {http://chapering.github.io/pubs/icsme17-artifacts.pdf},\r\n  url_project = {http://chapering.github.io/projects/droidfax/},\r\n  Keywords = {Android, dynamic analysis, mobile software engineering}\r\n}\r\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n DroidFax: A Toolkit for Systematic Characterization of Android Applications.\n \n \n \n \n\n\n \n Haipeng Cai, & Barbara Ryder.\n\n\n \n\n\n\n In International Conference on Software Maintenance and Evolution (ICSME), Tool, pages 643–647, 2017. \n \n\n\n\n
\n\n\n\n \n \n \"DroidFax: pdf\n  \n \n \n \"DroidFax: project\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 16 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{hcai17droidfax-tool,\r\n  author = \t {Haipeng Cai and Barbara Ryder},\r\n  title = \t {{DroidFax}: A Toolkit for Systematic Characterization of {Android} Applications},\r\n  year = \t {2017},\r\n  pages     = {643--647},\r\n  doi={10.1109/ICSME.2017.35},\r\n  booktitle = {International Conference on Software Maintenance and Evolution (ICSME), Tool},\r\n  url_pdf = {http://chapering.github.io/pubs/icsme17-tool.pdf},\r\n  url_project = {http://chapering.github.io/projects/droidfax/},\r\n  Keywords = {Android, characterization, mobile software engineering}\r\n}\r\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Understanding Android Application Programming and Security: A Dynamic Study.\n \n \n \n \n\n\n \n Haipeng Cai, & Barbara Ryder.\n\n\n \n\n\n\n In International Conference on Software Maintenance and Evolution (ICSME), pages 364–375, 2017. \n \n\n\n\n
\n\n\n\n \n \n \"Understanding pdf\n  \n \n \n \"Understanding project\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 9 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{hcai17droidfax-study,\r\n  author = \t {Haipeng Cai and Barbara Ryder},\r\n  title = \t {Understanding {Android} Application Programming and Security: A Dynamic Study},\r\n  year = \t {2017},\r\n  pages     = {364--375},\r\n  doi ={10.1109/ICSME.2017.31},\r\n  booktitle = {International Conference on Software Maintenance and Evolution (ICSME)},\r\n  url_pdf = {http://chapering.github.io/pubs/icsme17-study.pdf},\r\n  url_project = {http://chapering.github.io/projects/droidfax/},\r\n  Keywords = {Android, characterization, mobile software engineering, software security}\r\n}\r\n\r\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n On Locating Malicious Code in Piggybacked Android Apps.\n \n \n \n \n\n\n \n Li LI, Daoyuan Li, Tegawendé F. Bissyandé, Jacques Klein, Haipeng Cai, David Lo, & Yves Le Traon.\n\n\n \n\n\n\n Journal of Computer Science and Technology (JCST), 32(6): 1108–1124. 2017.\n (impact factor 1.506)\n\n\n\n
\n\n\n\n \n \n \"On pdf\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n\n\n\n
\n
@article{LiLBKCLT17jcst,\r\n  author    = {Li LI and\r\n               Daoyuan Li and\r\n               Tegawend{\\'{e}} F. Bissyand{\\'{e}} and\r\n               Jacques Klein and\r\n               Haipeng Cai and\r\n               David Lo and\r\n               Yves Le Traon},\r\n  title     = {On Locating Malicious Code in Piggybacked {Android} Apps},\r\n  journal   = {Journal of Computer Science and Technology (JCST)},\r\n  volume    = {32},\r\n  number    = {6},\r\n  pages     = {1108--1124},\r\n  year      = {2017},\r\n  doi   = {10.1007/s11390-017-1786-z},\r\n  url_pdf = {http://chapering.github.io/pubs/li2017locating.pdf},\r\n  Keywords = {Android, malware, software security},\r\n  note = {(impact factor 1.506)}\r\n}\r\n\r\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Automatically Locating Malicious Packages in Piggybacked Android Apps.\n \n \n \n \n\n\n \n Li LI, Daoyuan Li, Tegawende F. Bissyande, Jacques Klein, Haipeng Cai, David Lo, & Yves Le Traon.\n\n\n \n\n\n\n In IEEE/ACM International Conference on Mobile Software Engineering and Systems (MobileSoft), pages 170–174, 2017. \n \n\n\n\n
