LASE: locating and applying systematic edits by learning from examples N Meng, M Kim, KS McKinley 2013 35th International Conference on Software Engineering (ICSE), 502-511, 2013 | 263 | 2013 |
Droidcat: Effective android malware detection and categorization via app-level profiling H Cai, N Meng, B Ryder, D Yao IEEE Transactions on Information Forensics and Security 14 (6), 1455-1470, 2018 | 227 | 2018 |
Cclearner: A deep learning-based clone detection approach L Li, H Feng, W Zhuang, N Meng, B Ryder 2017 IEEE International Conference on Software Maintenance and Evolution …, 2017 | 203 | 2017 |
Systematic editing: generating program transformations from an example N Meng, M Kim, KS McKinley ACM SIGPLAN Notices 46 (6), 329-342, 2011 | 163 | 2011 |
Secure coding practices in java: Challenges and vulnerabilities N Meng, S Nagy, D Yao, W Zhuang, GA Argoty Proceedings of the 40th International Conference on Software Engineering …, 2018 | 136 | 2018 |
Does automated refactoring obviate systematic editing? N Meng, L Hua, M Kim, K McKinley ICSE '15 Proceedings of the 37th International Conference on Software …, 2015 | 81 | 2015 |
An Empirical Study of Flaky Tests in Android Apps S Thorve, C Sreshtha, N Meng 2018 IEEE International Conference on Software Maintenance and Evolution …, 2018 | 68 | 2018 |
Meditor: inference and application of API migration edits S Xu, Z Dong, N Meng 2019 IEEE/ACM 27th International Conference on Program Comprehension (ICPC …, 2019 | 54 | 2019 |
How reliable is the crowdsourced knowledge of security implementation? M Chen, F Fischer, N Meng, X Wang, J Grossklags 2019 IEEE/ACM 41st International Conference on Software Engineering (ICSE …, 2019 | 48 | 2019 |
How does execution information help with information-retrieval based bug localization? T Dao, L Zhang, N Meng 2017 IEEE/ACM 25th International Conference on Program Comprehension (ICPC …, 2017 | 47 | 2017 |
Sydit: Creating and applying a program transformation from an example N Meng, M Kim, KS McKinley Proceedings of the 19th ACM SIGSOFT symposium and the 13th European …, 2011 | 44 | 2011 |
Automatic clone recommendation for refactoring based on the present and the past R Yue, Z Gao, N Meng, Y Xiong, X Wang, JD Morgenthaler 2018 IEEE International Conference on Software Maintenance and Evolution …, 2018 | 34 | 2018 |
An approach to merge results of multiple static analysis tools (short paper) N Meng, Q Wang, Q Wu, H Mei 2008 The eighth international conference on quality software, 169-174, 2008 | 32 | 2008 |
A characterization study of repeated bug fixes R Yue, N Meng, Q Wang 2017 IEEE international conference on software maintenance and evolution …, 2017 | 31 | 2017 |
An empirical study of multi-entity changes in real bug fixes Y Wang, N Meng, H Zhong 2018 IEEE International Conference on Software Maintenance and Evolution …, 2018 | 26 | 2018 |
Lascad: Language-agnostic software categorization and similar application detection D Altarawy, H Shahin, A Mohammed, N Meng Journal of Systems and Software 142, 21-34, 2018 | 21 | 2018 |
Towards reusing hints from past fixes: An exploratory study on thousands of real samples H Zhong, N Meng Proceedings of the 40th International Conference on Software Engineering …, 2018 | 21 | 2018 |
An empirical study on API parameter rules H Zhong, N Meng, Z Li, L Jia Proceedings of the ACM/IEEE 42nd International Conference on Software …, 2020 | 16 | 2020 |
Droidcat: Unified dynamic detection of Android malware H Cai, N Meng, BG Ryder, DD Yao Department of Computer Science, Virginia Polytechnic Institute & State …, 2016 | 15 | 2016 |
Recommending Program Transformations: Automating Repetitive Software Changes M Kim, N Meng Recommendation Systems in Software Engineering, 421-453, 2013 | 15 | 2013 |