Follow
Na Meng
Title
Cited by
Cited by
Year
Droidcat: Effective android malware detection and categorization via app-level profiling
H Cai, N Meng, B Ryder, D Yao
IEEE Transactions on Information Forensics and Security 14 (6), 1455-1470, 2018
2962018
LASE: locating and applying systematic edits by learning from examples
N Meng, M Kim, KS McKinley
2013 35th International Conference on Software Engineering (ICSE), 502-511, 2013
2902013
Cclearner: A deep learning-based clone detection approach
L Li, H Feng, W Zhuang, N Meng, B Ryder
2017 IEEE international conference on software maintenance and evolution …, 2017
2702017
Secure coding practices in java: Challenges and vulnerabilities
N Meng, S Nagy, D Yao, W Zhuang, GA Argoty
Proceedings of the 40th International Conference on Software Engineering …, 2018
1842018
Systematic editing: generating program transformations from an example
N Meng, M Kim, KS McKinley
ACM SIGPLAN Notices 46 (6), 329-342, 2011
1702011
An Empirical Study of Flaky Tests in Android Apps
S Thorve, C Sreshtha, N Meng
2018 IEEE International Conference on Software Maintenance and Evolution …, 2018
892018
Does automated refactoring obviate systematic editing?
N Meng, L Hua, M Kim, K McKinley
ICSE '15 Proceedings of the 37th International Conference on Software …, 2015
852015
How reliable is the crowdsourced knowledge of security implementation?
M Chen, F Fischer, N Meng, X Wang, J Grossklags
2019 IEEE/ACM 41st International Conference on Software Engineering (ICSE …, 2019
722019
Meditor: inference and application of API migration edits
S Xu, Z Dong, N Meng
2019 IEEE/ACM 27th International Conference on Program Comprehension (ICPC …, 2019
622019
How does execution information help with information-retrieval based bug localization?
T Dao, L Zhang, N Meng
2017 IEEE/ACM 25th International Conference on Program Comprehension (ICPC …, 2017
532017
Automatic clone recommendation for refactoring based on the present and the past
R Yue, Z Gao, N Meng, Y Xiong, X Wang, JD Morgenthaler
2018 IEEE International Conference on Software Maintenance and Evolution …, 2018
522018
Sydit: Creating and applying a program transformation from an example
N Meng, M Kim, KS McKinley
Proceedings of the 19th ACM SIGSOFT symposium and the 13th European …, 2011
502011
Automatic detection of Java cryptographic API misuses: Are we there yet?
Y Zhang, MMA Kabir, Y Xiao, D Yao, N Meng
IEEE Transactions on Software Engineering 49 (1), 288-303, 2022
382022
A characterization study of repeated bug fixes
R Yue, N Meng, Q Wang
2017 IEEE international conference on software maintenance and evolution …, 2017
382017
An approach to merge results of multiple static analysis tools (short paper)
N Meng, Q Wang, Q Wu, H Mei
2008 The eighth international conference on quality software, 169-174, 2008
372008
An empirical study of multi-entity changes in real bug fixes
Y Wang, N Meng, H Zhong
2018 IEEE International Conference on Software Maintenance and Evolution …, 2018
352018
A cost-effective, scalable, and portable IoT data infrastructure for indoor environment sensing
SMH Anik, X Gao, N Meng, PR Agee, AP McCoy
Journal of Building Engineering 49, 104027, 2022
322022
Lascad: Language-agnostic software categorization and similar application detection
D Altarawy, H Shahin, A Mohammed, N Meng
Journal of Systems and Software 142, 21-34, 2018
292018
Investigating the reproducibility of npm packages
P Goswami, S Gupta, Z Li, N Meng, D Yao
2020 IEEE International Conference on Software Maintenance and Evolution …, 2020
272020
An empirical study on API parameter rules
H Zhong, N Meng, Z Li, L Jia
Proceedings of the ACM/IEEE 42nd International Conference on Software …, 2020
242020
The system can't perform the operation now. Try again later.
Articles 1–20