\n\n\n\n \n \n \"Automatically pdf\n  \n \n \n \"Automatically online\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 3 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{li17piggyback,\r\n  author = \t {Li LI and Daoyuan Li and Tegawende F. Bissyande and Jacques Klein and Haipeng Cai and David Lo and Yves Le Traon},\r\n  title = \t {Automatically Locating Malicious Packages in Piggybacked {Android} Apps},\r\n  year = \t {2017},\r\n  booktitle = {IEEE/ACM International Conference on Mobile Software Engineering and Systems (MobileSoft)},\r\n  pages = {170--174},\r\n  doi ={10.1109/MOBILESoft.2017.6},\r\n  url_pdf = {http://chapering.github.io/pubs/li2017automatically.pdf},\r\n  url_online = {http://dl.acm.org/citation.cfm?id=3104112&CFID=964677889&CFTOKEN=76478583},\r\n  Keywords = {Android, malware, software security}\r\n}\r\n\r\n\r\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n MR-Droid: A Scalable and Prioritized Analysis of Inter-App Communication Risks.\n \n \n \n \n\n\n \n Fang Liu, Haipeng Cai, Karim Elish, Danfeng Yao, & Barbara Ryder.\n\n\n \n\n\n\n In Mobile Security Technologies (MoST) Workshop at IEEE Symposium on Security and Privacy, pages 189–198, 2017. \n \n\n\n\n
\n\n\n\n \n \n \"MR-Droid: pdf\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 6 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{fang17mapreduceicc,\r\n  author = \t {Fang Liu and Haipeng Cai and Karim Elish and Danfeng Yao and Barbara Ryder},\r\n  title = \t {{MR-Droid}: A Scalable and Prioritized Analysis of Inter-App Communication Risks},\r\n  year = \t {2017},\r\n  pages     = {189--198},\r\n  doi={10.1109/SPW.2017.12},\r\n  booktitle = {Mobile Security Technologies (MoST) Workshop at IEEE Symposium on Security and Privacy},\r\n  url_pdf = {http://chapering.github.io/pubs/most17.pdf},\r\n  Keywords = {Android, software security, static analysis}\r\n}\r\n\r\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Prioritized Analysis of Inter-App Communication Risks.\n \n \n \n \n\n\n \n Fang Liu, Haipeng Cai, Karim Elish, Danfeng Yao, & Barbara Ryder.\n\n\n \n\n\n\n In ACM Conference on Data and Application Security and Privacy (CODASPY), Poster, pages 159–161, 2017. \n \n\n\n\n
\n\n\n\n \n \n \"Prioritized pdf\n  \n \n \n \"Prioritized online\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 1 download\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{fang17prioritizeicc,\r\n  author = \t {Fang Liu and Haipeng Cai and Karim Elish and Danfeng Yao and Barbara Ryder},\r\n  title = \t {Prioritized Analysis of Inter-App Communication Risks},\r\n  year = \t {2017},\r\n  doi={10.1145/3029806.3029843},\r\n  booktitle = {ACM Conference on Data and Application Security and Privacy (CODASPY), Poster},\r\n  pages = {159--161},\r\n  url_pdf = {http://chapering.github.io/pubs/codaspy17-poster.pdf},\r\n  url_online = {http://dl.acm.org/authorize?N38845},\r\n  Keywords = {Android, software security, static analysis}\r\n}\r\n\r\n%%%%%%%%%%%%%%%%%%%%% work done before WSU %%%%%%%%%%%%%%%%%%%%%%%%%%\r\n\r\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2016\n \n \n (5)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Method-Level Program Dependence Abstraction and Its Application to Impact Analysis.\n \n \n \n \n\n\n \n Haipeng Cai, & Raul Santelices.\n\n\n \n\n\n\n Journal of Systems and Software (JSS), 122: 311–326. 2016.\n (impact factor: 2.450)\n\n\n\n
\n\n\n\n \n \n \"Method-Level pdf\n  \n \n \n \"Method-Level project\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 18 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n\n\n\n
\n
@article{cai16mdgjournal,\r\n  author = \t {Haipeng Cai and Raul Santelices},\r\n  title = \t {Method-Level Program Dependence Abstraction and Its Application to Impact Analysis},\r\n  journal = {Journal of Systems and Software (JSS)},\r\n  year = \t {2016},\r\n  volume = {122},\r\n  pages = {311--326},\r\n  doi = {10.1016/j.jss.2016.09.048},\r\n  url_pdf = {http://chapering.github.io/pubs/jss16.pdf},\r\n  url_project = {http://chapering.github.io/projects/mdg/},\r\n  Keywords = {dependence analysis, static analysis, dynamic impact analysis},\r\n  note  = {(impact factor: 2.450)}\r\n}\r\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n DistIA: A Cost-Effective Dynamic Impact Analysis for Distributed Programs.\n \n \n \n \n\n\n \n Haipeng Cai, & Douglas Thain.\n\n\n \n\n\n\n In IEEE/ACM Conference on Automated Software Engineering (ASE), pages 344–355, 2016. \n \n\n\n\n
