Author of the publication

Towards Automatically Localizing Function Errors in Mobile Apps With User Reviews.

, , , , , , , , and . IEEE Trans. Software Eng., 49 (4): 1464-1486 (April 2023)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A Query System for Efficiently Investigating Complex Attack Behaviors for Enterprise Security., , , , , , and . Proc. VLDB Endow., 12 (12): 1802-1805 (2019)Behavior Query Discovery in System-Generated Temporal Graphs., , , , , , , and . Proc. VLDB Endow., 9 (4): 240-251 (2015)Are we there yet? An Industrial Viewpoint on Provenance-based Endpoint Detection and Response Tools., , , , , , , , , and 1 other author(s). CCS, page 2396-2410. ACM, (2023)Improving mobile application security via bridging user expectations and application behaviors., , , , and . HotSoS, page 32. ACM, (2014)Paladin: Automated Generation of Reproducible Test Cases for Android Apps., , , , and . HotMobile, page 99-104. ACM, (2019)DISTDET: A Cost-Effective Distributed Cyber Threat Detection System., , , , , , , and . USENIX Security Symposium, page 6575-6592. USENIX Association, (2023)On the Security Risks of Knowledge Graph Reasoning., , , , , , , , and . USENIX Security Symposium, page 3259-3276. USENIX Association, (2023)Lie to Me: Abusing the Mobile Content Sharing Service for Fun and Profit., , , , , , , , , and . WWW, page 3327-3335. ACM, (2022)DescribeCtx: Context-Aware Description Synthesis for Sensitive Behaviors in Mobile Apps., , , , , and . ICSE, page 685-697. ACM, (2022)DeepIntent: Deep Icon-Behavior Learning for Detecting Intention-Behavior Discrepancy in Mobile Apps., , , , , , , , , and 1 other author(s). CCS, page 2421-2436. ACM, (2019)