Follow
Yang Liu
Yang Liu
University Leadership Forum Chair Professor, Nanyang Technological University
Verified email at ntu.edu.sg - Homepage
Title
Cited by
Cited by
Year
graph2vec: Learning distributed representations of graphs
A Narayanan, M Chandramohan, R Venkatesan, L Chen, Y Liu, S Jaiswal
arXiv preprint arXiv:1707.05005, 2017
4942017
Machine learning testing: Survey, landscapes and horizons
JM Zhang, M Harman, L Ma, Y Liu
IEEE Transactions on Software Engineering, 2020
4682020
PAT: Towards flexible verification under fairness
J Sun, Y Liu, JS Dong, J Pang
International Conference on Computer Aided Verification, 709-714, 2009
4672009
DeepGauge: Multi-Granularity Testing Criteria for Deep Learning Systems
L Ma, F Juefei-Xu, F Zhang, J Sun, M Xue, B Li, C Chen, T Su, L Li, Y Liu, ...
Proceedings of the 33rd ACM/IEEE International Conference on Automated …, 2018
4432018
DeepHunter: a coverage-guided fuzz testing framework for deep neural networks
X Xie, L Ma, F Juefei-Xu, M Xue, H Chen, Y Liu, J Zhao, B Li, J Yin, S See
Proceedings of the 28th ACM SIGSOFT International Symposium on Software …, 2019
277*2019
DeepMutation: Mutation Testing of Deep Learning Systems
L Ma, F Zhang, J Sun, M Xue, B Li, F Juefei-Xu, C Xie, L Li, Y Liu, J Zhao, ...
The 29th IEEE International Symposium on Software Reliability Engineering …, 2018
2622018
Skyfire: Data-driven seed generation for fuzzing
J Wang, B Chen, L Wei, Y Liu
2017 IEEE Symposium on Security and Privacy (SP), 579-594, 2017
2512017
Steelix: program-state based binary fuzzing
Y Li, B Chen, M Chandramohan, SW Lin, Y Liu, A Tiu
Proceedings of the 2017 11th Joint Meeting on Foundations of Software …, 2017
2502017
Guided, stochastic model-based GUI testing of Android apps
T Su, G Meng, Y Chen, K Wu, W Yang, Y Yao, G Pu, Y Liu, Z Su
Proceedings of the 2017 11th Joint Meeting on Foundations of Software …, 2017
2292017
Model checking CSP revisited: Introducing a process analysis toolkit
J Sun, Y Liu, JS Dong
Leveraging Applications of Formal Methods, Verification and Validation, 307-322, 2009
2192009
Devign: Effective Vulnerability Identification by Learning Comprehensive Program Semantics via Graph Neural Networks
Y Zhou, S Liu, J Siow, X Du, Y Liu
Advances in Neural Information Processing Systems, 10197-10207, 2019
2172019
Cloudy with a chance of breach: Forecasting cyber security incidents
Y Liu, A Sarabi, J Zhang, P Naghizadeh, M Karir, M Bailey, M Liu
24th {USENIX} Security Symposium ({USENIX} Security 15), 1009-1024, 2015
1922015
subgraph2vec: Learning distributed representations of rooted sub-graphs from large graphs
A Narayanan, M Chandramohan, L Chen, Y Liu, S Saminathan
arXiv preprint arXiv:1606.08928, 2016
1802016
Semantics-based online malware detection: Towards efficient real-time protection against malware
S Das, Y Liu, W Zhang, M Chandramohan
IEEE transactions on information forensics and security 11 (2), 289-302, 2015
1732015
DeepCT: Tomographic Combinatorial Testing for Deep Learning Systems
L Ma, F Juefei-Xu, M Xue, B Li, L Li, Y Liu, J Zhao
2019 IEEE 26th International Conference on Software Analysis, Evolution and …, 2019
165*2019
FakeSpotter: A Simple yet Robust Baseline for Spotting AI-Synthesized Fake Faces
R Wang, F Juefei-Xu, L Ma, X Xie, Y Huang, J Wang, Y Liu
150*
Hawkeye: towards a desired directed grey-box fuzzer
H Chen, Y Xue, Y Li, B Chen, X Xie, X Wu, Y Liu
Proceedings of the 2018 ACM SIGSAC Conference on Computer and Communications …, 2018
1452018
From UI design image to GUI skeleton: a neural machine translator to bootstrap mobile GUI implementation
C Chen, T Su, G Meng, Z Xing, Y Liu
Proceedings of the 40th International Conference on Software Engineering …, 2018
1392018
AUTHSCAN: Automatic Extraction of Web Authentication Protocols from Implementations
G Bai, J Lei, G Meng, SS Venkatraman, P Saxena, J Sun, Y Liu, JS Dong
Proceedings of the 20th Annual Network and Distributed System Security …, 2013
1392013
Towards robust neural machine translation
Y Cheng, Z Tu, F Meng, J Zhai, Y Liu
arXiv preprint arXiv:1805.06130, 2018
1312018
The system can't perform the operation now. Try again later.
Articles 1–20