\n\n\n\n \n \n \"DistIA: pdf\n  \n \n \n \"DistIA: project\n  \n \n \n \"DistIA: arxiv\n  \n \n \n \"DistIA: slides\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 20 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{cai16distea,\r\n  author = \t {Haipeng Cai and Douglas Thain},\r\n  title = \t {{DistIA}: A Cost-Effective Dynamic Impact Analysis for Distributed Programs},\r\n  booktitle = {IEEE/ACM Conference on Automated Software Engineering (ASE)},\r\n  year = \t {2016},\r\n  pages = {344--355},\r\n  doi={10.1145/2970276.2970352},\r\n  url_pdf = {http://chapering.github.io/pubs/ase16.pdf},\r\n  url_project = {http://chapering.github.io/projects/distea/},\r\n  url_arxiv = {http://arxiv.org/abs/1604.04638},\r\n  url_slides = {http://chapering.github.io/slides/ase16-slides.pdf},\r\n  Keywords = {distributed systems, dependence analysis, dynamic impact analysis}\r\n}\r\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n DiaPro: Unifying Dynamic Impact Analyses for Improved and Variable Cost-Effectiveness.\n \n \n \n \n\n\n \n Haipeng Cai, Raul Santelices, & Douglas Thain.\n\n\n \n\n\n\n ACM Transactions on Software Engineering and Methodology (TOSEM), 25(2): 18:1–18:50. 2016.\n (impact factor 2.516)\n\n\n\n
\n\n\n\n \n \n \"DiaPro: pdf\n  \n \n \n \"DiaPro: project\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 15 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@article{cai16diverplusjournal,\r\n  author = \t {Haipeng Cai and Raul Santelices and Douglas Thain},\r\n  title = \t {{DiaPro}: Unifying Dynamic Impact Analyses for Improved and Variable Cost-Effectiveness},\r\n  year = \t {2016},\r\n  journal =  {ACM Transactions on Software Engineering and Methodology (TOSEM)},\r\n  volume = {25},\r\n  number = {2},\r\n  pages = {18:1--18:50},\r\n  doi = {10.1145/2894751},\r\n  url_pdf = {http://chapering.github.io/pubs/tosem16.pdf},\r\n  url_project = {http://chapering.github.io/projects/diver/},\r\n  Keywords = {change impact analysis, dynamic impact analysis, dependence analysis, variable cost-effectiveness},\r\n  note = {(impact factor 2.516)}\r\n}\r\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Prioritizing Change Impacts via Semantic Dependence Quantification.\n \n \n \n \n\n\n \n Haipeng Cai, Raul Santelices, & Siyuan Jiang.\n\n\n \n\n\n\n IEEE Transactions on Reliability (TRE), 65(3): 1114-1132. 2016.\n (impact factor 4.094)\n\n\n\n
\n\n\n\n \n \n \"Prioritizing pdf\n  \n \n \n \"Prioritizing project\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 8 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n\n\n\n
\n
@article{cai15sensajournal,\r\n  author = \t {Haipeng Cai and Raul Santelices and Siyuan Jiang},\r\n  title = \t {Prioritizing Change Impacts via Semantic Dependence Quantification},\r\n  journal = {IEEE Transactions on Reliability (TRE)},\r\n  year = \t {2016},\r\n  volume =   {65},\r\n  number = {3},\r\n  pages = {1114-1132},\r\n  doi = {10.1109/TR.2015.2481000},\r\n  url_pdf = {http://chapering.github.io/pubs/tr15.pdf},\r\n  url_project = {http://chapering.github.io/projects/sensa/html},\r\n  Keywords = {change impact analysis, dynamic impact analysis, dependence analysis},\r\n  note = {(impact factor 4.094)}\r\n}\r\n\r\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Parallel Rendering for Legible Illustrative Visualizations of Dense Geometries on Commodity CPUs.\n \n \n \n \n\n\n \n Haipeng Cai.\n\n\n \n\n\n\n International Journal of Image and Graphics (IJIG), 16(1). 2016.\n (impact factor 0.66)\n\n\n\n
\n\n\n\n \n \n \"Parallel pdf\n  \n \n \n \"Parallel project\n  \n \n \n \"Parallel arxiv\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 4 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n\n\n\n
\n
