Droidcat: Effective android malware detection and categorization via app-level profiling H Cai, N Meng, B Ryder, D Yao IEEE Transactions on Information Forensics and Security 14 (6), 1455-1470, 2018 | 296 | 2018 |
LASE: locating and applying systematic edits by learning from examples N Meng, M Kim, KS McKinley 2013 35th International Conference on Software Engineering (ICSE), 502-511, 2013 | 290 | 2013 |
Cclearner: A deep learning-based clone detection approach L Li, H Feng, W Zhuang, N Meng, B Ryder 2017 IEEE international conference on software maintenance and evolution …, 2017 | 270 | 2017 |
Secure coding practices in java: Challenges and vulnerabilities N Meng, S Nagy, D Yao, W Zhuang, GA Argoty Proceedings of the 40th International Conference on Software Engineering …, 2018 | 184 | 2018 |
Systematic editing: generating program transformations from an example N Meng, M Kim, KS McKinley ACM SIGPLAN Notices 46 (6), 329-342, 2011 | 170 | 2011 |
An Empirical Study of Flaky Tests in Android Apps S Thorve, C Sreshtha, N Meng 2018 IEEE International Conference on Software Maintenance and Evolution …, 2018 | 89 | 2018 |
Does automated refactoring obviate systematic editing? N Meng, L Hua, M Kim, K McKinley ICSE '15 Proceedings of the 37th International Conference on Software …, 2015 | 85 | 2015 |
How reliable is the crowdsourced knowledge of security implementation? M Chen, F Fischer, N Meng, X Wang, J Grossklags 2019 IEEE/ACM 41st International Conference on Software Engineering (ICSE …, 2019 | 72 | 2019 |
Meditor: inference and application of API migration edits S Xu, Z Dong, N Meng 2019 IEEE/ACM 27th International Conference on Program Comprehension (ICPC …, 2019 | 62 | 2019 |
How does execution information help with information-retrieval based bug localization? T Dao, L Zhang, N Meng 2017 IEEE/ACM 25th International Conference on Program Comprehension (ICPC …, 2017 | 53 | 2017 |
Automatic clone recommendation for refactoring based on the present and the past R Yue, Z Gao, N Meng, Y Xiong, X Wang, JD Morgenthaler 2018 IEEE International Conference on Software Maintenance and Evolution …, 2018 | 52 | 2018 |
Sydit: Creating and applying a program transformation from an example N Meng, M Kim, KS McKinley Proceedings of the 19th ACM SIGSOFT symposium and the 13th European …, 2011 | 50 | 2011 |
Automatic detection of Java cryptographic API misuses: Are we there yet? Y Zhang, MMA Kabir, Y Xiao, D Yao, N Meng IEEE Transactions on Software Engineering 49 (1), 288-303, 2022 | 38 | 2022 |
A characterization study of repeated bug fixes R Yue, N Meng, Q Wang 2017 IEEE international conference on software maintenance and evolution …, 2017 | 38 | 2017 |
An approach to merge results of multiple static analysis tools (short paper) N Meng, Q Wang, Q Wu, H Mei 2008 The eighth international conference on quality software, 169-174, 2008 | 37 | 2008 |
An empirical study of multi-entity changes in real bug fixes Y Wang, N Meng, H Zhong 2018 IEEE International Conference on Software Maintenance and Evolution …, 2018 | 35 | 2018 |
A cost-effective, scalable, and portable IoT data infrastructure for indoor environment sensing SMH Anik, X Gao, N Meng, PR Agee, AP McCoy Journal of Building Engineering 49, 104027, 2022 | 32 | 2022 |
Lascad: Language-agnostic software categorization and similar application detection D Altarawy, H Shahin, A Mohammed, N Meng Journal of Systems and Software 142, 21-34, 2018 | 29 | 2018 |
Investigating the reproducibility of npm packages P Goswami, S Gupta, Z Li, N Meng, D Yao 2020 IEEE International Conference on Software Maintenance and Evolution …, 2020 | 27 | 2020 |
An empirical study on API parameter rules H Zhong, N Meng, Z Li, L Jia Proceedings of the ACM/IEEE 42nd International Conference on Software …, 2020 | 24 | 2020 |