Cc2vec: Distributed representations of code changes T Hoang, HJ Kang, D Lo, J Lawall Proceedings of the ACM/IEEE 42nd International Conference on Software …, 2020 | 189 | 2020 |
Assessing the generalizability of code2vec token embeddings HJ Kang, TF Bissyandé, D Lo 2019 34th IEEE/ACM International Conference on Automated Software …, 2019 | 91 | 2019 |
Bugsinpy: a database of existing bugs in python programs to enable controlled testing and debugging studies R Widyasari, SQ Sim, C Lok, H Qi, J Phan, Q Tay, C Tan, F Wee, JE Tan, ... Proceedings of the 28th ACM joint meeting on european software engineering …, 2020 | 75 | 2020 |
Biasfinder: Metamorphic test generation to uncover bias for sentiment analysis systems MH Asyrofi, Z Yang, INB Yusuf, HJ Kang, F Thung, D Lo IEEE Transactions on Software Engineering 48 (12), 5087-5101, 2021 | 64 | 2021 |
Detecting false alarms from automatic static analysis tools: How far are we? HJ Kang, KL Aw, D Lo Proceedings of the 44th International Conference on Software Engineering …, 2022 | 41 | 2022 |
Automatic Android deprecated-API usage update by learning from single updated example SA Haryono, F Thung, HJ Kang, L Serrano, G Muller, J Lawall, D Lo, ... Proceedings of the 28th international conference on program comprehension …, 2020 | 36 | 2020 |
Semantic Patches for Java Program Transformation HJ Kang, F Thung, JL Lawall, G Muller, L Jiang, D Lo 33rd European Conference on Object-Oriented Programming (ECOOP 2019) 134, 22 …, 2019 | 30* | 2019 |
Stealthy backdoor attack for code models Z Yang, B Xu, JM Zhang, HJ Kang, J Shi, J He, D Lo IEEE Transactions on Software Engineering, 2024 | 23 | 2024 |
Compressing pre-trained models of code into 3 mb J Shi, Z Yang, B Xu, HJ Kang, D Lo Proceedings of the 37th IEEE/ACM International Conference on Automated …, 2022 | 22 | 2022 |
Active learning of discriminative subgraph patterns for api misuse detection HJ Kang, D Lo IEEE Transactions on Software Engineering 48 (8), 2761-2783, 2021 | 21 | 2021 |
AndroEvolve: automated Android API update with data flow analysis and variable denormalization SA Haryono, F Thung, D Lo, L Jiang, J Lawall, HJ Kang, L Serrano, ... Empirical Software Engineering 27 (3), 73, 2022 | 19 | 2022 |
Autopruner: transformer-based call graph pruning T Le-Cong, HJ Kang, TG Nguyen, SA Haryono, D Lo, XBD Le, QT Huynh Proceedings of the 30th ACM Joint European Software Engineering Conference …, 2022 | 18 | 2022 |
Hermes: Using commit-issue linking to detect vulnerability-fixing commits G Nguyen-Truong, HJ Kang, D Lo, A Sharma, AE Santosa, A Sharma, ... 2022 IEEE International Conference on Software Analysis, Evolution and …, 2022 | 16 | 2022 |
Vulcurator: a vulnerability-fixing commit detector TG Nguyen, T Le-Cong, HJ Kang, XBD Le, D Lo Proceedings of the 30th ACM Joint European Software Engineering Conference …, 2022 | 13 | 2022 |
Test mimicry to assess the exploitability of library vulnerabilities HJ Kang, TG Nguyen, B Le, CS Păsăreanu, D Lo Proceedings of the 31st ACM SIGSOFT International Symposium on Software …, 2022 | 12 | 2022 |
Androevolve: Automated update for android deprecated-api usages SA Haryono, F Thung, D Lo, L Jiang, J Lawall, HJ Kang, L Serrano, ... 2021 IEEE/ACM 43rd International Conference on Software Engineering …, 2021 | 12 | 2021 |
Towards generating transformation rules without examples for Android API replacement F Thung, HJ Kang, L Jiang, D Lo 2019 IEEE International Conference on Software Maintenance and Evolution …, 2019 | 11 | 2019 |
Chronos: Time-aware zero-shot identification of libraries from vulnerability reports Y Lyu, T Le-Cong, HJ Kang, R Widyasari, Z Zhao, XBD Le, M Li, D Lo 2023 IEEE/ACM 45th International Conference on Software Engineering (ICSE …, 2023 | 10 | 2023 |
Adversarial specification mining HJ Kang, D Lo ACM Transactions on Software Engineering and Methodology (TOSEM) 30 (2), 1-40, 2021 | 10 | 2021 |
How to find actionable static analysis warnings: A case study with FindBugs R Yedida, HJ Kang, H Tu, X Yang, D Lo, T Menzies IEEE Transactions on Software Engineering, 2023 | 9 | 2023 |