@article{cai15paravis,\r\n  author = \t {Haipeng Cai},\r\n  title = \t {Parallel Rendering for Legible Illustrative Visualizations of Dense Geometries on Commodity {CPU}s},\r\n  journal = {International Journal of Image and Graphics (IJIG)},\r\n  year = \t {2016},\r\n  volume = {16},\r\n  number = {1},\r\n  url_pdf = {http://chapering.github.io/pubs/ijig15.pdf},\r\n  url_project = {https://sites.google.com/site/hpcaius/home/prj_legidti},\r\n  url_arxiv = {http://arxiv.org/abs/1310.2994},\r\n  Keywords = {visualization, computer graphics, parallelization},\r\n  doi = {10.1142/S0219467816500029},\r\n  note = {(impact factor 0.66)}\r\n}\r\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2015\n \n \n (5)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Abstracting Program Dependencies using the Method Dependence Graph.\n \n \n \n \n\n\n \n Haipeng Cai, & Raul Santelices.\n\n\n \n\n\n\n In International Conference on Software Quality, Reliability, and Security (QRS), pages 49–58, 2015. \n \n\n\n\n
\n\n\n\n \n \n \"Abstracting pdf\n  \n \n \n \"Abstracting project\n  \n \n \n \"Abstracting slides\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 9 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{cai15mdg,\r\n  author = \t {Haipeng Cai and Raul Santelices},\r\n  title = \t {Abstracting Program Dependencies using the Method Dependence Graph},\r\n  booktitle = {International Conference on Software Quality, Reliability, and Security (QRS)},\r\n  year = \t {2015},\r\n  pages =    {49--58},\r\n  doi = {10.1109/QRS.2015.18},\r\n  url_pdf = {http://chapering.github.io/pubs/qrs15-a.pdf},\r\n  url_project = {http://chapering.github.io/projects/mdg/},\r\n  url_slides = {http://chapering.github.io/slides/qrs15-a-slides.pdf},\r\n  Keywords = {dependence analysis, static analysis, static impact analysis}\r\n}\r\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Facilitating Information Management in Integrated Development Environments through Visual Interface Enhancements.\n \n \n \n \n\n\n \n Haipeng Cai.\n\n\n \n\n\n\n In International Conference on Software Quality, Reliability, and Security Companion (QRS-C), pages 221–229, 2015. \n \n\n\n\n
\n\n\n\n \n \n \"Facilitating pdf\n  \n \n \n \"Facilitating arxiv\n  \n \n \n \"Facilitating slides\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 3 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{cai15sekm,\r\n  author = \t {Haipeng Cai},\r\n  title = \t {Facilitating Information Management in Integrated Development Environments through Visual Interface Enhancements},\r\n  booktitle = {International Conference on Software Quality, Reliability, and Security Companion (QRS-C)},\r\n  year = \t {2015},\r\n  pages = {221--229},\r\n  doi ={10.1109/QRS-C.2015.46},\r\n  url_pdf = {http://chapering.github.io/pubs/qrs15-b.pdf},\r\n  url_arxiv = {http://arxiv.org/abs/1502.06519},\r\n  url_slides = {http://chapering.github.io/slides/qrs15-b-slides.pdf},\r\n  Keywords = {visualization, program understanding}\r\n}\r\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n A Framework for Cost-effective Dependence-based Dynamic Impact Analysis.\n \n \n \n \n\n\n \n Haipeng Cai, & Raul Santelices.\n\n\n \n\n\n\n In International Conference on Software Analysis, Evolution, and Reengineering (SANER), pages 231–240, 2015. \n \n\n\n\n
\n\n\n\n \n \n \"A pdf\n  \n \n \n \"A slides\n  \n \n \n \"A project\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 7 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{cai15diverplus,\r\n  author = \t {Haipeng Cai and Raul Santelices},\r\n  title = \t {A Framework for Cost-effective Dependence-based Dynamic Impact Analysis},\r\n  booktitle = {International Conference on Software Analysis, Evolution, and Reengineering (SANER)},\r\n  year = \t {2015},\r\n  pages = {231--240},\r\n  doi={10.1109/SANER.2015.7081833},\r\n  url_pdf = {http://chapering.github.io/pubs/saner15-a.pdf},\r\n  url_slides = {http://chapering.github.io/slides/saner15-a-slides.pdf},\r\n  url_project = {http://chapering.github.io/projects/diver/},\r\n  Keywords = {change impact analysis, dynamic impact analysis, dependence analysis, variable cost-effectiveness}\r\n}\r\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n TracerJD: Generic Trace-based Dynamic Dependence Analysis with Fine-grained Logging.\n \n \n \n \n\n\n \n Haipeng Cai, & Raul Santelices.\n\n\n \n\n\n\n In International Conference on Software Analysis, Evolution, and Reengineering (SANER), Tool, pages 489–493, 2015. \n \n\n\n\n
