关注
Hong Jin Kang
Hong Jin Kang
其他姓名Kang Hong Jin
在 cs.ucla.edu 的电子邮件经过验证 - 首页
标题
引用次数
引用次数
年份
Cc2vec: Distributed representations of code changes
T Hoang, HJ Kang, D Lo, J Lawall
Proceedings of the ACM/IEEE 42nd International Conference on Software …, 2020
1892020
Assessing the generalizability of code2vec token embeddings
HJ Kang, TF Bissyandé, D Lo
2019 34th IEEE/ACM International Conference on Automated Software …, 2019
912019
Bugsinpy: a database of existing bugs in python programs to enable controlled testing and debugging studies
R Widyasari, SQ Sim, C Lok, H Qi, J Phan, Q Tay, C Tan, F Wee, JE Tan, ...
Proceedings of the 28th ACM joint meeting on european software engineering …, 2020
752020
Biasfinder: Metamorphic test generation to uncover bias for sentiment analysis systems
MH Asyrofi, Z Yang, INB Yusuf, HJ Kang, F Thung, D Lo
IEEE Transactions on Software Engineering 48 (12), 5087-5101, 2021
642021
Detecting false alarms from automatic static analysis tools: How far are we?
HJ Kang, KL Aw, D Lo
Proceedings of the 44th International Conference on Software Engineering …, 2022
412022
Automatic Android deprecated-API usage update by learning from single updated example
SA Haryono, F Thung, HJ Kang, L Serrano, G Muller, J Lawall, D Lo, ...
Proceedings of the 28th international conference on program comprehension …, 2020
362020
Semantic Patches for Java Program Transformation
HJ Kang, F Thung, JL Lawall, G Muller, L Jiang, D Lo
33rd European Conference on Object-Oriented Programming (ECOOP 2019) 134, 22 …, 2019
30*2019
Stealthy backdoor attack for code models
Z Yang, B Xu, JM Zhang, HJ Kang, J Shi, J He, D Lo
IEEE Transactions on Software Engineering, 2024
232024
Compressing pre-trained models of code into 3 mb
J Shi, Z Yang, B Xu, HJ Kang, D Lo
Proceedings of the 37th IEEE/ACM International Conference on Automated …, 2022
222022
Active learning of discriminative subgraph patterns for api misuse detection
HJ Kang, D Lo
IEEE Transactions on Software Engineering 48 (8), 2761-2783, 2021
212021
AndroEvolve: automated Android API update with data flow analysis and variable denormalization
SA Haryono, F Thung, D Lo, L Jiang, J Lawall, HJ Kang, L Serrano, ...
Empirical Software Engineering 27 (3), 73, 2022
192022
Autopruner: transformer-based call graph pruning
T Le-Cong, HJ Kang, TG Nguyen, SA Haryono, D Lo, XBD Le, QT Huynh
Proceedings of the 30th ACM Joint European Software Engineering Conference …, 2022
182022
Hermes: Using commit-issue linking to detect vulnerability-fixing commits
G Nguyen-Truong, HJ Kang, D Lo, A Sharma, AE Santosa, A Sharma, ...
2022 IEEE International Conference on Software Analysis, Evolution and …, 2022
162022
Vulcurator: a vulnerability-fixing commit detector
TG Nguyen, T Le-Cong, HJ Kang, XBD Le, D Lo
Proceedings of the 30th ACM Joint European Software Engineering Conference …, 2022
132022
Test mimicry to assess the exploitability of library vulnerabilities
HJ Kang, TG Nguyen, B Le, CS Păsăreanu, D Lo
Proceedings of the 31st ACM SIGSOFT International Symposium on Software …, 2022
122022
Androevolve: Automated update for android deprecated-api usages
SA Haryono, F Thung, D Lo, L Jiang, J Lawall, HJ Kang, L Serrano, ...
2021 IEEE/ACM 43rd International Conference on Software Engineering …, 2021
122021
Towards generating transformation rules without examples for Android API replacement
F Thung, HJ Kang, L Jiang, D Lo
2019 IEEE International Conference on Software Maintenance and Evolution …, 2019
112019
Chronos: Time-aware zero-shot identification of libraries from vulnerability reports
Y Lyu, T Le-Cong, HJ Kang, R Widyasari, Z Zhao, XBD Le, M Li, D Lo
2023 IEEE/ACM 45th International Conference on Software Engineering (ICSE …, 2023
102023
Adversarial specification mining
HJ Kang, D Lo
ACM Transactions on Software Engineering and Methodology (TOSEM) 30 (2), 1-40, 2021
102021
How to find actionable static analysis warnings: A case study with FindBugs
R Yedida, HJ Kang, H Tu, X Yang, D Lo, T Menzies
IEEE Transactions on Software Engineering, 2023
92023
系统目前无法执行此操作,请稍后再试。
文章 1–20