Deckard: Scalable and accurate tree-based detection of code clones L Jiang, G Misherghi, Z Su, S Glondu 29th International Conference on Software Engineering (ICSE'07), 96-105, 2007 | 1440 | 2007 |
On the naturalness of software A Hindle, ET Barr, M Gabel, Z Su, P Devanbu 34th International Conference on Software Engineering (ICSE), 837-847, 2012 | 1370* | 2012 |
The essence of command injection attacks in web applications Z Su, G Wassermann Acm Sigplan Notices 41 (1), 372-382, 2006 | 861 | 2006 |
FIREMAN: A toolkit for firewall modeling and analysis L Yuan, J Mai, Z Su, H Chen, CN Chuah, P Mohapatra Security and Privacy, 2006 IEEE Symposium on, 15 pp.-213, 2006 | 651 | 2006 |
Static detection of cross-site scripting vulnerabilities G Wassermann, Z Su Proceedings of the 30th international conference on Software engineering …, 2008 | 559 | 2008 |
Sound and precise analysis of web applications for injection vulnerabilities G Wassermann, Z Su Proceedings of the 28th ACM SIGPLAN Conference on Programming Language …, 2007 | 558 | 2007 |
Compiler validation via equivalence modulo inputs V Le, M Afshari, Z Su ACM Sigplan Notices 49 (6), 216-226, 2014 | 524 | 2014 |
Scalable detection of semantic clones M Gabel, L Jiang, Z Su Proceedings of the 30th international conference on Software engineering …, 2008 | 471 | 2008 |
Guided, stochastic model-based GUI testing of Android apps T Su, G Meng, Y Chen, K Wu, W Yang, Y Yao, G Pu, Y Liu, Z Su Proceedings of the 2017 11th Joint Meeting on Foundations of Software …, 2017 | 366 | 2017 |
On the localness of software Z Tu, Z Su, P Devanbu Proceedings of the 22nd ACM SIGSOFT International Symposium on Foundations …, 2014 | 346 | 2014 |
HDD: hierarchical delta debugging G Misherghi, Z Su Proceedings of the 28th international conference on Software engineering …, 2006 | 313 | 2006 |
Context-based detection of clone-related bugs L Jiang, Z Su, E Chiu Proceedings of the the 6th joint meeting of the European software …, 2007 | 281 | 2007 |
Partial online cycle elimination in inclusion constraint graphs M Fähndrich, JS Foster, Z Su, A Aiken Proceedings of the ACM SIGPLAN 1998 conference on Programming language …, 1998 | 279 | 1998 |
Static checking of dynamically generated queries in database applications C Gould, Z Su, P Devanbu Proceedings. 26th International Conference on Software Engineering, 645-654, 2004 | 272 | 2004 |
On deriving unknown vulnerabilities from zero-day polymorphic and metamorphic worm exploits JR Crandall, Z Su, SF Wu, FT Chong Proceedings of the 12th ACM conference on Computer and communications …, 2005 | 256 | 2005 |
Detecting code clones in binary executables A Sæbjørnsen, J Willcock, T Panas, D Quinlan, Z Su Proceedings of the eighteenth international symposium on Software testing …, 2009 | 253 | 2009 |
Dynamic test input generation for web applications G Wassermann, D Yu, A Chander, D Dhurjati, H Inamura, Z Su Proceedings of the 2008 international symposium on Software testing and …, 2008 | 241 | 2008 |
A study of the uniqueness of source code M Gabel, Z Su Proceedings of the eighteenth ACM SIGSOFT international symposium on …, 2010 | 240 | 2010 |
Javert: fully automatic mining of general temporal properties from dynamic traces M Gabel, Z Su Proceedings of the 16th ACM SIGSOFT International Symposium on Foundations …, 2008 | 240 | 2008 |
Automatic mining of functionally equivalent code fragments via random testing L Jiang, Z Su Proceedings of the eighteenth international symposium on Software testing …, 2009 | 233 | 2009 |