\n\n\n\n \n \n \"TracerJD: pdf\n  \n \n \n \"TracerJD: project\n  \n \n \n \"TracerJD: slides\n  \n \n \n \"TracerJD: frenzy\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 4 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{cai15tracer,\r\n  author = \t {Haipeng Cai and Raul Santelices},\r\n  title = \t {{TracerJD}: Generic Trace-based Dynamic Dependence Analysis with Fine-grained Logging},\r\n  booktitle = {International Conference on Software Analysis, Evolution, and Reengineering (SANER), Tool},\r\n  year = \t {2015},\r\n  pages = {489--493},\r\n  doi={10.1109/SANER.2015.7081862},\r\n  url_pdf = {http://chapering.github.io/pubs/saner15-b.pdf},\r\n  url_project = {http://chapering.github.io/projects/tracer/},\r\n  url_slides = {http://chapering.github.io/slides/saner15-b-slides.pdf},\r\n  url_frenzy = {http://chapering.github.io/slides/saner15-b-teaser.pdf},\r\n  Keywords = {dependence analysis, dynamic analysis, slicing, logging, tracing}\r\n}\r\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n A Comprehensive Study of the Predictive Accuracy of Dynamic Change-Impact Analysis.\n \n \n \n \n\n\n \n Haipeng Cai, & Raul Santelices.\n\n\n \n\n\n\n Journal of Systems and Software (JSS), 103: 248–265. 2015.\n (impact factor: 2.450)\n\n\n\n
\n\n\n\n \n \n \"A pdf\n  \n \n \n \"A project\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 5 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@article{cai15deamjournal,\r\n  author = \t {Haipeng Cai and Raul Santelices},\r\n  title = \t {A Comprehensive Study of the Predictive Accuracy of Dynamic Change-Impact Analysis},\r\n  journal = {Journal of Systems and Software (JSS)},\r\n  year = \t {2015},\r\n  volume = {103},\r\n  pages = {248--265},\r\n  doi = {10.1016/j.jss.2015.02.018},\r\n  url_pdf = {http://chapering.github.io/pubs/jss15.pdf},\r\n  url_project = {http://chapering.github.io/projects/deam/},\r\n  Keywords = {change impact analysis, dynamic analysis, dependence analysis, dynamic impact analysis, empirical study},\r\n  note  = {(impact factor: 2.450)}\r\n}\r\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2014\n \n \n (8)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Advanced Dependence Analysis for Software Testing, Debugging, and Evolution.\n \n \n \n \n\n\n \n Raul Santelices, Haipeng Cai, Siyuan Jiang, & Yiji Zhang.\n\n\n \n\n\n\n IEEE Reliability Magazine,18–24. 2014.\n \n\n\n\n
\n\n\n\n \n \n \"Advanced pdf\n  \n \n \n \"Advanced techreport\n  \n \n \n \"Advanced project\n  \n \n\n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 7 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@article{raul14rd,\r\n  author = \t {Raul Santelices and Haipeng Cai and Siyuan Jiang and Yiji Zhang},\r\n  title = \t {Advanced Dependence Analysis for Software Testing, Debugging, and Evolution},\r\n  journal = {{IEEE Reliability Magazine}},\r\n  year = \t {2014},\r\n  pages = {18--24},\r\n  url_pdf = {http://rs.ieee.org/images/files/newsletters/2014/RD6_11-17.pdf},\r\n  url_techreport = {http://chapering.github.io/pubs/rd14.pdf},\r\n  url_project = {https://rs.ieee.org/technical-activities/ieee-reliability-newsletter-special-issues/issues/reliability-special-issue-2014-november.html},\r\n  Keywords = {dependence analysis, testing, dynamic analysis, static analysis}\r\n}\r\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Estimating the Accuracy of Dynamic Change-Impact Analysis using Sensitivity Analysis.\n \n \n \n \n\n\n \n Haipeng Cai, Raul Santelices, & Tianyu Xu.\n\n\n \n\n\n\n In International Conference on Software Security and Reliability (SERE), pages 48–57, 2014. \n \n\n\n\n
