Yinxing Xue
TitleCited byYear
Feature location in a collection of product variants
Y Xue, Z Xing, S Jarzabek
2012 19th Working Conference on Reverse Engineering, 145-154, 2012
792012
Detecting differences across multiple instances of code clones
Y Lin, Z Xing, Y Xue, Y Liu, X Peng, J Sun, W Zhao
Proceedings of the 36th International Conference on Software Engineering …, 2014
432014
Bingo: Cross-architecture cross-os binary search
M Chandramohan, Y Xue, Z Xu, Y Liu, CY Cho, HBK Tan
Proceedings of the 2016 24th ACM SIGSOFT International Symposium on …, 2016
402016
Understanding feature evolution in a family of product variants
Y Xue, Z Xing, S Jarzabek
2010 17th Working Conference on Reverse Engineering, 109-118, 2010
382010
Semantic modelling of android malware for effective malware comprehension, detection, and classification
G Meng, Y Xue, Z Xu, Y Liu, J Zhang, A Narayanan
Proceedings of the 25th International Symposium on Software Testing and …, 2016
352016
Optimizing selection of competing features via feedback-directed evolutionary algorithms
TH Tan, Y Xue, M Chen, J Sun, Y Liu, JS Dong
Proceedings of the 2015 International Symposium on Software Testing and …, 2015
322015
Mystique: Evolving android malware for auditing anti-malware tools
G Meng, Y Xue, C Mahinthan, A Narayanan, Y Liu, J Zhang, T Chen
Proceedings of the 11th ACM on Asia conference on computer and …, 2016
282016
Reengineering legacy software products into software product line based on automatic variability analysis
Y Xue
Proceedings of the 33rd International Conference on Software Engineering …, 2011
282011
A case study of variation mechanism in an industrial product line
P Ye, X Peng, Y Xue, S Jarzabek
International Conference on Software Reuse, 126-136, 2009
282009
Hawkeye: Towards a desired directed grey-box fuzzer
H Chen, Y Xue, Y Li, B Chen, X Xie, X Wu, Y Liu
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
262018
Auditing anti-malware tools by evolving Android malware and dynamic loading technique
Y Xue, G Meng, Y Liu, TH Tan, H Chen, J Sun, J Zhang
IEEE Transactions on Information Forensics and Security 12 (7), 1529-1544, 2017
252017
Jsdc: A hybrid approach for javascript malware detection and classification
J Wang, Y Xue, Y Liu, TH Tan
Proceedings of the 10th ACM Symposium on Information, Computer and …, 2015
222015
Are clones harmful for maintenance?
S Jarzabek, Y Xue
222010
IBED: Combining IBEA and DE for optimal feature selection in software product line engineering
Y Xue, J Zhong, TH Tan, Y Liu, W Cai, M Chen, J Sun
Applied Soft Computing 49, 1215-1231, 2016
212016
Feedback-based debugging
Y Lin, J Sun, Y Xue, Y Liu, J Dong
2017 IEEE/ACM 39th International Conference on Software Engineering (ICSE …, 2017
182017
CloneDifferentiator: Analyzing clones by differentiation
Z Xing, Y Xue, S Jarzabek
2011 26th IEEE/ACM International Conference on Automated Software …, 2011
182011
Detection and classification of malicious JavaScript via attack behavior modelling
Y Xue, J Wang, Y Liu, H Xiao, J Sun, M Chandramohan
Proceedings of the 2015 International Symposium on Software Testing and …, 2015
172015
Optimizing selection of competing services with probabilistic hierarchical refinement
TH Tan, M Chen, J Sun, Y Liu, É André, Y Xue, JS Dong
2016 IEEE/ACM 38th International Conference on Software Engineering (ICSE …, 2016
162016
A large scale linux-kernel based benchmark for feature location research
Z Xing, Y Xue, S Jarzabek
Proceedings of the 2013 International Conference on Software Engineering …, 2013
122013
Reengineering legacy software products into software product line
Y Xue, Z Xing, S Jarzabek
LAP LAMBERT Academic Publishing, 2013
92013
The system can't perform the operation now. Try again later.
Articles 1–20