Marple, A Demand-Driven Path-Sensitive Buffer Overflow Detector W Le, ML Soffa 16th International Symposium on the Foundation of Softwa re Engineering, 272-282, 2008 | 98 | 2008 |
Deeplocalize: Fault localization for deep neural networks M Wardat, W Le, H Rajan 2021 IEEE/ACM 43rd International Conference on Software Engineering (ICSE …, 2021 | 92 | 2021 |
Proteus: Computing Disjunctive Loop Summary via Path Dependency Analysis X Xie, B Chen, Y Liu, W Le, X Li FSE, 2016 | 80 | 2016 |
Generating Performance Distributions via Probabilistic Symbolic Execution WL Bihuan Chen, Yang Liu ICSE '16 Proceedings of the 38th International Conference on Software …, 2016 | 78* | 2016 |
An empirical study of deep learning models for vulnerability detection B Steenhoek, MM Rahman, R Jiles, W Le 2023 IEEE/ACM 45th International Conference on Software Engineering (ICSE …, 2023 | 64 | 2023 |
Path-based fault correlations W Le, ML Soffa 18th International Symposium on the Foundation of Software Engineering, 307-316, 2010 | 64 | 2010 |
Software Assurance by Bounded Exhaustive Testing D Coppit, J Yang, S Khurshid, W Le, Kevin Sullivan IEEE Transactions on So ftware Engineering 31 (4), 328-339, 2005 | 58 | 2005 |
Patch Verification via Multiversion Interprocedural Control Flow Graphs W Le, SD Pattison 36th International Conference on Software Engineering, 1047-1058, 2014 | 49 | 2014 |
S-looper: Automatic summarization for multipath string loops X Xie, Y Liu, W Le, X Li, H Chen Proceedings of the 2015 International Symposium on Software Testing and …, 2015 | 48 | 2015 |
A Comparison of Energy Bugs for Smartphone Platforms J Zhang, A Musa, W Le 1st International Workshop on the Engineering of Mobile-Enabled Systems, 25-30, 2013 | 46 | 2013 |
Deepdiagnosis: automatically diagnosing faults and recommending actionable fixes in deep learning programs M Wardat, BD Cruz, W Le, H Rajan Proceedings of the 44th international conference on software engineering …, 2022 | 45 | 2022 |
Automatic loop summarization via path dependency analysis X Xie, B Chen, L Zou, Y Liu, W Le, X Li IEEE Transactions on Software Engineering 45 (6), 537-557, 2017 | 37 | 2017 |
A Code Clone Oracle DE Krutz, W Le 11th Working Conference on Mining Software Repositories, 388-391, 2014 | 30 | 2014 |
Generating Analyses for Detecting Faults in Path Segments W Le, ML Soffa International Symposium on Software Testing and Ana lysis, 320-330, 2011 | 30 | 2011 |
Traced: Execution-aware pre-training for source code Y Ding, B Steenhoek, K Pei, G Kaiser, W Le, B Ray Proceedings of the 46th IEEE/ACM International Conference on Software …, 2024 | 27 | 2024 |
Refining Buffer Overflow Detection via Demand-driven Path-sensitive Analysis W Le, ML Soffa 7th Workshop on Program Analysis for Software Tools and Engineering, 63-68, 2007 | 24 | 2007 |
An empirical study of deep learning models for vulnerability detection. In 2023 IEEE/ACM 45th International Conference on Software Engineering (ICSE) B Steenhoek, MM Rahman, R Jiles, W Le Los Alamitos, CA, USA, may, 2237-2248, 2023 | 23 | 2023 |
Segmented Symbolic Analysis W Le 35th International Conference on Software Engineering, 212-221, 2013 | 23 | 2013 |
RNNrepair: Automatic RNN repair via model-based analysis X Xie, W Guo, L Ma, W Le, J Wang, L Zhou, Y Liu, X Xing International Conference on Machine Learning, 11383-11392, 2021 | 21 | 2021 |
Dataflow analysis-inspired deep learning for efficient vulnerability detection B Steenhoek, H Gao, W Le Proceedings of the 46th IEEE/ACM International Conference on Software …, 2024 | 19 | 2024 |