\n\n\n\n \n \n \"Estimating pdf\n  \n \n \n \"Estimating slides\n  \n \n \n \"Estimating project\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 2 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{cai14deam,\r\n  author = \t {Haipeng Cai and Raul Santelices and Tianyu Xu},\r\n  title = \t {Estimating the Accuracy of Dynamic Change-Impact Analysis using Sensitivity Analysis},\r\n  booktitle = {International Conference on Software Security and Reliability (SERE)},\r\n  year = \t {2014},\r\n  pages = {48--57},\r\n  doi={10.1109/SERE.2014.18},\r\n  url_pdf = {http://chapering.github.io/pubs/sere14.pdf},\r\n  url_slides = {http://chapering.github.io/slides/sere14-slides.pdf},\r\n  url_project = {http://chapering.github.io/projects/deam/},\r\n  Keywords = {change impact analysis, dynamic analysis, dependence analysis, dynamic impact analysis, empirical study}\r\n}\r\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Diver: Precise Dynamic Impact Analysis Using Dependence-based Trace Pruning.\n \n \n \n \n\n\n \n Haipeng Cai, & Raul Santelices.\n\n\n \n\n\n\n In IEEE/ACM Conference on Automated Software Engineering (ASE), pages 343–348, 2014. \n \n\n\n\n
\n\n\n\n \n \n \"Diver: pdf\n  \n \n \n \"Diver: project\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 8 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{cai14diver,\r\n  author = \t {Haipeng Cai and Raul Santelices},\r\n  title = \t {{Diver}: Precise Dynamic Impact Analysis Using Dependence-based Trace Pruning},\r\n  booktitle = {IEEE/ACM Conference on Automated Software Engineering (ASE)},\r\n  year = \t {2014},\r\n  pages = {343--348},\r\n  doi={10.1145/2642937.2642950},\r\n  url_pdf = {http://chapering.github.io/pubs/ase14.pdf},\r\n  url_project = {http://chapering.github.io/projects/diver/},\r\n  Keywords = {change impact analysis, dynamic analysis, dependence analysis, dynamic impact analysis, hybrid analysis}\r\n}\r\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n SensA: Sensitivity Analysis for Quantitative Change-impact Prediction.\n \n \n \n \n\n\n \n Haipeng Cai, Siyuan Jiang, Raul Santelices, Yingjie Zhang, & Yiji Zhang.\n\n\n \n\n\n\n In International Working Conference on Source Code Analysis and Manipulation (SCAM), pages 165–174, 2014. \n \n\n\n\n
\n\n\n\n \n \n \"SensA: pdf\n  \n \n \n \"SensA: slides\n  \n \n \n \"SensA: techreport\n  \n \n \n \"SensA: project\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 5 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{cai14sensa,\r\n  author = \t {Haipeng Cai and Siyuan Jiang and Raul Santelices and Yingjie Zhang and Yiji Zhang},\r\n  title = \t {{SensA}: Sensitivity Analysis for Quantitative Change-impact Prediction},\r\n  booktitle = {International Working Conference on Source Code Analysis and Manipulation (SCAM)},\r\n  year = \t {2014},\r\n  pages = {165--174},\r\n  doi={10.1109/SCAM.2014.25},\r\n  url_pdf = {http://chapering.github.io/pubs/scam14.pdf},\r\n  url_slides = {http://chapering.github.io/slides/scam14-slides.pdf},\r\n  url_techreport = {http://chapering.github.io/pubs/sensaTR13.pdf},\r\n  url_project = {http://chapering.github.io/projects/sensa/html/},\r\n  Keywords = {change impact analysis, dynamic impact analysis, dependence analysis}\r\n}\r\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n On the Accuracy of Forward Dynamic Slicing and its Effects on Software Maintenance.\n \n \n \n \n\n\n \n Siyuan Jiang, Raul Santelices, Mark Grechanik, & Haipeng Cai.\n\n\n \n\n\n\n In International Working Conference on Source Code Analysis and Manipulation (SCAM), pages 145–154, 2014. \n \n\n\n\n
\n\n\n\n \n \n \"On pdf\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{jiang14sep,\r\n  author = \t {Siyuan Jiang and Raul Santelices and Mark Grechanik and Haipeng Cai},\r\n  title = \t {On the Accuracy of Forward Dynamic Slicing and its Effects on Software Maintenance},\r\n  booktitle = {International Working Conference on Source Code Analysis and Manipulation (SCAM)},\r\n  year = \t {2014},\r\n  pages = {145--154},\r\n  doi={10.1109/SCAM.2014.23},\r\n  url_pdf = {http://chapering.github.io/pubs/scam14-jiang.pdf},\r\n  Keywords = {dependence analysis, dynamic analysis, slicing, empirical study}\r\n}\r\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n How Accurate Is Dynamic Program Slicing? An Empirical Approach to Compute Accuracy Bounds.\n \n \n \n \n\n\n \n Siyuan Jiang, Raul Santelices, Haipeng Cai, & Mark Grechanik.\n\n\n \n\n\n\n In International Conference on Software Security and Reliability-Companion (SERE-C), pages 3–4, 2014. \n \n\n\n\n
\n\n\n\n \n \n \"How pdf\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{jiang2014accurate,\r\n  title={How Accurate Is Dynamic Program Slicing? An Empirical Approach to Compute Accuracy Bounds},\r\n  author={Jiang, Siyuan and Santelices, Raul and Cai, Haipeng and Grechanik, Mark},\r\n  booktitle={International Conference on Software Security and Reliability-Companion (SERE-C)},\r\n  pages={3--4},\r\n  year={2014},\r\n  doi={10.1109/SERE-C.2014.14},\r\n  url_pdf = {http://chapering.github.io/pubs/sere14-slice-acc.pdf},\r\n  Keywords = {dependence analysis, dynamic analysis, slicing, empirical study}\r\n}\r\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Change-Effects Analysis for Evolving Software.\n \n \n \n \n\n\n \n Raúl A Santelices, Yiji Zhang, Haipeng Cai, & Siyuan Jiang.\n\n\n \n\n\n\n Advances in Computers, 93: 227–285. 2014.\n (impact factor 37.5)\n\n\n\n
\n\n\n\n \n \n \"Change-Effects pdf\n  \n \n \n \"Change-Effects project\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 3 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@article{santelices2014change,\r\n  title={Change-Effects Analysis for Evolving Software},\r\n  author={Santelices, Ra{\\'u}l A and Zhang, Yiji and Cai, Haipeng and Jiang, Siyuan},\r\n  journal={Advances in Computers},\r\n  volume={93},\r\n  pages={227--285},\r\n  year={2014},\r\n  doi = {10.1016/B978-0-12-800162-2.00005-1},\r\n  url_pdf = {http://chapering.github.io/pubs/raul-ac-13.pdf},\r\n  url_project = {http://dx.doi.org/10.1016/B978-0-12-800162-2.00005-1},\r\n  Keywords = {change impact analysis},\r\n  note = {(impact factor 37.5)}\r\n}\r\n\r\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Gryphon: A Little Domain-Specific Programming Language for Diffusion MRI Visualizations.\n \n \n \n \n\n\n \n Jian Chen, Haipeng Cai, AlexanderP. Auchus, & DavidH. Laidlaw.\n\n\n \n\n\n\n In Weidong Huang., editor(s), Handbook of Human Centric Visualization, pages 41-61. Springer New York, 2014.\n \n\n\n\n
\n\n\n\n \n \n \"Gryphon: pdf\n  \n \n \n \"Gryphon: project\n  \n \n \n \"Gryphon: arxiv\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 4 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n\n\n\n
\n
@incollection{HCV2014,\r\n    year={2014},\r\n    isbn={978-1-4614-7484-5},\r\n    booktitle={Handbook of Human Centric Visualization},\r\n    editor={Huang, Weidong},\r\n    title={Gryphon: A Little Domain-Specific Programming Language for Diffusion MRI Visualizations},\r\n    publisher={Springer New York},\r\n    author={Chen, Jian and Cai, Haipeng and Auchus, AlexanderP. and Laidlaw, DavidH.},\r\n    pages={41-61},\r\n    doi={10.1007/978-1-4614-7485-2_2},\r\n\turl_pdf = {http://chapering.github.io/pubs/chapter-gryphon-dsl.pdf},\r\n    url_project = {https://sites.google.com/site/hpcaius/home/prj_zifazah},\r\n    url_arxiv = {http://arxiv.org/abs/1310.2923},\r\n    Keywords = {visualization}\r\n}\r\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2013\n \n \n (2)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n DUA-Forensics: A Fine-Grained Dependence Analysis and Instrumentation Framework Based on Soot.\n \n \n \n \n\n\n \n Raul Santelices, Yiji Zhang, Haipeng Cai, & Siyuan Jiang.\n\n\n \n\n\n\n In ACM SIGPLAN Workshop on the State Of the Art in Java Program Analysis (SOAP@PLDI), pages 13–18, 2013. \n \n\n\n\n
\n\n\n\n \n \n \"DUA-Forensics: pdf\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 2 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{SOAP2013,\r\n    author=\t\t{Raul Santelices and Yiji Zhang and Haipeng Cai and Siyuan Jiang},\r\n\tbooktitle=\t{ACM SIGPLAN Workshop on the State Of the Art in Java Program Analysis (SOAP@PLDI)},\r\n\ttitle=\t\t{{DUA-Forensics}: A Fine-Grained Dependence Analysis and Instrumentation Framework Based on {Soot}},\r\n    pages=      {13--18},\r\n\tyear=\t\t{2013},\r\n    doi={10.1145/2487568.2487574},\r\n\turl_pdf = {http://chapering.github.io/pubs/soap13.pdf},\r\n    Keywords = {dependence analysis, dynamic analysis, static analysis}\r\n}\r\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n Quantitative Program Slicing: Separating Statements by Relevance.\n \n \n \n \n\n\n \n Raul Santelices, Yiji Zhang, Siyuan Jiang, Haipeng Cai, & Yingjie Zhang.\n\n\n \n\n\n\n In International Conference on Software Engineering (ICSE), New Ideas and Emerging Results, pages 1269-1272, 2013. \n \n\n\n\n
\n\n\n\n \n \n \"Quantitative pdf\n  \n \n \n \"Quantitative project\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 1 download\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{NIER2013,\r\n    author=\t\t{Raul Santelices and Yiji Zhang and Siyuan Jiang and Haipeng Cai and Yingjie Zhang},\r\n\tbooktitle=\t{International Conference on Software Engineering (ICSE), New Ideas and Emerging Results},\r\n\ttitle=\t\t{Quantitative Program Slicing: Separating Statements by Relevance},\r\n    pages=      {1269-1272},\r\n\tyear=\t\t{2013},\r\n    doi={10.1109/ICSE.2013.6606695},\r\n    url_pdf = {http://chapering.github.io/pubs/icsenier13.pdf},\r\n    url_project = {http://chapering.github.io/projects/sensa/html},\r\n    Keywords = {dependence analysis, dynamic analysis, slicing}\r\n}\r\n\r\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n
\n
\n  \n 2012\n \n \n (2)\n \n \n
\n
\n \n \n
\n \n\n \n \n \n \n \n \n Effects of Stereo and Screen Size on the Legibility of Three-dimensional Streamtube Visualizations.\n \n \n \n \n\n\n \n Jian Chen, Haipeng Cai, Alexander P. Auchus, & David H. Laidlaw.\n\n\n \n\n\n\n IEEE Transactions on Visualization and Computer Graphics (TVCG), 18(12): 2130-2139. 2012.\n (impact factor 4.558)\n\n\n\n
\n\n\n\n \n \n \"Effects pdf\n  \n \n \n \"Effects project\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 7 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n\n\n\n
\n
@article{TVCG12,\r\n\tauthor=\t\t{Jian Chen and Haipeng Cai and Alexander P. Auchus and David H. Laidlaw},\r\n\tjournal=\t{IEEE Transactions on Visualization and Computer Graphics (TVCG)},\r\n\ttitle=\t\t{Effects of Stereo and Screen Size on the Legibility of Three-dimensional Streamtube Visualizations},\r\n\tnumber=\t\t{12},\r\n\tvolume=\t\t{18},\r\n    pages=      {2130-2139},\r\n\tyear=\t\t{2012},\r\n    doi = {10.1109/TVCG.2012.216},\r\n\turl_pdf = {http://chapering.github.io/pubs/tvcg12.pdf},\r\n    url_project = {https://sites.google.com/site/hpcaius/home/prj_display},\r\n    Keywords = {computer graphics, visualization},\r\n    note = {(impact factor 4.558)}\r\n}\r\n
\n
\n\n\n\n
\n\n\n
\n \n\n \n \n \n \n \n \n InShape: In-Situ Shape-Based Interactive Multiple-View Exploration of Diffusion MRI Visualizations.\n \n \n \n \n\n\n \n Haipeng Cai, Jian Chen, Alexander P. Auchus, & David H. Laidlaw.\n\n\n \n\n\n\n In International Symposium on Visual Computing (ISVC), pages 706-715, 2012. \n \n\n\n\n
\n\n\n\n \n \n \"InShape: pdf\n  \n \n \n \"InShape: project\n  \n \n\n \n \n doi\n  \n \n\n \n link\n  \n \n\n bibtex\n \n\n \n\n \n  \n \n 7 downloads\n \n \n\n \n \n \n \n \n \n \n\n  \n \n \n \n \n \n \n\n\n\n
\n
@inproceedings{ISVC2012,\r\n\tauthor=\t\t{Haipeng Cai and Jian Chen and Alexander P. Auchus and David H. Laidlaw},\r\n\tbooktitle=\t{International Symposium on Visual Computing (ISVC)},\r\n\ttitle=\t\t{InShape: In-Situ Shape-Based Interactive Multiple-View Exploration of Diffusion MRI Visualizations},\r\n    pages=      {706-715},\r\n\tyear=\t\t{2012},\r\n    doi={10.1007/978-3-642-33191-6_70},\r\n\turl_pdf ={http://chapering.github.io/pubs/isvc12.pdf},\r\n    url_project = {https://sites.google.com/site/hpcaius/home/prj_inbox},\r\n    Keywords = {computer graphics, visualization}\r\n}\r\n
\n
\n\n\n\n
\n\n\n\n\n\n
\n
\n\n\n\n\n
\n\n\n \n\n \n \n \n \n\n
\n"}; document.write(bibbase_data.data);